Professional Documents
Culture Documents
Hung 2019
Hung 2019
Received October 28, 2019, accepted November 30, 2019, date of publication December 13, 2019,
date of current version December 23, 2019.
Digital Object Identifier 10.1109/ACCESS.2019.2958973
ABSTRACT The Internet of Things (IoT) transforms many fields, including the educational, logistics, and
manufacturing industries. The IoT is an internet framework whereby a large number of devices or equipment
are connected and synchronized using gateways, third-party technologies, and software in machine-to-
machine and cloud computing networks. With the flourishing development of IoT, cloud computing plays
an essential role in its application layer. Cloud computing technology has been widely applied in various
industries and developed as particular cloud computing types: education as a service (EaaS), logistics as
a service (LaaS), and manufacturing as a service (MaaS). The applicability of cloud computing in various
industries has attracted significant attention from researchers and professionals. This study investigated the
technical trends of emerging cloud computing technologies and surveyed 3,697 cloud computing-related
studies from 2010 to 2019. The findings indicate that intelligence and automation are the core issues that
drive research on cloud computing. The main types of research are critical review, system design, and
systematic analysis. Cloud computing services (e.g., XaaS, EaaS, LaaS, MaaS) are related to big data,
analytical technologies, service orientation, and IoT. This study applied machine-learning algorithms to
analyze educational, logistic, and manufacturing data and yielded results with more than 90% accuracy
and AUC. This study used various devices such as laptops, tablets, and smartphones to configure and review
machine-learning models using third-party cloud platforms, which are infinitely scalable and flexible for
data analytics, thereby allowing users to make quicker predictions and decisions focused on business needs.
INDEX TERMS Cloud computing, machine learning, education as a service (EaaS), logistics as a service
(LaaS), manufacturing as a service (MaaS).
This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see http://creativecommons.org/licenses/by/4.0/
VOLUME 7, 2019 181505
Y.-H. Hung: Investigating How the Cloud Computing Transforms the Development of Industries
studies argue that the EaaS model would result in a ‘‘student- TABLE 4. The EaaS studies.
driven’’ trend and retain students through services that make
their training obvious [57], [58]. Some research used machine
learning techniques to forecast secondary school student
performance [59], [60]. Table 4 shows the current citation
statuses of the studies. Those with high citations focus on
distance education, student satisfaction, big data, IoT, and
analytics technology. The common keywords include ‘‘big
data,’’ ‘‘IoT,’’ ‘‘e-learning,’’ ‘‘customer satisfaction,’’ ‘‘higher
education,’’ ‘‘new managerialism,’’ and ‘‘cloud computing.’’
The use of digital technologies to increase the quality of
education service is accomplished by providing access to
resources and enabling remote collaboration between stu-
dents and teachers [58].
The standard procedure for data analytics was employed to for each training instance. This output is the aggregate of
preprocess and model the predicted issues for the learning the outputs of all the weak learners in the multiple model.
performance of students, vehicle acceptability, and semicon- Next, the gradients in the loss function for each instance is
ductor manufacturing processes. ML algorithms were used to estimated by the model. The algorithm uses the examples
solve and integrate these issues into different cloud comput- to fit a weak learner, and the gradient is simply defined as
ing solutions to achieve the goals of EaaS, LaaS, and MaaS. the target function. The learning rate is used to combine the
weak learners together to create a strong predictive model.
A. PROCEDURE OF KNOWLEDGE DISCOVERY IN The algorithm is repeated until it reaches a terminal condition.
DATABASES (KDD)
KDD is the process of acquiring potential useful information 2) TWO-CLASS SVM
by analyzing or mining data collections. This widely-used A two-class SVM is based on an SVM algorithm used to ana-
technique of data analytics is based on procedures that ana- lyze input data and recognize patterns in a multi-dimensional
lyze data from different sources. The standard procedures are feature space. The classifier initialized by this module is
selecting a target dataset, preprocessing data, transforming suitable for choosing between two outcomes that depend on
data formats, training models, and evaluation. To achieve categorical and continuous input variables. These machines
the goal of cloud computing, this study leveraged Microsoft require labeled data and assign new examples into one cate-
Azure ML Studio for pattern identification to predict different gory or another while mapping them onto the same space.
datasets in various industries. Microsoft Azure ML Studio has
numerous users and is considered to be a popular applica- 3) TWO-CLASS LOGISTICS REGRESSION
tion. Users can build, evaluate, preprocess, model, and run A two-class logistic regression algorithm is a supervisory,
their data analytics projects with Microsoft Azure ML tools. learning algorithm that predicts the probability of a binary
Figure 4 illustrates the procedures of KDD. event’s occurrence using a logistic function. Logistic regres-
sion assumes a logistic distribution of the observation where
the probability that an observation is classified as one
of two categories is based on the independent variables.
The algorithm aims to exploring the optimal solution for
α{0}, . . . , α{r − 1} by estimating the objective function of the
parameters with the given independent variables.
prob(x; α0 , . . . , αr − 1) (1)
A. EVALUATION CRITERIA
This study used accuracy, the receiver operating characteristic
curve (ROC), and the area under the curve of the ROC (AUC)
to evaluate the analytics.
1) ACCURACY
The key parameters are true negative (TN), false negative
(FN), true positive (TP), and false positive (FP). Equation 2 is
the formula for estimating the accuracy, which is the number
FIGURE 5. The procedure of the data analytics used in this study.
of correct assessments divided by the number of all assess-
TABLE 7. The list of dataset. ments.
(TN + TP)
Accuracy = (2)
(TN + TP + FN + FP)
2) ROC
ROC is a probability curve plotted with the false positive
rate (FPR) on the x-axis against sensitivity on the y-axis.
Equations 3 and 4 are the formulas of sensitivity and FPR,
respectively:
TP
Sensitivity = (3)
TP + FN
FP
FPR = (4)
TN + FP
3) AUC
Accuracy is measured using the AUC, for which a value
closer to 1 represents a near-perfect test but less than 0.5 rep-
from the observed results. Figure 5 shows the various pro- resents a worthless test. Table 8 shows the traditional aca-
cessing steps. demic guide for classifying the accuracy of a diagnostic test.
TABLE 9. Results of analytics in education case. TABLE 10. The result of analytics in the logistics case.
TABLE 11. The result of analytics using MaaS. cloud computing. This study surveyed our account, which
was validated on a cloud platform, by changing our device
to access the cloud service. Our case studies have shown that
the cloud computing environment validated our account when
we changed our device, then validated our use of the account
information. The survey’s results show that the cloud has
multi-factorial authentication, which means more credentials
that discriminate and verify access.
VII. CONCLUSION
Cloud computing has a growing market that many enter-
prise and organizations are adopting to enable their digital
transformation. This study not only surveyed cloud comput-
ing technologies but also current cloud computing services
research such as EaaS, LaaS, and MaaS. In Google Scholar,
results were obtained from 3,697 academic papers published
from 2010 to 2019. We used descriptive statistics, PoP, and
CiteSpace to analyze these studies. The recently proposed
concept of XaaS has quickly developed into diverse types of
services, such as EaaS, LaaS, and MaaS. The findings show
that the studies have a high number of citations. Classification
algorithms based on the standard KDD procedure were used
to analyze the imported data. The results show that data
from different industries can be imported into an authorized
connectivity applications. GE, Intel, Dell and other enter- cloud platform and the different algorithms had significantly
prises from hardware, software are considered as key role in high accuracy. In the education case, this study predicted the
the development of fog commuting. Some researchers have performance of students learning mathematics. The trained
indicated that the distributed cloud system could increase results could aid instructors or teachers in personalizing indi-
the utilization of the network in the future [13]. Edge com- vidual learning activities and materials. In the logistics case,
puting offers computing power, as well as memory, closer vehicle acceptability could be forecasted. The trained model
to a user’s location. Oracle, IBM, Microsoft, Advantech the could assist car rental managers in formulating rental strate-
main service providers also proposed the edge-based solution gies. In the manufacturing case, this study predicted equip-
(e.g., Oracle tactical edge cloud, Microsoft Azure IoT Edge). ment failure and assisted in the formulation of predictive
Both types of computing will be considered in a future study. maintenance strategies. Many consulting institutions have
We will train a model on the cloud but also retrain it on emphasized the importance of cloud computing. This study
the edge. This study was limited by its data sample; data utilized cases from different industries to demonstrate that
from diverse industries will be employed for data analytics cloud technologies offered users multiple alternatives for on-
in future studies. demand infrastructure so that enterprises can avoid investing
in expensive and complex resources.
B. SECURITY ISSUES Adequate integrated cloud computing services and ICT are
Forrester’s report estimated that, by the end of 2018, half prerequisites for keeping pace with the rapid rise of com-
of the businesses around the world will have used at least plexity in various industries. This study successfully demon-
one cloud service. This study has not only realized a cloud strates that using ML for training models on the cloud can
computing service but also investigated the effects of devices generate diverse cloud computing services, such as EaaS,
on a cloud computing environment by using tablets and LaaS, and MaaS. Cloud platforms could provide personal-
smartphones to access the environment. The cloud means that ized and flexible environments for different industries and
everything is not constrained by space, time, or device. The assist in data analysis and strategy formulation. The trained
cloud services must comply with network security standards results could be integrated with third-party ML tools, such
to guarantee the integrity of the data of an enterprise and as TensorFlow. Further, Python can be used for ML analysis
protect any user that contracts such services. Some studies workflow. Trained modeling can be generated as a web ser-
surveyed the security challenges of cloud computing [23]. vice for real-time analysis. This study surveyed how cloud
Some researchers have indicated that cloud computing ser- computing is changing the way industries practice decision-
vice users must be aware the risks of data breaches in a cloud- making and problem solving with dynamically virtualized
based framework [23]. Validating the verification of a user and scalable resources provided as a service over the network
who is trying to access a cloud application when the user communication. The cloud platform is infinitely flexible for
signs out of a platform or changes a device is necessary for data analytics, thereby giving users to make efficient analytics
focused on users’ needs. Developers can configure cloud data [13] B. Varghese and R. Buyya, ‘‘Next generation cloud computing: New
analytics using a mobile phone and tablet. However, the data trends and research directions,’’ Future Gener. Comput. Syst., vol. 79,
pp. 849–861, Feb. 2018, doi: 10.1016/j.future.2017.09.020.
set in this study is limited, and more industries’ data should be [14] P. Mell and T. Grance, ‘‘The NIST definition of cloud computing,’’ Nat.
included in future studies. We plan to conduct further research Inst. Standards Technol., vol. 53, no. 6, p. 50, 2011.
to repeat this analysis in other industries to investigate how [15] C. Stergiou, K. E. Psannis, B.-G. Kim, and B. Gupta, ‘‘Secure integration
of IoT and cloud computing,’’ Future Gener. Comput. Syst., vol. 78,
ensemble learning algorithms can transform different indus- pp. 964–975, Jan. 2018, doi: 10.1016/j.future.2016.11.031.
tries. Future work could also investigate the potential of edge [16] H. Li, K. Ota, and M. Dong, ‘‘Learning IoT in edge: Deep learning for
computing formed from the ubiquitous devices in wearable the Internet of Things with edge computing,’’ IEEE Netw., vol. 32, no. 1,
pp. 96–101, Jan./Feb. 2018, doi: 10.1109/mnet.2018.1700202.
object, device and other embedded objects, as such embedded
[17] N. Fernando, S. Loke, and W. Rahayu, ‘‘Mobile cloud computing: A sur-
computing will become more powerful and convenience in vey,’’ Future Gener. Comput. Syst., vol. 29, no. 1, pp. 84–106, Jul. 2013.
diverse industries [17], [27], [35]. [18] K. Kumar and Y.-H. Lu, ‘‘Cloud computing for mobile users: Can offload-
ing computation save energy?’’ Computer, vol. 43, no. 4, pp. 51–56, 2010,
doi: 10.1109/mc.2010.98.
ACKNOWLEDGMENT [19] F. Bonomi, R. Milito, J. Zhu, and S. Addepalli, ‘‘Fog computing and its
This work was supported in part by Taiwan Ministry of role in the Internet of Things,’’ in Proc. 1st Ed. MCC Workshop Mobile
Science and Technology (MOST), under Grant no. MOST Cloud Comput., 2012, pp. 13–16.
[20] M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. Katz, A. Konwinski,
108-2410-H-224-001-MY2 and MOST 108-3116-F-002-003 G. Lee, D. Patterson, A. Rabkin, I. Stoica, and M. Zaharia, ‘‘A view of
–CC1. MOST 108-2635-E-224 -001. The author would like cloud computing,’’ Commun. ACM, vol. 53, no. 4, p. 50, 2010. Accessed:
to thank the Enago for English grammar checking support. Jul. 31, 2019, doi: 10.1145/1721654.1721672.
[21] R. Calheiros, R. Ranjan, A. Beloglazov, C. De Rose, and R. Buyya,
‘‘CloudSim: A toolkit for modeling and simulation of cloud com-
REFERENCES puting environments and evaluation of resource provisioning algo-
[1] S. Sarma, D. L. Brock, and K. Ashton, ‘‘The networked physical world,’’ rithms,’’ Softw., Pract. Exper., vol. 41, no. 1, pp. 23–50, 2010, doi:
Auto-ID Center, Cambridge, MA, USA, White Paper MIT-AUTOID- 10.1002/spe.995.
WH-001, 2000, pp. 1–16. [22] Q. Zhang, L. Cheng, and R. Boutaba, ‘‘Cloud computing: State-of-the-
[2] A. Ghasempour and T. K. Moon, ‘‘Optimizing the number of collectors art and research challenges,’’ J. Internet Services Appl., vol. 1, no. 1,
in machine-to-machine advanced metering infrastructure architecture for pp. 7–18, 2010, doi: 10.1007/s13174-010-0007-6.
Internet of Things-based smart grid,’’ in Proc. IEEE Green Technol. Conf., [23] S. Subashini and V. Kavitha, ‘‘A survey on security issues in service
Kansas City, MO, USA, Apr. 2016, pp. 51–55. delivery models of cloud computing,’’ J. Netw. Comput. Appl., vol. 34,
[3] Internet of Things Strategic Research Roadmap. Accessed: no. 1, pp. 1–11, 2011, doi: 10.1016/j.jnca.2010.07.006.
Jul. 30, 2019. [Online]. Available: http://www.internet-of-things- [24] S. Marston, Z. Li, S. Bandyopadhyay, J. Zhang, and A. Ghalsasi, ‘‘Cloud
research.eu/pdf/IoT_Cluster_Strategic_Research_Agenda_2009.pdf computing—The business perspective,’’ Decis. Support Syst., vol. 51,
[4] Towards a Definition of the Internet of Things (IoT). Accessed: no. 1, pp. 176–189, 2011.
Jul. 30, 2019. [Online]. Available: https://iot.ieee.org/images/files/ [25] C. Wang, Q. Wang, K. Ren, and W. Lou, ‘‘Privacy-preserving public
pdf/IEEE_IoT_Towards_Definition_Internet_of_Things_Revision1_ auditing for data storage security in cloud computing,’’ in Proc. IEEE
27MAY15.pdf INFOCOM, Mar. 2010, pp. 1–9.
[5] N. Gershenfeld, R. Krikorian, and D. Cohen, ‘‘The Internet of Things,’’ [26] A. Beloglazov, J. Abawajy, and R. Buyya, ‘‘Energy-aware resource allo-
Sci. Amer., vol. 291, no. 4, pp. 76–81, 2004. cation heuristics for efficient management of data centers for Cloud
[6] A. Ghasempour, ‘‘Optimum number of aggregators based on power computing,’’ Future Gener. Comput. Syst., vol. 28, no. 5, pp. 755–768,
consumption, cost, and network lifetime in advanced metering infras- 2012, doi: 10.1016/j.future.2011.04.017.
tructure architecture for Smart Grid Internet of Things,’’ in Proc. IEEE
[27] H. T. Dinh, C. Lee, D. Niyato, and P. Wang, ‘‘A survey of mobile
Ann. Consum. Commun. Netw. Conf., Las Vegas, NV, USA, Jan. 2016,
cloud computing: Architecture applications and approaches,’’ Wireless
pp. 295–296.
Commun. Mobile Comput., vol. 13, no. 18, pp. 1587–1611, 2013.
[7] A. Ghasempour, ‘‘Internet of Things in smart grid: Architecture, applica-
[28] S. Yu, C. Wang, K. Ren, and W. Lou, ‘‘Achieving secure scalable and
tions, services, key technologies, and challenges,’’ Inventions J., vol. 4,
fine-grained data access control in cloud computing,’’ in Proc. IEEE
no. 1, pp. 1–12, 2019.
INFOCOM, Mar. 2010, pp. 534–542.
[8] A. Ghasempour, ‘‘Advanced metering infrastructure in smart grid:
Requirements, challenges, architectures, technologies, and optimiza- [29] D. Zissis and D. Lekkas, ‘‘Addressing cloud computing security issues,’’
tions,’’ in Smart Grids: Emerging Technologies, Challenges and Future Future Gener. Comput. Syst., vol. 28, no. 3, pp. 583–592, 2012, doi:
Directions, J. Lou, Ed. New York, NY, USA: Nova Science, 2017. 10.1016/j.future.2010.12.006.
[9] Gartner. (2019). Gartner Says Global IT Spending to Grow 1.1 [30] P. Nickolov, B. Armijo, and V. Miloushev, ‘‘Globally distributed utility
Percent in 2019. Accessed: Jul. 30, 2019. [Online]. Available: computing cloud,’’ U.S. Patent 8 429 630, Apr. 23, 2013.
https://www.gartner.com/en/newsroom/press-releases/2019-04-17- [31] I. Hashem, I. Yaqoob, N. Anuar, S. Mokhtar, A. Gani, and S. U. Khan,
gartner-says-global-it-spending-to-grow-1-1-percent-i ‘‘The rise of ‘big data’ on cloud computing: Review and open
[10] Marketsandmarkets.com. (2019). Global Cloud Migration Services research issues,’’ Inf. Syst., vol. 47, pp. 98–115, Jan. 2015, doi:
Market Contemplated to Grow $9.47 Billion in 2022. Accessed: 10.1016/j.is.2014.07.006.
Jul. 30, 2019. [Online]. Available: https://www.marketsandmarkets. [32] X. Xu, ‘‘From cloud computing to cloud manufacturing,’’ Robot.
com/pdfdownloadNew.asp?id=266815130 Comput.-Integr. Manuf., vol. 28, no. 1, pp. 75–86, 2012, doi:
[11] Reportlinker.com. (2019). Cloud Computing Market by Service, 10.1016/j.rcim.2011.07.002.
Deployment Model, Organization Size, Workload, Vertical And Region— [33] H. Takabi, J. B. D. Joshi, and G.-J. Ahn, ‘‘Security and privacy challenges
Global Forecast to 2023. Accessed: Jul. 30, 2019. [Online]. Available: in cloud computing environments,’’ IEEE Security Privacy, vol. 8, no. 6,
https://www.reportlinker.com/p05749258/Cloud-Computing-Market-by- pp. 24–31, Nov./Dec. 2010, doi: 10.1109/msp.2010.186.
Service-Deployment-Model-Organization-Size-Workload-Vertical-And- [34] T. Dillon, C. Wu, and E. Chang, ‘‘Cloud computing: Issues and chal-
Region-Global-Forecast-to.html lenges,’’ in Proc. 24th IEEE Int. Conf. Adv. Inf. Netw. Appl. (AINA),
[12] PAT RESEARCH: B2B Reviews, Buying Guides & Best Practices. Apr. 2010, pp. 27–33.
(2019). Top 52 Predictive Analytics & Prescriptive Analytics Software— [35] R. Buyya, J. Broberg, and A. Goscinski, Cloud Computing [Recurso
Compare Reviews, Features, Pricing in 2019—PAT RESEARCH: B2B Electrónico]. Hoboken, NJ, USA: Wiley, 2011.
Reviews, Buying Guides & Best Practices. Accessed: Jul. 30, 2019. [36] A. Botta, W. Donato, V. Persico, and A. Pescapé, ‘‘Integration of cloud
[Online]. Available: https://www.predictiveanalyticstoday.com/top- computing and Internet of Things: A survey,’’ Future Generat. Comput.
predictive-analytics-software/ Syst., vol. 56, pp. 684–700, Mar. 2016.
[37] Z. Cai, X. Li, and J. N. D. Gupta, ‘‘Heuristics for provisioning services to [59] P. Cortez and A. M. G. Silva, ‘‘Using data mining to predict sec-
workflows in XaaS clouds,’’ IEEE Trans. Services Comput., vol. 9, no. 2, ondary school student performance,’’ EUROSIS-ETI, Ghent, Belgium,
pp. 250–263, Mar. 2016, doi: 10.1109/tsc.2014.2361320. Tech. Rep., Apr. 2008, pp. 5–12.
[38] C. Grönroos and P. Voima, ‘‘Critical service logic: Making sense of [60] A. M. Shahiri, W. Husain, and N. A. Rashid, ‘‘A review on predicting
value creation and co-creation,’’ J. Acad. Marketing Sci., vol. 41, no. 2, student’s performance using data mining techniques,’’ Procedia Comput.
pp. 133–150, 2012, doi: 10.1007/s11747-012-0308-3. Sci., vol. 72, pp. 414–422, Dec. 2015, doi: 10.1016/j.procs.2015.12.157.
[39] B. Schneider, D. E. Bowen, P. P. Maglio, C. A. Kieliszewski, and [61] M. Moore and G. Kearsley, Distance Education. Belmont, CA, USA:
J. C. Spohrer, ‘‘Winning the service game: Revisiting the rules by which Wadsworth Cengage Learning, 2012.
people co-create value,’’ in Handbook of Service Science. New York, NY, [62] M. Lawn and S. Grek, Europeanizing Education. Oxford, U.K.:
USA: Springer, 2010, pp. 31–60. Symposium Books, 2012.
[40] P. Bender, P. Black, M. Grob, R. Padovani, N. Sindhushayana, and A. [63] T. Gruber, S. Fuß, R. Voss, and M. Gläser-Zikuda, ‘‘Examining student
Viterbi, ‘‘CDMA/HDR: A bandwidth efficient high speed wireless data satisfaction with higher education services: Using a new measurement
service for nomadic users,’’ in The Foundations of the Digital Wire- tool,’’ Int. J. Public Sector Manage., vol. 23, no. 2, pp. 105–123, 2010.
less World. Singapore: World Scientific, 2009, pp. 161–168. Accessed:
[64] J. Ozga, Fabricating Quality in Education. London, U.K.: Routledge,
Jul. 31, 2019, doi: 10.1142/9789814287517_0016.
2011.
[41] E. Morozov, To Save Everything, Click Here. New York, NY, USA:
[65] V. Chang, Y.-H. Kuo, and M. Ramachandran, ‘‘Cloud computing
PublicAffairs, 2013.
adoption framework: A security framework for business clouds,’’
[42] A. Ostrom, A. L. Ostrom, M. J. Bitner, S. W. Brown, K. A. Burkhard,
Futur. Gener. Comput. Syst., vol. 57, pp. 24–41, Apr. 2016, doi:
M. Goul, V. Smith-Daniels, H. Demirkan, and E. Rabinovich, ‘‘Mov-
10.1016/j.future.2015.09.031.
ing forward and making a difference: Research priorities for the sci-
ence of service,’’ J. Service Res., vol. 13, no. 1, pp. 4–36, 2010, doi: [66] J. Epstein and F. Van Voorhis, ‘‘School counselors,’’ Roles Develop.
10.1177/1094670509357611. Partnerships Families Communities Student Success’ Prof. School
[43] C. Grönroos, ‘‘Value co-creation in service logic: A critical anal- Counseling, vol. 14, no. 1, p. 2156759X1001400, 2010, doi:
ysis,’’ Marketing Theory, vol. 11, no. 3, pp. 279–301, 2011, doi: 10.1177/2156759x1001400102.
10.1177/1470593111408177. [67] M. Lawn and J. Ozga, ‘‘The educational worker? A re-assessment of
[44] B. Edvardsson, B. Tronvoll, and T. Gruber, ‘‘Expanding understand- teachers,’’ in Schools, Teachers and Teaching (RLE Edu N), vol. 45.
ing of service exchange and value co-creation: A social construction Abingdon, U.K.: Routledge Library Editions, 2012.
approach,’’ J. Acad. Marketing Sci., vol. 39, no. 2, pp. 327–339, 2010, [68] V. Chang, R. J. Walters, and G. Wills, ‘‘The development that leads to the
doi: 10.1007/s11747-010-0200-y. cloud computing business framework,’’ Int. J. Inf. Manage., vol. 33, no. 3,
[45] R. Lusch, S. Vargo, and M. Tanniru, ‘‘Service, value networks and learn- pp. 524–538, 2013.
ing,’’ J. Acad. Marketing Sci., vol. 38, no. 1, pp. 19–31, 2009. Accessed: [69] S. Moutsios, ‘‘Power, politics and transnational policy-making in educa-
Jul. 31, 2019, doi: 10.1007/s11747-008-0131-z. tion,’’ Globalisation, Soc. Edu., vol. 8, no. 1, pp. 121–141, 2010, doi:
[46] A. Ordanini, L. Miceli, M. Pizzetti, and A. Parasuraman, ‘‘Crowd- 10.1080/14767720903574124.
funding: Transforming customers into investors through innovative ser- [70] B. Ruben, Quality in Higher Education. 2018. Accessed: Jul. 31, 2019,
vice platforms,’’ J. Service Manage., vol. 22, no. 4, pp. 443–470, 2011, doi: 10.4324/9781351293563.
doi: 10.1108/09564231111155079. [71] K. Lynch, ‘‘Control by numbers: New managerialism and ranking in
[47] A. Dunne and F. Raby, Speculative Everything: Design, Fiction, and higher education,’’ Crit. Stud. Edu., vol. 56, no. 2, pp. 190–207, 2014,
Social Dreaming. Cambridge, MA, USA: MIT Press, 2013. doi: 10.1080/17508487.2014.949811.
[48] A. Bryant, N. Schönemann, and D. Karpa, ‘‘Children and the media: [72] R. Craig, College Disrupted: The Great Unbundling of Higher Education.
A service-learning approach,’’ in Integrating Service-Learning Into the New York, NY, USA: St. Martin’s Press, 2015.
University Classroom. Sudbury, MA, USA: Jones and Bartlett Publishers, [73] P. Kalagiakos and P. Karampelas, ‘‘Cloud computing learning,’’ in Proc.
2011. 5th Int. Conf. Appl. Inf. Commun. Technol. (AICT), pp. 1–4, 2011.
[49] J. V. Nguyen, ‘‘System and method for designing, developing and imple- [74] S. Carvalho and M. de Oliveira Mota, ‘‘The role of trust in creating value
menting Internet service provider architectures,’’ U.S. Patent 9 087 319, and student loyalty in relational exchanges between higher education
Jul. 21, 2015. institutions and their students,’’ J. Marketing Higher Edu., vol. 20, no. 1,
[50] S. Vaidhyanathan, The Googlization of Everything. Berkeley, CA, USA: pp. 145–165, 2010, doi: 10.1080/08841241003788201.
Univ. of California Press, 2012. [75] M. Pinar, P. Trapp, T. Girard, and T. Boyt, ‘‘Utilizing the brand
[51] A. Johnson, A Short Guide to Action Research. Boston, MA, USA: ecosystem framework in designing branding strategies for higher edu-
Pearson/Allyn and Bacon, 2012. cation,’’ Int. J. Educ. Manage., vol. 25, no. 7, pp. 724–739, 2011, doi:
[52] Y. Zheng, X. Xie, and W.-Y. Ma, ‘‘Geolife: A collaborative social net- 10.1108/09513541111172126.
working service among user location and trajectory,’’ IEEE Data Eng.
[76] Y. Liu, L. Wang, X. Wang, X. Xu, and L. Zhang, ‘‘Scheduling in cloud
Bull., vol. 33, no. 2, pp. 32–39, 2010.
manufacturing: State-of-the-art and research challenges,’’ Int. J. Prod.
[53] K. Heinonen, T. Strandvik, K. Mickelsson, B. Edvardsson,
Res., vol. 57, pp. 1–26, Oct. 2018, doi: 10.1080/00207543.2018.1449978.
E. Sundström, and P. Andersson, ‘‘A customer-dominant logic of
[77] X. Wen and X. Zhou, ‘‘Servitization of manufacturing industries based on
service,’’ J. Service Manage., vol. 21, no. 4, pp. 531–548, 2010, doi:
cloud-based business model and the down-to-earth implementary path,’’
10.1108/09564231011066088.
Int. J. Adv. Manuf. Technol., vol. 87, nos. 5–8, pp. 1491–1508, 2014, doi:
[54] L. Johnson, S. A. Becker, and M. Cummins, The NMC Horizon Report:
10.1007/s00170-014-6348-8.
2016 Higher Education Edition. Austin, TX, USA: New Media Consor-
tium, 2016. [78] J. Siderska and K. Jadaan, ‘‘Cloud manufacturing: A service-oriented
[55] B. Farahani, F. Firouzi, V. Chang, M. Badaroglu, N. Constant, and manufacturing paradigm. A review paper,’’ Eng. Manage. Prod. Services,
K. Mankodiya, ‘‘Towards fog-driven IoT eHealth: Promises and chal- vol. 10, no. 1, pp. 22–31, 2018, doi: 10.1515/emj-2018-0002.
lenges of IoT in medicine and healthcare,’’ Future Generat. Comput. [79] X. Yao, J. Zhou, Y. Lin, Y. Li, H. Yu, and Y. Liu, ‘‘Smart manufacturing
Syst., vol. 78, pp. 659–676, Jan. 2018, doi: 10.1016/j.future.2017.04.036. based on cyber-physical systems and beyond,’’ J. Intell. Manuf., vol. 30,
[56] I. Duhn, ‘‘Making ‘place’ for ecological sustainability in early childhood no. 8, pp. 2805–2817, Dec. 2017, doi: 10.1007/s10845-017-1384-5.
education,’’ Environ. Educ. Res., vol. 18, no. 1, pp. 19–29, 2012, doi: [80] F. Lin, K. Sandkuhl, N. Shilov, A. Smirnov, V. Tarasov, and
10.1080/13504622.2011.572162. A. Krizhanovsky, ‘‘Logistics-as-a-service: Ontology-based architecture
[57] L. Anderson, A. L. Ostrom, C. Corus, R. P. Fisk, A. S. Gallan, M. Giraldo, and approach,’’ Investigación Operacional, vol. 34, no. 3, pp. 188–194,
M. Mende, M. Mulder, S. W. Rayburn, M. S. Rosenbaum, K. Shirahada, 2014.
and J. D. Williams, ‘‘Transformative service research: An agenda for [81] J. Jung and H. Kim, ‘‘Deployment of cloud computing in logistics
the future,’’ J. Bus. Res., vol. 66, no. 8, pp. 1203–1210, 2013, doi: industry,’’ J. Digit. Converg., vol. 12, no. 2, pp. 163–171, 2014, doi:
10.1016/j.jbusres.2012.08.013. 10.14400/jdc.2014.12.2.163.
[58] G. Dominici and F. Palumbo, ‘‘How to build an e-learning product: [82] U. Arnold, J. Oberlander, and B. Schwarzbach, ‘‘Advancements in cloud
Factors for student/customer satisfaction,’’ Bus. Horizons, vol. 56, no. 1, computing for logistics,’’ in Proc. Federated Conf. Comput. Sci. Inf. Syst.
pp. 87–96, 2013, doi: 10.1016/j.bushor.2012.09.011. (FedCSIS), 2013, pp. 1055–1062.
[83] F. Tao, Y. Cheng, L. Zhang, and A. Y. C. Nee, ‘‘Advanced manufactur- [105] X. V. Wang and X. Xu, ‘‘An interoperable solution for cloud manufactur-
ing systems: Socialization characteristics and trends,’’ J. Intell. Manuf., ing,’’ Robot. Comput.-Integr. Manuf., vol. 29, no. 4, pp. 232–247, 2013,
vol. 28, no. 5, pp. 1079–1094, 2017, doi: 10.1007/s10845-015-1042-8. doi: 10.1016/j.rcim.2013.01.005.
[84] L. Ren, L. Zhang, F. Tao, C. Zhao, X. Chai, and X. Zhao, ‘‘Cloud [106] R. Gao, L. Wang, R. Teti, D. Dornfeld, S. Kumara, M. Mori, and M. Helu,
manufacturing: From concept to practice,’’ Enterprise Inf. Syst., vol. 9, ‘‘Cloud-enabled prognosis for manufacturing,’’ CIRP Ann., vol. 64, no. 2,
no. 2, pp. 186–209, 2015, doi: 10.1080/17517575.2013.839055. pp. 749–772, 2015, doi: 10.1016/j.cirp.2015.05.011.
[85] L. Ren, L. Zhang, L. Wang, F. Tao, and X. Chai, ‘‘Cloud manufacturing: [107] C. Yang, Q. Huang, Z. Li, K. Liu, and F. Hu, ‘‘Big data and cloud
Key characteristics and applications,’’ Int. J. Comput. Integr. Manuf., computing: Innovation opportunities and challenges,’’ Int. J. Digit. Earth,
vol. 30, no. 6, pp. 501–515, 2017, doi: 10.1080/0951192x.2014.902105. vol. 10, no. 1, pp. 13–53, 2017.
[86] J. R. Huscroft, B. T. Hazen, D. J. Hall, J. B. Skipper, and J. B. Hanna, [108] J. Gao, Y. Yao, V. Zhu, L. Sun, and L. Lin, ‘‘Service-oriented manufac-
‘‘Reverse logistics: Past research, current management issues, and future turing: A new product pattern and manufacturing paradigm,’’ J. Intell.
directions,’’ Int. J. Logistics Manage., vol. 24, no. 3, pp. 304–327, 2013. Manuf., vol. 22, no. 3, pp. 435–446, 2011.
[87] C. Yu, X. Xu, and Y. Lu, ‘‘Computer-integrated manufacturing, [109] L. Xu, E. Xu, and L. Li, ‘‘Industry 4.0: State of the art and future
cyber-physical systems and cloud manufacturing—Concepts and trends,’’ Int. J. Prod. Res., vol. 56, no. 8, pp. 2941–2962, 2018, doi:
relationships,’’ Manuf. Lett., vol. 6, pp. 5–9, Oct. 2015, doi: 10.1080/00207543.2018.1444806.
10.1016/j.mfglet.2015.11.005. [110] Y. Liu and X. Xu, ‘‘Industry 4.0 and cloud manufacturing: A comparative
[88] B. Lüthje, S. Hürtgen, P. Pawlicki, and M. Sproll, From Silicon Valley to analysis,’’ J. Manuf. Sci. Eng., vol. 139, no. 3, p. 034701, 2016, doi:
Shenzhen. Lanham, MD, USA: Rowman & Littlefield Publishers, 2013. 10.1115/1.4034667.
[89] K. Nowicka, ‘‘Smart city logistics on cloud computing model,’’ [111] I. Mezgár and U. Rauschecker, ‘‘The challenge of networked enterprises
Procedia—Social Behav. Sci., vol. 151, pp. 266–281, Oct. 2014, doi: for cloud computing interoperability,’’ Comput. Ind., vol. 65, no. 4,
10.1016/j.sbspro.2014.10.025. pp. 657–674, 2014, doi: 10.1016/j.compind.2014.01.017.
[90] G. Prockl, A. Pflaum, and H. Kotzab, ‘‘3PL factories or lernstatts? [112] O. Givehchi, H. Trsek, and J. Jasperneite, ‘‘Cloud computing for indus-
Value-creation models for 3PL service providers,’’ Int. J. Phys. Dis- trial automation systems—A comprehensive overview,’’ in Proc. 18th
trib. & Logistics Manage., vol. 42, no. 6, pp. 544–561, 2012, doi: IEEE ETFA, Sep. 2013, pp. 1–4.
10.1108/09600031211250587. [113] G. Tassey, ‘‘Competing in advanced manufacturing: The need for
[91] Z. Chu, ‘‘Logistics and economic growth: A panel data approach,’’ Ann. improved growth models and policies,’’ J. Econ. Perspectives, vol. 28,
Regional Sci., vol. 49, no. 1, pp. 87–102, 2011, doi: 10.1007/s00168-010- no. 1, pp. 27–48, 2014, doi: 10.1257/jep.28.1.27.
0434-0. [114] G. Adamson, L. Wang, M. Holm, and P. Moore, ‘‘Cloud manufacturing—
[92] D. Collado-Ruiz and H. Ostad-Ahmad-Ghorabi, ‘‘Fuon theory: A critical review of recent development and future trends,’’ Int. J. Com-
Standardizing functional units for product design,’’ Resour., put. Integr. Manuf., pp. 347-380, 2017. Accessed: Jul. 31, 2019, doi:
Conservation Recycling, vol. 54, no. 10, pp. 683–691, 2010, doi: 10.1080/0951192x.2015.1031704.
10.1016/j.resconrec.2009.11.009. [115] Q. Qi and F. Tao, ‘‘Digital twin and big data towards smart manufac-
[93] M. Klumpp, U. Clausen, and M. ten Hompel, Logistics Research and the turing and industry 4.0: 360 degree comparison,’’ IEEE Access, vol. 6,
Logistics World of 2050. Berlin, Germany: Springer, 2013, pp. 1–6. pp. 3585–3593, 2018, doi: 10.1109/access.2018.2793265.
[94] T. Tolio, A. Bernard, M. Colledani, S. Kara, G. Seliger, J. Duflou, [116] M. Bohanec and V. Rajkovic, ‘‘Knowledge acquisition and explanation
O. Battaia, and S. Takata, ‘‘Design, management and control of deman- for multi-attribute decision making,’’ in Proc. 8th Int. Workshop Expert
ufacturing and remanufacturing systems,’’ CIRP Ann., vol. 66, no. 2, Syst. Appl., 1988, pp. 59–78.
pp. 585–609, 2017, doi: 10.1016/j.cirp.2017.05.001. [117] D. Dua and C. Graff. (2019). Archive.ICS.UCI.Edu. Accessed:
[95] L. Ren, L. Zhang, C. Zhao, and X. Chai, ‘‘Cloud manufacturing platform: Oct. 28, 2019. [Online]. Available: http://archive.ics.uci.edu/ml
Operating paradigm, functional requirements, and architecture design,’’ [118] Y. Yang, W. Jin, and X. Hao, ‘‘Car rental logistics problem: A review
Sustain. Manuf., pp. 501–515, Apr. 2013. Accessed: Jul. 31, 2019, doi: of literature,’’ in Proc. IEEE Int. Conf. Service Oper. Logistics, Inform.
10.1115/msec2013-1185. (IEEE/SOLI), vol. 2, Oct. 2008, pp. 2815–2819.
[96] J. A. Vohr, ‘‘Haiti disaster relief: Logistics is the operation,’’ Military Rev.,
vol. 91, no. 4, pp. 76–82, 2011.
[97] S. Strzelczak, ‘‘Ontology aided manufacturing and logistics,’’ in Open
Knowledge Driven Manufacturing and Logistics—The eScop Approach.
Warsaw, Poland: OWPW, 2015, pp. 111–213.
[98] Y. Wang, S. Ma, and L. Ren, ‘‘A security framework for cloud manufac-
turing,’’ in Proc. ASME Int. Manuf. Sci. Eng. Conf., Detroit, MI, USA,
Jun. 2014, doi: 10.1115/MSEC2014-4082.
[99] F. Tao, L. Zhang, V. C. Venkatesh, Y. Luo, and Y. Cheng, ‘‘Cloud man-
ufacturing: A computing and service-oriented manufacturing model,’’
Proc. Inst. Mech. Eng. B-J. Eng. Manuf., vol. 225, no. 10, pp. 1969–1976,
2011.
[100] F. Tao, Y. Cheng, L. D. Xu, L. Zhang, and B. H. Li, ‘‘CCIoT-
CMfg: Cloud computing and Internet of Things-based cloud manu-
facturing service system,’’ IEEE Trans. Ind. Informat., vol. 10, no. 2,
pp. 1435–1442, May 2014.
[101] D. Wu, M. Greer, D. Rosen, and D. Schaefer, ‘‘Cloud manufacturing: YU-HSIN HUNG received the Ph.D. degree from
Strategic vision and state-of-the-art,’’ J. Manuf. Syst., vol. 32, no. 4, the Department of Engineering Science and Ocean
pp. 564–579, 2013, doi: 10.1016/j.jmsy.2013.04.008. Engineering, National Taiwan University, in 2017.
[102] L. Zhang, Y. Luo, F. Tao, B. H. Li, L. Ren, X. Zhang, H. Guo,
She was a member of the Intelligent Computing
Y. Cheng, A. Hu, and Y. Liu, ‘‘Cloud manufacturing: A new manufac-
and Network Laboratory. She has 5 years work-
turing paradigm,’’ Enterprise Inf. Syst., vol. 8, no. 2, pp. 167–187, 2012.
Accessed: Oct. 28, 2019, doi: 10.1080/17517575.2012.683812. ing experience in the IT industry. In 2018, she
[103] F. Nordin and C. Kowalkowski, ‘‘Solutions offerings: A critical review joins the Department of Industrial Engineering and
and reconceptualisation,’’ J. Service Manage., vol. 21, no. 4, pp. 441–459, Management, National Yunlin University of Sci-
2010, doi: 10.1108/09564231011066105. ence and Technology. She has published more than
[104] F. Tao, Y. J. LaiLi, L. D. Xu, and L. Zhang, ‘‘FC-PACO-RM: A parallel 20 original articles in international conferences
method for service composition optimal-selection in cloud manufacturing and journals. Her current research interests include the Internet of Thing
system,’’ IEEE Trans. Ind. Informat., vol. 9, no. 4, pp. 2023–2033, (IoT), mobile application design, artificial intelligence, and web technology.
Nov. 2013, doi: 10.1109/TII.2012.2232936.