{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,2]],"date-time":"2026-05-02T14:58:57Z","timestamp":1777733937669,"version":"3.51.4"},"reference-count":67,"publisher":"Wiley","issue":"8","license":[{"start":{"date-parts":[[2025,8,5]],"date-time":"2025-08-05T00:00:00Z","timestamp":1754352000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["72371030"],"award-info":[{"award-number":["72371030"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["72131002"],"award-info":[{"award-number":["72131002"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["71971026"],"award-info":[{"award-number":["71971026"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["72001026"],"award-info":[{"award-number":["72001026"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012236","name":"Beijing Institute of Technology Research Fund Program for Young Scholars","doi-asserted-by":"publisher","award":["XSQD\u20106120220141"],"award-info":[{"award-number":["XSQD\u20106120220141"]}],"id":[{"id":"10.13039\/501100012236","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Quality &amp; Reliability Eng"],"published-print":{"date-parts":[[2025,12]]},"abstract":"<jats:title>ABSTRACT<\/jats:title>\n                  <jats:p>This study addresses the growing safety challenges associated with data transmission and processing in cloud computing systems, particularly in light of their vulnerability to external shocks such as hacker attacks. We introduce risk control strategies that focus on condition\u2010based data backup and mission abort decisions. We establish a mission abort threshold based on the number of shocks specific to cloud computing systems engaged in data transmission, aiming to reduce the risk of system failures. Before executing a mission abort decision, we propose a condition\u2010based backup strategy that triggers data backup once the transmitted data reaches a predefined threshold, thus mitigating the risk of data loss. Within the framework of the integrated backup and mission abort strategies, we evaluate critical system performance metrics, including mission success probability (MSP) and expected total costs, utilizing a recursive method. Optimization of integrated backup and mission abort policies seeks to minimize expected total costs associated with system failures, mission failures, data backups, and data loss. To validate the effectiveness of our proposed strategies, we conduct a comprehensive numerical example, demonstrating that the implementation of condition\u2010based backup and abort thresholds can significantly reduce expected costs and enhance MSP.<\/jats:p>","DOI":"10.1002\/qre.70035","type":"journal-article","created":{"date-parts":[[2025,8,5]],"date-time":"2025-08-05T15:13:27Z","timestamp":1754406807000},"page":"3319-3333","update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Optimal Condition\u2010Based Backup and Mission Abort Decisions for Cloud Computing Systems"],"prefix":"10.1002","volume":"41","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8741-0536","authenticated-orcid":false,"given":"Qingan","family":"Qiu","sequence":"first","affiliation":[{"name":"School of Management Beijing Institute of Technology Beijing China"}]},{"given":"Bosen","family":"Liu","sequence":"additional","affiliation":[{"name":"School of Management Beijing Institute of Technology Beijing China"}]},{"given":"Cuicui","family":"Pei","sequence":"additional","affiliation":[{"name":"School of Management Beijing Institute of Technology Beijing China"}]},{"given":"Rongchi","family":"Sun","sequence":"additional","affiliation":[{"name":"School of Management Beijing Institute of Technology Beijing China"}]},{"given":"Xian","family":"Zhao","sequence":"additional","affiliation":[{"name":"School of Economics Beijing Institute of Technology Beijing China"},{"name":"Digital Economy and Policy Intelligentization Key Laboratory of Ministry of Industry and Information Technology Beijing China"}]}],"member":"311","published-online":{"date-parts":[[2025,8,5]]},"reference":[{"key":"e_1_2_8_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1721654.1721672"},{"key":"e_1_2_8_3_1","doi-asserted-by":"crossref","unstructured":"P.MellandT.Grance The Nist Definition of Cloud Computing Technical Report SP 800\u2010145(National Institute of Standards and Technology 2011).","DOI":"10.6028\/NIST.SP.800-145"},{"key":"e_1_2_8_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2010.12.006"},{"issue":"1","key":"e_1_2_8_5_1","first-page":"143","article-title":"Cloud Computing Security Issues and Challenges: A Survey","volume":"11","author":"Khan M. S.","year":"2020","journal-title":"International Journal of Advanced Computer Science and Applications"},{"key":"e_1_2_8_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2025.3583769"},{"key":"e_1_2_8_7_1","doi-asserted-by":"publisher","DOI":"10.1080\/24725854.2019.1567958"},{"key":"e_1_2_8_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/s42524-024-4130-7"},{"key":"e_1_2_8_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/s42524-024-0140-8"},{"key":"e_1_2_8_10_1","doi-asserted-by":"publisher","DOI":"10.1080\/24725854.2025.2491492"},{"key":"e_1_2_8_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2912427"},{"key":"e_1_2_8_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2022.108870"},{"key":"e_1_2_8_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2023.109853"},{"key":"e_1_2_8_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2022.108612"},{"key":"e_1_2_8_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2023.109149"},{"key":"e_1_2_8_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2019.106590"},{"key":"e_1_2_8_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2020.107122"},{"key":"e_1_2_8_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2024.110335"},{"key":"e_1_2_8_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2022.3172377"},{"key":"e_1_2_8_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2020.107069"},{"key":"e_1_2_8_21_1","doi-asserted-by":"publisher","DOI":"10.1111\/risa.17696"},{"key":"e_1_2_8_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2022.3141416"},{"key":"e_1_2_8_23_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cie.2025.111208"},{"key":"e_1_2_8_24_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2025.110853"},{"key":"e_1_2_8_25_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2019.106496"},{"key":"e_1_2_8_26_1","doi-asserted-by":"publisher","DOI":"10.1002\/qre.3351"},{"key":"e_1_2_8_27_1","doi-asserted-by":"publisher","DOI":"10.1111\/risa.14187"},{"key":"e_1_2_8_28_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2025.111366"},{"key":"e_1_2_8_29_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2021.107716"},{"key":"e_1_2_8_30_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2019.04.010"},{"key":"e_1_2_8_31_1","doi-asserted-by":"publisher","DOI":"10.1287\/opre.2022.0643"},{"key":"e_1_2_8_32_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2020.106920"},{"key":"e_1_2_8_33_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2020.107091"},{"key":"e_1_2_8_34_1","doi-asserted-by":"publisher","DOI":"10.1088\/3050-2454\/ada36b"},{"key":"e_1_2_8_35_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2022.108457"},{"key":"e_1_2_8_36_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2024.110750"},{"key":"e_1_2_8_37_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2024.110078"},{"key":"e_1_2_8_38_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2024.110315"},{"key":"e_1_2_8_39_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2024.110168"},{"key":"e_1_2_8_40_1","doi-asserted-by":"publisher","DOI":"10.1002\/nav.22260"},{"key":"e_1_2_8_41_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2021.107921"},{"key":"e_1_2_8_42_1","doi-asserted-by":"publisher","DOI":"10.1111\/risa.16709"},{"key":"e_1_2_8_43_1","doi-asserted-by":"publisher","DOI":"10.1111\/risa.13869"},{"key":"e_1_2_8_44_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2022.108870"},{"key":"e_1_2_8_45_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2023.109128"},{"key":"e_1_2_8_46_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2022.108948"},{"key":"e_1_2_8_47_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2023.109482"},{"key":"e_1_2_8_48_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2025.111358"},{"key":"e_1_2_8_49_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2021.107641"},{"key":"e_1_2_8_50_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4302-6383-8_13"},{"issue":"4","key":"e_1_2_8_51_1","first-page":"10","article-title":"A Survey of Cloud Computing Task Scheduling Algorithms","volume":"6","author":"Wang H.","year":"2017","journal-title":"International Journal of Cloud Computing and Services Science"},{"issue":"1","key":"e_1_2_8_52_1","first-page":"39","article-title":"Periodic Backup Strategies in Cloud Computing","volume":"3","author":"Soni A.","year":"2014","journal-title":"Journal of Cloud Computing: Advances, Systems, and Applications"},{"key":"e_1_2_8_53_1","article-title":"Mitigating Safety Risks Via Integrated Proactive Backup and Mission Abort Policies","author":"Qiu Q.","year":"2025","journal-title":"Reliability Engineering & System Safety"},{"key":"e_1_2_8_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2014.2315644"},{"key":"e_1_2_8_55_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2015.2413404"},{"key":"e_1_2_8_56_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2017.2672999"},{"key":"e_1_2_8_57_1","first-page":"50","article-title":"Backup Strategies for iot Cloud Services: A Survey","volume":"88","author":"Basu S.","year":"2018","journal-title":"Future Generation Computer Systems"},{"key":"e_1_2_8_58_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2018.10.017"},{"key":"e_1_2_8_59_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2014.08.009"},{"key":"e_1_2_8_60_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2023.109094"},{"key":"e_1_2_8_61_1","first-page":"1","article-title":"Reinforcement Learning in Dynamic Job Shop Scheduling: a Comprehensive Review of ai\u2010Driven Approaches in Modern Manufacturing","author":"Ngwu C.","year":"2025","journal-title":"Journal of Intelligent Manufacturing"},{"key":"e_1_2_8_62_1","doi-asserted-by":"crossref","unstructured":"K. J.Melcher J.Cruz S. B.Johnson andY.Lo \u201cAbort Trigger False Positive and False Negative Analysis Methodology for Threshold\u2010Based Abort Detection \u201d inAnnual Conference of the PHM Societyvol.7(2015):1\u201315.","DOI":"10.36001\/phmconf.2015.v7i1.2765"},{"key":"e_1_2_8_63_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cie.2018.08.006"},{"key":"e_1_2_8_64_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ejor.2022.05.012"},{"key":"e_1_2_8_65_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2020.107027"},{"key":"e_1_2_8_66_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2023.109119"},{"key":"e_1_2_8_67_1","doi-asserted-by":"publisher","DOI":"10.1177\/1748006X17742767"},{"key":"e_1_2_8_68_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2021.107581"}],"container-title":["Quality and Reliability Engineering International"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/qre.70035","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,3]],"date-time":"2025-11-03T08:38:51Z","timestamp":1762159131000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/qre.70035"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8,5]]},"references-count":67,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2025,12]]}},"alternative-id":["10.1002\/qre.70035"],"URL":"https:\/\/doi.org\/10.1002\/qre.70035","archive":["Portico"],"relation":{},"ISSN":["0748-8017","1099-1638"],"issn-type":[{"value":"0748-8017","type":"print"},{"value":"1099-1638","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,8,5]]},"assertion":[{"value":"2025-03-25","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-07-24","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-08-05","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}