Journal of Cloud Computing
The Journal of Cloud Computing: Advances, Systems and Applications (JoCCASA) is dedicated to sharing research on every facet of Cloud Computing. The journal will primarily feature articles that concentrate on essential aspects of Cloud Computing, including applications, systems, and innovations that will shape future Cloud technologies. Additionally, thorough review and survey articles that provide fresh perspectives and set the stage for future research and experimentation are also welcome.
Outlet metrics
Global
N/A
Country
N/A
Category
N/A
Articles
-
Nov 7, 2024 |
journalofcloudcomputing.springeropen.com | Gansu Agricultural
ReferencesBartolomeu PC, Vieira E, Hosseini SM, Ferreira J, Ieee (2019) Self-Sovereign Identity: Use-cases, Technologies, and Challenges for Industrial IoT. 24th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA). IEEE, Zaragoza, SPAIN, pp 1173–80 Google Scholar Glöckler J, Sedlmeir J, Frank M, Fridgen G. A Systematic Review of Identity and Access Management Requirements in Enterprises and Potential Contributions of Self-Sovereign Identity. Bus Inf Syst Eng.
-
Oct 30, 2024 |
journalofcloudcomputing.springeropen.com | Luyao Pei |Cheng Xu |Xueli Yin |Jinsong Zhang
This section provides a detailed analysis of cloud-based task processing in power grid DT systems, explaining how tasks generated by the power grid and its DT are routed to cloud nodes for processing. Figure 2 provides a detailed depiction of how task scheduling is managed within cloud nodes for a power grid digital twin system. Typically, when a computing job from the DT system arrives, the scheduler assigns it to a suitable instance, where it is then placed in the queue.
-
Oct 21, 2024 |
journalofcloudcomputing.springeropen.com | Colchester Campus
One of the most recent trends in IDS is to instrument Explainable AI to improve the transparency and interpretability of these systems. Over the years, the models used in IDS became increasingly complex until they reached models that were hard to interpret, based on machine learning and deep learning, which are considered ‘black-box’ models. Now, scientists working on IDS are turning to Explainable AI to allow these high-performing models to become interpretable.
-
Sep 30, 2024 |
journalofcloudcomputing.springeropen.com | Celestine Iwendi |Piyush Shukla |Preeti Gulia |Aarti Punia |Ebuka Ibeke |Nasib Singh Gill
The widespread adoption of cloud computing has dramatically altered how data is stored, processed, and accessed in an era. The rapid development of digital technologies characterizes all this. The widespread adoption of cloud services has introduced new obstacles to guaranteeing secure and expeditious access to sensitive data. Organizations of all types find user-friendly and cost-effective solutions crucial, which is why they consider cloud services essential. The availability of the cloud hampers access control security in systems that are constantly and remotely changing. Conventional methods of access control are efficient, but the advanced world of technology exposes them to more threats. Applying blockchain technology to cloud access control systems, which are decentralized, transparent, and tamper-proof, has overcome these challenges. This paper aims to discuss the potential of blockchain in enhancing access management, security and trust in cloud computing. Besides, this scholarly article reviews the evolving area of blockchain-based access control systems and synthesizes the findings of 118 selected papers from various academic repositories. Based on this systematic review of the studies, twelve different types of blockchain-based access control paradigms can be identified. This work provides a critical analysis of the research on blockchain technology in access control systems, with a focus on scalability, compatibility, and security challenges. It also highlights areas that require further research and proposes directions for future research to advance this rapidly growing area of scholarship.
-
Sep 5, 2024 |
journalofcloudcomputing.springeropen.com | Henan Normal
Experimental evaluationThis section is structured as follows, we first introduce the experimental simulation conditions. Secondly, we analyze the performance of DAG-DQN method in terms of application completion time, energy consumption, and completion rate through the experimental simulation results. Finally, we analyze the time complexity of the method and the execution time of the method. We use computational experiments to perform DAG-DQN task offloading experimental simulations.
Contact details
Address
123 Example Street
City, Country 12345
Try JournoFinder For Free
Search and contact over 1M+ journalist profiles, browse 100M+ articles, and unlock powerful PR tools.
Start Your 7-Day Free Trial →