{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,31]],"date-time":"2025-12-31T20:14:47Z","timestamp":1767212087071,"version":"3.37.3"},"reference-count":55,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2020,8,18]],"date-time":"2020-08-18T00:00:00Z","timestamp":1597708800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,8,18]],"date-time":"2020-08-18T00:00:00Z","timestamp":1597708800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"published-print":{"date-parts":[[2021,4]]},"DOI":"10.1007\/s11227-020-03393-w","type":"journal-article","created":{"date-parts":[[2020,8,18]],"date-time":"2020-08-18T09:05:48Z","timestamp":1597741548000},"page":"3422-3449","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":23,"title":["A comparative analysis of prominently used MCDM methods in cloud environment"],"prefix":"10.1007","volume":"77","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8851-0712","authenticated-orcid":false,"family":"Neeraj","sequence":"first","affiliation":[]},{"given":"Major Singh","family":"Goraya","sequence":"additional","affiliation":[]},{"given":"Damanpreet","family":"Singh","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,8,18]]},"reference":[{"key":"3393_CR1","volume-title":"Industry trends in cloud computing: alternative business-to-business revenue models","author":"D Dempsey","year":"2017","unstructured":"Dempsey D, Kelliher F (2017) Industry trends in cloud computing: alternative business-to-business revenue models. Springer, Basingstoke"},{"key":"3393_CR2","unstructured":"Erl T, Puttini R, Mahmood Z (eds) (2013) Cost metrics and pricing models. In: Cloud computing: concepts, technology and architecture. Upper Saddle River, Prentice Hall, pp 380\u2013390"},{"key":"3393_CR3","unstructured":"Larkin A (2019) Disadvantages of cloud computing. https:\/\/cloudacademy.com\/blog\/disadvantages-of-cloud-computing\/. Accessed 3 Mar 2019"},{"key":"3393_CR4","unstructured":"Shen H, Liu G (2013) An efficient and trustworthy resource sharing platform for collaborative cloud"},{"key":"3393_CR5","unstructured":"The cloud service measurement initiative consortium, service measurement index (SMI), Carnegie Mellon, Silicon Valley. http:\/\/www.cloudcommons.com\/about-smi. Accessed 3 Mar 2019"},{"key":"3393_CR6","first-page":"345","volume":"78","author":"TL Saaty","year":"2005","unstructured":"Saaty TL (2005) The analytic hierarchy and analytic network processes for the measurement of intangible criteria and for decision-making. Int Ser Oper Res Manag Sci 78:345\u2013405","journal-title":"Int Ser Oper Res Manag Sci"},{"issue":"6","key":"3393_CR7","doi-asserted-by":"publisher","first-page":"647","DOI":"10.1287\/mnsc.31.6.647","volume":"31","author":"JP Brans","year":"1985","unstructured":"Brans JP, Vincke P (1985) Note: a preference ranking organisation method. Manag Sci 31(6):647\u2013656","journal-title":"Manag Sci"},{"issue":"3","key":"3393_CR8","doi-asserted-by":"publisher","first-page":"277","DOI":"10.1057\/jors.1987.44","volume":"38","author":"K Yoon","year":"1987","unstructured":"Yoon K (1987) A reconciliation among discrete compromise solutions. J Oper Res Soc 38(3):277\u2013286","journal-title":"J Oper Res Soc"},{"issue":"1","key":"3393_CR9","doi-asserted-by":"publisher","first-page":"37","DOI":"10.3390\/su8010037","volume":"8","author":"A Mardani","year":"2016","unstructured":"Mardani A, Zavadskas EK, Govindan K, Amat Senin A, Jusoh A (2016) VIKOR technique: a systematic review of the state of the art literature on methodologies and applications. Sustainability 8(1):37","journal-title":"Sustainability"},{"issue":"4","key":"3393_CR10","doi-asserted-by":"publisher","first-page":"1012","DOI":"10.1016\/j.future.2012.06.006","volume":"29","author":"SK Garg","year":"2013","unstructured":"Garg SK, Versteeg S, Buyya R (2013) A framework for ranking of cloud computing services. Future Gener Comput Syst 29(4):1012\u20131023","journal-title":"Future Gener Comput Syst"},{"key":"3393_CR11","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1016\/j.future.2017.11.027","volume":"81","author":"N Yadav","year":"2018","unstructured":"Yadav N, Goraya MS (2018) Two-way ranking based service mapping in cloud environment. Future Gener Comput Syst 81:53\u201366","journal-title":"Future Gener Comput Syst"},{"key":"3393_CR12","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1016\/j.future.2018.03.014","volume":"86","author":"M Abdel-Basset","year":"2018","unstructured":"Abdel-Basset M, Mohamed M, Chang V (2018) NMCDA: a framework for evaluating cloud computing services. Future Gener Comput Syst 86:12\u201329","journal-title":"Future Gener Comput Syst"},{"issue":"3","key":"3393_CR13","doi-asserted-by":"publisher","first-page":"835","DOI":"10.1007\/s11227-011-0625-1","volume":"64","author":"D Ergu","year":"2011","unstructured":"Ergu D, Kou G, Peng Y, Shi Y (2011) The analytic hierarchy process: task scheduling and resource allocation in cloud computing environment. J Supercomput 64(3):835\u2013848","journal-title":"J Supercomput"},{"key":"3393_CR14","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1016\/j.asoc.2016.12.040","volume":"53","author":"R Meesariganda","year":"2017","unstructured":"Meesariganda R, Ishizaka A (2017) Mapping verbal AHP scale to numerical scale for cloud computing strategy selection. Appl Soft Comput 53:111\u2013118","journal-title":"Appl Soft Comput"},{"issue":"2","key":"3393_CR15","doi-asserted-by":"publisher","first-page":"759","DOI":"10.11591\/ijece.v6i2.pp759-769","volume":"6","author":"S Roy","year":"2016","unstructured":"Roy S, Pattnaik PK, Mall R (2016) A cognitive approach for evaluating the usability of storage as a service in cloud computing environment. Int J Electr Comput Eng (IJECE) 6(2):759","journal-title":"Int J Electr Comput Eng (IJECE)"},{"key":"3393_CR16","doi-asserted-by":"crossref","unstructured":"Toinard C, Ravier T, C\u00e9rin C, Ngoko Y (2015) The promethee method for cloud brokering with trust and assurance criteria. In: IEEE International Parallel and Distributed Processing Symposium Workshop","DOI":"10.1109\/IPDPSW.2015.63"},{"key":"3393_CR17","doi-asserted-by":"crossref","unstructured":"Yazir YO, Matthews C, Farahbod R, Neville S, Guitouni A, Ganti S, Coady Y (2010) Dynamic resource allocation in computing clouds using distributed multiple criteria decision analysis. In: IEEE 3rd International Conference on Cloud Computing","DOI":"10.1109\/CLOUD.2010.66"},{"key":"3393_CR18","doi-asserted-by":"crossref","unstructured":"Kabir MH, Shoja GC, Ganti S (2014) VM placement algorithms for hierarchical cloud infrastructure. In: IEEE 6th International Conference on Cloud Computing Technology and Science","DOI":"10.1109\/CloudCom.2014.53"},{"issue":"2","key":"3393_CR19","first-page":"194","volume":"16","author":"J Sidhu","year":"2016","unstructured":"Sidhu J, Singh S (2016) Using the improved PROMETHEE for selection of trustworthy cloud database servers. Int Arab J Inf Technol 16(2):194\u2013202","journal-title":"Int Arab J Inf Technol"},{"key":"3393_CR20","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1016\/j.jss.2018.05.004","volume":"143","author":"L Lu","year":"2018","unstructured":"Lu L, Yuan Y (2018) A novel TOPSIS evaluation scheme for cloud service trustworthiness combining objective and subjective aspects. J Syst Softw 143:71\u201386","journal-title":"J Syst Softw"},{"key":"3393_CR21","doi-asserted-by":"crossref","unstructured":"Achar R, Thilagam PS (2014) A broker based approach for cloud provider selection. In: International Conference on Advances in Computing, Communications and Informatics (ICACCI)","DOI":"10.1109\/ICACCI.2014.6968439"},{"key":"3393_CR22","unstructured":"Ma F, Liu F, Liu Z (2012) Distributed load balancing allocation of virtual machine in cloud data center. In: IEEE International Conference on Computer Science and Automation Engineering"},{"key":"3393_CR23","doi-asserted-by":"crossref","unstructured":"Ma F, Liu Z (2015) Multi-objective optimization for dynamic virtual machine management in cloud data center. In: 6th IEEE International Conference on Software Engineering and Service Science (ICSESS)","DOI":"10.1109\/ICSESS.2015.7339030"},{"key":"3393_CR24","doi-asserted-by":"crossref","unstructured":"Lo CC, Chen DY, Tsai CF, Chao KM (2010) Service selection based on fuzzy TOPSIS method. In: IEEE 24th International Conference on Advanced Information Networking and Applications Workshops","DOI":"10.1109\/WAINA.2010.117"},{"key":"3393_CR25","doi-asserted-by":"crossref","unstructured":"Mu B, Li S, Yuan S (2014) QoS-aware cloud service selection based on uncertain user preference. In: Rough sets and knowledge technology. Lecture notes in computer science, pp 589\u2013600","DOI":"10.1007\/978-3-319-11740-9_54"},{"key":"3393_CR26","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1016\/j.cie.2019.04.020","volume":"132","author":"O Sohaib","year":"2019","unstructured":"Sohaib O, Naderpour M, Hussain W, Martinez L (2019) Cloud computing model selection for e-commerce enterprises using a new 2-tuple fuzzy linguistic decision-making method. Comput Ind Eng 132:47\u201358","journal-title":"Comput Ind Eng"},{"issue":"2","key":"3393_CR27","doi-asserted-by":"publisher","first-page":"183","DOI":"10.24846\/v26i2y201706","volume":"26","author":"CZ R\u0103dulescu","year":"2017","unstructured":"R\u0103dulescu CZ, R\u0103dulescu IC (2017) An extended TOPSIS approach for ranking cloud service providers. Stud Inform Control 26(2):183\u2013192","journal-title":"Stud Inform Control"},{"issue":"4","key":"3393_CR28","doi-asserted-by":"publisher","first-page":"3315","DOI":"10.1016\/j.asej.2017.10.007","volume":"9","author":"SC Nayak","year":"2018","unstructured":"Nayak SC, Tripathy C (2018) Deadline based task scheduling using multi-criteria decision-making in cloud environment. Ain Shams Eng J 9(4):3315\u20133324","journal-title":"Ain Shams Eng J"},{"issue":"9","key":"3393_CR29","first-page":"211","volume":"7","author":"H Mohammd","year":"2013","unstructured":"Mohammd H, Mahmood AK (2013) Trust-based service selection in public cloud computing using fuzzy modified VIKOR method. Aust J Basic Appl Sci 7(9):211\u2013220","journal-title":"Aust J Basic Appl Sci"},{"issue":"6","key":"3393_CR30","doi-asserted-by":"publisher","first-page":"523","DOI":"10.1016\/j.elerap.2015.08.002","volume":"14","author":"ZU Rehman","year":"2015","unstructured":"Rehman ZU, Hussain OK, Chang E, Dillon T (2015) Decision-making framework for user-based inter-cloud service migration. Electron Commer Res Appl 14(6):523\u2013531","journal-title":"Electron Commer Res Appl"},{"key":"3393_CR31","unstructured":"Kassabi HT, Serhani MA (2017) De-centralized reputation-based trust model to discriminate between cloud providers capable of processing Big Data. In: IEEE International Congress on Big Data (BigData Congress)"},{"key":"3393_CR32","doi-asserted-by":"crossref","unstructured":"Ruby Annette J, Banu A, Subash Chandran P (2016) Comparison of multi criteria decision making algorithms for ranking cloud renderfarm services. Indian J Sci Technol 9(31):1\u20135","DOI":"10.17485\/ijst\/2016\/v9i31\/93467"},{"issue":"5","key":"3393_CR33","doi-asserted-by":"publisher","first-page":"820","DOI":"10.1007\/s10766-013-0276-3","volume":"42","author":"ZU Rehman","year":"2013","unstructured":"Rehman ZU, Hussain OK, Hussain FK (2013) Parallel cloud service selection and ranking based on QoS history. Int J Parallel Program 42(5):820\u2013852","journal-title":"Int J Parallel Program"},{"issue":"6","key":"3393_CR34","first-page":"13841","volume":"7","author":"MN Satya","year":"2018","unstructured":"Satya MN, Reddy LV (2018) Evaluating consumer trust using topsis and vikor methods in cloud analyst tool. Int J Curr Adv Res 7(6):13841\u201313847","journal-title":"Int J Curr Adv Res"},{"issue":"11","key":"3393_CR35","doi-asserted-by":"publisher","first-page":"4652","DOI":"10.1007\/s11227-017-2039-1","volume":"73","author":"RR Kumar","year":"2017","unstructured":"Kumar RR, Mishra S, Kumar C (2017) Prioritizing the solution of cloud service selection using integrated MCDM methods under fuzzy environment. J Supercomput 73(11):4652\u20134682","journal-title":"J Supercomput"},{"key":"3393_CR36","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1016\/j.future.2015.11.025","volume":"57","author":"L Sun","year":"2016","unstructured":"Sun L, Ma J, Zhang Y, Dong H, Hussain FK (2016) Cloud-FuSeR: fuzzy ontology and MCDM based cloud service selection. Future Gener Comput Syst 57:42\u201355","journal-title":"Future Gener Comput Syst"},{"issue":"13","key":"3393_CR37","doi-asserted-by":"publisher","first-page":"4701","DOI":"10.1007\/s00500-018-3120-2","volume":"23","author":"GR Jatoth","year":"2018","unstructured":"Jatoth GR, Gangadharan U, Fiore R Buyya (2018) SELCLOUD: a hybrid multi-criteria decision-making model for selection of cloud services. Soft Comput 23(13):4701\u20134715","journal-title":"Soft Comput"},{"key":"3393_CR38","doi-asserted-by":"crossref","unstructured":"Khan MZ, Qamar U (2015) Towards service evaluation and ranking model for cloud infrastructure selection. In: IEEE 12th International Conference on Ubiquitous Intelligence and Computing and 2015 IEEE 12th International Conference on Autonomic and Trusted Computing and 2015 IEEE 15th International Conference on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom)","DOI":"10.1109\/UIC-ATC-ScalCom-CBDCom-IoP.2015.232"},{"key":"3393_CR39","doi-asserted-by":"crossref","unstructured":"Garg R, Naudts B, Verbrugge S, Stiller B (2015) Modeling legal and regulative requirements for ranking alternatives of cloud-based services. In: IEEE Eighth International Workshop on Requirements Engineering and Law (RELAW)","DOI":"10.1109\/RELAW.2015.7330208"},{"issue":"3","key":"3393_CR40","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1504\/IJHPCN.2013.056537","volume":"7","author":"QN Do","year":"2013","unstructured":"Do QN, Hussain FK (2013) A hybrid approach for the personalization of cloud-based e-governance services. Int J High Perform Comput Netw 7(3):205\u2013214","journal-title":"Int J High Perform Comput Netw"},{"issue":"1","key":"3393_CR41","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1504\/IJIL.2015.070240","volume":"18","author":"G Fatih","year":"2015","unstructured":"Fatih G, Hidayanto AN, Alfina I, Purwandari B (2015) Framework for selecting cloud deployment model in government institutions using BCOR, entropy and TOPSIS approach. Int J Innov Learn 18(1):81\u2013100","journal-title":"Int J Innov Learn"},{"issue":"13","key":"3393_CR42","doi-asserted-by":"publisher","first-page":"2572","DOI":"10.1080\/00949655.2017.1349130","volume":"87","author":"X Li","year":"2017","unstructured":"Li X, Yin C, Liu F (2017) A trust estimation method of machine tool resources in the cloud environment. J Stat Comput Simul 87(13):2572\u20132580","journal-title":"J Stat Comput Simul"},{"key":"3393_CR43","doi-asserted-by":"publisher","first-page":"153","DOI":"10.4028\/www.scientific.net\/JERA.24.153","volume":"24","author":"S Bhushan","year":"2016","unstructured":"Bhushan S, Pradeep RC (2016) A network QoS aware service ranking using hybrid AHP-PROMETHEE method in multi-cloud domain. Int J Eng Res Afr 24:153\u2013164","journal-title":"Int J Eng Res Afr"},{"key":"3393_CR44","doi-asserted-by":"crossref","unstructured":"Lee B, Oh KH, Park HJ, Kim UM, Youn HY (2014) Resource reallocation of virtual machine in cloud computing with MCDM algorithm. In: International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","DOI":"10.1109\/CyberC.2014.87"},{"key":"3393_CR45","doi-asserted-by":"crossref","unstructured":"Li L, Hang J, Gao Y, Mu C (2017) Using an integrated group decision method based on SVM, TFN-RS-AHP, and TOPSIS-CD for cloud service supplier selection. In: Mathematical Problems in Engineering, pp 1\u201314","DOI":"10.1155\/2017\/3143502"},{"key":"3393_CR46","doi-asserted-by":"crossref","unstructured":"Rehman ZU, Hussain OK, Hussain FK (2012) IaaS cloud selection using MCDM methods. In: IEEE Ninth International Conference on e-Business Engineering","DOI":"10.1109\/ICEBE.2012.47"},{"key":"3393_CR47","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1016\/j.eswa.2016.01.059","volume":"55","author":"S Liu","year":"2016","unstructured":"Liu S, Chan FT, Ran W (2016) Decision making for the selection of cloud vendor: an improved approach under group decision-making with integrated weights and objective\/subjective attributes. Expert Syst Appl 55:37\u201347","journal-title":"Expert Syst Appl"},{"issue":"2","key":"3393_CR48","first-page":"118","volume":"5","author":"T Subramanian","year":"2016","unstructured":"Subramanian T, Savarimuthu V (2016) Cloud service evaluation and selection using fuzzy hybrid MCDM approach in marketplace. Int J Fuzzy Syst Appl 5(2):118\u2013153","journal-title":"Int J Fuzzy Syst Appl"},{"issue":"Suppl 2","key":"3393_CR49","doi-asserted-by":"publisher","first-page":"1237","DOI":"10.1007\/s13198-017-0592-x","volume":"8","author":"O Boutkhoum","year":"2017","unstructured":"Boutkhoum O, Hanine M, Agouti T, Tikniouine A (2017) A decision-making approach based on fuzzy AHP-TOPSIS methodology for selecting the appropriate cloud solution to manage Big Data projects. Int J Syst Assur Eng Manag 8(Suppl 2):1237\u20131253","journal-title":"Int J Syst Assur Eng Manag"},{"key":"3393_CR50","doi-asserted-by":"crossref","unstructured":"Su CH, Tzeng GH, Tseng HL (2012) Improving cloud computing service in fuzzy environment\u2014combining fuzzy DANP and fuzzy VIKOR with a new hybrid FMCDM model. In: International Conference on Fuzzy Theory and Its Applications (iFUZZY2012)","DOI":"10.1109\/iFUZZY.2012.6409671"},{"key":"3393_CR51","doi-asserted-by":"crossref","unstructured":"Fang SC, Tsao JH (2009) Entropy optimization: Shannon measure of entropy and its properties. SpringerReference","DOI":"10.1007\/978-0-387-74759-0_161"},{"key":"3393_CR52","unstructured":"Regions and availability zones (n.d.). https:\/\/docs.aws.amazon.com\/AWSEC2\/latest\/UserGuide\/using-regions-availability-zones.html. Accessed 3 Mar 2019"},{"key":"3393_CR53","doi-asserted-by":"publisher","unstructured":"Weimer L (2009) Cost-benefit analysis and public policy. https:\/\/doi.org\/10.1002\/9781444307177.ch1","DOI":"10.1002\/9781444307177.ch1"},{"key":"3393_CR54","doi-asserted-by":"publisher","unstructured":"Saltelli A, Tarantola S, Campolongo F, Ratto M (2004) Global sensitivity analysis for importance assessment. In: Sensitivity analysis in practice. https:\/\/doi.org\/10.1002\/0470870958.ch2","DOI":"10.1002\/0470870958.ch2"},{"key":"3393_CR55","doi-asserted-by":"publisher","unstructured":"Saltelli A, Ratto M, Andres T, Campolongo F, Cariboni J, Gatelli D, Saisana M, Tarantola S (2017) Introduction to sensitivity analysis. In: Global sensitivity analysis: the primer. https:\/\/doi.org\/10.1002\/9780470725184.ch1","DOI":"10.1002\/9780470725184.ch1"}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-020-03393-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11227-020-03393-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-020-03393-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,11,7]],"date-time":"2022-11-07T20:08:07Z","timestamp":1667851687000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11227-020-03393-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,8,18]]},"references-count":55,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2021,4]]}},"alternative-id":["3393"],"URL":"https:\/\/doi.org\/10.1007\/s11227-020-03393-w","relation":{},"ISSN":["0920-8542","1573-0484"],"issn-type":[{"type":"print","value":"0920-8542"},{"type":"electronic","value":"1573-0484"}],"subject":[],"published":{"date-parts":[[2020,8,18]]},"assertion":[{"value":"18 August 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}