{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,9]],"date-time":"2026-03-09T22:30:39Z","timestamp":1773095439095,"version":"3.50.1"},"reference-count":27,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2026,2,5]],"date-time":"2026-02-05T00:00:00Z","timestamp":1770249600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2026,3,9]],"date-time":"2026-03-09T00:00:00Z","timestamp":1773014400000},"content-version":"vor","delay-in-days":32,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Cloud Comp"],"DOI":"10.1186\/s13677-026-00846-0","type":"journal-article","created":{"date-parts":[[2026,2,5]],"date-time":"2026-02-05T08:36:49Z","timestamp":1770280609000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Cloud disaster recovery model based on failure prediction"],"prefix":"10.1186","volume":"15","author":[{"given":"Kun","family":"Meng","sequence":"first","affiliation":[]},{"given":"Mingxing","family":"Li","sequence":"additional","affiliation":[]},{"given":"Jianwen","family":"Ding","sequence":"additional","affiliation":[]},{"given":"Huachun","family":"Zhou","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,2,5]]},"reference":[{"key":"846_CR1","doi-asserted-by":"crossref","unstructured":"Omer MA, Yazdeen AA, Malallah HS, Abdulrahman LM (2022) A survey on cloud security: concepts, types, limitations, and challenges. J Appl Sci Technol Trends (JASTT) 3(2)","DOI":"10.38094\/jastt301137"},{"issue":"9","key":"846_CR2","first-page":"702","volume":"11","author":"AZ Abualkishik","year":"2020","unstructured":"Abualkishik AZ, Alwan AA, Gulzar Y (2020) Disaster recovery in cloud computing systems: an overview. Int J Adv Comput Sci Appl 11(9):702","journal-title":"Int J Adv Comput Sci Appl"},{"key":"846_CR3","doi-asserted-by":"crossref","unstructured":"Suguna S, Suhasini A (2015) Overview of data backup and disaster recovery in cloud. IEEE","DOI":"10.1109\/ICICES.2014.7033804"},{"key":"846_CR4","doi-asserted-by":"crossref","unstructured":"Saxena D, Gupta I, Singh AK, Lee (2022) C.N.: a fault tolerant elastic resource management framework towards high availability of cloud services. IEEE Trans Netw Service Manag","DOI":"10.1109\/TNSM.2022.3170379"},{"key":"846_CR5","unstructured":"Ramesh G, Logeshwaran J, Aravindarajan V (2023) A secured database monitoring method to improve data backup and recovery operations in cloud computing. BOHR Int J Comput Sci"},{"issue":"10","key":"846_CR6","first-page":"9505249","volume":"2021","author":"D Chang","year":"2021","unstructured":"Chang D, Li L, Qiao CZ (2021) Cloud computing storage backup and recovery strategy based on secure iot and spark. Mob Inf Syst 2021(10):9505249\u20131950524913","journal-title":"Mob Inf Syst"},{"key":"846_CR7","doi-asserted-by":"publisher","first-page":"85384","DOI":"10.1109\/ACCESS.2023.3303430","volume":"11","author":"A Malhotra","year":"2023","unstructured":"Malhotra A, Elsayed A, Torres R, Venkatraman S (2023) Evaluate solutions for achieving high availability or near zero downtime for cloud native enterprise applications. IEEE Access 11:85384\u201385394. https:\/\/doi.org\/10.1109\/ACCESS.2023.3303430","journal-title":"IEEE Access"},{"issue":"6","key":"846_CR8","doi-asserted-by":"publisher","first-page":"698","DOI":"10.1016\/j.ress.2009.10.009","volume":"95","author":"FP Garc\u00eda","year":"2010","unstructured":"Garc\u00eda FP, Pedregal DJ, Roberts C (2010) Time series methods applied to failure prediction and detection. Reliab Eng Syst Saf 95(6):698\u2013703","journal-title":"Reliab Eng Syst Saf"},{"key":"846_CR9","doi-asserted-by":"crossref","unstructured":"Shumway RH, Stoffer DS (2017) Time series analysis and its applications: with r examples","DOI":"10.1007\/978-3-319-52452-8"},{"key":"846_CR10","unstructured":"Rafferty G (2021) Forecasting time series data with Facebook Prophet: build, improve, and optimize time series forecasting models using the advanced forecasting tool"},{"issue":"7","key":"846_CR11","doi-asserted-by":"publisher","first-page":"1235","DOI":"10.1162\/neco_a_01199","volume":"31","author":"Y Yu","year":"2019","unstructured":"Yu Y, Si X, Hu C, Zhang J (2019) A review of recurrent neural networks: lstm cells and network architectures. Neural Comput 31(7):1235\u20131270","journal-title":"Neural Comput"},{"key":"846_CR12","doi-asserted-by":"publisher","unstructured":"Xi L, Xin Y, Luo S, Shang Y, Tang Q (2021) Anomaly detection mechanism based on hierarchical weights through large-scale log data. In: 2021 International Conference on Computer Communication and Artificial Intelligence (CCAI), p 106\u2013115. https:\/\/doi.org\/10.1109\/CCAI50917.2021.9447458","DOI":"10.1109\/CCAI50917.2021.9447458"},{"key":"846_CR13","doi-asserted-by":"publisher","unstructured":"Coote E, Lachine B (2023) Platform management system host-based anomaly detection using tf-idf and an lstm autoencoder. In: MILCOM 2023 \u2013 2023 IEEE Military Communications Conference (MILCOM), p 471\u2013477. https:\/\/doi.org\/10.1109\/MILCOM58377.2023.10356381","DOI":"10.1109\/MILCOM58377.2023.10356381"},{"key":"846_CR14","doi-asserted-by":"crossref","unstructured":"Yasin Ghadi Y, Mazhar T, Aurangzeb K, Haq I, Shahzad T, Ali Laghari A, Shahid Anwar M (2024) Security risk models against attacks in smart grid using big data and artificial intelligence. PeerJ Comput Sci","DOI":"10.7717\/peerj-cs.1840"},{"key":"846_CR15","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1109\/ACCESS.2024.3355312","volume":"12","author":"YY Ghadi","year":"2024","unstructured":"Ghadi YY, Mazhar T, Shloul TA, Shahzad T, Salaria UA, Ahmed A, Hamam H (2024) Machine learning solutions for the security of wireless sensor networks: a review. IEEE Access 1221","journal-title":"IEEE Access"},{"key":"846_CR16","doi-asserted-by":"publisher","first-page":"100031","DOI":"10.1016\/j.meaene.2024.100031","volume":"5","author":"S Khan","year":"2025","unstructured":"Khan S, Mazhar T, Shahzad T, Amir Khan M, Rehman AU, Hamam H (2025) Integration of smart grid with industry 5.0: applications, challenges and solutions. Meas Energy 5:100031. https:\/\/doi.org\/10.1016\/j.meaene.2024.100031","journal-title":"Meas Energy"},{"key":"846_CR17","doi-asserted-by":"publisher","first-page":"1748","DOI":"10.1016\/j.ijforecast.2021.03.012","volume":"37","author":"B Lim","year":"2021","unstructured":"Lim B, Ar\u0131k SO, Loeff N, Pfister T (2021) Temporal fusion transformers for interpretable multi-horizon time series forecasting. Int J Forecasting 37:1748\u20131764","journal-title":"Int J Forecasting"},{"key":"846_CR18","unstructured":"Cho K, Merrienboer B, Bahdanau D, Bengio Y (2014) On the properties of neural machine translation: encoder-decoder approaches. CoRR abs\/1409.1259. 1409.1259"},{"key":"846_CR19","volume-title":"COLING","author":"Z Li","year":"2018","unstructured":"Li Z, Cai J, He S, Zhao H (2018) Seq2seq dependency parsing. In: COLING"},{"key":"846_CR20","doi-asserted-by":"crossref","unstructured":"Hodson TO (2022) Root man square error (rmse) or mean absolute error (mae): when to use them or not. Geosci Model Dev Discuss","DOI":"10.5194\/gmd-2022-64"},{"key":"846_CR21","doi-asserted-by":"crossref","unstructured":"Zhou H, Zhang S, Peng J, Zhang S, Zhang W (2020) Informer: beyond efficient transformer for long sequence time-series forecasting","DOI":"10.1609\/aaai.v35i12.17325"},{"key":"846_CR22","doi-asserted-by":"publisher","DOI":"10.24432\/C58C86","author":"A Trindade","year":"2015","unstructured":"Trindade A (2015) ElectricityLoadDiagrams20112014. UCI Mach Learn Repos. https:\/\/doi.org\/10.24432\/C58C86","journal-title":"UCI Mach Learn Repos"},{"key":"846_CR23","unstructured":"PeMS Traffic[Internet]. http:\/\/pems.dot.ca.gov\/"},{"key":"846_CR24","unstructured":"Olaf K Weather[Internet]. https:\/\/www.bgc-jena.mpg.de\/wetter\/"},{"key":"846_CR25","doi-asserted-by":"crossref","unstructured":"Lai G, Chang WC, Yang Y, Liu H (2018) Modeling long- and short-term temporal patterns with deep neural networks. In International ACM SIGIR Conference on Research and Development in Information Retrieval","DOI":"10.1145\/3209978.3210006"},{"key":"846_CR26","unstructured":"Foundation AS Ofbiz[Internet]. https:\/\/cwiki.apache.org\/"},{"issue":"9","key":"846_CR27","doi-asserted-by":"publisher","first-page":"3592","DOI":"10.3390\/s22093592","volume":"22","author":"MK Hassan","year":"2022","unstructured":"Hassan MK, Khan A, Abdullah J, Ahmad F (2022) Dynamic learning framework for smooth-aided machine-learning-based backbone traffic forecasts. Sensors 22(9):3592","journal-title":"Sensors"}],"container-title":["Journal of Cloud Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s13677-026-00846-0","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13677-026-00846-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13677-026-00846-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,9]],"date-time":"2026-03-09T12:20:39Z","timestamp":1773058839000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1186\/s13677-026-00846-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,2,5]]},"references-count":27,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2026,12]]}},"alternative-id":["846"],"URL":"https:\/\/doi.org\/10.1186\/s13677-026-00846-0","relation":{},"ISSN":["2192-113X"],"issn-type":[{"value":"2192-113X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,2,5]]},"assertion":[{"value":"24 July 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 January 2026","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 February 2026","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"All authors confirm that this manuscript is an original work, has not been published previously (either in whole or in part), and is not under consideration for publication elsewhere.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"All authors have read and approved the final version of the manuscript and agree to its submission to your journal. All authors agree to publication in the journal.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"The authors declare no competing interests.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"33"}}