Academic literature on the topic 'Cloud computing'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Cloud computing.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Cloud computing"

1

Hayes, J. "Clout of the cloud (cloud computing)." Engineering & Technology 4, no. 6 (April 11, 2009): 60–61. http://dx.doi.org/10.1049/et.2009.0611.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Sahare, Shubhangi, and Dr D. V. Rojatkar. "Cloud Computing." International Journal of Trend in Scientific Research and Development Volume-1, Issue-6 (October 31, 2017): 786–89. http://dx.doi.org/10.31142/ijtsrd4685.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Khan, Nawsher, Noraziah Ahmad, Tutut Herawan, and Zakira Inayat. "Cloud Computing." International Journal of Cloud Applications and Computing 2, no. 3 (July 2012): 68–85. http://dx.doi.org/10.4018/ijcac.2012070103.

Full text
Abstract:
Efficiency (in term of time consumption) and effectiveness in resources utilization are the desired quality attributes in cloud services provision. The main purpose of which is to execute jobs optimally, i.e., with minimum average waiting, turnaround and response time by using effective scheduling technique. Replication provides improved availability and scalability; decreases bandwidth use and increases fault tolerance. To speed up access, file can be replicated so a user can access a nearby replica. This paper proposes architecture to convert Globally One Cloud to Locally Many Clouds. By combining replication and scheduling, this architecture improves efficiency and easy accessibility. In the case of failure of one sub cloud or one cloud service, clients can start using another cloud under “failover” techniques. As a result, no one cloud service will go down.
APA, Harvard, Vancouver, ISO, and other styles
4

Guo, Le Jiang, Feng Zheng, Ya Hui Hu, Lei Xiao, and Liang Liu. "Analysis and Research of Cloud Computing Data Center." Applied Mechanics and Materials 427-429 (September 2013): 2184–87. http://dx.doi.org/10.4028/www.scientific.net/amm.427-429.2184.

Full text
Abstract:
Cloud computing data centers can be called cloud computing centers. It has put forward newer and higher demands for data centers with the development of cloud computing technologies. This paper will discuss what are cloud computing data centers, cloud computing data center construction, cloud computing data center architecture, cloud computing data center management and maintenance, and the relationship between cloud computing data centers and clouds.
APA, Harvard, Vancouver, ISO, and other styles
5

Anjaneyulu, P., and Mr S. Srinivasa Reddy. "Cloud Computing Adoption Approach towards Securing Data in Cloud Computing." International Journal of Trend in Scientific Research and Development Volume-2, Issue-4 (June 30, 2018): 390–93. http://dx.doi.org/10.31142/ijtsrd12995.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Ojha, Pranav. "Enhanced Cloud Computing Security Based on Single to Multi Cloud Systems." Journal of Research in Science and Engineering 6, no. 8 (August 29, 2024): 52–56. http://dx.doi.org/10.53469/jrse.2024.06(08).12.

Full text
Abstract:
Cloud computing has increased rapidly in many organizations and then it's utilized. Cloud computing provides safe data. Cloud computing provides many advantages in terms of low cost and accessibility of data. Ensuring the security of cloud computing is a major factor in the cloud computing environment, as users often store sensitive information with cloud storage providers but these providers may be untrusted. Dealing with "single cloud" providers is predicted to become less popular with customers due to risks of service availability failure and the possibility of malicious insiders in the single cloud. A movement towards "multi - clouds", or in other words, "inter clouds" or "cloud - of - clouds" has emerged recently. We propose the recent research related to single and multi - cloud security and address possible solutions. It is found that the research into the use of multi - cloud providers to maintain security has received less attention from the research community than the use of single clouds. This work aims to promote the use of multi - clouds due to their ability to reduce security risks that affect the cloud computing user. We proposed the AES algorithm can explore the cloud sharing to multiple clouds. This algorithm protects secure to personal information, financial records, and other confidential records. The system is highly effective in accuracy.
APA, Harvard, Vancouver, ISO, and other styles
7

R, Jain. "Survey on Mobile Cloud Computing." Advances in Robotic Technology 2, no. 1 (January 19, 2024): 1–7. http://dx.doi.org/10.23880/art-16000111.

Full text
Abstract:
The paper explores how cloud computing offers the capacity to improve computing features and application services while addressing its transformative impact on mobile device systems. It recognizes, yet, the security risks associated with transferring data and computing. Using various cloud types for secure information searches and security-critical activities, the research proposal proposes a secure exporting architecture to basic clouds. It shows the significance of cryptography, confidentiality security measures, and data security methods in solving these security issues with cloud computing and mobile cloud computing (MCC). From the perspective of the specific challenges of mobile environments, that abstract's argument indicates the need for further research to enhance mobile cloud-based applications and improve these security technologies.
APA, Harvard, Vancouver, ISO, and other styles
8

Aouat, Asmaa, El Abbassia Deba, Abou El Hassan Benyamina, and Djilali Benhamamouch. "Deployment in Cloud Computing." International Journal of Distributed Systems and Technologies 11, no. 1 (January 2020): 27–37. http://dx.doi.org/10.4018/ijdst.2020010103.

Full text
Abstract:
Although clouds have adopted common communication protocols such as HTTP and SOAP, interoperability, integration, and coordination of all clouds remain a concern. Instead, companies are looking for solutions to deploy an infrastructure that spans multiple instances of public and private clouds. Each of the proposed cloud solutions has its own limitations, management APIs, and development cycles that must be monitored and managed to provide a consistent set. The objective of the article is to answer the question: Is there a platform to deploy, run and manage applications in a multi-cloud environment and to ensure their availability, performance, and optimal use of resources?
APA, Harvard, Vancouver, ISO, and other styles
9

Beri, Rydhm, and Veerawali Behal. "Cloud Computing: A Survey on Cloud Computing." International Journal of Computer Applications 111, no. 16 (February 18, 2015): 19–22. http://dx.doi.org/10.5120/19622-1385.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Ahuja, Sanjay P., and Niharika Deval. "From Cloud Computing to Fog Computing." International Journal of Fog Computing 1, no. 1 (January 2018): 1–14. http://dx.doi.org/10.4018/ijfc.2018010101.

Full text
Abstract:
This article describes how in recent years, Cloud Computing has emerged as a fundamental computing paradigm that has significantly changed the approach of enterprises as well as end users towards implementation of Internet technology. The key characteristics such as on-demand resource provision, scalability, rapid elasticity, higher flexibility, and significant cost savings have influenced enterprises of all sizes in the wide and successful adoption of Cloud Computing. Despite numerous advantages, Cloud Computing has its fair share of downsides as well. One of those major concerns is latency issues which has relevance to the Internet of Things (IoT). A new computing paradigm has been proposed by Cisco in early 2014 and termed 'Fog Computing'. Fog Computing otherwise known as Edge Computing is the integration of Cloud Computing and IoT. Being located in close proximity to the IoT devices, the Fog assists with latency requirements of IoT related applications. It also meets the data processing needs of IoT devices which are resource constrained by bringing computation, communication, control and storage closer to the end users. Clouds continue to offer support for data analytics. One can think of the IoT-Fog-Cloud as being part of a continuum. This article surveys the current literature on Fog Computing and provides a discussion on the background, details and architecture of Fog Computing, as well as the application areas of Fog Computing. The article concludes with some recommendations in the areas of future research.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Cloud computing"

1

Lebedeva, A. O. "Cloud computing." Thesis, Сумський державний університет, 2013. http://essuir.sumdu.edu.ua/handle/123456789/33692.

Full text
Abstract:
Cloud Computing is a revolution that will define IT in the second decade of the 21st Century. It have become the basis for radical business innovation and new business models, and for significant improvements in the effectiveness of anyone using information technology. When you are citing the document, use the following link http://essuir.sumdu.edu.ua/handle/123456789/33692
APA, Harvard, Vancouver, ISO, and other styles
2

Begic, Dina. "Cloud Computing." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2013. http://amslaurea.unibo.it/5697/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Matteazzi, Piergiorgio <1969&gt. "Cloud computing." Master's Degree Thesis, Università Ca' Foscari Venezia, 2015. http://hdl.handle.net/10579/6952.

Full text
Abstract:
L’obiettivo della tesi è valutare il Cloud Computing dal punto di vista dei vantaggi/svantaggi che le aziende possono trarne, e quali motivi rallentano la diffusione di tale tecnologia. Il cloud computing è da anni un argomento di discussione e analisi nel mondo accademico e dell’Information Technology. Sono state date definizioni che con l’evoluzione tecnologica degli strumenti a disposizione dei Provider si sono ampliate e consolidate. La sua natura di servizio non chiaramente localizzato ha generato diverse problematiche, non solo a livello tecnologico ma anche a livello legale (dei problemi legali non ci siamo occupati specificamente, ma li citiamo in quanto causa di frizioni nell’adozione di tale tecnologia). Per esempio all’interno della comunità economica, al fine di stimolare l’adozione del cloud computing, si sta promuovendo un processo per uniformare la normativa sulla proprietà dei dati. Alcune grosse aziende come CISCO, per ovviare alla inadeguatezza della normativa, inseriscono nel contratto di cloud clausule dove si assumono i rischi derivanti dalle diverse normative presenti ove i dati vengono collocati. Partendo dalla definizione, analizzando l’implementazione nonchè l’evoluzione degli strumenti a disposizione di chi programma in questo ambito, ci si rende conto quanto questo paradigma sia in evoluzione, e quanto ancora possa crescere. Si sta facendo un grande lavoro sia sulla virtualizzazione delle reti, sia sulle tecnologie di storage, che in futuro permetteranno con la diffusione della banda larga, di superare determinati limiti ad oggi presenti in determinati ambiti del Cloud, favorendone la diffusione e l’utilizzo. Dallo sviluppo e analisi svolta, si evidenzia come il paradigma cloud sia altamente modulabile rispetto alle esigenze aziendali proprio per le numerose opzioni e soluzioni tecnologiche, software e gestionali. Di seguito si riassumono gli elementi di vantaggio/svantaggio rilevabili nel paradigma cloud.
APA, Harvard, Vancouver, ISO, and other styles
4

Gorelik, Eugene. "Cloud computing models." Thesis, Massachusetts Institute of Technology, 2013. http://hdl.handle.net/1721.1/79811.

Full text
Abstract:
Thesis (S.M. in Engineering and Management)--Massachusetts Institute of Technology, Engineering Systems Division, 2013.
Cataloged from PDF version of thesis.
Includes bibliographical references (p. 79-80).
Information Technology has always been considered a major pain point of enterprise organizations, from the perspectives of both cost and management. However, the information technology industry has experienced a dramatic shift in the past decade - factors such as hardware commoditization, open-source software, virtualization, workforce globalization, and agile IT processes have supported the development of new technology and business models. Cloud computing now offers organizations more choices regarding how to run infrastructures, save costs, and delegate liabilities to third-party providers. It has become an integral part of technology and business models, and has forced businesses to adapt to new technology strategies. Accordingly, the demand for cloud computing has forced the development of new market offerings, representing various cloud service and delivery models. These models significantly expand the range of available options, and task organizations with dilemmas over which cloud computing model to employ. This thesis poses analysis of available cloud computing models and potential future cloud computing trends. Comparative analysis includes cloud services delivery (SaaS, PaaS, IaaS) and deployment models (private, public, and hybrid). Cloud computing paradigms are discussed in the context of technical, business, and human factors, analyzing how business and technology strategy could be impacted by the following aspects of cloud computing: --Architecture --Security --Costs --Hardware/software trends (commodity vs. brands, open vs. closed-source) --Organizational/human Factors To provide a systematic approach to the research presented in this paper, cloud taxonomy is introduced to classify and compare the available cloud service offerings. In particular, this thesis focuses on the services of a few major cloud providers. Amazon Web Services (AWS) will be used as a base in many examples because this cloud provider represents approximately 70% of the current public cloud services market. Amazon's AWS has become a cloud services trend-setter, and a reference point for other cloud service providers. The analysis of cloud computing models has shown that public cloud deployment model is likely to stay dominant and keep expanding further. Private and Hybrid deployment models are going to stay for years ahead but their market share is going to continuously drop. In the long-term private and Hybrid cloud models most probably will be used only for specific business cases. IaaS service delivery model is likely to keep losing market share to PaaS and SaaS models because companies realize more value and resource-savings from software and platform services rather than infrastructure. In the near future we can expect significant number of market consolidations with few large players retaining market control at the end.
by Eugene Gorelik.
S.M.in Engineering and Management
APA, Harvard, Vancouver, ISO, and other styles
5

Sousa, Francisco Cordeiro de. "Mainroad: cloud computing." Master's thesis, NSBE - UNL, 2010. http://hdl.handle.net/10362/10316.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Imine, Youcef. "Cloud computing security." Thesis, Compiègne, 2019. http://www.theses.fr/2019COMP2520.

Full text
Abstract:
Ces dernières années, nous assistons à une immense révolution numérique de l’internet où de nombreuses applications, innovantes telles que l’internet des objets, les voitures autonomes, etc., ont émergé. Par conséquent, l’adoption des technologies d’externalisations des données, telles que le cloud ou le fog computing, afin de gérer cette expansion technologique semble inévitable. Cependant, l’utilisation du cloud ou du fog computing en tant que plateforme d’externalisation pour le stockage ou le partage des données crée plusieurs défis scientifiques. En effet, externaliser ses données signifie que l’utilisateur perd le contrôle sur ces derniers. D’où la sécurité des données devienne une préoccupation majeure qui doit être proprement traitée. C’est dans ce contexte que s’inscrivent les travaux de cette thèse dans laquelle nous avons déterminé dans un premier temps les principaux problèmes de sécurité liés à l’adoption du cloud et du fog computing. Puis, nous avons adressé trois problématiques de sécurité majeure, qui sont : 1 - Le contrôle d’accès aux données dans une architecture de type Cloud storage, où nous avons proposé une nouvelle solution de contrôle d’accès basée sur le chiffrement à base d’attributs. Notre solution assure un contrôle d’accès souple et à grains fins. De plus, elle permet d’effectuer une révocation immédiate des utilisateurs et des attributs sans aucune mise à jour des clés de chiffrement fournies aux utilisateurs. 2 - Le problème de l’authentification mutuelle entre les utilisateurs et les serveurs Fog dans une architecture Fog computing, où nous avons proposé un nouveau schéma d’authentification efficace, qui assure l’authentification mutuelle et qui est robuste contre les comportements malicieux des serveurs Fog. 3 - Le problème de traçabilité et de la protection de la vie privée dans le cadre des applications de partage d’informations publiques, où nous avons proposé une nouvelle solution pour le partage d’informations publiques assurant le service de traçabilité tout en préservant les informations privées des utilisateurs. Avec notre solution, les serveurs d’externalisations authentifient les utilisateurs sans pouvoir obtenir des informations sur leur vie privée. En cas de comportements malicieux, notre solution permet de tracer les utilisateurs malveillants grâce à une autorité
These last years, we are witnessing a real digital revolution of Internet where many innovative applications such as Internet of Things, autonomous cars, etc., have emerged. Consequently, adopting externalization technologies such as cloud and fog computing to handle this technological expansion seems to be an inevitable outcome. However, using the cloud or fog computing as a data repository opens many challenges in prospect. This thesis addresses security issues in cloud and fog computing which is a major challenge that need to be appropriately overcomed. Indeed, adopting these technologies means that the users lose control over their own data, which exposes it to several security threats. Therefore, we first investigated the main security issues facing the adoption of cloud and fog computing technologies. As one of the main challenges pointed in our investigation, access control is indeed a cornerstone of data security. An efficient access control mechanism must provide enforced and flexible access policies that ensure data protection, even from the service provider. Hence, we proposed a novel secure and efficient attribute based access control scheme for cloud data-storage applications. Our solution ensures flexible and fine-grained access control and prevents security degradations. Moreover, it performs immediate users and attributes revocation without any key regeneration. Authentication service in fog computing architecture is another issue that we have addressed in this thesis. Some traditional authentication schemes endure latency issues while others do not satisfy fog computing requirements such as mutual authentication between end-devices and fog servers. Thus, we have proposed a new, secure and efficient authentication scheme that ensures mutual authentication at the edge of the network and remedies to fog servers' misbehaviors.Finally, we tackled accountability and privacy-preserving challenges in information-sharing applications for which several proposals in the literature have treated privacy issues, but few of them have considered accountability service. Therefore, we have proposed a novel accountable privacy preserving solution for public information sharing in data externalization platforms. Externalization servers in our scheme authenticate any user in the system without violating its privacy. In case of misbehavior, our solution allows to trace malicious users thanks to an authority
APA, Harvard, Vancouver, ISO, and other styles
7

Aliperti, Francesco. "Il Cloud Computing." Doctoral thesis, Universita degli studi di Salerno, 2017. http://hdl.handle.net/10556/2595.

Full text
Abstract:
2015 - 2016
According to the definition of National Institute of Standards and Technology (NIST) dell’U.S. Departement of Commerce, cloud computing consists of a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and service) that can be rapidely provisioned and released with minimal management effort or service provider interaction; a new form of storage and data processing on a virtual platform. The first chapter define the phenomenon, describing the models and typologies, highlighting the benefits and the risks, as well as the legal problems associated with it. In particular, as the data and their processing are the object of the services offered by the cloud system, it is of particular importance that those aspects of the protection of the personal data of cloud service users are clarified as necessary, preliminary, a policy of prevention, aimed at informing about the risks. These issues are highlighted by the Guarantor for the Protection of Personal Data, which, more than once, has intervened in order to encourage a conscious and correct use of the cloud system. In the second chapter, the right to privacy is investigated in the current context of technological evolution. Some fundamental judgments of European jurisprudence are reviewed (judgments: Lindqvist, Costeja, Scherms) on the protection of privacy in the internet, highlighting the points of contact and distance to the Italian one, with reference also to a recent judgment of the Spanish High Tribunal. It is noted, however, that in the diversity of solutions offered, conflict between the various interests at stake can only be solved by reason of their careful balancing. Looking back on its evolution, it is clear that the right in question (which has expanded its content by including the right to the protection of personal data), in the light of what the European Court of Justice has stated, is not absolute prerogative, but must be considered in the light of its social function. The following is a review of European Regulation 2016/679 (which will be directly applicable in all EU countries from 25 May 2018), as it represents the instrument for formalizing the new digital course for the protection of Personal data, at Community and non-EU level. In particular, they analyze the novelties it introduces and the archives on which it relies on the entire privacy system. It is also intended to specify the spatial scope of application, in the light of the criteria set out in Article 3 thereof. In the third chapter, focusing on the most significant aspect of the technology under discussion (the clear separation between data ownership and processing and possession and control of data), the research analyzes the topic of ‘processing’ personal data the light of the opinions of the Italian and European Regulatory Authority (Art. 29 Group) and, in particular, of the recent European Regulation 2016/679 and of the Code of Conduct, 26 September 2016 of the CISPE. The topic that inevitably interfere with cloud technology, especially today, in a context where the scope for sharing and personal data collection has increased significantly, allowing both private companies and public authorities to use personal data, such as in the pursuit of their activities. This also in view of the fact that cloud services allow to ‘process’ and ‘store’ data on server systems deployed in different parts of the planet, where it is necessary to verify the existence of an ‘adequate level of protection’ in order to ensure to the party concerned a ‘substantially equivalent’ protection to that guaranteed within the Union. To this end, the essential premise for which it is necessary to inform about the risks is to clarify, in the light of the provisions of the Privacy Policy 2016 and of the Code of Conduct, 26 September 2016 of CISPE, issues such as: roles and obligations between controller and processor; the informational omissions of the service provider and the user’s unknowingness; keeping data in cloud computing and transferring them to a ‘third country’ after the judgments of the Court of Justice; the question of the portability of their data on other Csp (problem of the c.d. ‘vendor lock-in’); the data breach notification and the data protection in the relationship between constumer and provider. [edited by Author]
XXIX n.s.
APA, Harvard, Vancouver, ISO, and other styles
8

TAPANELLI, Pietro. "Cloud computing contracts." Doctoral thesis, Università degli Studi di Camerino, 2014. http://hdl.handle.net/11581/401831.

Full text
Abstract:
Cloud computing services are ubiquitous: for small and large companies the phenomenon of cloud computing is nowadays a standard business practice. This work would compile an analysis about the contractual issues related to the different services provided by all IT services provider. There are faced not only legal topics strictly connected to the personal data protection because, as the thesis will show, there are several legal acts provided by European Union, Italy (and from all EU's member states) and data protection authorities (both nation and international) that discipline the entire data protection topic in the cloud computing era. The legislation over cloud computing contracts, on the contrary, is totally absent and only the contractual instrument can be used to point out and specify duties and obligations between the contractual cloud parties, but the problem to find the proper legal discipline is not easy to solve. This work analyze the state of the art and provide a possible solution in order to find the legal discipline of cloud computing contracts, especially using the theory of ''connected contracts''.
APA, Harvard, Vancouver, ISO, and other styles
9

Grahn, Cecilia, and Martin Sund. "Cloud computing - Moving to the cloud." Thesis, Högskolan Dalarna, Informatik, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:du-12916.

Full text
Abstract:
Cloud computing innebär användning av datorresurser som är tillgängliga via ett nätverk, oftast Internet och är ett område som har vuxit fram i snabb takt under de senaste åren. Allt fler företag migrerar hela eller delar av sin verksamhet till molnet. Sogeti i Borlänge har behov av att migrera sina utvecklingsmiljöer till en molntjänst då drift och underhåll av dessa är kostsamma och tidsödande. Som Microsoftpartners vill Sogeti använda Microsoft tjänst för cloud computing, Windows Azure, för detta syfte. Migration till molnet är ett nytt område för Sogeti och de har inga beskrivningar för hur en sådan process går till. Vårt uppdrag var att utveckla ett tillvägagångssätt för migration av en IT-lösning till molnet. En del av uppdraget blev då att kartlägga cloud computing, dess beståndsdelar samt vilka för- och nackdelar som finns, vilket har gjort att vi har fått grundläggande kunskap i ämnet. För att utveckla ett tillvägagångssätt för migration har vi utfört flera migrationer av virtuella maskiner till Windows Azure och utifrån dessa migrationer, litteraturstudier och intervjuer dragit slutsatser som mynnat ut i ett generellt tillvägagångssätt för migration till molnet. Resultatet har visat att det är svårt att göra en generell men samtidigt detaljerad beskrivning över ett tillvägagångssätt för migration, då scenariot ser olika ut beroende på vad som ska migreras och vilken typ av molntjänst som används. Vi har dock utifrån våra erfarenheter från våra migrationer, tillsammans med litteraturstudier, dokumentstudier och intervjuer lyft vår kunskap till en generell nivå. Från denna kunskap har vi sammanställt ett generellt tillvägagångssätt med större fokus på de förberedande aktiviteter som en organisation bör genomföra innan migration. Våra studier har även resulterat i en fördjupad beskrivning av cloud computing. I vår studie har vi inte sett att någon tidigare har beskrivit kritiska framgångsfaktorer i samband med cloud computing. I vårt empiriska arbete har vi dock identifierat tre kritiska framgångsfaktorer för cloud computing och i och med detta täckt upp en del av kunskapsgapet där emellan.
Cloud computing involves the use of computer resources that are available through a network, usually the Internet and it is an area that has grown rapidly in recent years. More and more companies move entire or part of their operations to the cloud.Sogeti in Borlänge needs to move their development environments to a cloud service as operating and maintaining of these are costly and time-consuming. As a Microsoft Partner, Sogeti wants to use Microsoft´s services for cloud computing, Windows Azure, for this purpose. Migration to the cloud is a new area for Sogeti and they do not have any descriptions of how this process works.Our mission was to develop an approach for the migration of an IT-solution to the cloud. Part of the mission included the identifying of cloud computing, its components, benefits and drawbacks, which lead to us acquiring basic knowledge of the subject.To develop an approach to migration, we performed several migrations of virtual machines to Windows Azure, and based on these migrations, literature studies and interviews we drew conclusions that resulted in an overall approach for migration to the cloud.The results have shown that it is difficult to make a general but detailed description of an approach to migration, as the scenario looks different depending on what to migrate and what type of cloud service is used. However, based on our experiences from our migrations, along with literature, documents and interviews we have lifted our knowledge to a general level. From this knowledge, we have compiled a general approach with greater focus on the preparatory activities that an organization should implement before migration.Our studies also resulted in an in-depth description of cloud computing. In our studies we did not find previous works in which the critical success factors have been described in the context of cloud computing. In our empirical work, we identified three critical success factors for cloud computing and in doing so covered up some of the knowledge gap in between.
APA, Harvard, Vancouver, ISO, and other styles
10

Gustafsson, Bennet, and Alexander Orrgren. "Cloud Computing : The Adoption of Cloud Computing for Small and Medium Enterprises." Thesis, Internationella Handelshögskolan, Högskolan i Jönköping, IHH, Informatik, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-18505.

Full text
Abstract:
The objective with this research was to investigate and understand the adoption of cloud computing and to find the process of adopting cloud services. The method used to collect data was interviews. To find both the users and the providers perspective two cases were investigated, one user case and one provider case. The results were divided into two parts, the first a number of categories that were found when comparing the user case to the provider case, the second a process that describes the adoption of cloud computing. The categories in the first part of the results are; decision process, definition of cloud computing, integration and security, adoption and future development. When analyzing the results we came to the conclusion that both users and providers are striving for simplicity, security and to move the responsibility away from the user. The adoption of cloud computing is not as complex as many organizations have thought and by moving the applications and hardware out of the organization the user can focus on its core strategies.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Cloud computing"

1

Ye, Kejiang, and Liang-Jie Zhang, eds. Cloud Computing – CLOUD 2021. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-96326-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Luo, Min, and Liang-Jie Zhang, eds. Cloud Computing – CLOUD 2018. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-94295-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Da Silva, Dilma, Qingyang Wang, and Liang-Jie Zhang, eds. Cloud Computing – CLOUD 2019. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-23502-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Zhang, Qi, Yingwei Wang, and Liang-Jie Zhang, eds. Cloud Computing – CLOUD 2020. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-59635-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Ye, Kejiang, and Liang-Jie Zhang, eds. Cloud Computing – CLOUD 2022. Cham: Springer Nature Switzerland, 2022. http://dx.doi.org/10.1007/978-3-031-23498-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Luo, Min, and Liang-Jie Zhang, eds. Cloud Computing – CLOUD 2023. Cham: Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-51709-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Wang, Yang, and Liang-Jie Zhang, eds. CLOUD Computing – CLOUD 2024. Cham: Springer Nature Switzerland, 2025. http://dx.doi.org/10.1007/978-3-031-77153-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Khosravi, Mohammad R., Qiang He, and Haipeng Dai, eds. Cloud Computing. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-99191-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Avresky, Dimiter R., Michel Diaz, Arndt Bode, Bruno Ciciani, and Eliezer Dekel, eds. Cloud Computing. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-12636-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Reinheimer, Stefan, ed. Cloud Computing. Wiesbaden: Springer Fachmedien Wiesbaden, 2018. http://dx.doi.org/10.1007/978-3-658-20967-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Cloud computing"

1

Kohne, Andreas. "Cloud Computing." In Cloud-Föderationen, 19–28. Wiesbaden: Springer Fachmedien Wiesbaden, 2018. http://dx.doi.org/10.1007/978-3-658-20973-5_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Zhao, Liang, Sherif Sakr, Anna Liu, and Athman Bouguettaya. "Cloud Computing." In Cloud Data Management, 9–20. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-04765-2_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Vogel, Robert, Tarkan Koçoğlu, and Thomas Berger. "Cloud Computing." In Desktopvirtualisierung, 119–37. Wiesbaden: Vieweg+Teubner, 2010. http://dx.doi.org/10.1007/978-3-8348-9768-8_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Oppitz, Marcus, and Peter Tomsu. "Cloud Computing." In Inventing the Cloud Century, 267–318. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-61161-7_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Murugesan, San, and Irena Bojanova. "Cloud Computing." In Encyclopedia of Cloud Computing, 1–14. Chichester, UK: John Wiley & Sons, Ltd, 2016. http://dx.doi.org/10.1002/9781118821930.ch1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Barton, Thomas. "Cloud Computing." In E-Business mit Cloud Computing, 41–52. Wiesbaden: Springer Fachmedien Wiesbaden, 2014. http://dx.doi.org/10.1007/978-3-8348-2426-4_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Möhring, Michael, Barbara Keller, and Rainer Schmidt. "Cloud-Computing." In CRM in der Public Cloud, 11–19. Wiesbaden: Springer Fachmedien Wiesbaden, 2017. http://dx.doi.org/10.1007/978-3-658-19724-7_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Lele, Ajey. "Cloud Computing." In Disruptive Technologies for the Militaries and Security, 167–85. Singapore: Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-13-3384-2_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Krintz, Chandra. "Cloud Computing." In Encyclopedia of Database Systems, 1–7. New York, NY: Springer New York, 2017. http://dx.doi.org/10.1007/978-1-4899-7993-3_2206-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Humphrey, Chuck. "Cloud Computing." In Encyclopedia of Quality of Life and Well-Being Research, 964–66. Dordrecht: Springer Netherlands, 2014. http://dx.doi.org/10.1007/978-94-007-0753-5_3011.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Cloud computing"

1

Kushwaha, Sumit, and Ankur Rai. "Mobile Cloud Computing: The Future of Cloud." In 2024 OPJU International Technology Conference (OTCON) on Smart Computing for Innovation and Advancement in Industry 4.0, 1–6. IEEE, 2024. http://dx.doi.org/10.1109/otcon60325.2024.10687896.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Moravcik, Marek, Pavel Segec, Jana Uramova, and Martin Kontsek. "Teaching cloud computing in cloud computing." In 2017 15th International Conference on Emerging eLearning Technologies and Applications (ICETA). IEEE, 2017. http://dx.doi.org/10.1109/iceta.2017.8102512.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Asaduzzaman, Abu, Abilash Rao Joseph, Fadi N. Sibai, and Nader Mohamed. "Cloud computing: A cloudy future?" In 2012 International Conference on Innovations in Information Technology (IIT). IEEE, 2012. http://dx.doi.org/10.1109/innovations.2012.6207778.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Mejias, Boris, and Peter Van Roy. "From Mini-clouds to Cloud Computing." In 2010 Fourth IEEE International Conference on Self-Adaptive and Self-Organizing Systems Workshop (SASOW). IEEE, 2010. http://dx.doi.org/10.1109/sasow.2010.67.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Pokharel, Manish, and Jong Sou Park. "Cloud computing." In the 3rd International Conference. New York, New York, USA: ACM Press, 2009. http://dx.doi.org/10.1145/1693042.1693134.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

"Cloud computing." In 2012 National Days of Network Security and Systems (JNS2). IEEE, 2012. http://dx.doi.org/10.1109/jns2.2012.6249245.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Sumter, La'Quata. "Cloud computing." In the 48th Annual Southeast Regional Conference. New York, New York, USA: ACM Press, 2010. http://dx.doi.org/10.1145/1900008.1900152.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Liang, Haoming, Wenbo Chen, and Kefu Shi. "Cloud computing." In the 2011 International Conference. New York, New York, USA: ACM Press, 2011. http://dx.doi.org/10.1145/2071639.2071642.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Bolin, Jeremiah, and Mengkun Yang. "Cloud computing." In ACM SE '18: Southeast Conference. New York, NY, USA: ACM, 2018. http://dx.doi.org/10.1145/3190645.3190706.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Pandey, Prashant, Sandeep Singh, and Suraj Singh. "Cloud computing." In ICWET '10: International Conference and Workshop on Emerging Trends in Technology. New York, NY, USA: ACM, 2010. http://dx.doi.org/10.1145/1741906.1742192.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Cloud computing"

1

Cully, John, and Susie Wright. Cloud computing. Parliamentary Office of Science and Technology, June 2020. http://dx.doi.org/10.58248/pn629.

Full text
Abstract:
Cloud computing refers to the delivery of computing services on-demand over the internet. This POSTnote describes the different types of cloud computing before outlining issues relating to security, regulation, energy use and barriers to the adoption of this technology.
APA, Harvard, Vancouver, ISO, and other styles
2

Weber, Arnd, ed. Impacts of Cloud Computing (STOA Cloud Computing Del.3). Vienna: self, 2014. http://dx.doi.org/10.1553/ita-pb-a65-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Weber, Arnd, ed. Foundations of Cloud Computing (STOA Cloud Computing Del.2). Vienna: self, 2014. http://dx.doi.org/10.1553/ita-pb-a65-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Takai, Teresa M. Cloud Computing Strategy. Fort Belvoir, VA: Defense Technical Information Center, July 2012. http://dx.doi.org/10.21236/ada563989.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Hochstein, Lorin. High Performance Computing (HPC) Innovation Service Portal Pilots Cloud Computing (HPC-ISP Pilot Cloud Computing). Fort Belvoir, VA: Defense Technical Information Center, August 2011. http://dx.doi.org/10.21236/ada549202.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Seybold, Patricia. Cloud Computing in 2015. Boston, MA: Patricia Seybold Group, December 2013. http://dx.doi.org/10.1571/ta12-13-13cc.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Kim, Anya, and Ira S. Moskowitz. Incentivized Cloud Computing: A Principal Agent Solution to the Cloud Computing Dilemma. Fort Belvoir, VA: Defense Technical Information Center, September 2010. http://dx.doi.org/10.21236/ada530441.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Weber, Arnd, ed. Cloud Computing - European Perspectives on impacts and potentials of Cloud Computing and Social Network Sites (STOA Cloud Computing Del.1). Vienna: self, 2014. http://dx.doi.org/10.1553/ita-pb-a65-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Hogan, Michael, Fang Liu, Annie Sokol, and Jin Tong. NIST cloud computing standards roadmap :. Gaithersburg, MD: National Institute of Standards and Technology, 2011. http://dx.doi.org/10.6028/nist.sp.500-291v1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Liu, Fang, Jin Tong, Jian Mao, Robert Bohn, John Messina, Lee Badger, and Dawn Leaf. NIST cloud computing reference architecture. Gaithersburg, MD: National Institute of Standards and Technology, 2011. http://dx.doi.org/10.6028/nist.sp.500-292.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography