IEEE Transactions on Cloud Computing

Papers
(The median citation count of IEEE Transactions on Cloud Computing is 5. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-11-01 to 2024-11-01.)
ArticleCitations
Blockchain-Based Public Integrity Verification for Cloud Storage against Procrastinating Auditors201
Energy Efficient Dynamic Offloading in Mobile Edge Computing for Internet of Things200
Attribute Based Encryption with Privacy Protection and Accountability for CloudIoT137
Efficient Identity-Based Provable Multi-Copy Data Possession in Multi-Cloud Storage114
TOFFEE: Task Offloading and Frequency Scaling for Energy Efficiency of Mobile Devices in Mobile Edge Computing110
Blockchain-Assisted Public-Key Encryption with Keyword Search Against Keyword Guessing Attacks for Cloud Storage106
A New Service Mechanism for Profit Optimizations of a Cloud Provider and Its Users102
Price-Based Resource Allocation for Edge Computing: A Market Equilibrium Approach101
A Blockchain-Based Multi-Cloud Storage Data Auditing Scheme to Locate Faults99
A User-Centric Data Protection Method for Cloud Storage Based on Invertible DWT96
Lyapunov Optimization-Based Trade-Off Policy for Mobile Cloud Offloading in Heterogeneous Wireless Networks92
Cost-Efficient Resource Provisioning for Dynamic Requests in Cloud Assisted Mobile Edge Computing91
Lightweight and Privacy-Preserving Delegatable Proofs of Storage with Data Dynamics in Cloud Storage88
Cloud Intrusion Detection Method Based on Stacked Contractive Auto-Encoder and Support Vector Machine87
A Game Approach to Multi-Servers Load Balancing with Load-Dependent Server Availability Consideration78
Online Multi-Workflow Scheduling under Uncertain Task Execution Time in IaaS Clouds71
Cloud Computing Assisted Blockchain-Enabled Internet of Things70
CIPPPA: Conditional Identity Privacy-Preserving Public Auditing for Cloud-Based WBANs Against Malicious Auditors64
Joint Optimization of Computing Offloading and Service Caching in Edge Computing-Based Smart Grid62
Accurate Fault Location using Deep Neural Evolution Network in Cloud Data Center Interconnection57
A Cloud-Edge Collaboration Framework for Cognitive Service56
Cloud Mining Pool Aided Blockchain-Enabled Internet of Things: An Evolutionary Game Approach55
Verifiable Searchable Encryption Framework Against Insider Keyword-Guessing Attack in Cloud Storage53
Cost-Effective App User Allocation in an Edge Computing Environment53
Trading off Between User Coverage and Network Robustness for Edge Server Placement52
OP-MLB: An Online VM Prediction-Based Multi-Objective Load Balancing Framework for Resource Management at Cloud Data Center51
An Efficient and Secured Framework for Mobile Cloud Computing51
Lightweight and Expressive Fine-Grained Access Control for Healthcare Internet-of-Things50
Dependency-Aware Computation Offloading for Mobile Edge Computing With Edge-Cloud Cooperation49
Data Integrity Auditing without Private Key Storage for Secure Cloud Storage49
An Automated Task Scheduling Model Using Non-Dominated Sorting Genetic Algorithm II for Fog-Cloud Systems48
Resource Allocation for Cloud-Based Software Services Using Prediction-Enabled Feedback Control With Reinforcement Learning47
Privacy Preserving Searchable Encryption with Fine-Grained Access Control46
Elephant Flow Detection and Load-Balanced Routing with Efficient Sampling and Classification44
A Docker Container Anomaly Monitoring System Based on Optimized Isolation Forest43
Performance Modeling of Serverless Computing Platforms43
Real-Time Prediction of Docker Container Resource Load Based on a Hybrid Model of ARIMA and Triple Exponential Smoothing41
Forecasting Cloud Application Workloads WithCloudInsightfor Predictive Resource Management41
Classification-Based and Energy-Efficient Dynamic Task Scheduling Scheme for Virtualized Cloud Data Center39
Microscaler: Cost-Effective Scaling for Microservice Applications in the Cloud With an Online Learning Approach38
Reliability-Aware Cost-Efficient Scientific Workflows Scheduling Strategy on Multi-Cloud Systems38
Resource Price-Aware Offloading for Edge-Cloud Collaboration: A Two-Timescale Online Control Approach37
Forward Secure Public Key Encryption with Keyword Search for Outsourced Cloud Storage37
A Robust Optimization Technique for Energy Cost Minimization of Cloud Data Centers37
Similarity Search for Encrypted Images in Secure Cloud Computing37
Dynamic Cloud Resource Allocation Considering Demand Uncertainty37
Hedonic Pricing of Cloud Computing Services36
Scheduling Real-Time Parallel Applications in Cloud to Minimize Energy Consumption35
Proactive Fault-Tolerance Technique to Enhance Reliability of Cloud Service in Cloud Federation Environment34
Key Management Scheme for Secure Channel Establishment in Fog Computing34
Edge AR X5: An Edge-Assisted Multi-User Collaborative Framework for Mobile Web Augmented Reality in 5G and Beyond33
Blockchain-Based Decentralized Public Auditing for Cloud Storage33
Virtual Machine Placement Optimization in Mobile Cloud Gaming Through QoE-Oriented Resource Competition33
Impact of Processing-Resource Sharing on the Placement of Chained Virtual Network Functions32
Inspecting Edge Data Integrity With Aggregate Signature in Distributed Edge Computing Environment32
An Energy and Performance Aware Consolidation Technique for Containerized Datacenters32
Outsourced Decentralized Multi-Authority Attribute Based Signature and Its Application in IoT32
Extending Kubernetes Clusters to Low-Resource Edge Devices Using Virtual Kubelets30
Enabling Edge-Cloud Video Analytics for Robotics Applications30
Hybrid Evolutionary Scheduling for Energy-Efficient Fog-Enhanced Internet of Things30
Distributed Energy Management for Multiple Data Centers With Renewable Resources and Energy Storages29
On the Planning and Design Problem of Fog Computing Networks29
MCDM-Based Parametric Selection of Cloud Deployment Models for an Academic Organization29
Computing-Aware Base Station Sleeping Mechanism in H-CRAN-Cloud-Edge Networks28
Maximizing Throughput of Delay-Sensitive NFV-Enabled Request Admissions via Virtualized Network Function Placement28
Joint Management of Wireless and Computing Resources for Computation Offloading in Mobile Edge Clouds28
Privacy-Preserving Efficient Verifiable Deep Packet Inspection for Cloud-Assisted Middlebox28
RES: Real-Time Video Stream Analytics Using Edge Enhanced Clouds27
A Cooperative Coevolution Genetic Programming Hyper-Heuristics Approach for On-Line Resource Allocation in Container-Based Clouds27
Robust Optimization Model for Primary and Backup Resource Allocation in Cloud Providers26
Joint Computation Offloading and Bandwidth Assignment in Cloud-Assisted Edge Computing26
A Reliability-Aware, Delay Guaranteed, and Resource Efficient Placement of Service Function Chains in Softwarized 5G Networks26
Dynamic Resource Management to Defend Against Advanced Persistent Threats in Fog Computing: A Game Theoretic Approach26
SLA-Based Profit Optimization Resource Scheduling for Big Data Analytics-as-a-Service Platforms in Cloud Computing Environments26
Cloud Computing Based Demand Response Management Using Deep Reinforcement Learning26
Efficient Provision of Service Function Chains in Overlay Networks Using Reinforcement Learning26
Stream Processing on Clustered Edge Devices25
New Scheduling Algorithms for Improving Performance and Resource Utilization in Hadoop YARN Clusters25
Practical Multi-Keyword Ranked Search With Access Control Over Encrypted Cloud Data24
Provably Secure and Lightweight Identity-Based Authenticated Data Sharing Protocol for Cyber-Physical Cloud Environment24
Predictive Auto-Scaling of Multi-Tier Applications Using Performance Varying Cloud Resources24
A Two-stage Multi-population Genetic Algorithm with Heuristics for Workflow Scheduling in Heterogeneous Distributed Computing Environments24
FPGA Resource Pooling in Cloud Computing23
Multi-Keyword Searchable and Verifiable Attribute-Based Encryption Over Cloud Data23
A Multi-Objective Optimization Scheme for Job Scheduling in Sustainable Cloud Data Centers23
Achieving Secure, Universal, and Fine-Grained Query Results Verification for Secure Search Scheme Over Encrypted Cloud Data23
Enhancing Reliability and Availability through Redundancy in Vehicular Clouds23
Multi-Cloud Performance and Security Driven Federated Workflow Management23
A Trust-Aware Mechanism for Cloud Federation Formation23
Optimal Energy Trading With Demand Responses in Cloud Computing Enabled Virtual Power Plant in Smart Grids23
Virtual Network Recognition and Optimization in SDN-Enabled Cloud Environment22
HFedMS: Heterogeneous Federated Learning With Memorable Data Semantics in Industrial Metaverse22
Dual-Server Public-Key Authenticated Encryption with Keyword Search22
Evolutionary Game Based Demand Response Bidding Strategy for End-Users Using Q-Learning and Compound Differential Evolution22
Traceable and Controllable Encrypted Cloud Image Search in Multi-User Settings22
A Multi-Task Oriented Framework for Mobile Computation Offloading22
A Power Consumption Model for Cloud Servers Based on Elman Neural Network22
When FPGA Meets Cloud: A First Look at Performance22
VPSL: Verifiable Privacy-Preserving Data Search for Cloud-Assisted Internet of Things21
Efficient Algorithms for Multi-Component Application Placement in Mobile Edge Computing21
QoS Promotion in Energy-Efficient Datacenters Through Peak Load Scheduling21
Resource Usage Cost Optimization in Cloud Computing Using Machine Learning21
Interference-Aware SaaS User Allocation Game for Edge Computing21
PKE-MET: Public-Key Encryption With Multi-Ciphertext Equality Test in Cloud Computing21
AI-Bazaar: A Cloud-Edge Computing Power Trading Framework for Ubiquitous AI Services21
A Learning-Based Data Placement Framework for Low Latency in Data Center Networks21
Nimbus: Towards Latency-Energy Efficient Task Offloading for AR Services20
Evolutionary Multi-Objective Workflow Scheduling for Volatile Resources in the Cloud20
Charon: A Secure Cloud-of-Clouds System for Storing and Sharing Big Data20
Resource Allocation With Workload-Time Windows for Cloud-Based Software Services: A Deep Reinforcement Learning Approach20
Malicious Node Detection Scheme Based on Correlation of Data and Network Topology in Fog Computing-Based VANETs20
Trust-Based Secure Multi-Cloud Collaboration Framework in Cloud-Fog-Assisted IoT20
SDN-Based Traffic Matrix Estimation in Data Center Networks through Large Size Flow Identification20
Threat-Specific Security Risk Evaluation in the Cloud20
An Edge Computing Matching Framework With Guaranteed Quality of Service20
Efficient and Privacy-Preserving Online Fingerprint Authentication Scheme over Outsourced Data19
Joint Task Offloading and Resource Allocation for Device-Edge-Cloud Collaboration With Subtask Dependencies19
Optimal Incentive Strategy in Cloud-Edge Integrated Demand Response Framework for Residential Air Conditioning Loads19
Mobility and Dependence-Aware QoS Monitoring in Mobile Edge Computing19
A Game-based Thermal-Aware Resource Allocation Strategy for Data Centers19
Geography-Aware Task Scheduling for Profit Maximization in Distributed Green Data Centers19
A Streaming Cloud Platform for Real-Time Video Processing on Embedded Devices19
KeyD: Secure Key-Deduplication with Identity-Based Broadcast Encryption19
A Dynamic Deep-Learning-Based Virtual Edge Node Placement Scheme for Edge Cloud Systems in Mobile Environment19
Network Slicing for NOMA-Enabled Edge Computing18
A Multi-Objective Clustering Evolutionary Algorithm for Multi-Workflow Computation Offloading in Mobile Edge Computing18
A Hybrid Cloud and Edge Control Strategy for Demand Responses Using Deep Reinforcement Learning and Transfer Learning18
Characterizing Co-Located Workloads in Alibaba Cloud Datacenters18
DNA Similarity Search With Access Control Over Encrypted Cloud Data18
Virtual Network Function Service Provisioning in MEC Via Trading Off the Usages Between Computing and Communication Resources18
Kubernetes-Oriented Microservice Placement With Dynamic Resource Allocation18
Scheduling of Low Latency Services in Softwarized Networks18
Efficient Replica Migration Scheme for Distributed Cloud Storage Systems18
MockFog 2.0: Automated Execution of Fog Application Experiments in the Cloud17
Attribute-Based Pseudonymity for Privacy-Preserving Authentication in Cloud Services17
Investigating Machine Learning Algorithms for Modeling SSD I/O Performance for Container-Based Virtualization17
Authorized Keyword Search over Outsourced Encrypted Data in Cloud Environment17
An Intermediate Data Partition Algorithm for Skew Mitigation in Spark Computing Environment17
Enabling Cost-Effective, SLO-Aware Machine Learning Inference Serving on Public Cloud17
Efficient and Secure Outsourcing of Large-Scale Linear System of Equations16
Maximizing Cloud Revenue using Dynamic Pricing of Multiple Class Virtual Machines16
D-SRTF: Distributed Shortest Remaining Time First Scheduling for Data Center Networks16
Fairness-Efficiency Scheduling for Cloud Computing With Soft Fairness Guarantees16
Dynamic Resource Allocation Method Based on Symbiotic Organism Search Algorithm in Cloud Computing16
Enhancing Performance and Energy Efficiency for Hybrid Workloads in Virtualized Cloud Environment16
APS: Adaptive Packet Spraying to Isolate Mix-Flows in Data Center Network16
An Empirical Study on Data Flow Bugs in Business Processes16
Threshold Multi-Keyword Search for Cloud-Based Group Data Sharing16
SecEDMO: Enabling Efficient Data Mining with Strong Privacy Protection in Cloud Computing16
Searchable Public-Key Encryption With Cryptographic Reverse Firewalls for Cloud Storage15
Outsourcing Proofs of Retrievability15
Cloud-Edge Hosted Digital Twins for Coordinated Control of Distributed Energy Resources15
Computing Without Borders: The Way Towards Liquid Computing15
An Efficient Privacy-Aware Authentication Scheme With Hierarchical Access Control for Mobile Cloud Computing Services15
CoMCLOUD: Virtual Machine Coalition for Multi-Tier Applications Over Multi-Cloud Environments15
A Truthful Combinatorial Auction Mechanism Towards Mobile Edge Computing in Industrial Internet of Things15
Context-Aware Routing in Fog Computing Systems15
Share Your Data Carefree: An Efficient, Scalable and Privacy-Preserving Data Sharing Service in Cloud Computing15
Multi-Access Filtering for Privacy-Preserving Fog Computing15
Online Deployment Algorithms for Microservice Systems With Complex Dependencies15
Near-Optimal Energy-Efficient Algorithm for Virtual Network Function Placement14
SeSPHR: A Methodology for Secure Sharing of Personal Health Records in the Cloud14
When RAN Intelligent Controller in O-RAN Meets Multi-UAV Enable Wireless Network14
Cloud-Edge Interoperability for Demand Response-Enabled Fast Frequency Response Service Provision14
SLearn: A Case for Task Sampling Based Learning for Cluster Job Scheduling14
Efficient Algorithm for Secure Outsourcing of Modular Exponentiation with Single Server14
DMORA: Decentralized Multi-SP Online Resource Allocation Scheme for Mobile Edge Computing14
Live Migration in Bare-Metal Clouds14
Computational Cost Analysis and Data-Driven Predictive Modeling of Cloud-Based Online-NILM Algorithm14
MultiScaler: A Multi-Loop Auto-Scaling Approach for Cloud-Based Applications14
Autonomic Resource Management for Fog Computing13
Performance Modeling of Metric-Based Serverless Computing Platforms13
A Two-Stage Auction Mechanism for Cloud Resource Allocation13
Content Caching and Distribution at Wireless Mobile Edge13
Outsourcing Data Processing Jobs With Lithops13
Real-Time FaaS: Towards a Latency Bounded Serverless Cloud13
MSIAP: A Dynamic Searchable Encryption for Privacy-Protection on Smart Grid With Cloud-Edge-End13
FCTcon: Dynamic Control of Flow Completion Time in Data Center Networks for Power Efficiency13
Dual Traceable Distributed Attribute-Based Searchable Encryption and Ownership Transfer13
Secure Cloud Storage With Data Dynamics Using Secure Network Coding Techniques13
Efficient Revocable Storage Attribute-based Encryption With Arithmetic Span Programs in Cloud-Assisted Internet of Things13
Chosen-Ciphertext Secure Homomorphic Proxy Re-Encryption12
Privacy-Preserving Traceable Attribute-Based Keyword Search in Multi-Authority Medical Cloud12
Context-Aware Policy Enforcement for PaaS-Enabled Access Control12
The Effects of Soft Errors and Mitigation Strategies for Virtualization Servers12
Dynamic Deployment and Scheduling Strategy for Dual-Service Pooling-Based Hierarchical Cloud Service System in Intelligent Buildings12
Hybrid Multiple Access for Network Slicing Aware Mobile Edge Computing12
SecureAD: A Secure Video Anomaly Detection Framework on Convolutional Neural Network in Edge Computing Environment12
Directed Search: A New Operator in NSGA-II for Task Scheduling in IoT Based on Cloud-Fog Computing12
Efficient IoT Management With Resilience to Unauthorized Access to Cloud Storage12
Popularity-Based Data Placement With Load Balancing in Edge Computing12
Towards Efficient Verifiable Boolean Search Over Encrypted Cloud Data12
Infrastructure Aware Heterogeneous-Workloads Scheduling for Data Center Energy Cost Minimization12
Efficient Online Scheduling for Coflow-Aware Machine Learning Clusters12
An Efficient Approach Based on Ant Colony Optimization and Tabu Search for a Resource Embedding Across Multiple Cloud Providers12
Differentiate Quality of Experience Scheduling for Deep Learning Inferences With Docker Containers in the Cloud12
SR-PEKS: Subversion-Resistant Public Key Encryption With Keyword Search12
Optimal Task Allocation and Coding Design for Secure Edge Computing With Heterogeneous Edge Devices12
Deadline-Aware Fast One-to-Many Bulk Transfers over Inter-Datacenter Networks11
Secure Data Group Sharing and Conditional Dissemination with Multi-Owner in Cloud Computing11
Joint Optimization of VNF Placement and Flow Scheduling in Mobile Core Network11
Enabling Traceable and Verifiable Multi-User Forward Secure Searchable Encryption in Hybrid Cloud11
Performance Modeling of Microservice Platforms11
ViePEP-C: A Container-Based Elastic Process Platform11
A Robust Generic Multi-Authority Attributes Management System for Cloud Storage Services11
Cost-Effective and Latency-Minimized Data Placement Strategy for Spatial Crowdsourcing in Multi-Cloud Environment11
A Knowledge-Based Adaptive Discrete Water Wave Optimization for Solving Cloud Workflow Scheduling11
Demand Response as a Service: Clearing Multiple Distribution-Level Markets11
Delay and Cost Optimization in Computational Offloading Systems with Unknown Task Processing Times11
Service Availability Analysis in a Virtualized System: A Markov Regenerative Model Approach11
Empirical Investigation of Key Factors for SaaS Architecture11
Demand Response Control of Smart Buildings Integrated With Security Interconnection11
A Hierarchical Receding Horizon Algorithm for QoS-Driven Control of Multi-IaaS Applications11
Verifiable and Dynamic Multi-Keyword Search Over Encrypted Cloud Data Using Bitmap11
Deep Reinforcement Learning-Based Joint Optimization of Delay and Privacy in Multiple-User MEC Systems11
Efficiency Measurement of Cloud Service Providers Using Network Data Envelopment Analysis11
A Universal Reversible Data Hiding Method in Encrypted Image Based on MSB Prediction and Error Embedding11
Power of Random Choices Made Efficient for Fog Computing10
Dynamic Demand Prediction and Allocation in Cloud Service Brokerage10
A Fast Graph Neural Network-Based Method for Winner Determination in Multi-Unit Combinatorial Auctions10
Demand-Aware Erasure Coding for Distributed Storage Systems10
User-Centric Interference-Aware Load Balancing for Cloud-Deployed Applications10
Column Generation Based Service Function Chaining Embedding in Multi-Domain Networks10
Pooling is not Favorable: Decentralize Mining Power of PoW Blockchain Using Age-of-Work10
Fast Secure and Anonymous Key Agreement Against Bad Randomness for Cloud Computing10
Cloud-Based Privacy-Preserving Collaborative Consumption for Sharing Economy10
Efficient Multi-Channel Computation Offloading for Mobile Edge Computing: A Game-Theoretic Approach10
Scalable Fuzzy Keyword Ranked Search Over Encrypted Data on Hybrid Clouds10
Latency-Aware Task Scheduling in Software-Defined Edge and Cloud Computing With Erasure-Coded Storage Systems10
Automatic Performance-Optimal Offloading of Network Functions on Programmable Switches10
Tag-Based Verifiable Delegated Set Intersection Over Outsourced Private Datasets10
A Privacy-Preserving Outsourcing Computing Scheme Based on Secure Trusted Environment10
Multi-Tier Workload Consolidations in the Cloud: Profiling, Modeling and Optimization10
Optimizing Speculative Execution in Spark Heterogeneous Environments10
LPGA: Location Privacy-Guaranteed Offloading Algorithm in Cache-Enabled Edge Clouds10
BFCRI: A Blockchain-Based Framework for Crowdsourcing With Reputation and Incentive10
A Queue Waiting Cost-Aware Control Model for Large Scale Heterogeneous Cloud Datacenter10
Flash: Joint Flow Scheduling and Congestion Control in Data Center Networks10
Dynamic VM Scaling: Provisioning and Pricing through an Online Auction10
Quantifying the Influence of Intermittent Connectivity on Mobile Edge Computing10
Reversible Data Hiding in Shared Images Based on Syndrome Decoding and Homomorphism9
Power Control Framework for Green Data Centers9
Personality-Guided Cloud Pricing via Reinforcement Learning9
Strong Temporal Isolation Among Containers in OpenStack for NFV Services9
Secure and Efficient Data Deduplication in JointCloud Storage9
Joint Optimization Across Timescales: Resource Placement and Task Dispatching in Edge Clouds9
Cloud Workload Turning Points Prediction via Cloud Feature-Enhanced Deep Learning9
Infrastructure-efficient Virtual-Machine Placement and Workload Assignment in Cooperative Edge-Cloud Computing Over Backhaul Networks9
Dynamic Pricing for Sensor-Cloud Platform in the Presence of Dumb Nodes9
Edge-Assisted Short Video Sharing With Guaranteed Quality-of-Experience9
0.057868003845215