Skip to main content

Cloud Computing

  • Chapter
  • First Online:
Internet Computing

Abstract

Cloud computing is an evolution of information technology and a dominant business model for delivering IT resources. With cloud computing, individuals and organizations can gain on-demand network access to a shared pool of managed and scalable IT resources, such as servers, storage, and applications. Recently, academics as well as practitioners have paid a great deal of attention to cloud computing. We rely heavily on cloud services in our daily lives, e.g., for storing data, writing documents, managing businesses, and playing games online. Cloud computing also provides the infrastructure that has powered key digital trends such as mobile computing, the Internet of Things, big data, and artificial intelligence, thereby accelerating industry dynamics, disrupting existing business models, and fueling the digital transformation. Still, cloud computing not only provides a vast number of benefits and opportunities; it also comes with several challenges and concerns, e.g., regarding protecting customers’ data.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 64.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 84.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  • Ahmed M, Litchfield AT (2018) Taxonomy for identification of security issues in cloud computing environments. J Comput Inf Syst 58(1):79–88

    Google Scholar 

  • Anisetti M, Ardagna C, Damiani E, Gaudenzi F (2017) A semi-automatic and trustworthy scheme for continuous cloud service certification. IEEE Trans Serv Comput 10(1):1–14

    Google Scholar 

  • Annette JR, Banu WA, Chandran PS (2015) Rendering-as-a-service: taxonomy and comparison. Procedia Comput Sci 50:276–281

    Article  Google Scholar 

  • Apps Run The World (2017) Cloud applications revenue from leading vendors worldwide in 2015 and 2016 (in million U.S. dollars). https://www.statista.com/statistics/475844/cloud-applications-revenues-worldwide-by-vendor/. Accessed 11 Dec 2018

  • Arasaratnam O (2011) Introduction to cloud computing. In: Halpert B (ed) Auditing cloud computing, a security and privacy guide. Wiley, Hoboken, NJ, pp 1–13

    Google Scholar 

  • Bajaj A (2000) A study of senior information systems managers decision models in adopting new computing architectures. J AIS 1(1es):4

    Google Scholar 

  • Baldwin LP, Irani Z, Love PED (2001) Outsourcing information systems: drawing lessons from a banking case study. Eur J Inf Syst 10(1):15–24

    Article  Google Scholar 

  • Bayramusta M, Nasir VA (2016) A fad or future of IT?: a comprehensive literature review on the cloud computing research. Int J Inf Manag 36(4):635–644

    Article  Google Scholar 

  • Benlian A, Hess T (2011) Opportunities and risks of software-as-a-service: findings from a survey of IT executives. Decis Support Syst 52(1):232–246

    Article  Google Scholar 

  • Benlian A, Kettinger WJ, Sunyaev A, Winkler TJ (2018) Special section: The transformative value of cloud computing: a decoupling, platformization, and recombination theoretical framework. J Manag Inf Syst 35(3):719–739

    Article  Google Scholar 

  • Bennett C, Timbrell GT (2000) Application service providers: will they succeed? Inf Syst Front 2(2):195–211

    Article  Google Scholar 

  • Berman F, Hey T (2004) The scientific imperative. In: Foster I, Kesselman C (eds) The grid 2: blueprint for a new computing infrastructure. The Morgan Kaufmann series in computer architecture and design. Morgan Kaufman, San Francisco, CA, pp 13–24

    Chapter  Google Scholar 

  • Bharadwaj A, El Sawy OA, Pavlou PA, Venkatraman N (2013) Digital business strategy: toward a next generation of insights. MIS Q 37(2):471–482

    Article  Google Scholar 

  • Bhattacherjee A, Park SC (2014) Why end-users move to the cloud: a migration-theoretic analysis. Eur J Inf Syst 23(3):357–372

    Article  Google Scholar 

  • Böhm M, Leimeister S, Riedl C, Krcmar H (2011) Cloud computing – outsourcing 2.0 or a new business model for IT provisioning? In: Keuper F, Oecking C, Degenhardt A (eds) Application management: challenges – service creation – strategies. Gabler, Wiesbaden, pp 31–56

    Chapter  Google Scholar 

  • Bunker G, Thomson D (2006) Delivering utility computing: business-driver IT optimization. Wiley, Chichester

    Google Scholar 

  • Burda D, Teuteberg F (2014) The role of trust and risk perceptions in cloud archiving — results from an empirical study. J High Technol Manag Res 25(2):172–187

    Article  Google Scholar 

  • Burnham TA, Frels JK, Mahajan V (2003) Consumer switching costs: a typology, antecedents, and consequences. J Acad Mark Sci 31(2):109

    Article  Google Scholar 

  • Buyya R, Yeo CS, Venugopal S, Broberg J, Brandic I (2009) Cloud computing and emerging IT platforms: vision, hype, and reality for delivering computing as the 5th utility. Futur Gener Comput Syst 25(6):599–616

    Article  Google Scholar 

  • Cafaro M, Aloisio G (2011) Grids, clouds, and virtualization. In: Cafaro M, Aloisio G (eds) Grids, clouds and virtualization. Computer communications and networks. Springer, London, pp 1–21

    Google Scholar 

  • Carr N (2008) The big switch: rewiring the world, from Edison to Google. W.W. Norton, New York, NY

    Google Scholar 

  • Cloudscene (2018) Top ten data center operators in North America, EMEA, Oceania and Asia for the January to March 2018 period. https://cloudscene.com/top10. Accessed 11 Dec 2018

  • Cusumano M (2010) Cloud computing and SaaS as new computing platforms. Commun ACM 53(4):27–29

    Article  Google Scholar 

  • Dašić P, Dašić J, Crvenković B (2016) Service models for cloud computing: search as a service (SaaS). Int J Eng Technol (IJET) 8(5):2366–2373

    Article  Google Scholar 

  • Dillon T, Wu C, Chang E (2010) Cloud computing: issues and challenges. Paper presented at the 24th IEEE international conference on advanced information networking and applications, Perth, WA, 20–23 Apr 2010

    Google Scholar 

  • Doelitzscher F, Fischer C, Moskal D, Reich C, Knahl M, Clarke N (2012) Validating cloud infrastructure changes by cloud audits. Paper presented at the 8th IEEE world congress on services, Honolulu, HI, 24–29 June 2012

    Google Scholar 

  • Durkee D (2010) Why cloud computing will never be free. Commun ACM 53(5):62–69

    Article  Google Scholar 

  • ENISA (2012) Cloud computing – benefits, risks and recommendations for information security. European network and security agency. https://resilience.enisa.europa.eu/cloud-security-and-resilience/publications/cloud-computing-benefits-risks-and-recommendations-for-information-security. Accessed 17 Sept 2019

  • Fernandes DAB, Soares LFB, Gomes JV, Freire MM, Inácio PRM (2014) Security issues in cloud environments: a survey. Int J Inf Secur 13(2):113–170

    Article  Google Scholar 

  • Foster I, Kesselman C (2004) The grid 2: blueprint for a new computing infrastructure, 2nd edn. Elsevier, San Francisco, CA

    Google Scholar 

  • Foster I, Kesselman C, Tuecke S (2001) The anatomy of the grid: enabling scalable virtual organizations. Int J High Perform Comput Appl 15(3):200–222

    Article  Google Scholar 

  • Foster I, Zhao Y, Raicu I, Lu S (2008) Cloud computing and grid computing 360-degree compared. Paper presented at the grid computing environments workshop, Austin, TX, 12–16 Nov 2008

    Google Scholar 

  • Gao F, Thiebes S, Sunyaev A (2018) Rethinking the meaning of cloud computing for health care: a taxonomic perspective and future research directions. J Med Internet Res 20(7):e10041

    Article  Google Scholar 

  • Gartner (2018a) Revenue of cloud computing worldwide. https://de.statista.com/statistik/daten/studie/195760/umfrage/umsatz-mit-cloud-computing-weltweit/. Accessed 9 Dec 2018

  • Gartner (2018b) Revenues from public cloud infrastructure as a service (IaaS) market worldwide from 2015 to 2017, by vendor (in million U.S. dollars). https://www.statista.com/statistics/754826/worldwide-public-cloud-infrastructure-services-vendor-revenues/. Accessed 11 Dec 2018

  • Gefen D, Karahanna E, Straub DW (2003) Trust and TAM in online shopping: an integrated model. MIS Q 27(1):51–90

    Article  Google Scholar 

  • Gonzalez R, Gasco J, Llop J (2009) Information systems outsourcing reasons and risks: an empirical study. Int J Soc Sci 4(3):180–191

    Google Scholar 

  • Grover V, Kohli R (2012) Cocreating IT value: new capabilities and metrics for multifirm environments. MIS Q 36(1):225–232

    Article  Google Scholar 

  • Grozev N, Buyya R (2014) Inter-cloud architectures and application brokering: taxonomy and survey. Softw Pract Exp 44(3):369–390

    Article  Google Scholar 

  • Hentschel R, Leyh C, Petznick A (2018) Current cloud challenges in Germany: the perspective of cloud service providers. J Cloud Comput 7(1):5

    Article  Google Scholar 

  • Hess T, Matt C, Benlian A, Wiesböck F (2016) Options for formulating a digital transformation strategy. MIS Q Exec 15(2):123–139

    Google Scholar 

  • Höfer CN, Karagiannis G (2011) Cloud computing services: taxonomy and comparison. J Internet Serv Appl 2(2):81–94

    Article  Google Scholar 

  • Hogendorn C (2011) Excessive(?) entry of national telecom networks, 1990–2001. Telecommun Policy 35(11):920–932

    Article  Google Scholar 

  • Hussain SA, Fatima M, Saeed A, Raza I, Shahzad RK (2017) Multilevel classification of security concerns in cloud computing. Appl Comput Inform 13(1):57–65

    Article  Google Scholar 

  • ISO (2004) Conformity assessment – vocabulary and general principles. https://www.iso.org/standard/29316.html. Accessed 17 Sept 2019

  • ITCandor (2018) Distribution of cloud platform as a service (PaaS) market revenues worldwide from 2015 to June 2018, by vendor. https://www.statista.com/statistics/540521/worldwide-cloud-platform-revenue-share-by-vendor/. Accessed 11 Dec 2018

  • Iyer B, Henderson JC (2010) Preparing for the future: understanding the seven capabilities of cloud computing. MIS Q Exec 9(2):117–131

    Google Scholar 

  • Jones MA, Mothersbaugh DL, Beatty SE (2002) Why customers stay: measuring the underlying dimensions of services switching costs and managing their differential strategic outcomes. J Bus Res 55(6):441–450

    Article  Google Scholar 

  • Kern T, Lacity MC, Willcocks L (2002) Netsourcing: renting business applications and services over a network. Prentice-Hall, New York, NY

    Google Scholar 

  • Khan N, Al-Yasiri A (2016) Identifying cloud security threats to strengthen cloud computing adoption framework. Procedia Comput Sci 94:485–490

    Article  Google Scholar 

  • Killalea T (2008) Meet the virts. ACM Queue 6(1):14–18

    Article  Google Scholar 

  • Kleinrock L (2005) A vision for the internet. ST J Res 2(1):4–5

    Google Scholar 

  • Kouatli I (2014) A comparative study of the evolution of vulnerabilities in IT systems and its relation to the new concept of cloud computing. J Manag Hist 20(4):409–433

    Google Scholar 

  • Kroeker KL (2011) Grid computing’s future. Commun ACM 54(3):15–17

    Article  Google Scholar 

  • Krotsiani M, Spanoudakis G, Kloukinas C (2015) Monitoring-based certification of cloud service security. Paper presented at the OTM confederated international conferences “On the move to meaningful internet systems”, Rhodes, 26–30 Oct 2015

    Google Scholar 

  • Kumar N, DuPree L (2011) Protection and privacy of information assets in the cloud. In: Halpert B (ed) Auditing cloud computing, a security and privacy guide. Wiley, Hoboken, NJ, pp 97–128

    Chapter  Google Scholar 

  • Kunz I, Stephanow P (2017) A process model to support continuous certification of cloud services. Paper presented at the 31st IEEE international conference on advanced information networking and applications, Taipei, 27–29 Mar 2017

    Google Scholar 

  • Lansing J, Benlian A, Sunyaev A (2018) ‘Unblackboxing’ decision makers’ interpretations of IS certifications in the context of cloud service certifications. J Assoc Inf Syst 19(11):1064–1096

    Google Scholar 

  • Lee C, Wan G (2010) Including subjective norm and technology trust in the technology acceptance model: a case of e-ticketing in China. SIGMIS Database 41(4):40–51

    Article  Google Scholar 

  • Leimeister S, Böhm M, Riedl C, Krcmar H (2010) The business perspective of cloud computing: actors, roles and value networks. Paper presented at the 18th European conference on information systems, Pretoria, 7–9 June 2010

    Google Scholar 

  • Lins S, Grochol P, Schneider S, Sunyaev A (2016a) Dynamic certification of cloud services: trust, but verify! IEEE Secur Priv 14(2):66–71

    Article  Google Scholar 

  • Lins S, Teigeler H, Sunyaev A (2016b) Towards a bright future: enhancing diffusion of continuous cloud service auditing by third parties. Paper presented at the 24th European conference on information systems, Istanbul, 12–15 June 2016

    Google Scholar 

  • Lins S, Schneider S, Sunyaev A (2018) Trust is good, control is better: creating secure clouds by continuous auditing. IEEE Trans Cloud Comput 6(3):890–903

    Article  Google Scholar 

  • Lins S, Schneider S, Sunyaev A (2019a) Cloud-Service-Zertifizierung: Ein Rahmenwerk und Kriterienkatalog zur Zertifizierung von Cloud-Services, 2nd edn. Springer, Berlin

    Book  Google Scholar 

  • Lins S, Schneider S, Szefer J, Ibraheem S, Sunyaev A (2019b) Designing monitoring systems for continuous certification of cloud services: deriving meta-requirements and design guidelines. Commun Assoc Inf Syst 44:460–510

    Google Scholar 

  • Linthicum DS (2009) Cloud computing and SOA convergence in your enterprise: a step-by-step guide: how to use SaaS, SOA, Mashups, and web 2.0 to break down the IT gates. Addison-Wesley, Boston, MA

    Google Scholar 

  • Liu F, Tong J, Mao J, Bohn R, Messina J, Badger L, Leaf D (2011) NIST cloud computing reference architecture. https://bigdatawg.nist.gov/_uploadfiles/M0008_v1_7256814129.pdf. Accessed 11 Dec 2018

  • Luftman J, Zadeh HS (2011) Key information technology and management issues 2010–11: an international study. J Inf Technol 26(3):193–204

    Article  Google Scholar 

  • Malluhi Q, Khan KM (2013) Trust in cloud services: providing more controls to clients. Computer 46(7):94–96

    Article  Google Scholar 

  • Marston S, Li Z, Bandyopadhyay S, Zhang J, Ghalsasi A (2011) Cloud computing — the business perspective. Decis Support Syst 51(1):176–189

    Article  Google Scholar 

  • Mell P, Grance T (2011) The NIST definition of cloud computing. https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-145.pdf. Accessed 17 Sept 2019

  • NIST Cloud Computing Security Working Group (2013) NIST cloud computing security reference architecture. https://csrc.nist.gov/publications/detail/sp/500-299/draft. Accessed 10 Dec 2018

  • Pahl C (2015) Containerization and the PaaS cloud. IEEE Cloud Comput 2(3):24–31

    Article  Google Scholar 

  • Park S-T, Park E-M, Seo J-H, Li G (2016) Factors affecting the continuous use of cloud service: focused on security risks. Clust Comput 19(1):485–495

    Article  Google Scholar 

  • Sarkar P, Young L (2011) Sailing the cloud: a case study of perceptions and changing roles in an Australian University. Paper presented at the 19th European conference on information systems, Helsinki, 9–11 June 2011

    Google Scholar 

  • Schneider S, Sunyaev A (2016) Determinant factors of cloud-sourcing decisions: reflecting on the IT outsourcing literature in the era of cloud computing. J Inf Technol 31(1):1–31

    Article  Google Scholar 

  • Schneider S, Lansing J, Gao F, Sunyaev A (2014) A taxonomic perspective on certification schemes: development of a taxonomy for cloud service certification criteria. Paper presented at the 47th Hawaii international conference on system sciences, Waikoloa, HI, 6–9 Jan 2014

    Google Scholar 

  • Schneider S, Wollersheim J, Krcmar H, Sunyaev A (2018) How do requirements evolve over time? a case study investigating the role of context and experiences in the evolution of enterprise software requirements. J Inf Technol 33(2):151–170

    Article  Google Scholar 

  • Schwarz A, Jayatilaka B, Hirschheim R, Goles T (2009) A conjoint approach to understanding IT application services outsourcing. J Assoc Inf Syst 10(10):1

    Google Scholar 

  • Schwiegelshohn U, Badia RM, Bubak M, Danelutto M, Dustdar S, Gagliardi F, Geiger A, Hluchy L, Kranzlmüller D, Laure E, Priol T, Reinefeld A, Resch M, Reuter A, Rienhoff O, Rüter T, Sloot P, Talia D, Ullmann K, Yahyapour R (2010) Perspectives on grid computing. Futur Gener Comput Syst 26(8):1104–1115

    Article  Google Scholar 

  • Seethamraju R (2013) Determinants of SaaS ERP systems adoption. Paper presented at the 17th Pacific Asia conference on information systems, Jeju Island, 18–22 June 2013

    Google Scholar 

  • Sehgal NK, Sohoni S, Xiong Y, Fritz D, Mulia W, Acken JM (2011) A cross section of the issues and research activities related to both information security and cloud computing. IETE Tech Rev 28(4):279–291

    Article  Google Scholar 

  • Sharma D, Dhote C, Potey MM (2016) Identity and access management as security-as-a-service from clouds. Procedia Comput Sci 79:170–174

    Article  Google Scholar 

  • Singh A, Chatterjee K (2017) Cloud security issues and challenges: a survey. J Netw Comput Appl 79(C):88–115

    Article  Google Scholar 

  • Singh S, Jeong Y-S, Park JH (2016) A survey on cloud computing security. J Netw Comput Appl 75(C):200–222

    Article  Google Scholar 

  • Soares J, Carapinha J, Melo M, Monteiro R, Sargento S (2011) Building virtual private clouds with network-aware cloud. Paper presented at the 5th international conference on advanced engineering computing and applications in sciences, Lisbon, 20–25 Nov 2011

    Google Scholar 

  • Stephanow P, Banse C (2017) Evaluating the performance of continuous test-based cloud service certification. Paper presented at the 17th IEEE/ACM international symposium on cluster, cloud and grid computing, Madrid, 14–17 May 2017

    Google Scholar 

  • Stephanow P, Khajehmoogahi K (2017) Towards continuous security certification of software-as-a-service applications using web application testing techniques. Paper presented at the 31st IEEE international conference on advanced information networking and applications, Taipei, 27–29 Mar 2017

    Google Scholar 

  • Stephanow P, Banse C, Schütte J (2016) Generating threat profiles for cloud service certification systems. Paper presented at the 17th IEEE international symposium on high assurance systems engineering, Orlando, FL, 7–9 Jan 2016

    Google Scholar 

  • Subashini S, Kavitha V (2011) A survey on security issues in service delivery models of cloud computing. J Netw Comput Appl 34(1):1–11

    Article  Google Scholar 

  • Sunyaev A, Schneider S (2013) Cloud services certification. Commun ACM 56(2):33–36

    Article  Google Scholar 

  • Susarla A, Barua A, Whinston AB (2003) Understanding the service component of application service provision: an empirical analysis of satisfaction with ASP services. MIS Q 27(1):91–123

    Article  Google Scholar 

  • Tan W, Fan Y, Ghoneim A, Hossain MA, Dustdar S (2016) From the service-oriented architecture to the web API economy. IEEE Internet Comput 20(4):64–68

    Article  Google Scholar 

  • Teigeler H, Lins S, Sunyaev A (2018) Drivers vs. inhibitors – what clinches continuous service certification adoption by cloud service providers? Paper presented at the 51th Hawaii international conference on system sciences, Hilton Waikoloa Village, HI, 3–6 Jan 2018

    Google Scholar 

  • Thiebes S, Kleiber G, Sunyaev A (2017) Cancer genomics research in the cloud: a taxonomy of genome data sets. Paper presented at the 4th international workshop on genome privacy and security, Orlando, FL, 15 Oct 2017

    Google Scholar 

  • Tiwana A, Konsynski B, Bush AA (2010) Research commentary—platform evolution: coevolution of platform architecture, governance, and environmental dynamics. Inf Syst Res 21(4):675–687

    Article  Google Scholar 

  • Top Threats Working Group (2016) The treacherous 12. Cloud computing top threats in 2016. https://downloads.cloudsecurityalliance.org/assets/research/top-threats/Treacherous-12_Cloud-Computing_Top-Threats.pdf. Accessed 17 Sept 2019

  • Trenz M, Huntgeburth JC, Veit DJ (2013) The role of uncertainty in cloud computing continuance: antecedents, mitigators, and consequences. Paper presented at the 21st European conference on information systems, Utrecht, 5–8 June 2013

    Google Scholar 

  • Trenz M, Huntgeburth J, Veit D (2018) Uncertainty in cloud service relationships: uncovering the differential effect of three social influence processes on potential and current users. Inf Manag 55(8):971–983

    Article  Google Scholar 

  • Venkatesh V, Morris MG, Davis GB, Davis FD (2003) User acceptance of information technology: toward a unified view. MIS Q 27(3):425–478

    Article  Google Scholar 

  • Venters W, Whitley EA (2012) A critical review of cloud computing: researching desires and realities. J Inf Technol 27(3):179–197

    Article  Google Scholar 

  • Voorsluys W, Broberg J, Buyya R (2011) Introduction to cloud computing. In: Buyya R, Broberg J, Goscinski A (eds) Cloud computing. Wiley, Hoboken, NJ, pp 3–42

    Google Scholar 

  • Wang B, Li B, Li H (2014) Oruta: privacy-preserving public auditing for shared data in the cloud. IEEE Trans Cloud Comput 2(1):43–56

    Article  MathSciNet  Google Scholar 

  • Weinhardt C, Anandasivam A, Blau B, Borissov N, Meinl T, Michalk W, Stößer J (2009) Cloud computing–a classification, business models, and research directions. Bus Inf Syst Eng 1(5):391–399

    Article  Google Scholar 

  • Whitman M, Mattord H (2011) Cloud-based IT governance. In: Halpert B (ed) Auditing cloud computing: a security and privacy guide. Wiley, Hoboken, NJ, pp 33–55

    Chapter  Google Scholar 

  • Windhorst I, Sunyaev A (2013) Dynamic certification of cloud services. Paper presented at the 8th international conference on availability, reliability and security, Regensburg, 2–6 Sept 2013

    Google Scholar 

  • Yoo Y, Henfridsson O, Lyytinen K (2010) Research commentary—the new organizing logic of digital innovation: an agenda for information systems research. Inf Syst Res 21(4):724–735

    Article  Google Scholar 

Further Reading

  • Benlian A, Kettinger WJ, Sunyaev A, Winkler TJ (2018) Special section: The transformative value of cloud computing: a decoupling, platformization, and recombination theoretical framework. J Manag Inf Syst 35(3):719–739

    Article  Google Scholar 

  • Fernandes DAB, Soares LFB, Gomes JV, Freire MM, Inácio PRM (2014) Security issues in cloud environments: a survey. Int J Inf Secur 13(2):113–170

    Article  Google Scholar 

  • Lins S, Schneider S, Sunyaev A (2019) Cloud-Service-Zertifizierung: Ein Rahmenwerk und Kriterienkatalog zur Zertifizierung von Cloud-Services, 2nd edn. Springer, Berlin

    Book  Google Scholar 

  • Marston S, Li Z, Bandyopadhyay S, Zhang J, Ghalsasi A (2011) Cloud computing — the business perspective. Decis Support Syst 51(1):176–189

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Sunyaev, A. (2020). Cloud Computing. In: Internet Computing. Springer, Cham. https://doi.org/10.1007/978-3-030-34957-8_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-34957-8_7

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-34956-1

  • Online ISBN: 978-3-030-34957-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics