[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ Skip to main content
Log in

A systematic review on cloud computing

  • Published:
The Journal of Supercomputing Aims and scope Submit manuscript

Abstract

Cloud computing is an ascending technology that has introduced a new paradigm by rendering a rational computational model possible. It has changed the dynamics of IT consumption by means of a model that provides on-demand services over the Internet. Unlike the traditional hosting service, cloud computing services are paid for per usage and may expand or shrink based on demand. Such services are, in general, fully managed by cloud providers that require users nothing but a personal computer and an Internet access. In recent years, this model has attracted the attention of researchers, investors and practitioners, many of whom have proposed a number of applications, structures and fundamentals of cloud computing, resulting in various definitions, requirements and models. Despite the interest and advances in the field, issues such as security and privacy, service layer agreement, resource sharing, and billing have opened up new questions about the real gains of the model. Although cloud computing is based on a 50-year-old business model, evidence from this study indicates that cloud computing still needs to expand and overcome present limitations that prevent the full use of its potential. In this study, we critically review the state of the art in cloud computing with the aim of identifying advances, gaps and new challenges.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
£29.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price includes VAT (United Kingdom)

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14

Similar content being viewed by others

Notes

  1. http://cabig.cancer.gov/.

  2. http://www.earthsystemgrid.org/home.htm.

  3. http://searchcloudcomputing.techtarget.com/definition/cloud-computing.

  4. http://www.sri.com/sites/default/files/brochures/dec-05.pdf.

  5. http://www.gartner.com/newsroom/id/2537815/.

  6. http://www.networkworld.com/news/2013/073013/cloud-computing-disaster-recovery-272370.html.

  7. http://assertlab.com/.

References

  1. Amazon (2012) Amazon web services. URL: http://aws.amazon.com/. Retrieved 24 Oct 2013

  2. Apple (1983) Apple invents the personal computer. URL: http://archive.computerhistory.org/resources/text/Apple/Apple.Lisa.1983.102634506.pdf. Retrieved 24 Oct 2013

  3. Baliga J, Ayre RWA, Hinton K, Tucker RS (2010) Green cloud computing: balancing energy in processing, storage and transport. J Proc IEEE 99

  4. Basili VR, Zelkowitz MV (2007) Empirical studies to build a science of computer science. Commun ACM 50(11):33–37

    Article  Google Scholar 

  5. Bellis M (1997) The history of computers. URL: http://inventors.about.com/library/blcoindex.htm. Retrieved 24 Oct 2013

  6. Berners-Lee T (1998) The world wide web: a very short personal history

  7. Boloor K, Chirkova R, Viniotis Y, Salo T (2010) Dynamic request allocation and scheduling for context aware applications subject to a percentile response time sla in a distributed cloud. In: IEEE International Conference and Workshops on Cloud Computing Technology and Science (CLOUDCOM’10)

  8. Bonetta D, Pautasso C (2011) Towards liquid service oriented architectures. In: International conference on World Wide Web, Hyderabad, India

  9. Budgen D, Kitchenham BA, Charters SM, Turner M, Brereton P, Linkman SG (2008) Presenting software engineering results using structured abstracts: a randomised experiment. Empirical Softw Eng 13(4):435–468

    Article  Google Scholar 

  10. Buyya R, Yeo CS, Venugopal S, Broberg J, Brandic I (2009) Cloud computing and emerging it platforms: vision, hype, and reality for delivering computing as the 5th utility. Future Comput Syst 25(6):599–616

    Article  Google Scholar 

  11. Cadan KS, Li WS, Phan T, Zhou M (2009) Frontiers in information and software as services. In: International Conference on Data, Engineering (ICDE’09)

  12. Calero JMA, Edwards N, Kirschnick J, Wilcock L, Wray M (2010) Toward a multi-tenancy authorization system for cloud services. J Secur Priv 8:48–55

    Article  Google Scholar 

  13. Campbell-Kelly M (2009) Historical reflections the rise, fall, and resurrection of software as a service. J CACM 52

  14. Caron E, Desprez F, Muresan A (2011) Pattern matching based forecast of non-periodic repetitive behavior for cloud clients. J Grid Comput 9:49–64

    Article  Google Scholar 

  15. Carr NG (2003) It doesn’t matter. In: Harvard Business School

  16. Chapman C, Emmerich W, Márquez FG, Clayman S, Galis A (2011) Software architecture definition for on-demand cloud provisioning. J Cluster Comput 14:1–22

    Article  Google Scholar 

  17. Chaves SA, Westphall CB, Lamin FR (2010) Sla perspective in security management for cloud computing. In: International Conference on Networking and Services (ICNS’10)

  18. Chellappa RK (1997) Intermediaries in cloud-computing: A new computing paradigm. In INFORMS Annual Meeting, Dallas

  19. Chieu T, Kapoor S, Mohindra A, Shaikh A (2010) Cross enterprise improvements delivered via a cloud platform: a game changer for the consumer product and retail industry. In: International Conference on Services, Computing (SCC’10)

  20. Cho B, Gupta I (2010) New algorithms for planning bulk transfer via internet and shipping networks. In: International Conference on Distributed, Computing Systems (ICDCS’10)

  21. Chong F, Carraro G (2006) Architecture strategies for catching the long tail. MSDN Library, Microsoft Corporation, pp 9–10

  22. Columbus L (2011) Gartner releases their hype cycle for cloud computing, 2011. URL: http://goo.gl/pqrDC, 2011. Retrieved 24 Oct 2013

  23. Costa R, Brasileiro F, Filho GL, Souza DM (2009) Oddci: on-demand distributed computing infrastructure. In: Workshop on Many-Task Computing on Grids and Supercomputers (MTAGS’09)

  24. Doelitzscher F, Reich C, Sulistio A (2010) Designing cloud services adhering to government privacy laws. In: Complex, Intelligent and Software Intensive Systems (CIT’10)

  25. Dutreilh X, Moreau A, Malenfant J, Rivierre N, Truck I (2010) Data center resource allocation to control theory and back. In: International Conference on Cloud, Computing (CLOUD’10)

  26. Elmroth E, Larsson L (2009) Interfaces for placement, migration, and monitoring of virtual machines in federated clouds. In: International Conference on Grid and Cooperative, Computing (GCC’09)

  27. Erl T (2005) Service-oriented architecture (SOA): concepts, technology, and design. Prentice Hall

  28. Foster I (1998) The grid: blueprint for a new computing infrastructure. Morgan Kaufmann Publishers Inc, Burlington

    Google Scholar 

  29. Gill K (2008) Remember the oil crisis? URL: http://uspolitics.about.com/b/2008/01/02/remember-the-oil-crisis.htm. Retrieved 24 Oct 2013

  30. Guha R, Al-Dabass D (2010) Impact of web 2.0 and cloud computing platform on software engineering. In: Proceedings of the 2010 International Symposium on Electronic System Design (ISED’10), pp 213–218

  31. Hassan MM, Song B, Huh EN (2009) A framework of sensor, cloud integration opportunities and challenges. In: International Conference on Ubiquitous Information Management and Communication (ICUIMC’09)

  32. Hou Z, Zhou X (2010) Asaas: application software as a service for high performance cloud computing. In: International Conference on High Performance Computing and Communications (HPCC’10)

  33. Huang H, Wang L (2010) P&p: a combined push-pull model for resource monitoring in cloud computing environment. In: International Conference on Cloud, Computing (CLOUD’10)

  34. Hutchinson C, Ward J, Castilon K (2009) Navigating the application architecture. J IT Prof 11:18–22

    Article  Google Scholar 

  35. Ichak A (1996) The pursuit of prime: maximize your company’s success with the Adizes Program. Knowledge Exchange

  36. Jianhong Z, Hua C (2010) Secuirty storage in the cloud computing: a rsa-based assumption data integrity check without original data. In: International Conference on Educational and Information Technology (ICEIT’10)

  37. Jin H, Xiang G, Zou D, Wu S, Zhao F, Li M, Zheng W (2011) A vmm-based intrusion prevention system in cloud computing environment. J Supercomput 66:1133–1151

    Google Scholar 

  38. Kandukuri BP, Paturi VR (2009) Cloud security issues. In: International Conference on Services, Computing (SCC’09)

  39. Kansal A, Zhao F, Liu J, Kothari N, Bhattacharya AA (2010) Virtual machine power metering and provisioning. In: ACM symposium on Cloud computing (SoCC’10)

  40. Kertész A, Kecskeméti G, Brandic I (2011) Autonomic sla-aware service virtualization for distributed systems. In: Euromicro Conference on Parallel, Distributed and Network-based (PDP’11)

  41. Kitchenham B, Charters S (2007) Guidelines for performing systematic literature reviews in software engineering. Technical Report EBSE 2007–001, Keele University and Durham University Joint, Report

  42. Kondo D, Javadi B, Malecot P, Cappello F, Anderson DP (2009) Cost-benefit analysis of cloud computing versus desktop grids. In: IEEE International Symposium on Parallel and Distributed Processing with Applications (IPDPS’09)

  43. Kossmann D, Kraska T, Loesing S (2010) An avaluation of alternative architectures for transaction processing in the cloud. In: International conference on Management of data (SIGMOD’10)

  44. Kozuch MA, Ryan MP, Gass R, Schlosser SW, O’Hallaron, Cipar J, Krevat E, ópez JL, Stroucken M, Ganger GR (2009) Tashi: location-aware cluster management. In: International Conference on AC and DC Power Transmission (ACDC’09)

  45. Kumar SR, Saxena A (2011) Data integrity proofs in cloud storage. In: International Conference on COMmunication Systems and NETworkS (COMSNETS’11)

  46. Kutare M, Eisenhauer G, Wang C, Schwan K, Talwar V, Wolf M (2010) Monalytics: Online monitoring and analytics for managing large scale data centers. In: International Conference on Autonomic Computing (ICAC’10), Washington

  47. Lee JH, Park MW, Eom JH, Chung TM (2011) Multi-level intrusion detection system and log management in cloud computing. In: International Conference on Advanced Communication Technology (ICACT’11)

  48. Li J, Zhao G, Chen X, Xie D, Rong C, Li W, Tang L, Tang Y (2010) Fine-grained data access control systems with user accountability in cloud computin. In: IEEE International Conference and Workshops on Cloud Computing Technology and Science (CLOUDCOM’10)

  49. Li Q, Hao Q, Xiao L, Li Z (2009) Adaptive management of virtualized resources in cloud computing using feedback control. In: International Conference on Information Science and Engineering (ICISE’09)

  50. Lin FT, Shih TS (2010) Cloud computing: the emerging computing technology. J ICIC Int 1:33–38

    Google Scholar 

  51. Luo M, Zhang LJ, Lei F (2010) An insuanrance model for guranteeing service assurance, integrity and qos in cloud computing. In: International Conference on Web Services (ICWS’10)

  52. Macías M, Fitó JO, Guitart J (2010) Rule-based sla management for revenue maximisation in cloud computing markets. In: International Conference on network and Service Management (CNSM’10)

  53. Madnick S (1969) Time-sharing systems: virtual machine conept vs. conventional approach. J Modern Data Sys 2:34–36

    Google Scholar 

  54. Marston S, Li Z, Bandyopadhyay S, Zhang J, Ghalsasi A (2010) Cloud computing-the business perspective. J Decis Support Syst 51:176–189

    Article  Google Scholar 

  55. McCarthy J (1983) Reminiscences on the history of time-sharing. URL: http://www-formal.stanford.edu/jmc/history/timesharing.dvi, 1983. Retrieved 02 June 2012

  56. Mehta HK, Kanungo P, Chandwani M (2011) Performance enhancement of scheduling algorithms in clusters and grids using improved dynamic load balancing techniques. In: International conference on World Wide Web (WWW’11)

  57. Menzel M, Warschofsky R, Thomas I, Willems C, Meinel C (2010) The service security lab: A model-driven platform to compose and explore service security in the cloud. In: World Congress on Services (SERVICES-I’10)

  58. Mounzer J, Bambos N (2010) Integrated security risk management for it-intensive organizations. In: International Conference on Information Assurance and Security (IAS’10)

  59. Nae V, Prodan R, Losup A (2011) A new business model for massively multiplayer online games. In: International conference on Performance, engineering (ICPE’11)

  60. Nair SK, Porwal S, Dimitrakos T, Ferrer AJ, Tordsson J, Sharif T, Sheridan C, Rajarajan M, Khan AU (2010) Towards secure cloud bursting, brokerage and aggregation. In: International Conference on Web Services

  61. Nicolae B (2010) High throughput data-compression for cloud storage. Lect Notes Comput Sci 6265(2010):1–12

    Google Scholar 

  62. NITRD (1991) High performance computing act of 1991. URL: http://www.nitrd.gov/Congressional/Laws/pl_102-194.html, 1991. Retrieved 24 Oct 2013

  63. Parkhill DF (1966) The challenge of the computer utility. Addison-Wesley Publishing Company, Boston

    Google Scholar 

  64. Pervez Z, Khattak AM, Lee S, Lee YK (2010) Dual validation framework for multi-tenant saas architecture. In: Future Information Technology (FutureTech’10)

  65. Petersen K, Feldt R, Mujtaba S, Mattsson M (2008) Systematic mapping studies in software engineering. In: Evaluation and Assessment in Software Engineering (EASE’08), Italy. University of Bari

  66. Polsson K (2012) Chronology of personal computers. URL: http://www.islandnet.com/kpolsson/comphist/comp1988.htm, 2012. Retrieved 24 Oct 2013

  67. Ramakrishman L, Jackson KR, Canon S, Cholia S, Shalf J (2010) Defining future platform requirements for e-science clouds. In: ACM symposium on Cloud, computing (SoCC’10)

  68. Rimal BR, Jukan A, Katsaros D, Goeleven Y (2010) Architectural requirements for cloud computing systems: an enterprise cloud approach. J Grid Comput 9:3–26

    Article  Google Scholar 

  69. Per R, Martin H (2009) Guidelines for conducting and reporting case study research in software engineering. Empirical Softw Engg 14(2):131–164

    Article  Google Scholar 

  70. Salesforce.com (2013) Salesforce.com. last checked oct/2013. URL: www.salesforce.com, 2013. Retrieved 24 Oct 2013

  71. David S, Farheen A (2010) Taking a flexible approach to asps. J CACM 53:139–143

    Google Scholar 

  72. Sevior M, Fifield T, Katayama N (2010) Belle monte-carlo production on the amazon ec2 cloud. J Phys Conf Ser 219 012003. doi:10.1088/1742-6596/219/1/012003

  73. Shi A, Xia Y, Zhan H (2010) Applying cloud computing in financial service industry. In: International Conference on Intelligent Control and Information Processing (ICICIP’10)

  74. Foster I, Zhao Y, Raicu L, Shiyong L (2008) Cloud computing and grid computing 360-degree compared. URL: http://arxiv.org/ftp/arxiv/papers/0901/0901.0131.pdf, 2008. Retrived 24 Oct 2013

  75. Sigh MD, Krishna PR, Saxena A (2010) A cryptography based privacy preserving solution to mine cloud data. In: Proceedings of the Annual ACM Bangalore Conference (COMPUTE’10)

  76. Sivathanu S, Liu L, Yiduo M, Pu X (2010) Storage management in virtualized cloud environment. In: International Conference on Cloud, Computing (CLOUD’10)

  77. Smarr L (2008) Metacomputer architecture of the global lambdagrid: How personal light paths are transforming e-science. URL: http://goo.gl/ohpfMR, 2008. Retrieved 24 Oct 2013

  78. Spring J (2011) Monitoring cloud computing by layer, part 1. J IEEE Secur Priv 9:66–68

    Google Scholar 

  79. Staten J (2009) Hollow out the moose: reducing cost with strategic rightsourcing. Forrester Research Inc, Cambridge

    Google Scholar 

  80. Tao Q, Chang H, Yi Y, Gu C (2010) A trustworthy management approach for cloud services qos data. In: International Conference on Machine Learning and Cybernetics (ICMLC’10)

  81. Taylor M, Haggerty J, Gresty D, Hegarty R (2010) Digital evidence in cloud computing systems. J Comput Law Secur Rep Rev 26:204–208

    Google Scholar 

  82. Thelen E (2010) General electric computer department from the bottom up 1961 through 1965. URL: http://www.ed-thelen.org/EarlyGE-Computers.html, 2010. Retrieved 24 Oct 2013

  83. Udo H (2010) Data protection and legal compliance in cloud computing. J DuD 34:554–556

    Article  Google Scholar 

  84. Wang J, Varman P (2010) Avoiding performance fluctuation in cloud storage. In: International Conference on High, Performance Computing (HiPC’10)

  85. Wang Y, Song A, Luo J (2010) A mapreducemerge-based data cube construction method. In: International Conference on Grid and Cooperative, Computing (GCC’10)

  86. Wayne NIST, Jansen A (2011) Cloud hooks: security and privacy issues in cloud computing. In: Hawaii International Conference on System Sciences (HICSS’11)

  87. Christof W, Arun A, Benjamin B, Nikolay B, Thomas M, Wibke M, Jochen S (2009) Cloud computing: a classification, business models, and research directions. J Bus Inform Syst Eng 1:391–399

    Google Scholar 

  88. Woitaszek M, Tufo HM (2010) Developing a cloud computing charging model for high-performance computing resources. In: CIT, IEEE Computer Society, pp 210–217

  89. Wong WK, Cheung DW, Kao B, Mamoulis N (2009) Secure knn computation on encrypted databases. In: International conference on Management of data (SIGMOD’09)

  90. Wu H, Winer C (2009) Network security for virtual machine in cloud computing? In: International Conference on Computer Sciences and Convergence Information Technology (ICCIT’09)

  91. Yigitbasi N, Iosup A, Epema D, Ostermann S (2009) C-meter: a framework for performance analysis of computing clouds. In: IEEE/ACM International Symposium on Cluster, Cloud and Grid, Computing (CCGrid’09)

  92. Yu X, Wen Q (2010) A view about cloud data security from data life cycle. In: International Conference on Computational Intelligence and Software Engineering (CiSE’10)

  93. Yusuke T, Koie H, Tomohiro K, Isao K, Yoshio T (2010) A distributed storage system allowing application users to reserve i/o performance in advance for achieving sla. In: International Workshop on Middleware for Grids, Clouds and e-Science (MGC’10)

  94. Zhang Q, Cheng L, Boutaba R (2010) Cloud computing: state-of-the-art and research challenges. J Internet Serv Appl 1(1):7–18

    Article  Google Scholar 

  95. Zheng Q, Xu S (2010) Fail and dynamic proofs of retrievability. In: ACM Conference on Data and Application Security and Privacy (CODASPY’10)

  96. Zhou M, Zhang R, Xie W, Qian W, Zhou A (2010) Security and privacy in cloud computing: a survey. In: International Conference on Semantics Knowledge and Grid (SKG’10)

  97. Zhou W, Ning P, Wang R, Zhang X, Ammons G, Bala V (2010) Always up-to-date -slacalable offline patching of vm images in a compute cloud. In: Annual Computer Security Applications Conference (ACSAC’10)

  98. Zissis D, Lekkas D (2011) Securing e-government and e-voting with an open cloud computing architecture. J Gov Inform Quart 28:239–251

    Google Scholar 

Download references

Acknowledgments

The authors would like to thank the ASSERT Research Group for the feedback on meetings and support during the execution of this research. This work was partially supported by the National Institute of Science and Technology for Software Engineering (INES), funded by CNPq and FACEPE, grants 573964/2008-4 and APQ-1037-1.03/08.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Frederico Durao.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Durao, F., Carvalho, J.F.S., Fonseka, A. et al. A systematic review on cloud computing. J Supercomput 68, 1321–1346 (2014). https://doi.org/10.1007/s11227-014-1089-x

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11227-014-1089-x

Keywords

Navigation