Cloud Computing Trends: A Literature Review

This study is a literature review on cloud computing cloud computing trends as one the fastest growing technologies in the computer industry and their benefits and opportunities for all types of organizations. In addition, it addresses the challenges and problems that contribute to increasing the number of customers willing to adopt and use the technology. A mixed research study approach was adopted for the study, that is, by collecting and analyzing both quantitative and qualitative information within the same literature review and summarizing the findings of previous (related) studies. Results highlights the current and future trends of cloud computing and exposes readers to the challenges and problems associated with cloud computing. The reviewed literature showed that the technology is promising and is expected to grow in the future. Researchers have proposed many techniques to address the problems and challenges of cloud computing, such as security and privacy risks, through mobile cloud computing and cloud-computing governance.

[1]  Seyed Aliakbar Mousavi,et al.  Adoption of Cloud Computing among Enterprises in Malaysia , 2016 .

[2]  Prashant Pandey,et al.  Cloud computing , 2010, ICWET.

[3]  Vladimir Stantchev,et al.  Governance, Risk, and Compliance in Cloud Scenarios , 2019, Applied Sciences.

[4]  Geng Yang,et al.  A privacy protection-oriented parallel fully homomorphic encryption algorithm in cyber physical systems , 2019, EURASIP J. Wirel. Commun. Netw..

[5]  K. Ruba Soundar,et al.  A Novel Securable Fuzzy Logic Based Ranking Scheme for Document Searching on Outsourced Cloud Data , 2019, Wirel. Pers. Commun..

[6]  Gexiang Zhang,et al.  Cloud-assisted secure eHealth systems for tamper-proofing EHR via blockchain , 2019, Inf. Sci..

[7]  Dongxi Liu,et al.  Unified Fine-Grained Access Control for Personal Health Records in Cloud Computing , 2019, IEEE Journal of Biomedical and Health Informatics.

[8]  Xianmin Wang,et al.  Multi-level multi-secret sharing scheme for decentralized e-voting in cloud computing , 2019, J. Parallel Distributed Comput..

[9]  Xiaojun Zhang,et al.  Identity-based proxy-oriented outsourcing with public auditing in cloud-based medical cyber-physical systems , 2019, Pervasive Mob. Comput..

[10]  Ke Xu,et al.  A Survey of Research on Mobile Cloud Computing , 2011, 2011 10th IEEE/ACIS International Conference on Computer and Information Science.

[11]  Huiyong Wang,et al.  Privacy-Preserving Cloud-Based Road Condition Monitoring With Source Authentication in VANETs , 2019, IEEE Transactions on Information Forensics and Security.

[12]  P. Mell,et al.  The NIST Definition of Cloud Computing , 2011 .

[13]  Paramvir Bahl,et al.  The Case for VM-Based Cloudlets in Mobile Computing , 2009, IEEE Pervasive Computing.

[14]  Bo Hu,et al.  Everything as a Service (XaaS) on the Cloud: Origins, Current and Future Trends , 2015, 2015 IEEE 8th International Conference on Cloud Computing.

[15]  Jie Cui,et al.  OOABKS: Online/offline attribute-based encryption for keyword search in mobile cloud , 2019, Inf. Sci..

[16]  Sukhwinder Singh,et al.  Mobile Cloud Computing , 2014 .

[17]  Hans D. Schotten,et al.  Access Schemes for Mobile Cloud Computing , 2010, 2010 Eleventh International Conference on Mobile Data Management.

[18]  Qiang Ye,et al.  A machine learning based intrusion detection scheme for data fusion in mobile clouds involving heterogeneous client networks , 2019, Inf. Fusion.

[19]  Zehra Sura,et al.  Collaborative and Accountable Hardware Governance Using Blockchain , 2018, 2018 IEEE 4th International Conference on Collaboration and Internet Computing (CIC).

[20]  Mircea Georgescu,et al.  IT Governance in Cloud , 2014 .

[21]  S. Ganapathy,et al.  A secured storage and privacy-preserving model using CRT for providing security on cloud and IoT-based applications , 2019, Comput. Networks.

[22]  Z. Maamar,et al.  Role assigning and taking in cloud computing , 2019, Human Systems Management.

[23]  B. Asvija,et al.  Security in hardware assisted virtualization for cloud computing - State of the art issues and challenges , 2019, Comput. Networks.

[24]  Qiang Zhang,et al.  Enabling Cooperative Privacy-preserving Personalized search in cloud environments , 2019, Inf. Sci..

[25]  Ezz El-Din Hemdan,et al.  IFHDS: Intelligent Framework for Securing Healthcare BigData , 2019, Journal of Medical Systems.

[26]  Ramraj Dangi,et al.  An Improved Authentication and Data Security Approach Over Cloud Environment , 2019 .

[27]  Jianhua Chen,et al.  Privacy-Preserving and Efficient Truly Three-Factor Authentication Scheme for Telecare Medical Information Systems , 2018, Journal of Medical Systems.

[28]  Hao Wang,et al.  Privacy-preserving data search with fine-grained dynamic search right management in fog-assisted Internet of Things , 2019, Inf. Sci..

[29]  Qiaoyan Wen,et al.  Decentralized, Revocable and Verifiable Attribute-Based Encryption in Hybrid Cloud System , 2019, Wirel. Pers. Commun..

[30]  Antonio A. de A. Rocha,et al.  Calculating the trust of providers through the construction weighted Sec-SLA , 2019, Future Gener. Comput. Syst..

[31]  Navpreet Kaur Walia,et al.  Survey on Mobile Cloud Computing , 2024, Advances in Robotic Technology.

[32]  Ahmad Ashari,et al.  Cloud Computing : Solusi ICT ? , 2011 .

[33]  Musheer Ahmad,et al.  A secure elliptic curve cryptography based mutual authentication protocol for cloud-assisted TMIS , 2019, Telematics Informatics.

[34]  Chengyu Hu,et al.  Towards dependable and trustworthy outsourced computing: A comprehensive survey and tutorial , 2019, J. Netw. Comput. Appl..

[35]  Zhihui Lu,et al.  Data Privacy Protection for Edge Computing of Smart City in a DIKW Architecture , 2019, Eng. Appl. Artif. Intell..

[36]  Yaping Lin,et al.  A lightweight privacy and integrity preserving range query scheme for mobile cloud computing , 2019, Comput. Secur..

[37]  Rajkumar Buyya,et al.  Next generation cloud computing: New trends and research directions , 2017, Future Gener. Comput. Syst..

[38]  Tao Zhang,et al.  A lightweight secure conjunctive keyword search scheme in hybrid cloud , 2019, Future Gener. Comput. Syst..

[39]  Ralf Klamma,et al.  Mobile Cloud Computing: A Comparison of Application Models , 2011, ArXiv.

[40]  Randy H. Katz,et al.  A view of cloud computing , 2010, CACM.

[41]  Chonho Lee,et al.  A survey of mobile cloud computing: architecture, applications, and approaches , 2013, Wirel. Commun. Mob. Comput..

[42]  Hatim Hafiddi,et al.  Toward a unified framework for Cloud Computing governance: An approach for evaluating and integrating IT management and governance models , 2019, Comput. Stand. Interfaces.

[43]  Perry Cheng,et al.  Serverless Computing: Current Trends and Open Problems , 2017, Research Advances in Cloud Computing.

[44]  Hamid Harroud,et al.  Mobile cloud computing for computation offloading: Issues and challenges , 2018 .

[45]  Qing Yang,et al.  A dual privacy-preservation scheme for cloud-based eHealth systems , 2019, J. Inf. Secur. Appl..

[46]  Josep Domingo-Ferrer,et al.  Privacy-preserving cloud computing on sensitive data: A survey of methods, products and challenges , 2019, Comput. Commun..

[47]  Xin Jiang,et al.  A Blockchain-Based Scheme for Secure Sharing of X-Ray Medical Images , 2018 .

[48]  Albert Y. Zomaya,et al.  Privacy-preserving anomaly detection in the cloud for quality assured decision-making in smart cities , 2019, J. Parallel Distributed Comput..

[49]  Fuchun Guo,et al.  Privacy-Preserving Certificateless Cloud Auditing with Multiple Users , 2019, Wirel. Pers. Commun..

[50]  Yasmine Abouelseoud,et al.  Effect of chosen features on performance of privacy preserving image retrieval systems , 2019, Comput. Electr. Eng..

[51]  Hans P. Borgman,et al.  Cloudrise: Exploring Cloud Computing Adoption and Governance with the TOE Framework , 2013, 2013 46th Hawaii International Conference on System Sciences.

[52]  Qinghua Zheng,et al.  Towards Efficient Fine-Grained Access Control and Trustworthy Data Processing for Remote Monitoring Services in IoT , 2019, IEEE Transactions on Information Forensics and Security.

[53]  Mazliza Othman,et al.  A Survey of Mobile Cloud Computing Application Models , 2014, IEEE Communications Surveys & Tutorials.

[54]  Eugene Marinelli,et al.  Hyrax: Cloud Computing on Mobile Devices using MapReduce , 2009 .

[55]  Albert Y. Zomaya,et al.  Customer-Satisfaction-Aware Optimal Multiserver Configuration for Profit Maximization in Cloud Computing , 2019 .