{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T14:41:23Z","timestamp":1775054483243,"version":"3.50.1"},"publisher-location":"Singapore","reference-count":35,"publisher":"Springer Singapore","isbn-type":[{"value":"9789811399411","type":"print"},{"value":"9789811399428","type":"electronic"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-981-13-9942-8_66","type":"book-chapter","created":{"date-parts":[[2019,7,18]],"date-time":"2019-07-18T03:03:25Z","timestamp":1563419005000},"page":"711-723","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":17,"title":["QoS Based Resource Provisioning in Cloud Computing Environment: A Technical Survey"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0099-8192","authenticated-orcid":false,"given":"Shefali","family":"Varshney","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8658-6089","authenticated-orcid":false,"given":"Rajinder","family":"Sandhu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0416-7097","authenticated-orcid":false,"given":"P. K.","family":"Gupta","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,7,19]]},"reference":[{"issue":"1","key":"66_CR1","doi-asserted-by":"publisher","first-page":"58","DOI":"10.14445\/22312803\/IJCTT-V27P110","volume":"27","author":"HA Akpan","year":"2015","unstructured":"Akpan, H.A., Vadhanam, B.R.: A survey on quality of service in cloud computing. Int. J. Comput. Trends Technol. 27(1), 58\u201363 (2015)","journal-title":"Int. J. Comput. Trends Technol."},{"key":"66_CR2","doi-asserted-by":"crossref","unstructured":"Floris, A., Atzori, L.: Quality of experience in the multimedia Internet of Things: definition and practical use-cases. In: Proceedings of IEEE International Conference on Communication Workshop (ICCW), pp. 1747\u20131752. IEEE (2015)","DOI":"10.1109\/ICCW.2015.7247433"},{"key":"66_CR3","doi-asserted-by":"crossref","unstructured":"Dey, S., Sen, S.K.: Trust evaluation model in cloud using reputation, recommendation and QOS based approach. In: Procedings of 2018 International Conference on Research in Intelligent and Computing in Engineering (RICE), pp. 1\u20135. IEEE (2018)","DOI":"10.1109\/RICE.2018.8509061"},{"issue":"18","key":"66_CR4","doi-asserted-by":"publisher","first-page":"18489","DOI":"10.1007\/s11042-016-4050-6","volume":"76","author":"PK Gupta","year":"2017","unstructured":"Gupta, P.K., Maharaj, B.T., Malekian, R.: A novel and secure IoT based cloud centric architecture to perform predictive analysis of users activities in sustainable health centres. Multimed. Tools Appl. 76(18), 18489\u201318512 (2017). \n                    https:\/\/doi.org\/10.1007\/s11042-016-4050-6","journal-title":"Multimed. Tools Appl."},{"key":"66_CR5","doi-asserted-by":"crossref","unstructured":"Calheiros, R.N., Ranjan, R., Buyya, R.: Virtual machine provisioning based on analytical performance and QoS in cloud computing environments. In: Proceedings of International Conference on Parallel Processing, pp. 295\u2013304. IEEE (2011)","DOI":"10.1109\/ICPP.2011.17"},{"key":"66_CR6","doi-asserted-by":"crossref","unstructured":"Maguluri, S.T., Srikant, R., Ying, L.: Stochastic models of load balancing and scheduling in cloud computing clusters. In: Proceedings of Infocom, pp. 702\u2013710. IEEE (2012)","DOI":"10.1109\/INFCOM.2012.6195815"},{"key":"66_CR7","doi-asserted-by":"crossref","unstructured":"Peng, H., Han, W., Yao, J., Fu, C.: The realization of load balancing algorithm in cloud computing. In: Proceedings of the 2nd International Conference on Computer Science and Application Engineering, p. 140. ACM (2018)","DOI":"10.1145\/3207677.3278001"},{"key":"66_CR8","doi-asserted-by":"crossref","unstructured":"Xiao, Y., Krunz, M.: QoE and power efficiency tradeoff for fog computing networks with fog node cooperation. In: Proceedings of INFOCOM 2017-IEEE Conference on Computer Communications, pp. 1\u20139. IEEE (2017)","DOI":"10.1109\/INFOCOM.2017.8057196"},{"issue":"1","key":"66_CR9","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1007\/s10479-013-1380-x","volume":"233","author":"P Manuel","year":"2015","unstructured":"Manuel, P.: A trust model of cloud computing based on Quality of Service. Ann. Oper. Res. 233(1), 281\u2013292 (2015)","journal-title":"Ann. Oper. Res."},{"key":"66_CR10","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-5107-4","volume-title":"Predictive Computing and Information Security","author":"PK Gupta","year":"2017","unstructured":"Gupta, P.K., Tyagi, V., Singh, S.K.: Predictive Computing and Information Security. Springer, Singapore (2017). \n                    https:\/\/doi.org\/10.1007\/978-981-10-5107-4"},{"issue":"10","key":"66_CR11","first-page":"28","volume":"87","author":"AS Thakur","year":"2014","unstructured":"Thakur, A.S., Gupta, P.K.: Framework to improve data integrity in multi cloud environment. Int. J. Comput. Appl. 87(10), 28\u201332 (2014)","journal-title":"Int. J. Comput. Appl."},{"issue":"18","key":"66_CR12","doi-asserted-by":"publisher","first-page":"18489","DOI":"10.1007\/s11042-016-4050-6","volume":"76","author":"PK Gupta","year":"2017","unstructured":"Gupta, P.K., Maharaj, B.T., Malekian, R.: A novel and secure IoT based cloud centric architecture to perform predictive analysis of users activities in sustainable health centres. Multimed. Tools Appl. 76(18), 18489\u201318512 (2017)","journal-title":"Multimed. Tools Appl."},{"key":"66_CR13","doi-asserted-by":"crossref","unstructured":"Zhao, Y., Huang, W.: Adaptive distributed load balancing algorithm based on live migration of virtual machines in cloud. In: Proceedings of Fifth International Joint Conference on INC, IMS and IDC, pp. 170\u2013175. IEEE (2009)","DOI":"10.1109\/NCM.2009.350"},{"key":"66_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"289","DOI":"10.1007\/978-3-642-30767-6_25","volume-title":"Advances in Grid and Pervasive Computing","author":"A Chandrasekar","year":"2012","unstructured":"Chandrasekar, A., Chandrasekar, K., Mahadevan, M., Varalakshmi, P.: QoS monitoring and dynamic trust establishment in the cloud. In: Li, R., Cao, J., Bourgeois, J. (eds.) GPC 2012. LNCS, vol. 7296, pp. 289\u2013301. Springer, Heidelberg (2012). \n                    https:\/\/doi.org\/10.1007\/978-3-642-30767-6_25"},{"issue":"5","key":"66_CR15","doi-asserted-by":"publisher","first-page":"1073","DOI":"10.1016\/j.compeleceng.2012.06.006","volume":"38","author":"IM Abbadi","year":"2012","unstructured":"Abbadi, I.M., Alawneh, M.: A framework for establishing trust in the cloud. Comput. Electr. Eng. 38(5), 1073\u20131087 (2012)","journal-title":"Comput. Electr. Eng."},{"key":"66_CR16","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1007\/978-981-13-1544-2_6","volume-title":"Proceedings of International Ethical Hacking Conference 2018","author":"A Bhandari","year":"2019","unstructured":"Bhandari, A., Kaur, K.: An enhanced post-migration algorithm for dynamic load balancing in cloud computing environment. In: Chakraborty, M., Chakrabarti, S., Balas, V.E., Mandal, J.K. (eds.) Proceedings of International Ethical Hacking Conference 2018. AISC, vol. 811, pp. 59\u201373. Springer, Singapore (2019). \n                    https:\/\/doi.org\/10.1007\/978-981-13-1544-2_6"},{"issue":"3","key":"66_CR17","doi-asserted-by":"publisher","first-page":"711","DOI":"10.1007\/s11227-013-0980-1","volume":"67","author":"C Choi","year":"2014","unstructured":"Choi, C., Choi, J., Kim, P.: Ontology-based access control model for security policy reasoning in cloud computing. J. Supercomput. 67(3), 711\u2013722 (2014)","journal-title":"J. Supercomput."},{"key":"66_CR18","doi-asserted-by":"publisher","first-page":"371","DOI":"10.1016\/j.ins.2013.04.028","volume":"258","author":"L Wei","year":"2014","unstructured":"Wei, L., et al.: Security and privacy for storage and computation in cloud computing. Inf. Sci. 258, 371\u2013386 (2014)","journal-title":"Inf. Sci."},{"key":"66_CR19","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1016\/j.comnet.2019.01.032","volume":"151","author":"BP Kavin","year":"2019","unstructured":"Kavin, B.P., Ganapathy, S.: A secured storage and privacy-preserving model using CRT for providing security on cloud and IoT-based applications. Comput. Netw. 151, 181\u2013190 (2019)","journal-title":"Comput. Netw."},{"key":"66_CR20","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1016\/j.ijinfomgt.2018.12.009","volume":"47","author":"S Al-Sharhan","year":"2019","unstructured":"Al-Sharhan, S., Omran, E., Lari, K.: An integrated holistic model for an eHealth system: a national implementation approach and a new cloud-based security model. Int. J. Inf. Manag. 47, 121\u2013130 (2019)","journal-title":"Int. J. Inf. Manag."},{"key":"66_CR21","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1016\/j.ins.2014.02.008","volume":"357","author":"P Samimi","year":"2016","unstructured":"Samimi, P., Teimouri, Y., Mukhtar, M.: A combinatorial double auction resource allocation model in cloud computing. Inf. Sci. 357, 201\u2013216 (2016)","journal-title":"Inf. Sci."},{"key":"66_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1007\/978-3-642-15681-6_3","volume-title":"Economics of Grids, Clouds, Systems, and Services","author":"\u00cd Goiri","year":"2010","unstructured":"Goiri, \u00cd., Juli\u00e0, F., Fit\u00f3, J.O., Mac\u00edas, M., Guitart, J.: Resource-level QoS metric for CPU-based guarantees in cloud providers. In: Altmann, J., Rana, O.F. (eds.) GECON 2010. LNCS, vol. 6296, pp. 34\u201347. Springer, Heidelberg (2010). \n                    https:\/\/doi.org\/10.1007\/978-3-642-15681-6_3"},{"key":"66_CR23","doi-asserted-by":"crossref","unstructured":"Zhou, J., Yan, M., Ye, X., Lu, H.: An algorithm of resource evaluation and selection based on multi-QoS constraints. In: Proceedings of Seventh Conference on Web Information Systems and Applications, pp. 49\u201352. IEEE (2010)","DOI":"10.1109\/WISA.2010.43"},{"issue":"2","key":"66_CR24","doi-asserted-by":"publisher","first-page":"783","DOI":"10.1007\/s11227-013-0890-2","volume":"66","author":"W-J Wang","year":"2013","unstructured":"Wang, W.-J., Chang, Y.-S., Lo, W.-T., Lee, Y.-K.: Adaptive scheduling for parallel tasks with QoS satisfaction for hybrid cloud environments. J. Supercomput. 66(2), 783\u2013811 (2013)","journal-title":"J. Supercomput."},{"issue":"10","key":"66_CR25","doi-asserted-by":"publisher","first-page":"4568","DOI":"10.1109\/TII.2018.2816590","volume":"14","author":"X Wang","year":"2018","unstructured":"Wang, X., Ning, Z., Wang, L.: Offloading in Internet of vehicles: a fog-enabled real-time traffic management system. IEEE Trans. Ind. Inf. 14(10), 4568\u20134578 (2018)","journal-title":"IEEE Trans. Ind. Inf."},{"key":"66_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1007\/978-3-642-20152-3_24","volume-title":"Database Systems for Advanced Applications","author":"Z Ye","year":"2011","unstructured":"Ye, Z., Zhou, X., Bouguettaya, A.: Genetic algorithm based QoS-aware service compositions in cloud computing. In: Yu, J.X., Kim, M.H., Unland, R. (eds.) DASFAA 2011. LNCS, vol. 6588, pp. 321\u2013334. Springer, Heidelberg (2011). \n                    https:\/\/doi.org\/10.1007\/978-3-642-20152-3_24"},{"issue":"7","key":"66_CR27","doi-asserted-by":"publisher","first-page":"419","DOI":"10.1016\/j.advengsoft.2011.03.007","volume":"42","author":"B Xu","year":"2011","unstructured":"Xu, B., Zhao, C., Hu, E., Hu, B.: Job scheduling algorithm based on berger model in cloud environment. Adv. Eng. Softw. 42(7), 419\u2013425 (2011)","journal-title":"Adv. Eng. Softw."},{"issue":"5","key":"66_CR28","first-page":"283","volume":"4","author":"B Li","year":"2012","unstructured":"Li, B., Song, A.M., Song, J.: A distributed QoS-constraint task scheduling scheme in cloud computing environment: model and algorithm. Adv. Inf. Sci. Ser. Sci. 4(5), 283\u2013291 (2012)","journal-title":"Adv. Inf. Sci. Ser. Sci."},{"key":"66_CR29","doi-asserted-by":"crossref","unstructured":"Dutta, D., Joshi, R.C.: A genetic: algorithm approach to cost-based multi-QoS job scheduling in cloud computing environment. In: Proceedings of the International Conference & Workshop on Emerging Trends in Technology, pp. 422\u2013427. ACM(2011)","DOI":"10.1145\/1980022.1980111"},{"key":"66_CR30","doi-asserted-by":"crossref","unstructured":"Singh, M., Gupta, P.K. Srivastava, V.M.: Key challenges in implementing cloud computing in Indian healthcare industry. In: Pattern Recognition Association of South Africa and Robotics and Mechatronics (PRASA-RobMech), pp. 162\u2013167. IEEE (2017)","DOI":"10.1109\/RoboMech.2017.8261141"},{"issue":"1","key":"66_CR31","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1007\/s11227-015-1587-5","volume":"75","author":"J Shen","year":"2019","unstructured":"Shen, J., Zou, D., Jin, H., Yuan, B., Dai, W.: A domain-divided configurable security model for cloud computing-based telecommunication services. J. Supercomput. 75(1), 109\u2013122 (2019)","journal-title":"J. Supercomput."},{"key":"66_CR32","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"407","DOI":"10.1007\/978-81-322-2526-3_42","volume-title":"Proceedings of the Second International Conference on Computer and Communication Technologies","author":"G Gugnani","year":"2016","unstructured":"Gugnani, G., Ghrera, S.P., Gupta, P.K., Malekian, R., Maharaj, B.T.J.: Implementing DNA encryption technique in web services to embed confidentiality in cloud. In: Satapathy, S.C., Raju, K.S., Mandal, J.K., Bhateja, V. (eds.) Proceedings of the Second International Conference on Computer and Communication Technologies. AISC, vol. 381, pp. 407\u2013415. Springer, New Delhi (2016). \n                    https:\/\/doi.org\/10.1007\/978-81-322-2526-3_42"},{"issue":"2","key":"66_CR33","doi-asserted-by":"publisher","first-page":"661","DOI":"10.1007\/s11277-014-2151-y","volume":"81","author":"PK Gupta","year":"2015","unstructured":"Gupta, P.K., Singh, G.: A novel human computer interaction aware algorithm to minimize energy consumption. Wirel. Pers. Commun. 81(2), 661\u2013683 (2015)","journal-title":"Wirel. Pers. Commun."},{"issue":"4","key":"66_CR34","doi-asserted-by":"publisher","first-page":"1717","DOI":"10.1007\/s11277-016-3419-1","volume":"90","author":"R Malekian","year":"2016","unstructured":"Malekian, R., Kavishe, A.F., Maharaj, B.T., et al.: Smart vehicle navigation system using Hidden Markov Model and RFID technology. Wirel. Pers. Commun. 90(4), 1717\u20131742 (2016). \n                    https:\/\/doi.org\/10.1007\/s11277-016-3419-1","journal-title":"Wirel. Pers. Commun."},{"key":"66_CR35","series-title":"Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","doi-asserted-by":"publisher","first-page":"355","DOI":"10.1007\/978-3-319-19656-5_48","volume-title":"Internet of Things. User-Centric IoT","author":"HA Kholidy","year":"2015","unstructured":"Kholidy, H.A., Hassan, H., Sarhan, A.M., Erradi, A., Abdelwahed, S.: QoS optimization for cloud service composition based on economic model. In: Giaffreda, R., et al. (eds.) IoT360 2014. LNICST, vol. 150, pp. 355\u2013366. Springer, Cham (2015). \n                    https:\/\/doi.org\/10.1007\/978-3-319-19656-5_48"}],"container-title":["Communications in Computer and Information Science","Advances in Computing and Data Sciences"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-13-9942-8_66","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,18]],"date-time":"2019-07-18T03:24:17Z","timestamp":1563420257000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-13-9942-8_66"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9789811399411","9789811399428"],"references-count":35,"URL":"https:\/\/doi.org\/10.1007\/978-981-13-9942-8_66","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"value":"1865-0929","type":"print"},{"value":"1865-0937","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"19 July 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICACDS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Advances in Computing and Data Sciences","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Ghazibad","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 April 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 April 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icacds0a","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/icacds.com\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"621","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"112","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"18% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"-","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}