The Journal of Supercomputing

, Volume 68, Issue 3, pp 1321–1346 | Cite as

A systematic review on cloud computing

  • Frederico Durao
  • Jose Fernando S. Carvalho
  • Anderson Fonseka
  • Vinicius Cardoso Garcia
Article

Abstract

Cloud computing is an ascending technology that has introduced a new paradigm by rendering a rational computational model possible. It has changed the dynamics of IT consumption by means of a model that provides on-demand services over the Internet. Unlike the traditional hosting service, cloud computing services are paid for per usage and may expand or shrink based on demand. Such services are, in general, fully managed by cloud providers that require users nothing but a personal computer and an Internet access. In recent years, this model has attracted the attention of researchers, investors and practitioners, many of whom have proposed a number of applications, structures and fundamentals of cloud computing, resulting in various definitions, requirements and models. Despite the interest and advances in the field, issues such as security and privacy, service layer agreement, resource sharing, and billing have opened up new questions about the real gains of the model. Although cloud computing is based on a 50-year-old business model, evidence from this study indicates that cloud computing still needs to expand and overcome present limitations that prevent the full use of its potential. In this study, we critically review the state of the art in cloud computing with the aim of identifying advances, gaps and new challenges.

Keywords

Cloud computing Service layer agreement Virtualization On-demand business model 

Notes

Acknowledgments

The authors would like to thank the ASSERT Research Group for the feedback on meetings and support during the execution of this research. This work was partially supported by the National Institute of Science and Technology for Software Engineering (INES), funded by CNPq and FACEPE, grants 573964/2008-4 and APQ-1037-1.03/08.

References

  1. 1.
    Amazon (2012) Amazon web services. URL: http://aws.amazon.com/. Retrieved 24 Oct 2013
  2. 2.
    Apple (1983) Apple invents the personal computer. URL: http://archive.computerhistory.org/resources/text/Apple/Apple.Lisa.1983.102634506.pdf. Retrieved 24 Oct 2013
  3. 3.
    Baliga J, Ayre RWA, Hinton K, Tucker RS (2010) Green cloud computing: balancing energy in processing, storage and transport. J Proc IEEE 99Google Scholar
  4. 4.
    Basili VR, Zelkowitz MV (2007) Empirical studies to build a science of computer science. Commun ACM 50(11):33–37CrossRefGoogle Scholar
  5. 5.
    Bellis M (1997) The history of computers. URL: http://inventors.about.com/library/blcoindex.htm. Retrieved 24 Oct 2013
  6. 6.
    Berners-Lee T (1998) The world wide web: a very short personal historyGoogle Scholar
  7. 7.
    Boloor K, Chirkova R, Viniotis Y, Salo T (2010) Dynamic request allocation and scheduling for context aware applications subject to a percentile response time sla in a distributed cloud. In: IEEE International Conference and Workshops on Cloud Computing Technology and Science (CLOUDCOM’10)Google Scholar
  8. 8.
    Bonetta D, Pautasso C (2011) Towards liquid service oriented architectures. In: International conference on World Wide Web, Hyderabad, IndiaGoogle Scholar
  9. 9.
    Budgen D, Kitchenham BA, Charters SM, Turner M, Brereton P, Linkman SG (2008) Presenting software engineering results using structured abstracts: a randomised experiment. Empirical Softw Eng 13(4):435–468CrossRefGoogle Scholar
  10. 10.
    Buyya R, Yeo CS, Venugopal S, Broberg J, Brandic I (2009) Cloud computing and emerging it platforms: vision, hype, and reality for delivering computing as the 5th utility. Future Comput Syst 25(6):599–616CrossRefGoogle Scholar
  11. 11.
    Cadan KS, Li WS, Phan T, Zhou M (2009) Frontiers in information and software as services. In: International Conference on Data, Engineering (ICDE’09)Google Scholar
  12. 12.
    Calero JMA, Edwards N, Kirschnick J, Wilcock L, Wray M (2010) Toward a multi-tenancy authorization system for cloud services. J Secur Priv 8:48–55CrossRefGoogle Scholar
  13. 13.
    Campbell-Kelly M (2009) Historical reflections the rise, fall, and resurrection of software as a service. J CACM 52Google Scholar
  14. 14.
    Caron E, Desprez F, Muresan A (2011) Pattern matching based forecast of non-periodic repetitive behavior for cloud clients. J Grid Comput 9:49–64CrossRefGoogle Scholar
  15. 15.
    Carr NG (2003) It doesn’t matter. In: Harvard Business SchoolGoogle Scholar
  16. 16.
    Chapman C, Emmerich W, Márquez FG, Clayman S, Galis A (2011) Software architecture definition for on-demand cloud provisioning. J Cluster Comput 14:1–22CrossRefGoogle Scholar
  17. 17.
    Chaves SA, Westphall CB, Lamin FR (2010) Sla perspective in security management for cloud computing. In: International Conference on Networking and Services (ICNS’10)Google Scholar
  18. 18.
    Chellappa RK (1997) Intermediaries in cloud-computing: A new computing paradigm. In INFORMS Annual Meeting, DallasGoogle Scholar
  19. 19.
    Chieu T, Kapoor S, Mohindra A, Shaikh A (2010) Cross enterprise improvements delivered via a cloud platform: a game changer for the consumer product and retail industry. In: International Conference on Services, Computing (SCC’10)Google Scholar
  20. 20.
    Cho B, Gupta I (2010) New algorithms for planning bulk transfer via internet and shipping networks. In: International Conference on Distributed, Computing Systems (ICDCS’10)Google Scholar
  21. 21.
    Chong F, Carraro G (2006) Architecture strategies for catching the long tail. MSDN Library, Microsoft Corporation, pp 9–10Google Scholar
  22. 22.
    Columbus L (2011) Gartner releases their hype cycle for cloud computing, 2011. URL: http://goo.gl/pqrDC, 2011. Retrieved 24 Oct 2013
  23. 23.
    Costa R, Brasileiro F, Filho GL, Souza DM (2009) Oddci: on-demand distributed computing infrastructure. In: Workshop on Many-Task Computing on Grids and Supercomputers (MTAGS’09)Google Scholar
  24. 24.
    Doelitzscher F, Reich C, Sulistio A (2010) Designing cloud services adhering to government privacy laws. In: Complex, Intelligent and Software Intensive Systems (CIT’10)Google Scholar
  25. 25.
    Dutreilh X, Moreau A, Malenfant J, Rivierre N, Truck I (2010) Data center resource allocation to control theory and back. In: International Conference on Cloud, Computing (CLOUD’10)Google Scholar
  26. 26.
    Elmroth E, Larsson L (2009) Interfaces for placement, migration, and monitoring of virtual machines in federated clouds. In: International Conference on Grid and Cooperative, Computing (GCC’09)Google Scholar
  27. 27.
    Erl T (2005) Service-oriented architecture (SOA): concepts, technology, and design. Prentice HallGoogle Scholar
  28. 28.
    Foster I (1998) The grid: blueprint for a new computing infrastructure. Morgan Kaufmann Publishers Inc, BurlingtonGoogle Scholar
  29. 29.
    Gill K (2008) Remember the oil crisis? URL: http://uspolitics.about.com/b/2008/01/02/remember-the-oil-crisis.htm. Retrieved 24 Oct 2013
  30. 30.
    Guha R, Al-Dabass D (2010) Impact of web 2.0 and cloud computing platform on software engineering. In: Proceedings of the 2010 International Symposium on Electronic System Design (ISED’10), pp 213–218Google Scholar
  31. 31.
    Hassan MM, Song B, Huh EN (2009) A framework of sensor, cloud integration opportunities and challenges. In: International Conference on Ubiquitous Information Management and Communication (ICUIMC’09)Google Scholar
  32. 32.
    Hou Z, Zhou X (2010) Asaas: application software as a service for high performance cloud computing. In: International Conference on High Performance Computing and Communications (HPCC’10)Google Scholar
  33. 33.
    Huang H, Wang L (2010) P&p: a combined push-pull model for resource monitoring in cloud computing environment. In: International Conference on Cloud, Computing (CLOUD’10)Google Scholar
  34. 34.
    Hutchinson C, Ward J, Castilon K (2009) Navigating the application architecture. J IT Prof 11:18–22CrossRefGoogle Scholar
  35. 35.
    Ichak A (1996) The pursuit of prime: maximize your company’s success with the Adizes Program. Knowledge ExchangeGoogle Scholar
  36. 36.
    Jianhong Z, Hua C (2010) Secuirty storage in the cloud computing: a rsa-based assumption data integrity check without original data. In: International Conference on Educational and Information Technology (ICEIT’10)Google Scholar
  37. 37.
    Jin H, Xiang G, Zou D, Wu S, Zhao F, Li M, Zheng W (2011) A vmm-based intrusion prevention system in cloud computing environment. J Supercomput 66:1133–1151Google Scholar
  38. 38.
    Kandukuri BP, Paturi VR (2009) Cloud security issues. In: International Conference on Services, Computing (SCC’09)Google Scholar
  39. 39.
    Kansal A, Zhao F, Liu J, Kothari N, Bhattacharya AA (2010) Virtual machine power metering and provisioning. In: ACM symposium on Cloud computing (SoCC’10)Google Scholar
  40. 40.
    Kertész A, Kecskeméti G, Brandic I (2011) Autonomic sla-aware service virtualization for distributed systems. In: Euromicro Conference on Parallel, Distributed and Network-based (PDP’11)Google Scholar
  41. 41.
    Kitchenham B, Charters S (2007) Guidelines for performing systematic literature reviews in software engineering. Technical Report EBSE 2007–001, Keele University and Durham University Joint, ReportGoogle Scholar
  42. 42.
    Kondo D, Javadi B, Malecot P, Cappello F, Anderson DP (2009) Cost-benefit analysis of cloud computing versus desktop grids. In: IEEE International Symposium on Parallel and Distributed Processing with Applications (IPDPS’09)Google Scholar
  43. 43.
    Kossmann D, Kraska T, Loesing S (2010) An avaluation of alternative architectures for transaction processing in the cloud. In: International conference on Management of data (SIGMOD’10)Google Scholar
  44. 44.
    Kozuch MA, Ryan MP, Gass R, Schlosser SW, O’Hallaron, Cipar J, Krevat E, ópez JL, Stroucken M, Ganger GR (2009) Tashi: location-aware cluster management. In: International Conference on AC and DC Power Transmission (ACDC’09)Google Scholar
  45. 45.
    Kumar SR, Saxena A (2011) Data integrity proofs in cloud storage. In: International Conference on COMmunication Systems and NETworkS (COMSNETS’11)Google Scholar
  46. 46.
    Kutare M, Eisenhauer G, Wang C, Schwan K, Talwar V, Wolf M (2010) Monalytics: Online monitoring and analytics for managing large scale data centers. In: International Conference on Autonomic Computing (ICAC’10), WashingtonGoogle Scholar
  47. 47.
    Lee JH, Park MW, Eom JH, Chung TM (2011) Multi-level intrusion detection system and log management in cloud computing. In: International Conference on Advanced Communication Technology (ICACT’11)Google Scholar
  48. 48.
    Li J, Zhao G, Chen X, Xie D, Rong C, Li W, Tang L, Tang Y (2010) Fine-grained data access control systems with user accountability in cloud computin. In: IEEE International Conference and Workshops on Cloud Computing Technology and Science (CLOUDCOM’10)Google Scholar
  49. 49.
    Li Q, Hao Q, Xiao L, Li Z (2009) Adaptive management of virtualized resources in cloud computing using feedback control. In: International Conference on Information Science and Engineering (ICISE’09)Google Scholar
  50. 50.
    Lin FT, Shih TS (2010) Cloud computing: the emerging computing technology. J ICIC Int 1:33–38Google Scholar
  51. 51.
    Luo M, Zhang LJ, Lei F (2010) An insuanrance model for guranteeing service assurance, integrity and qos in cloud computing. In: International Conference on Web Services (ICWS’10)Google Scholar
  52. 52.
    Macías M, Fitó JO, Guitart J (2010) Rule-based sla management for revenue maximisation in cloud computing markets. In: International Conference on network and Service Management (CNSM’10)Google Scholar
  53. 53.
    Madnick S (1969) Time-sharing systems: virtual machine conept vs. conventional approach. J Modern Data Sys 2:34–36Google Scholar
  54. 54.
    Marston S, Li Z, Bandyopadhyay S, Zhang J, Ghalsasi A (2010) Cloud computing-the business perspective. J Decis Support Syst 51:176–189CrossRefGoogle Scholar
  55. 55.
    McCarthy J (1983) Reminiscences on the history of time-sharing. URL: http://www-formal.stanford.edu/jmc/history/timesharing.dvi, 1983. Retrieved 02 June 2012
  56. 56.
    Mehta HK, Kanungo P, Chandwani M (2011) Performance enhancement of scheduling algorithms in clusters and grids using improved dynamic load balancing techniques. In: International conference on World Wide Web (WWW’11)Google Scholar
  57. 57.
    Menzel M, Warschofsky R, Thomas I, Willems C, Meinel C (2010) The service security lab: A model-driven platform to compose and explore service security in the cloud. In: World Congress on Services (SERVICES-I’10)Google Scholar
  58. 58.
    Mounzer J, Bambos N (2010) Integrated security risk management for it-intensive organizations. In: International Conference on Information Assurance and Security (IAS’10)Google Scholar
  59. 59.
    Nae V, Prodan R, Losup A (2011) A new business model for massively multiplayer online games. In: International conference on Performance, engineering (ICPE’11)Google Scholar
  60. 60.
    Nair SK, Porwal S, Dimitrakos T, Ferrer AJ, Tordsson J, Sharif T, Sheridan C, Rajarajan M, Khan AU (2010) Towards secure cloud bursting, brokerage and aggregation. In: International Conference on Web ServicesGoogle Scholar
  61. 61.
    Nicolae B (2010) High throughput data-compression for cloud storage. Lect Notes Comput Sci 6265(2010):1–12Google Scholar
  62. 62.
    NITRD (1991) High performance computing act of 1991. URL: http://www.nitrd.gov/Congressional/Laws/pl_102-194.html, 1991. Retrieved 24 Oct 2013
  63. 63.
    Parkhill DF (1966) The challenge of the computer utility. Addison-Wesley Publishing Company, BostonGoogle Scholar
  64. 64.
    Pervez Z, Khattak AM, Lee S, Lee YK (2010) Dual validation framework for multi-tenant saas architecture. In: Future Information Technology (FutureTech’10)Google Scholar
  65. 65.
    Petersen K, Feldt R, Mujtaba S, Mattsson M (2008) Systematic mapping studies in software engineering. In: Evaluation and Assessment in Software Engineering (EASE’08), Italy. University of BariGoogle Scholar
  66. 66.
    Polsson K (2012) Chronology of personal computers. URL: http://www.islandnet.com/kpolsson/comphist/comp1988.htm, 2012. Retrieved 24 Oct 2013
  67. 67.
    Ramakrishman L, Jackson KR, Canon S, Cholia S, Shalf J (2010) Defining future platform requirements for e-science clouds. In: ACM symposium on Cloud, computing (SoCC’10)Google Scholar
  68. 68.
    Rimal BR, Jukan A, Katsaros D, Goeleven Y (2010) Architectural requirements for cloud computing systems: an enterprise cloud approach. J Grid Comput 9:3–26CrossRefGoogle Scholar
  69. 69.
    Per R, Martin H (2009) Guidelines for conducting and reporting case study research in software engineering. Empirical Softw Engg 14(2):131–164CrossRefGoogle Scholar
  70. 70.
    Salesforce.com (2013) Salesforce.com. last checked oct/2013. URL: www.salesforce.com, 2013. Retrieved 24 Oct 2013
  71. 71.
    David S, Farheen A (2010) Taking a flexible approach to asps. J CACM 53:139–143Google Scholar
  72. 72.
    Sevior M, Fifield T, Katayama N (2010) Belle monte-carlo production on the amazon ec2 cloud. J Phys Conf Ser 219 012003. doi: 10.1088/1742-6596/219/1/012003
  73. 73.
    Shi A, Xia Y, Zhan H (2010) Applying cloud computing in financial service industry. In: International Conference on Intelligent Control and Information Processing (ICICIP’10)Google Scholar
  74. 74.
    Foster I, Zhao Y, Raicu L, Shiyong L (2008) Cloud computing and grid computing 360-degree compared. URL: http://arxiv.org/ftp/arxiv/papers/0901/0901.0131.pdf, 2008. Retrived 24 Oct 2013
  75. 75.
    Sigh MD, Krishna PR, Saxena A (2010) A cryptography based privacy preserving solution to mine cloud data. In: Proceedings of the Annual ACM Bangalore Conference (COMPUTE’10)Google Scholar
  76. 76.
    Sivathanu S, Liu L, Yiduo M, Pu X (2010) Storage management in virtualized cloud environment. In: International Conference on Cloud, Computing (CLOUD’10)Google Scholar
  77. 77.
    Smarr L (2008) Metacomputer architecture of the global lambdagrid: How personal light paths are transforming e-science. URL: http://goo.gl/ohpfMR, 2008. Retrieved 24 Oct 2013
  78. 78.
    Spring J (2011) Monitoring cloud computing by layer, part 1. J IEEE Secur Priv 9:66–68Google Scholar
  79. 79.
    Staten J (2009) Hollow out the moose: reducing cost with strategic rightsourcing. Forrester Research Inc, CambridgeGoogle Scholar
  80. 80.
    Tao Q, Chang H, Yi Y, Gu C (2010) A trustworthy management approach for cloud services qos data. In: International Conference on Machine Learning and Cybernetics (ICMLC’10)Google Scholar
  81. 81.
    Taylor M, Haggerty J, Gresty D, Hegarty R (2010) Digital evidence in cloud computing systems. J Comput Law Secur Rep Rev 26:204–208Google Scholar
  82. 82.
    Thelen E (2010) General electric computer department from the bottom up 1961 through 1965. URL: http://www.ed-thelen.org/EarlyGE-Computers.html, 2010. Retrieved 24 Oct 2013
  83. 83.
    Udo H (2010) Data protection and legal compliance in cloud computing. J DuD 34:554–556CrossRefGoogle Scholar
  84. 84.
    Wang J, Varman P (2010) Avoiding performance fluctuation in cloud storage. In: International Conference on High, Performance Computing (HiPC’10)Google Scholar
  85. 85.
    Wang Y, Song A, Luo J (2010) A mapreducemerge-based data cube construction method. In: International Conference on Grid and Cooperative, Computing (GCC’10)Google Scholar
  86. 86.
    Wayne NIST, Jansen A (2011) Cloud hooks: security and privacy issues in cloud computing. In: Hawaii International Conference on System Sciences (HICSS’11)Google Scholar
  87. 87.
    Christof W, Arun A, Benjamin B, Nikolay B, Thomas M, Wibke M, Jochen S (2009) Cloud computing: a classification, business models, and research directions. J Bus Inform Syst Eng 1:391–399Google Scholar
  88. 88.
    Woitaszek M, Tufo HM (2010) Developing a cloud computing charging model for high-performance computing resources. In: CIT, IEEE Computer Society, pp 210–217Google Scholar
  89. 89.
    Wong WK, Cheung DW, Kao B, Mamoulis N (2009) Secure knn computation on encrypted databases. In: International conference on Management of data (SIGMOD’09)Google Scholar
  90. 90.
    Wu H, Winer C (2009) Network security for virtual machine in cloud computing? In: International Conference on Computer Sciences and Convergence Information Technology (ICCIT’09)Google Scholar
  91. 91.
    Yigitbasi N, Iosup A, Epema D, Ostermann S (2009) C-meter: a framework for performance analysis of computing clouds. In: IEEE/ACM International Symposium on Cluster, Cloud and Grid, Computing (CCGrid’09)Google Scholar
  92. 92.
    Yu X, Wen Q (2010) A view about cloud data security from data life cycle. In: International Conference on Computational Intelligence and Software Engineering (CiSE’10)Google Scholar
  93. 93.
    Yusuke T, Koie H, Tomohiro K, Isao K, Yoshio T (2010) A distributed storage system allowing application users to reserve i/o performance in advance for achieving sla. In: International Workshop on Middleware for Grids, Clouds and e-Science (MGC’10)Google Scholar
  94. 94.
    Zhang Q, Cheng L, Boutaba R (2010) Cloud computing: state-of-the-art and research challenges. J Internet Serv Appl 1(1):7–18CrossRefGoogle Scholar
  95. 95.
    Zheng Q, Xu S (2010) Fail and dynamic proofs of retrievability. In: ACM Conference on Data and Application Security and Privacy (CODASPY’10)Google Scholar
  96. 96.
    Zhou M, Zhang R, Xie W, Qian W, Zhou A (2010) Security and privacy in cloud computing: a survey. In: International Conference on Semantics Knowledge and Grid (SKG’10)Google Scholar
  97. 97.
    Zhou W, Ning P, Wang R, Zhang X, Ammons G, Bala V (2010) Always up-to-date -slacalable offline patching of vm images in a compute cloud. In: Annual Computer Security Applications Conference (ACSAC’10)Google Scholar
  98. 98.
    Zissis D, Lekkas D (2011) Securing e-government and e-voting with an open cloud computing architecture. J Gov Inform Quart 28:239–251Google Scholar

Copyright information

© Springer Science+Business Media New York 2014

Authors and Affiliations

  • Frederico Durao
    • 1
  • Jose Fernando S. Carvalho
    • 2
  • Anderson Fonseka
    • 2
  • Vinicius Cardoso Garcia
    • 2
  1. 1.Computer Science DepartmentFederal University of BahiaSalvadorBrazil
  2. 2.Informatic CenterFederal University of PernambucoRecifeBrazil

Personalised recommendations