International Journal of Cloud Computing

Call for papers
Editor in Chief: Prof. Yi Pan
ISSN online: 2043-9997
ISSN print: 2043-9989
4 issues per year
Subscription price


Cloud computing refers to computing with a pool of virtualised computer resources. A cloud can host different workloads, allows workloads to be deployed/scaled-out on-demand by rapid provisioning of virtual or physical machines, supports redundant, self-recovering, highly-scalable programming models and allows workloads to recover from hardware/software failures and rebalance allocations. The idea is to move desktop computing to a service-oriented platform using server clusters and huge databases at datacentres. IJCC addresses innovative developments, research issues/solutions in cloud computing and related technologies.


 Topics covered include

  • Auditing, monitoring, scheduling, resource registration/discovery
  • Automatic reconfiguration, self healing/monitoring
  • Autonomic, high-performance, utility, P2P computing
  • Cloud architecture/modelling, services
  • Consistency models, fault tolerance/reliability
  • Data grid, semantic web, web services, hardware/software as a service
  • Innovations in IP (esp. open source) systems
  • IT service/relationship management, security, risk, trustworthiness, privacy
  • Load balancing, optimal deployment configuration
  • Mainframe/large systems integration, programming models
  • Middleware frameworks, virtualisation
  • Power-aware profiling, modelling, optimisation
  • Scalable fault resilience techniques
  • Scalable scheduling on heterogeneous architectures
  • Service level agreements, integration, management

More on this journal...

The objectives of IJCC are to develop, promote and coordinate the development and practice of cloud computing. IJCC aims to help professionals working in the field, academic educators and policy-makers to contribute, to disseminate knowledge, and to learn from each other's work. The international dimension is emphasised in order to overcome cultural and national barriers and to meet the needs of accelerating technological change and changes in the global economy. IJCC is an outstanding outlet that can shape a significant body of research in the field of cloud computing and in which results can be shared across institutions, governments, researchers and students, and also industry.


IJCC provides a vehicle to help professionals, academics, researchers, graduate students, and managers, working in the field of cloud computing and its related areas such as virtual computing and grid computing, to disseminate information and to learn from each other’s work.


IJCC publishes original and review papers, technical reports, and case studies. Contribution may be by submission or invitation, and suggestions and proposals for special issues devoted to important topics in cloud computing are welcome.



Browse issues

Vol. 4
Vol. 3
Vol. 2
Vol. 1


 IJCC is indexed in:


 IJCC is listed in:


Editor in Chief

  • Pan, Yi, Georgia State University, USA

    Associate Editor

    • Goscinski, Andrzej M., Deakin University, Australia

    Editorial Board Members

    • Buyya, Rajkumar, The University of Melbourne, Australia
    • Cao, Jiannong, Hong Kong Polytechnic University, Hong Kong SAR, China
    • Damiani, Ernesto, Universitą degli Studi di Milano, Italy
    • Dongarra, Jack, University of Tennessee Knoxville, USA
    • Fox, Geoffrey Charles, Indiana University, USA
    • Gouda, Mohamed G., National Science Foundation, USA
    • Grossman, Bob, University of Illinois at Chicago, USA
    • Guo, Yike, Imperial College London, UK
    • Hosono, Shigeru, NEC Corporation, Japan
    • Huang, Runhe, Hosei University, Japan
    • Huang, Xuedong, Microsoft Research, USA
    • Hwang, Kai, University of Southern California, USA
    • Kozuch, Michael A., Intel Americas, Inc., USA
    • Lee, Craig A., The Aerospace Corporation, USA
    • Liang, Qianhui (Althea), HP Labs, Singapore
    • Li, Deyi, National Natural Science Foundation, China
    • Mahanti, Prabhat K., University of New Brunswick, Canada
    • Pataricza, Andrįs, Budapest University of Technology and Economics, Hungary
    • Qiu, Judy, Indiana University, USA
    • Qu, Yanzhen, Colorado Technical University, USA
    • Rindos, Andy, IBM, USA
    • Rong, Chunming, University of Stavanger, Norway
    • Sim, Kwang Mong, University of Kent, UK
    • Zhang, Yaoxue, Tsinghua University, China
    • Zimmermann, Wolf, Universität Halle Wittenberg, Germany
    • Zomaya, Albert, University of Sydney, Australia


    A few essentials for publishing in this journal


    • Submitted articles should not have been previously published or be currently under consideration for publication elsewhere.
    • Conference papers may only be submitted if the paper has been completely re-written (taken to mean more than 50%) and the author has cleared any necessary permissions with the copyright owner if it has been previously copyrighted.
    • All our articles are refereed through a double-blind process.
    • All authors must declare they have read and agreed to the content of the submitted article. A full statement of our Ethical Guidelines for Authors (PDF) is available.


    Submission process


    All articles for this journal must be submitted using our online submissions system.

    Read our Submitting articles page.



    Journal news

    • FAPA cloud protection


      As cloud computing becomes increasingly prevalent, the need for protection against malicious attacks on servers becomes more pressing. Now, US computer scientists have developed FAPA, a flooding attack protection architecture, to protect users of cloud systems. They report details in the aptly named International Journal of Cloud Computing. Kazi Zunnurhain, Susan Vrbsky and Ragib Hasan [...]

      More details...

    • Seven security concerns in the cloud


      The basic concept of cloud computing emerged in the 1950s when mainframe computers were coming to the fore and users would instigate processing from their dummy terminals. However, in modern parlance, cloud computing represents much more in that the dummy terminals are no longer simple input/output devices but might themselves be high-powered desktop workstations, laptops, [...]

      More details...