{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,16]],"date-time":"2026-04-16T10:09:30Z","timestamp":1776334170990,"version":"3.51.2"},"reference-count":32,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2021,3,20]],"date-time":"2021-03-20T00:00:00Z","timestamp":1616198400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,3,20]],"date-time":"2021-03-20T00:00:00Z","timestamp":1616198400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"name":"competition projects of excellent open online courses in colleges and universities of Henan Province in 2018"},{"name":"bidding project in research and practice of education and teaching reform of Henan Polytechnic in 2019","award":["2019JZ012"],"award-info":[{"award-number":["2019JZ012"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int J Syst Assur Eng Manag"],"published-print":{"date-parts":[[2021,8]]},"DOI":"10.1007\/s13198-021-01068-0","type":"journal-article","created":{"date-parts":[[2021,3,20]],"date-time":"2021-03-20T09:02:46Z","timestamp":1616230966000},"page":"731-740","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Automatic deployment system of computer program application based on cloud computing"],"prefix":"10.1007","volume":"12","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3343-3369","authenticated-orcid":false,"given":"Hui","family":"Zhai","sequence":"first","affiliation":[]},{"given":"Jia","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,3,20]]},"reference":[{"issue":"5\u20136","key":"1068_CR1","doi-asserted-by":"publisher","first-page":"233","DOI":"10.1007\/s12243-017-0578-3","volume":"72","author":"H Abbas","year":"2017","unstructured":"Abbas H, Maennel O, Assar S (2017) Security and privacy issues in cloud computing. Ann Telecommun 72(5\u20136):233\u2013235","journal-title":"Ann Telecommun"},{"key":"1068_CR2","doi-asserted-by":"publisher","first-page":"640","DOI":"10.1016\/j.future.2015.08.006","volume":"56","author":"M Abdullahi","year":"2016","unstructured":"Abdullahi M, Ngadi MA, Abdulhamid SM (2016) Symbiotic organism search optimization based task scheduling in cloud computing environment. Future Gener Comput Syst 56:640\u2013650","journal-title":"Future Gener Comput Syst"},{"issue":"4","key":"1068_CR3","doi-asserted-by":"publisher","first-page":"162","DOI":"10.5539\/ass.v13n4p162","volume":"13","author":"AB Ali","year":"2017","unstructured":"Ali AB, Ali T, Wafaa AK (2017) Financial incentives for adopting cloud computing in higher educational institutions. Asian Soc Sci 13(4):162\u2013174","journal-title":"Asian Soc Sci"},{"issue":"6","key":"1068_CR4","doi-asserted-by":"publisher","first-page":"1663","DOI":"10.1007\/s10639-015-9407-3","volume":"21","author":"M Anshari","year":"2016","unstructured":"Anshari M, Alas Y, Guan LS (2016) Developing online learning resources: Big data, social networks, and cloud computing to support pervasive knowledge. Educ Inf Technol 21(6):1663\u20131677","journal-title":"Educ Inf Technol"},{"issue":"3","key":"1068_CR5","doi-asserted-by":"publisher","first-page":"485","DOI":"10.1109\/TIFS.2014.2384391","volume":"10","author":"AF Barsoum","year":"2017","unstructured":"Barsoum AF, Hasan MA (2017) Provable multicopy dynamic data possession in cloud computing systems. IEEE Trans Inf Forensics Secur 10(3):485\u2013497","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"1","key":"1068_CR6","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1109\/JIOT.2016.2619369","volume":"4","author":"H Cai","year":"2017","unstructured":"Cai H, Xu B, Jiang L et al (2017) IoT-based big data storage systems in cloud computing: perspectives and challenges. IEEE Int Things J 4(1):75\u201387","journal-title":"IEEE Int Things J"},{"issue":"4","key":"1068_CR7","first-page":"1943","volume":"8","author":"Z Cao","year":"2017","unstructured":"Cao Z, Lin J, Wan C et al (2017) Optimal cloud computing resource allocation for demand side management. IEEE Trans Smart Grid 8(4):1943\u20131955","journal-title":"IEEE Trans Smart Grid"},{"key":"1068_CR8","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1016\/j.comcom.2016.03.012","volume":"89","author":"E Cavalcante","year":"2016","unstructured":"Cavalcante E, Pereira J, Alves MP et al (2016) On the interplay of internet of things and cloud computing: a systematic mapping study. Comput Commun 89:17\u201333","journal-title":"Comput Commun"},{"issue":"5","key":"1068_CR9","doi-asserted-by":"publisher","first-page":"2795","DOI":"10.1109\/TNET.2015.2487344","volume":"24","author":"X Chen","year":"2016","unstructured":"Chen X, Jiao L, Li W et al (2016) Efficient multi-user computation offloading for mobile-edge cloud computing. IEEE\/ACM Trans Netw 24(5):2795\u20132808","journal-title":"IEEE\/ACM Trans Netw"},{"issue":"6","key":"1068_CR10","first-page":"1171","volume":"3","author":"R Deng","year":"2017","unstructured":"Deng R, Lu R, Lai C et al (2017) Optimal workload allocation in fog-cloud computing toward balanced delay and power consumption. IEEE Internet Things J 3(6):1171\u20131181","journal-title":"IEEE Internet Things J"},{"key":"1068_CR11","doi-asserted-by":"publisher","first-page":"711","DOI":"10.1007\/s11227-020-03296-w","volume":"77","author":"M Ghobaei-Arani","year":"2021","unstructured":"Ghobaei-Arani M, Shahidinejad A (2021) An efficient resource provisioning approach for analyzing cloud workloads: a metaheuristic-based clustering approach. J Supercomput 77:711\u2013750. https:\/\/doi.org\/10.1007\/s11227-020-03296-w","journal-title":"J Supercomput"},{"issue":"2","key":"1068_CR12","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1109\/MCI.2015.2405351","volume":"10","author":"M Guzek","year":"2016","unstructured":"Guzek M, Bouvry P, Talbi EG (2016) A survey of evolutionary computation for resource management of processing in Cloud computing. IEEE Comput Intell Mag 10(2):53\u201367","journal-title":"IEEE Comput Intell Mag"},{"issue":"1","key":"1068_CR13","first-page":"95","volume":"14","author":"Y Han","year":"2017","unstructured":"Han Y, Chan J, Alpcan T et al (2017) Using virtual machine allocation policies to defend against co-resident attacks in cloud computing. IEEE Trans Dependable Secure Comput 14(1):95\u2013108","journal-title":"IEEE Trans Dependable Secure Comput"},{"key":"1068_CR14","doi-asserted-by":"publisher","first-page":"173","DOI":"10.1016\/j.jnca.2016.04.016","volume":"68","author":"SHH Madni","year":"2016","unstructured":"Madni SHH, Abd Latiff MS, Coulibaly Y et al (2016) Resource scheduling for infrastructure as a service (IaaS) in cloud computing: challenges and opportunities. J Netw Comput Appl 68:173\u2013200","journal-title":"J Netw Comput Appl"},{"key":"1068_CR15","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1016\/j.jnca.2016.01.018","volume":"66","author":"M Masdari","year":"2016","unstructured":"Masdari M, Valikardan S, Shahi Z et al (2016) Towards workflow scheduling in cloud computing: A comprehensive analysis. J Netw Comput Appl 66:64\u201382","journal-title":"J Netw Comput Appl"},{"issue":"2","key":"1068_CR16","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1016\/j.ijinfomgt.2015.11.010","volume":"36","author":"HM Sabi","year":"2016","unstructured":"Sabi HM, Uzoka FME, Langmia K et al (2016) Conceptualizing a model for adoption of cloud computing in education. Int J Inf Manage 36(2):183\u2013191","journal-title":"Int J Inf Manage"},{"key":"1068_CR17","unstructured":"Shahidinejad A , Mostafa Ghobaei\u2010Arani (2020) Joint computation offloading and resource provisioning for edge\u2010cloud computing environment: a machine learning\u2010based approach[J]. Software: Practice and Experience. https:\/\/link.springer.com\/article\/10.1007%2Fs11227-020-03296-w"},{"key":"1068_CR18","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-020-03107-0","author":"A Shahidinejad","year":"2020","unstructured":"Shahidinejad A, Ghobaei-Arani M, Masdari M (2020) Resource provisioning using workload clustering in cloud computing environment: a hybrid approach. Cluster Comput. https:\/\/doi.org\/10.1007\/s10586-020-03107-0","journal-title":"Cluster Comput"},{"key":"1068_CR19","doi-asserted-by":"publisher","first-page":"1045","DOI":"10.1007\/s10586-019-02972-8","volume":"23","author":"A Shahidinejad","year":"2020","unstructured":"Shahidinejad A, Ghobaei-Arani M, Esmaeili L (2020) An elastic controller using Colored Petri Nets in cloud computing environment. Cluster Comput 23:1045\u20131071. https:\/\/doi.org\/10.1007\/s10586-019-02972-8","journal-title":"Cluster Comput"},{"issue":"4","key":"1068_CR20","doi-asserted-by":"publisher","first-page":"912","DOI":"10.1109\/TIFS.2017.2774439","volume":"13","author":"J Shen","year":"2018","unstructured":"Shen J et al (2018) Anonymous and traceable group data sharing in cloud computing. IEEE Trans Inf Forensics Secur 13(4):912\u2013925","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"3","key":"1068_CR21","doi-asserted-by":"publisher","first-page":"355","DOI":"10.1016\/j.im.2015.10.004","volume":"53","author":"WL Shiau","year":"2016","unstructured":"Shiau WL, Chau PYK (2016) Understanding behavioral intention to use a cloud computing classroom: A multiple model comparison approach. Inf Manag 53(3):355\u2013365","journal-title":"Inf Manag"},{"issue":"2","key":"1068_CR22","doi-asserted-by":"publisher","first-page":"217","DOI":"10.1007\/s10723-015-9359-2","volume":"14","author":"S Singh","year":"2016","unstructured":"Singh S, Chana I (2016) A survey on resource scheduling in cloud computing: issues and challenges. J Grid Computing 14(2):217\u2013264","journal-title":"J Grid Computing"},{"key":"1068_CR23","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1016\/j.comnet.2016.03.022","volume":"109","author":"G Somani","year":"2016","unstructured":"Somani G, Gaur MS, Sanghi D et al (2016) DDoS attacks in cloud computing: collateral damage to non-targets. Comput Netw 109:157\u2013171","journal-title":"Comput Netw"},{"issue":"2","key":"1068_CR24","first-page":"95","volume":"96","author":"AA Soofi","year":"2017","unstructured":"Soofi AA, Khan MI (2017) A review on data security in cloud computing. Int J Comput Appl 96(2):95\u201396","journal-title":"Int J Comput Appl"},{"issue":"3","key":"1068_CR25","doi-asserted-by":"publisher","first-page":"805","DOI":"10.1109\/JSYST.2014.2322973","volume":"9","author":"JL Tsai","year":"2017","unstructured":"Tsai JL, Lo NW (2017) A privacy-aware authentication scheme for distributed mobile cloud computing services. IEEE Syst J 9(3):805\u2013815","journal-title":"IEEE Syst J"},{"issue":"1","key":"1068_CR26","doi-asserted-by":"publisher","first-page":"216","DOI":"10.1109\/TC.2015.2417542","volume":"65","author":"C Wang","year":"2016","unstructured":"Wang C, Ren K, Wang J (2016) Secure Optimization computation outsourcing in cloud computing: a case study of linear programming. Comput IEEE Trans on 65(1):216\u2013229","journal-title":"Comput IEEE Trans on"},{"issue":"6","key":"1068_CR27","doi-asserted-by":"publisher","first-page":"1265","DOI":"10.1109\/TIFS.2016.2523941","volume":"11","author":"S Wang","year":"2017","unstructured":"Wang S, Zhou J et al (2017) An efficient file hierarchy attribute-based encryption scheme in cloud computing. IEEE Trans Inf Forensics Secur 11(6):1265\u20131277","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"8","key":"1068_CR28","doi-asserted-by":"publisher","first-page":"1661","DOI":"10.1109\/TIFS.2016.2549004","volume":"11","author":"S Wang","year":"2017","unstructured":"Wang S, Liang K, Liu JK et al (2017a) Attribute-based data sharing scheme revisited in cloud computing. IEEE Trans Inf Forensics Secur 11(8):1661\u20131673","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"11","key":"1068_CR29","doi-asserted-by":"publisher","first-page":"2594","DOI":"10.1109\/TIFS.2016.2590944","volume":"11","author":"Z Xia","year":"2017","unstructured":"Xia Z, Wang X, Zhang L et al (2017) A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing. IEEE Trans Inf Forensics Secur 11(11):2594\u20132608","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"1","key":"1068_CR30","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1080\/17517575.2015.1053416","volume":"11","author":"B Xu","year":"2017","unstructured":"Xu B, Xu L, Cai H et al (2017) The design of an m-Health monitoring system based on a cloud computing platform. Enterp Inf Syst 11(1):17\u201336","journal-title":"Enterp Inf Syst"},{"issue":"1","key":"1068_CR31","doi-asserted-by":"publisher","first-page":"602","DOI":"10.1109\/COMST.2015.2487361","volume":"18","author":"Q Yan","year":"2016","unstructured":"Yan Q, Yu R, Gong Q et al (2016) Software-defined networking (SDN) and distributed denial of service (DDoS) attacks in cloud computing environments: a survey, some research issues, and challenges. IEEE Commun Surv Tutor 18(1):602\u2013622","journal-title":"IEEE Commun Surv Tutor"},{"issue":"5","key":"1068_CR32","doi-asserted-by":"publisher","first-page":"1757","DOI":"10.1109\/JSAC.2016.2545382","volume":"34","author":"C You","year":"2016","unstructured":"You C, Huang K, Chae H (2016) Energy efficient mobile cloud computing powered by wireless energy transfer. IEEE J Sel Areas Commun 34(5):1757\u20131771","journal-title":"IEEE J Sel Areas Commun"}],"container-title":["International Journal of System Assurance Engineering and Management"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13198-021-01068-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s13198-021-01068-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13198-021-01068-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,7,9]],"date-time":"2021-07-09T05:14:05Z","timestamp":1625807645000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s13198-021-01068-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,3,20]]},"references-count":32,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2021,8]]}},"alternative-id":["1068"],"URL":"https:\/\/doi.org\/10.1007\/s13198-021-01068-0","relation":{},"ISSN":["0975-6809","0976-4348"],"issn-type":[{"value":"0975-6809","type":"print"},{"value":"0976-4348","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,3,20]]},"assertion":[{"value":"6 December 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 January 2021","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 January 2021","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 March 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}