New trends and innovative methods in cloud computing and big dataWith the rapid development of network technology in recent years, more and more innovative computing models and related applications appear, such as mobile device based cloud computing, social network, intelligent manufacturing and e-business, et al. Under these situations, massive data will be generated, stored and processed under various circumstances and different requirement. 1 In order to effectively store and analyze the big data based on cloud computing architecture to realize intelligent network-based applications, the new methodologies and technologies for both cloud computing and big data need to be proposed and developed. • Cloud storage system design and implementation,• Mobile cloud computing security and privacy protection,• Big data analysis and processing technique, and• Big data analysis applications.The secure data access and access performance are two important concerns in the management and storage of large-scale data in enterprises.However, current solutions have the following drawbacks: (1) do not support fine-grained access control and cannot meet the strict secure data access requirements of enterprises, and (2) suffer from the unpredictable access latency. To solve these drawbacks, Dong et al 2 propose an enterprise-oriented cloud storage system, called Frostor, which addresses the secure data access issue through a user account and IP-based fine-grained access control mechanism, and guarantees the access performance via a two-level performance optimization mechanism.With the prevalence of smartphones, the number of Android malware shows explosive growth. As malicious apps may steal users 0 sensitive data and even money from mobile and bank accounts, it is important to detect potential malicious behaviors so as to block them. To achieve this goal, Yang et al 3 propose a dynamic behavior inspection and analysis framework for malicious behavior detection. An automated app behavior inspection platform is developed to install and inspect massive samples so as to collect apps 0 dynamic behavior Q3 records. Then these records are exploited to train a string subsequence kernel-based SVM model to classify benign and malicious behaviors.In the field of machine learning, feature extraction is one of the most important preprocessing in data classification for its effectiveness, and now it has attracted much extensive attention for large-scale data stream preprocessing step, especially in the era of Big Data. Motivated by the advantages of unsupervised and supervised feature extraction, which are two desirable and promising characteristics for dimension reduction, Tan et al 4 propose a new Semi-Supervised Local Preserving Embedding Algorithm based on Maximum Margin Criterion (SLPE/MMC). The proposed algorithm has effectively taken advantage of sample 0 s supervised information, and keeps the geometry structure and the class discrimination information of the manifold.Recent advances of recommender systems have proven that social relatio...