{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:22:35Z","timestamp":1750306955327,"version":"3.41.0"},"reference-count":46,"publisher":"Association for Computing Machinery (ACM)","issue":"3","license":[{"start":{"date-parts":[[2013,5,23]],"date-time":"2013-05-23T00:00:00Z","timestamp":1369267200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["SIGSOFT Softw. Eng. Notes"],"published-print":{"date-parts":[[2013,5,23]]},"abstract":"<jats:p>Cloud computing is a name given to a set of systems for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. Cloud computing is aimed at making an organization more agile and cost effective. Due to the rapid evolution of Cloud Computing in the recent past, it is relevant to investigate the key areas of research of this technology. In this paper, we present a systematic review of research intensive areas in the field of cloud computing. Research papers in the period from 2009 to 2012 were gathered. A total of 36 research papers were reviewed systematically and categorized into four broad categories based on the issues addressed by them. We identified that the majority of the research papers focused on Cloud Security. By systematically analyzing the work accomplished so far, the gaps and yet to be explored areas in this field are brought to light.<\/jats:p>","DOI":"10.1145\/2464526.2464533","type":"journal-article","created":{"date-parts":[[2013,5,23]],"date-time":"2013-05-23T15:23:31Z","timestamp":1369322611000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["Pragmatic assessment of research intensive areas in cloud"],"prefix":"10.1145","volume":"38","author":[{"given":"Nitasha","family":"Hasteer","sequence":"first","affiliation":[{"name":"Amity University Uttar Pradesh Noida, India"}]},{"given":"Abhay","family":"Bansal","sequence":"additional","affiliation":[{"name":"Amity University Uttar Pradesh Noida, India"}]},{"given":"B. K.","family":"Murthy","sequence":"additional","affiliation":[{"name":"CDAC Noida, India"}]}],"member":"320","published-online":{"date-parts":[[2013,5,23]]},"reference":[{"volume-title":"EMEA marketing VP, Blue Coat Systems {Last Accessed","year":"2012","author":"Hawthorn Nigel","key":"e_1_2_1_2_1"},{"volume-title":"GFI Software. Cloud Security: Is It Really an issue for SMBs? {Last Accessed","year":"2012","author":"Scott Walter","key":"e_1_2_1_3_1"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.istr.2011.08.005"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2010.07.006"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2011.08.009"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2012.07.001"},{"volume-title":"Ali Mili, A Cyber Security model in Cloud Computing Environments","year":"2012","author":"Arfa Rabai Latifa Ben","key":"e_1_2_1_10_1"},{"key":"e_1_2_1_11_1","doi-asserted-by":"crossref","unstructured":"Nancy J. King V.T. Raja Protecting the Privacy and Security of Sensitive Customer Data in the Cloud Computer Law & Security Review 28(2012)308--319.  Nancy J. King V.T. Raja Protecting the Privacy and Security of Sensitive Customer Data in the Cloud Computer Law & Security Review 28(2012)308--319.","DOI":"10.1016\/j.clsr.2012.03.003"},{"key":"e_1_2_1_12_1","doi-asserted-by":"crossref","unstructured":"Luis Rodero-Merino Building Safe Paas Clouds: A survey on security in multitenant software platforms Computers & Security 31(2012)96--108.  Luis Rodero-Merino Building Safe Paas Clouds: A survey on security in multitenant software platforms Computers & Security 31(2012)96--108.","DOI":"10.1016\/j.cose.2011.10.006"},{"key":"e_1_2_1_13_1","unstructured":"Roberto Di Pietro Flavio Lombardi Matteo Signorini CloRExPa: Cloud Resilience via Execution Path Analysis Future Generation Computer Systems.  Roberto Di Pietro Flavio Lombardi Matteo Signorini CloRExPa: Cloud Resilience via Execution Path Analysis Future Generation Computer Systems."},{"key":"e_1_2_1_14_1","doi-asserted-by":"crossref","unstructured":"Shini. S.G. Dr. Tony Thoma Chithraranjan K. Cloud Based Medical Image Exchange-Security Challenges Procedia Engineering 38 ( 2012 ) 3454--3461.  Shini. S.G. Dr. Tony Thoma Chithraranjan K. Cloud Based Medical Image Exchange-Security Challenges Procedia Engineering 38 ( 2012 ) 3454--3461.","DOI":"10.1016\/j.proeng.2012.06.399"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2010.06.008"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2010.09.009"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2010.10.003"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2011.08.012"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2011.08.013"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jcss.2012.05.010"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2011.05.018"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2011.07.003"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2012.07.003"},{"volume-title":"Scheduling strategies for optimal service deployment across multiple clouds. Future Generation Computer Systems","year":"2012","author":"Lucas-Simarro Jose Luis","key":"e_1_2_1_24_1"},{"key":"e_1_2_1_25_1","unstructured":"A. Kertesz G. Kecskemeti I. Brandic. 2012. An interoperable and self-adaptive approach for SLA-based service virtualization in heterogeneous Cloud environments. Future Generation Computer Systems.  A. Kertesz G. Kecskemeti I. Brandic. 2012. An interoperable and self-adaptive approach for SLA-based service virtualization in heterogeneous Cloud environments. Future Generation Computer Systems."},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2011.12.024"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.proenv.2011.09.111"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jcss.2011.12.017"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.protcy.2012.05.089"},{"key":"e_1_2_1_30_1","unstructured":"Hyunji Chung Jungheum Park Sangjin Lee Cheulhoon Kang. 2012. Digital forensic investigation of cloud storage services. Digital Investigation. (2012) 1--15.  Hyunji Chung Jungheum Park Sangjin Lee Cheulhoon Kang. 2012. Digital forensic investigation of cloud storage services. Digital Investigation. (2012) 1--15."},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2011.08.001"},{"volume-title":"Computers in Human Behavior","year":"2012","author":"Park Sang Cheol","key":"e_1_2_1_32_1"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.mcm.2010.03.037"},{"key":"e_1_2_1_34_1","doi-asserted-by":"crossref","unstructured":"Paulo Jorge Passo Da Costa Antonio Miguel Rosado Da Cruz Microsoft Windows Azure Analysis and Comparison Procedia Technology 5 (2012) 93--102.  Paulo Jorge Passo Da Costa Antonio Miguel Rosado Da Cruz Microsoft Windows Azure Analysis and Comparison Procedia Technology 5 (2012) 93--102.","DOI":"10.1016\/j.protcy.2012.09.011"},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2012.06.005"},{"key":"e_1_2_1_36_1","first-page":"65","volume-title":"EBSE 2007-001","author":"Kitchenham B.","year":"2007"},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/ESEM.2007.21"},{"key":"e_1_2_1_38_1","unstructured":"http:\/\/www.idc.com\/prodserv\/idc_cloud.jsp{Last Accessed: November 2012}.  http:\/\/www.idc.com\/prodserv\/idc_cloud.jsp{Last Accessed: November 2012}."},{"volume-title":"R3.","year":"2011","author":"M.","key":"e_1_2_1_39_1"},{"volume-title":"Cloud computing: How to get your business ready. Retrieved from \/http:\/\/www.bbc.co.uk\/news\/business-12779201","year":"2011","author":"T.","key":"e_1_2_1_40_1"},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.5555\/2042243.2042251"},{"key":"e_1_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2012.08.007"},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2008.12.001"},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2010.11.014"},{"key":"e_1_2_1_45_1","first-page":"1","volume-title":"R. Buyya, J. Broberg, A.Goscinski. Cloud Computing: Principles and Paradigms.","author":"Cloud Rajkumar","year":"2011"},{"volume-title":"Cisco White paper {Last Accessed","year":"2012","author":"Cisco","key":"e_1_2_1_46_1"},{"volume-title":"Oracle White paper.","year":"2011","author":"Oracle","key":"e_1_2_1_47_1"},{"volume-title":"2010 Available at: https:\/\/cloudsecurityalliance.org\/topthreats\/csathreats.v1.0.pdf {Last Accessed","year":"2012","author":"Cloud Security","key":"e_1_2_1_48_1"},{"key":"e_1_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/1327512.1327513"}],"container-title":["ACM SIGSOFT Software Engineering Notes"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2464526.2464533","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2464526.2464533","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T08:39:05Z","timestamp":1750235945000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2464526.2464533"}},"subtitle":["a systematic review"],"short-title":[],"issued":{"date-parts":[[2013,5,23]]},"references-count":46,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2013,5,23]]}},"alternative-id":["10.1145\/2464526.2464533"],"URL":"https:\/\/doi.org\/10.1145\/2464526.2464533","relation":{},"ISSN":["0163-5948"],"issn-type":[{"type":"print","value":"0163-5948"}],"subject":[],"published":{"date-parts":[[2013,5,23]]},"assertion":[{"value":"2013-05-23","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}