Mapping the quantity, quality and structural indicators of Asian (48 countries and 3 territories) research productivity on cloud computing

2022 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Waqar Ahmad Awan ◽  
Akhtar Abbas

PurposeThe purpose of this study was to map the quantity (frequency), quality (impact) and structural indicators (correlations) of research produced on cloud computing in 48 countries and 3 territories in the Asia continent.Design/methodology/approachTo achieve the objectives of the study and scientifically map the indicators, data were extracted from the Scopus database. The extracted bibliographic data was first cleaned properly using Endnote and then analyzed using Biblioshiny and VosViewer application software. In the software, calculations include citations count; h, g and m indexes; Bradford's and Lotka's laws; and other scientific mappings.FindingsResults of the study indicate that China remained the most productive, impactful and collaborative country in Asia. All the top 20 impactful authors were also from China. The other most researched areas associated with cloud computing were revealed to be mobile cloud computing and data security in clouds. The most prominent journal currently publishing research studies on cloud computing was “Advances in Intelligent Systems and Computing.”Originality/valueThe study is the first of its kind which identified the quantity (frequencies), quality (impact) and structural indicators (correlations) of Asian (48 countries and 3 territories) research productivity on cloud computing. The results are of great importance for researchers and countries interested in further exploring, publishing and increasing cross country collaborations related to the phenomenon of cloud computing.

Kybernetes ◽  
2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Shurui Gao ◽  
Weidong Meng

PurposeCloud-based technologies are reliably improving Information Technology (IT) environment incorporating changes and modifications to the present business structure. Cloud computing enables small and medium-sized businesses (SMBs) to organize and exchange pertinent data and information in real time. This study checks out the influence of cloud-based services (IT infrastructure, expenses of cloud services, cloud data security and IT knowledge of human resources) on customers' satisfaction in SMBs.Design/methodology/approachCloud computing offers a way to coordinate and share organizational and personal information and data. The adoption of cloud services is one of the most emerging technological advances in the current competitive business environment. Cloud-based services allow start-ups or SMBs to take advantage of technological advancements and respond more quickly to changing consumer demands. In the available literature, cloud computing has received a lot of attention. However, there is also a research gap in creating a paradigm that links the value development drivers in the electronic industry with the leveraging impact of cloud and intercloud computing resources for start-ups and SMBs. A hypothetical model was constructed based on a literature review, and the associations between the latent variables were investigated utilizing structural equations.FindingsFindings from the study confirmed the validity of the proposed model for customer satisfaction assessment. Besides, the results showed that customer satisfaction is affected by cloud-based services in SMBs. The results illustrated that IT infrastructure influences customer satisfaction significantly and positively, with a T-value of 2.42. Also, the results confirmed that the cost of cloud services with a T-value of 2.68 affects customer satisfaction significantly and positively. Cloud data security also impacts customer satisfaction with a T-value of 5.20. The results also showed that the IT knowledge of human resources affects customer satisfaction with a T-value of 3.01.Originality/valueThe main originality of this research is proposing a new conceptual model to assess the impact of cloud-based services on the satisfaction of the customers in SMBs.


Cloud Computing is a very viable data storage structure where the users can store and access the data from anywhere. Cloud computing use is increasing at a very rapid pace nowadays. But as cloud allows us data accessibility quite easily data security is a major concern and is an emerging area of study. Other issues related to cloud computing are data privacy and internet dependency. On the other cloud computing also has wide range of benefits over traditional storage and accessibility environment such as scalability, flexibility and resource utilization. We have worked in the area of mobile cloud computing to analyse and solve the problems of anomaly attacks. Our work focuses on preventing the adaptive anomaly attacks and some other security issues of cloud computing


2018 ◽  
Author(s):  
Mohammed-Ali Anwar

Mobile Cloud Computing (MCC) is a recent technological development, which has emerged from two popular technology trends; mobile computing and cloud. In essence it revolutionises the capabilities of mobile devices by integrating both storage and processing of the cloud environment with mobile computing and in doing so providing greater optimisation and operating power, allowing for transparent and seamless use of resources provided by the cloud. However, expanding the capability of resource constrained mobile devices in this manner comes at a price. There are many risks associated with the security of data within the cloud environment and as MCC essentially uses the cloud, it also inherits any security issues that are associated with cloud computing. The aim of this survey is to identify potential data security issues, and analyse and present some pioneering security mechanisms and finally suggest some future directions for better data security with MCC.


2017 ◽  
Vol 379 ◽  
pp. 42-61 ◽  
Author(s):  
Yinghui Zhang ◽  
Xiaofeng Chen ◽  
Jin Li ◽  
Duncan S. Wong ◽  
Hui Li ◽  
...  

IJARCCE ◽  
2015 ◽  
pp. 254-257 ◽  
Author(s):  
Chandni Patel ◽  
SameerSingh Chauhan ◽  
Bhavesh Patel

OALib ◽  
2016 ◽  
Vol 03 (04) ◽  
pp. 1-11 ◽  
Author(s):  
Mohammad Waseem ◽  
Abdullah Lakhan ◽  
Irfan Ali Jamali

Author(s):  
Seada Abdu Wakene ◽  
Sisay Muleta Hababa ◽  
Gutema Seboka Daba ◽  
K S Ananda Kumar

Mobile cloud computing (MCC) combines cloud computing and mobile computing to deliver vast computational resources to mobile consumers, network operators, and cloud computing providers. You may access your data from anywhere in the globe using any mobile device that is linked to the Internet. Cloud computing provides access to data in real-time whenever and wherever want. Any conventional mobile device can benefit from MCC's infrastructure, computational capacity, software, and platform services. Network security, web application security, data access, authentication, authorization, data confidentiality, and data breach are all concerns of MCC's security. Because mobile devices lack sufficient storage and processing power, their data storage capacity is limited. Users of mobile devices may inadvertently provide sensitive information over the network or through the application. Therefore, data security is the main concern for mobile device users. The objective of this paper is to find a solution that can enhance technical requirements with relation to user’s data security and privacy in mobile cloud computing. To achieve this improved blowfish encryption algorithm is used to encrypt each user’s data security and where the shared secret key is hash down using message digest called secured hash function. Hashing can increase the integrity and privacy of user data. The proposed algorithm is evaluated with a normal blowfish algorithm and 3DES with different parameters. Improved blowfish algorithm shows better performance than normal blowfish algorithm and 3DES. In this work, we have developed web-based application where the Amazon MySQL RDS database is used for data storage.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Ankush Balaram Pawar ◽  
Dr. Shashikant U. Ghumbre ◽  
Dr. Rashmi M. Jogdand

Purpose Cloud computing plays a significant role in the initialization of secure communication between users. The advanced technology directs to offer several services, such as platform, resources, and accessing the network. Furthermore, cloud computing is a broader technology of communication convergence. In cloud computing architecture, data security and authentication are the main significant concerns. Design/methodology/approach The purpose of this study is to design and develop authentication and data security model in cloud computing. This method includes six various units, such as cloud server, data owner, cloud user, inspection authority, attribute authority, and central certified authority. The developed privacy preservation method includes several stages, namely setup phase, key generation phase, authentication phase and data sharing phase. Initially, the setup phase is performed through the owner, where the input is security attributes, whereas the system master key and the public parameter are produced in the key generation stage. After that, the authentication process is performed to identify the security controls of the information system. Finally, the data is decrypted in the data sharing phase for sharing data and for achieving data privacy for confidential data. Additionally, dynamic splicing is utilized, and the security functions, such as hashing, Elliptic Curve Cryptography (ECC), Data Encryption Standard-3 (3DES), interpolation, polynomial kernel, and XOR are employed for providing security to sensitive data. Findings The effectiveness of the developed privacy preservation method is estimated based on other approaches and displayed efficient outcomes with better privacy factor and detection rate of 0.83 and 0.65, and time is highly reduced by 2815ms using the Cleveland dataset. Originality/value This paper presents the privacy preservation technique for initiating authenticated encrypted access in clouds, which is designed for mutual authentication of requester and data owner in the system.


Sign in / Sign up

Export Citation Format

Share Document