| 5G | The Next (5th) Generation |
| ACID | Atomicity, Consistency, Isolation, Durability |
| ACL | Access Control List |
| AI | Artificial Intelligence |
| AIIOT | Artificial Intelligence and Internet of Things |
| AKS | Azure Kubernetes Service |
| ALB | Adaptive Load Balancing |
| AMQP | Advanced Message Queuing Protocol |
| ANSI | American National Standards Institute |
| API | Application Programming Interface |
| ARP | Address Resolution Protocol |
| ARPA | Advanced Research Projects Agency |
| AS | Autonomous System |
| ATL | Atlas Transformation Language |
| AWS | Amazon Web Services |
| BGP | Border Gateway Protocol |
| BSM | Business Service Management |
| BSP | Business Service Provider |
| BSON | Binary JSON |
| CAA | Cloud Application Architecture |
| CAM | Content Addressable Memory |
| CAP | Consistency, Availability, and Partition |
| CapEx | Capital Expenditure |
| CC | Cluster Controller |
| CDP | Continuous Data Protection |
| CDS | Content Delivery Servers |
| CCE | Cloud Computing Environment |
| CERN | European Organization for Nuclear Research |
| CFI | Control Flow Integrity |
| CIDR | Classless Inter-Domain Routing |
| CIS | Cloud Information Service |
| CLC | Cloud Controller |
| CMR | Customer Relationship Management |
| CODINE | Computing in Distributed Networked Environments |
| COI | Community of Interest |
| CPA | Cloud Platform Architecture |
| CPU | Central Processing Unit |
| CSA | Cloud Protection Alliance |
| CSLB | Central Scheduler Load Balancing |
| CSP | Cloud Service Provider |
| DAM | Database Activity Monitoring |
| DaaS | Database as a Service |
| DBMS | Database Management System |
| DCE | Data Center Efficiency |
| DC | Distributed Computing |
| DDoS | Distributed Denial of Service |
| DoS | Denial of Service |
| DHCP | Dynamic Host Configuration Protocol |
| DLP | Data Loss Prevention |
| DNS | Domain Name Server |
| DNSSEC | Domain Name System Security Extensions |
| DPM | Distributed Power Management |
| DRS | Distributed Resource Scheduler |
| DSM | Distributed Shared Memory |
| DVFS | Dynamic Frequency Voltage Scaling |
| ECMP | Equal-Cost Multi-Path |
| EC2 | Elastic Compute Cloud |
| ECN | Explicit Congestion Notification |
| EPPKS | Efficient Privacy Preserving Keyword Search Scheme |
| FAM | File Activity Monitoring |
| FGBI | Fine-Grained Block Identification |
| FCAPS | Fault, Configuration, Account, Performance, Security |
| FC | Fiber Channel |
| FC-SAN | FC-Based Storage Area Networks |
| GA | Genetic Algorithm |
| GAE | Google App Engine |
| GVMI | Generic Virtual Machine Image |
| GOC | Green Open Cloud |
| GPS | Global Positioning System |
| GPLv2 | General Public License |
| GUI | Graphical User Interface |
| HA | Homomorphic Authenticator |
| HDFS | Hadoop Distributed File System |
| HMAC | Hash Message Authentication Code |
| HIPS | Host Intrusion Prevention System |
| HME | Hypervisor Monitoring Environment |
| HPC | Hardware Performance Computing |
| HTTP | Hypertext Transfer Protocol |
| HVM | Hardware-Assisted Virtual Machine |
| IaaS | Infrastructure as a Service |
| IDC | international Information Enterprise |
| IDS | Intrusion Detection System |
| IDS/IPS | Intrusion Detection System/Intrusion Prevention System |
| IMA | Integrity Management Architecture |
| IoT | Internet of Things |
| IP | Internet Protocol |
| IPsec | IP-Level Security |
| IPS | Intrusion Prevention System |
| IRM | In-Lined Reference Monitors |
| ISA | Instruction Set Architecture |
| IT | Information Technology |
| I/O | Input/Output |
| JSON | JavaScript Object Notation |
| KVM | Kernel-Based Virtual Machine |
| KBA | Knowledge-Based Answers/Questions |
| LAN | Local Area Network |
| LGPL | Lesser General Public License |
| LLFC | Link Layer Flow Control |
| LLM | Lightweight Live Migration |
| LVM | Logical Volume Manager |
| LVMM | Live Virtual Machine Migration |
| MaaS | Model as a Service |
| MAC | Media Access Control |
| MCC | Mobile Cloud Computing |
| MFA | Multi-Factor Authentication |
| MiTM | Man-in-the-Middle Attack |
| MP | Microprocessor |
| MPI | Message Passing Interface |
| MPLS | Multi-Protocol Label Switching |
| MSN | Mobile Social Networking |
| MVCC | Multi-Version Concurrency Control |
| NAS | Network-Attached Storage |
| NAC | Network Access Control |
| NC | Node Controller |
| NFS | Network File Server |
| NSF | National Science Foundation |
| NSFC | National Natural Science Foundation of China |
| NIPS | Network Intrusion Prevention System |
| NIC | Network Interface Controller |
| NoSQL | Not-only-SQL |
| NOW | Networks of Workstations |
| NICs | Network Interface Cards |
| NRDC | Natural Resources Defense Council |
| OCR | Optical Character Recognition |
| OLTP | Online Transaction Processing |
| ONF | Open Networking Foundation |
| OS | Operating System |
| OSG | Object Storage Gateway |
| OSP | Object Storage Provider |
| OVS | Open vSwitch |
| P2P | Peer-to-Peer |
| PaaS | Platform as a Service |
| PAP | Policy Access Points |
| PC | Personal Computer |
| PCB | Process Control Block |
| PDT | Performance Degradation Time |
| PDP | Policy Decision Points |
| PEP | Policy Enforcement Points |
| PKI | Public Key Infrastructure |
| PMC | Performance Monitoring Counters |
| POR | Proof of Retrievability |
| POC | Proof of Concept |
| PPW | Performance Per Watt |
| PUE | Power Usage Effectiveness |
| PVM | Parallel Virtual Machine |
| PV | Public Verifiability |
| QoS | Quality of Service |
| RaaS | Resources as a Service |
| RBAC | Role-Based Access Control |
| RDBMS | Relationship Database Management System |
| RDPC | Remote Data Processing Scheme |
| RDS | Relational Database System |
| RED | Random Early Detection |
| RLE | Run-Length Encoding |
| RPC | Remote Procedure Call Protocol |
| RPM | Red Hat Package Manager |
| RSA | Rivest–Shamir–Adleman |
| RTT | Round-Trip Time |
| S3 | Simple Storage Service |
| SAN | Storage Area Network |
| SaaS | Software as a Service |
| SAML | Security Assertion Markup Language |
| SC | Storage Controller |
| SDN | Software-Defined Networks |
| SECaaS | Security as a Service |
| SEaaS | Sensor Event as a Service |
| SFI | Software Fault Isolation |
| SIEM | Security Information and Event Management |
| SLA | Service-Level Agreements |
| SMC | Secure Multi-Party Computation |
| SME | Small Medium Enterprise |
| SMP | Symmetric Multi-Processing |
| SOAP | Simple Object Access Protocol |
| SOA | Service-Oriented Architecture |
| SPT | Shadow Page Table |
| SQL | Structured Query Language |
| SSC | SQL Server Compact |
| SSH | Password-Based Auth |
| SSI | Single System Image |
| STP | Spanning Tree Protocol |
| TCSEC | Trusted Computer System Evaluation Criteria |
| TDS | Tabular Data Stream |
| TPA | Third-Party Auditor |
| TPAS | Third-Party Auditing Service |
| TPM | Trusted Platform Module |
| TTP | Trusted Third Party |
| TCG | Trusted Computing Group |
| TCP/IP | Transmission Control Protocol/Internet Protocol |
| UDB | User Database |
| UFS | User-Facing Service |
| VDCs | Virtual Data Centers |
| VDI | Virtual Desktop Infrastructure |
| VEE | Virtual Environment Extension |
| VLAN | Virtual Local Area Network |
| VLB | Valiant Load Balancing |
| VM | Virtual Machine |
| VMLM | Virtual Machine Live Migration |
| VMM | Virtual Machine Migration |
| VO | Virtual Organization |
| VPC | Virtual Predict Checkpointing |
| VPN | Virtual Private Network |
| WaaS | Workflow as a Service |
| WAN | Wide Area Network |
| WSN | Wireless Sensor Network |
| WWS | Writable Working Set |
| WWW | World Wide Web |
| XSS | Cross-Site Scripting |
| XML | Extensible Markup Language |
| YARN | Yet Another Resource Negotiator |