{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,5]],"date-time":"2026-05-05T17:12:39Z","timestamp":1778001159287,"version":"3.51.4"},"reference-count":115,"publisher":"Wiley","license":[{"start":{"date-parts":[[2021,9,13]],"date-time":"2021-09-13T00:00:00Z","timestamp":1631491200000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"National University Commission"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Applied Computational Intelligence and Soft Computing"],"published-print":{"date-parts":[[2021,9,13]]},"abstract":"<jats:p>Cloud computing is a technology that allows dynamic and flexible computing capability and storage through on-demand delivery and pay-as-you-go services over the Internet. This technology has brought significant advances in the Information Technology (IT) domain. In the last few years, the evolution of cloud computing has led to the development of new technologies such as cloud federation, edge computing, and fog computing. However, with the development of Internet of Things (IoT), several challenges have emerged with these new technologies. Therefore, this paper discusses each of the emerging cloud-based technologies, as well as their architectures, opportunities, and challenges. We present how cloud computing evolved from one paradigm to another through the interplay of benefits such as improvement in computational resources through the combination of the strengths of various Cloud Service Providers (CSPs), decrease in latency, improvement in bandwidth, and so on. Furthermore, the paper highlights the application of different cloud paradigms in the healthcare ecosystem.<\/jats:p>","DOI":"10.1155\/2021\/1843671","type":"journal-article","created":{"date-parts":[[2021,9,21]],"date-time":"2021-09-21T02:20:11Z","timestamp":1632190811000},"page":"1-16","source":"Crossref","is-referenced-by-count":21,"title":["A Review of Evolutionary Trends in Cloud Computing and Applications to the Healthcare Ecosystem"],"prefix":"10.1155","volume":"2021","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2096-1701","authenticated-orcid":true,"given":"Mbasa Joaquim","family":"Molo","sequence":"first","affiliation":[{"name":"Department of Electrical and Information Engineering, Covenant University, Ota, Ogun State, Nigeria"},{"name":"Covenant Applied Informatics and Communication African Center of Excellence, Covenant University, Ota, Ogun State, Nigeria"},{"name":"G\u00e9nie Electrique et Informatique, Universit\u00e9 Libre des Pays des Grands Lacs, BP 360 Goma, Goma, Democratic Republic of the Congo"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5646-7385","authenticated-orcid":true,"given":"Joke A.","family":"Badejo","sequence":"additional","affiliation":[{"name":"Department of Electrical and Information Engineering, Covenant University, Ota, Ogun State, Nigeria"},{"name":"Covenant Applied Informatics and Communication African Center of Excellence, Covenant University, Ota, Ogun State, Nigeria"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9227-7389","authenticated-orcid":true,"given":"Emmanuel","family":"Adetiba","sequence":"additional","affiliation":[{"name":"Department of Electrical and Information Engineering, Covenant University, Ota, Ogun State, Nigeria"},{"name":"Covenant Applied Informatics and Communication African Center of Excellence, Covenant University, Ota, Ogun State, Nigeria"},{"name":"HRA, Institute for Systems Science, Durban University of Technology, P.O. Box 1334, Durban, South Africa"}]},{"given":"Vingi Patrick","family":"Nzanzu","sequence":"additional","affiliation":[{"name":"Department of Electrical and Information Engineering, Covenant University, Ota, Ogun State, Nigeria"},{"name":"Covenant Applied Informatics and Communication African Center of Excellence, Covenant University, Ota, Ogun State, Nigeria"},{"name":"G\u00e9nie Electrique et Informatique, Universit\u00e9 Libre des Pays des Grands Lacs, BP 360 Goma, Goma, Democratic Republic of the Congo"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4030-2321","authenticated-orcid":true,"given":"Etinosa","family":"Noma-Osaghae","sequence":"additional","affiliation":[{"name":"Department of Electrical and Information Engineering, Covenant University, Ota, Ogun State, Nigeria"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1068-3613","authenticated-orcid":true,"given":"Victoria","family":"Oguntosin","sequence":"additional","affiliation":[{"name":"Department of Electrical and Information Engineering, Covenant University, Ota, Ogun State, Nigeria"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8094-3054","authenticated-orcid":true,"given":"Mushage Olivier","family":"Baraka","sequence":"additional","affiliation":[{"name":"G\u00e9nie Electrique et Informatique, Universit\u00e9 Libre des Pays des Grands Lacs, BP 360 Goma, Goma, Democratic Republic of the Congo"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1928-8396","authenticated-orcid":true,"given":"Claude","family":"Takenga","sequence":"additional","affiliation":[{"name":"G\u00e9nie Electrique et Informatique, Universit\u00e9 Libre des Pays des Grands Lacs, BP 360 Goma, Goma, Democratic Republic of the Congo"},{"name":"Infokom GmbH, Entreprise NTIC, Neubrandenburg, Germany"}]},{"given":"Sadeeq","family":"Suraju","sequence":"additional","affiliation":[{"name":"Covenant Applied Informatics and Communication African Center of Excellence, Covenant University, Ota, Ogun State, Nigeria"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1390-2359","authenticated-orcid":true,"given":"Ezekiel F.","family":"Adebiyi","sequence":"additional","affiliation":[{"name":"Covenant Applied Informatics and Communication African Center of Excellence, Covenant University, Ota, Ogun State, Nigeria"}]}],"member":"311","reference":[{"key":"1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-45260-4_8"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.14419\/ijet.v7i4.10904"},{"issue":"2","key":"3","first-page":"480","article-title":"A survey on use of cloud computing in various fields","volume":"2","author":"M. Chopra","year":"2013","journal-title":"International Journal of Science, Engineering and Technology Research"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1108\/JEIM-09-2014-0094"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2014.04.006"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.10.008"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2021.01.050"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/3301443"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2020.12.015"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2013.95"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1016\/J.COSREV.2020.100319"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1016\/j.icte.2021.05.004"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/SCEECS.2018.8546860"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/ICICT48043.2020.9112457"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/ISC246665.2019.9071674"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2020.100273"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1145\/1721654.1721672"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1145\/1364782.1364786"},{"key":"19","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2020.102642"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/ISTEL.2014.7000791"},{"issue":"1","key":"21","first-page":"6","article-title":"Cloud computing: architecture & challenges","volume":"1","author":"S. Joshi","year":"2019","journal-title":"Mody University International Journal of Computing and Engineering Research"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.17722\/ijme.v3i2.259"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/1025\/1\/012091"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1186\/s13677-017-0093-0"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2018.12.005"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.5121\/ijccsa.2013.3503"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1109\/CAMAD.2017.8031522"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1007\/s13174-010-0007-6"},{"key":"29","article-title":"Review: layers arhitecture of cloud computing","volume":"8","author":"V. Goyal","year":"2012","journal-title":"International Journal of Computing & Business Research"},{"key":"30","article-title":"Layers based security issues in cloud computing","author":"J. Jeya Singh","year":"2015"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2017.8376184"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijin.2020.11.004"},{"key":"33","doi-asserted-by":"publisher","DOI":"10.1016\/j.cmpb.2013.09.013"},{"key":"34","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.09.002"},{"key":"35","doi-asserted-by":"publisher","DOI":"10.1111\/exsy.12207"},{"key":"36","doi-asserted-by":"publisher","DOI":"10.1016\/j.jii.2019.04.005"},{"key":"37","doi-asserted-by":"publisher","DOI":"10.1109\/ICoAC44903.2018.8939061"},{"key":"38","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2015.04.021"},{"key":"39","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2017.08.138"},{"key":"40","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2020.07.010"},{"key":"41","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2017.108"},{"key":"42","doi-asserted-by":"publisher","DOI":"10.1145\/2593512"},{"key":"43","doi-asserted-by":"publisher","DOI":"10.1109\/3PGCIC.2015.183"},{"key":"44","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2018.08.001"},{"key":"45","doi-asserted-by":"publisher","DOI":"10.1109\/35021BIGCOMP.2015.7072851"},{"key":"46","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2960615"},{"key":"47","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-44769-4_9"},{"key":"48","doi-asserted-by":"publisher","DOI":"10.4066\/biomedicalresearch.29-17-823"},{"key":"49","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.02.050"},{"key":"50","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.12.036"},{"key":"51","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.04.016"},{"key":"52","doi-asserted-by":"publisher","DOI":"10.1145\/2831347.2831354"},{"key":"53","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2016.2579198"},{"key":"54","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2017.9"},{"key":"55","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.05.057"},{"key":"56","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2018.1700202"},{"key":"57","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2820162"},{"key":"58","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2778504"},{"key":"59","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2020.01.004"},{"key":"60","doi-asserted-by":"publisher","DOI":"10.1088\/2399-6528\/ab90c1"},{"key":"61","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.03.054"},{"key":"62","doi-asserted-by":"publisher","DOI":"10.1109\/JBHI.2020.3007661"},{"key":"63","doi-asserted-by":"publisher","DOI":"10.1109\/ISMSIT50672.2020.9254501"},{"key":"64","doi-asserted-by":"publisher","DOI":"10.1109\/CC.2016.7445510"},{"key":"65","first-page":"1157","article-title":"An overview of security issues in fog computing","author":"M. Luqman"},{"key":"66","doi-asserted-by":"publisher","DOI":"10.1109\/SRDS.2012.3"},{"key":"67","doi-asserted-by":"publisher","DOI":"10.1186\/s13638-019-1624-9"},{"key":"68","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2019.02.009"},{"key":"69","doi-asserted-by":"publisher","DOI":"10.1109\/SMC.2017.8122791"},{"key":"70","doi-asserted-by":"publisher","DOI":"10.1145\/2757384.2757397"},{"key":"71","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-019-04220-y"},{"key":"72","doi-asserted-by":"publisher","DOI":"10.1186\/s13638-018-1267-2"},{"key":"73","doi-asserted-by":"publisher","DOI":"10.1109\/ICRAECC43874.2019.8994985"},{"key":"74","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/6285719"},{"key":"75","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3033131"},{"key":"76","doi-asserted-by":"publisher","DOI":"10.1109\/CloudCom.2019.00047"},{"key":"77","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2020.03.447"},{"key":"78","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2017.178"},{"key":"79","doi-asserted-by":"publisher","DOI":"10.1080\/08276331.2018.1466850"},{"key":"80","doi-asserted-by":"publisher","DOI":"10.4018\/IJEBR.2018070105"},{"key":"81","doi-asserted-by":"publisher","DOI":"10.5176\/978-981-08-5837-7_185"},{"key":"82","doi-asserted-by":"publisher","DOI":"10.1109\/ICAC.2017.34"},{"key":"83","doi-asserted-by":"publisher","DOI":"10.1186\/s13673-018-0143-8"},{"key":"84","doi-asserted-by":"publisher","DOI":"10.5171\/2011.875547"},{"key":"85","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2021.01.231"},{"key":"86","doi-asserted-by":"publisher","DOI":"10.1109\/TAFGEN.2015.7289571"},{"key":"87","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2016.11.027"},{"key":"88","doi-asserted-by":"publisher","DOI":"10.1016\/j.suscom.2018.06.003"},{"key":"89","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2018.04.145"},{"key":"90","doi-asserted-by":"publisher","DOI":"10.1186\/s13174-016-0046-8"},{"key":"91","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-41674-3_96"},{"key":"92","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-4666-8662-5.ch0072"},{"key":"93","doi-asserted-by":"publisher","DOI":"10.1109\/ICFEC.2017.20"},{"key":"94","doi-asserted-by":"publisher","DOI":"10.1016\/j.bdr.2021.100188"},{"key":"95","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.08.032"},{"key":"96","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2016.10.008"},{"key":"97","doi-asserted-by":"publisher","DOI":"10.1109\/MASS.2017.68"},{"key":"98","doi-asserted-by":"publisher","DOI":"10.1109\/MCE.2018.2880807"},{"key":"99","doi-asserted-by":"publisher","DOI":"10.14257\/ijgdc.2013.6.5.09"},{"key":"100","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2015.03.001"},{"key":"101","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2015.02.003"},{"key":"102","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2947652"},{"key":"103","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2771153"},{"key":"104","doi-asserted-by":"publisher","DOI":"10.1109\/MCE.2019.2893674"},{"key":"105","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2018.12.007"},{"key":"106","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2020.102882"},{"key":"107","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2017.2787700"},{"key":"108","doi-asserted-by":"publisher","DOI":"10.1109\/IoTSMS.2018.8554827"},{"key":"109","doi-asserted-by":"publisher","DOI":"10.1007\/s10723-019-09491-1"},{"key":"110","doi-asserted-by":"publisher","DOI":"10.23919\/CNSM46954.2019.9012677"},{"key":"111","doi-asserted-by":"publisher","DOI":"10.1016\/j.jmsy.2020.11.017"},{"key":"112","doi-asserted-by":"publisher","DOI":"10.1109\/JAS.2017.7510349"},{"key":"113","doi-asserted-by":"publisher","DOI":"10.1007\/s11235-020-00747-w"},{"key":"114","doi-asserted-by":"publisher","DOI":"10.1109\/JAS.2021.1004003"},{"key":"115","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-018-0800-9"}],"container-title":["Applied Computational Intelligence and Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/acisc\/2021\/1843671.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/acisc\/2021\/1843671.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/acisc\/2021\/1843671.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,9,21]],"date-time":"2021-09-21T02:20:22Z","timestamp":1632190822000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/acisc\/2021\/1843671\/"}},"subtitle":[],"editor":[{"given":"Aniello","family":"Minutolo","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2021,9,13]]},"references-count":115,"alternative-id":["1843671","1843671"],"URL":"https:\/\/doi.org\/10.1155\/2021\/1843671","relation":{},"ISSN":["1687-9732","1687-9724"],"issn-type":[{"value":"1687-9732","type":"electronic"},{"value":"1687-9724","type":"print"}],"subject":[],"published":{"date-parts":[[2021,9,13]]}}}