Cloud Computing and Its Security in Real applications
Main Article Content
Abstract
Cloud computing is one of the revolutionary technology that offers efficient means to remotely access and store data in different locations through the internet network. Cloud computing provides a shared pool of computing resources such as storage devices, servers and network. All these resources can provision and released with minimal management efforts or service provider interactions. Cloud computing is a framework that allows users to access computing resources over the internet instead of using all computers facilities that are available locally on site. The purpose of this paper is to come up with the new knowledge related to the wide range of architectural configurations, (memories management, number of processors, and nodes), relevant new trends of storing, processing and accessing remote data. Cloud computing is especially powerful for businesses. This paper has been including cloud computing benefits in addition to the challenges with their impacts on information technology that may happen in the future. Despite the challenges there are good benefits related to the saving, scalability and high performance of cloud over the internet. The providers have the responsibilities to ensure the confidentiality and security of the customers’ data in addition to the security measure that have been taken by the customers themselves. Cloud computing may face the same security problems for the net work. All these matters have explained in details in this paper.
Article Details

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
Licensed under a CC-BY license: https://creativecommons.org/licenses/by-nc-sa/4.0/
How to Cite
References
R. Islam et al., ‘The Future of Cloud Computing: Benefits and Challenges’, Int. J. Commun. Netw. Syst. Sci., vol. 16, no. 4, pp. 53–65, 2023.
J. Ahola, ‘Cloud monitoring: cloud monitoring with dynatrace’, 2022.
M. Sharma, R. Gupta, and P. Acharya, ‘Analysing the adoption of cloud computing service: A systematic literature review’, Glob. Knowledge, Mem. Commun., vol. 70, no. 1/2, pp. 114–153, 2021.
M. U. Saleem et al., ‘Integrating smart energy management system with internet of things and cloud computing for efficient demand side management in smart grids’, Energies, vol. 16, no. 12, p. 4835, 2023.
V. A. Thiviyanathan, H. R. Lim, P. E. Tham, and P. L. Show, ‘How far has the development for industrial Internet of Things (IoT) in microalgae?’, in Microalgae for Environmental Biotechnology, CRC Press, 2022, pp. 145–174.
B. Benmammar and A. Amraoui, ‘Artificial Intelligence Application to Cognitive Radio Networks’, Intell. Netw. Manag. Control Intell. Secur. Multi‐criteria Optim. Cloud Comput. Internet Veh. Intell. Radio, pp. 217–243, 2021.
D. Nikhil, B. Dhanalaxmi, and K. S. Reddy, ‘The evolution of cloud computing and its contribution with big data analytics’, in Innovative Data Communication Technologies and Application: ICIDCA 2019, 2020, pp. 332–341.
H. Tschopp, ‘Future Trends in Finance, Software, and Technology’, 2023.
R. Sivan and Z. A. Zukarnain, ‘Security and privacy in cloud-based e-health system’, Symmetry (Basel)., vol. 13, no. 5, p. 742, 2021.
F. P. Appio, F. Frattini, A. M. Petruzzelli, and P. Neirotti, ‘Digital transformation and innovation management: A synthesis of existing research and an agenda for future studies’, J. Prod. Innov. Manag., vol. 38, no. 1, pp. 4–20, 2021.
X. Jin, W. Hua, Z. Wang, and Y. Chen, ‘A survey of research on computation offloading in mobile cloud computing’, Wirel. Networks, vol. 28, no. 4, pp. 1563–1585, 2022.
T. Wang, Y. Liang, X. Shen, X. Zheng, A. Mahmood, and Q. Z. Sheng, ‘Edge Computing and Sensor-Cloud: Overview, Solutions, and Directions’, ACM Comput. Surv., 2023.
S. H. Murad and K. H. Rahouma, ‘Implementation and performance analysis of hybrid cryptographic schemes applied in cloud computing environment’, Procedia Comput. Sci., vol. 194, pp. 165–172, 2021.
A. Katal, S. Dahiya, and T. Choudhury, ‘Energy efficiency in cloud computing data centers: a survey on software technologies’, Cluster Comput., vol. 26, no. 3, pp. 1845–1875, 2023.
F. K. Parast, C. Sindhav, S. Nikam, H. I. Yekta, K. B. Kent, and S. Hakak, ‘Cloud computing security: A survey of service-based models’, Comput. Secur., vol. 114, p. 102580, 2022.
H. Tabrizchi and M. Kuchaki Rafsanjani, ‘A survey on security challenges in cloud computing: issues, threats, and solutions’, J. Supercomput., vol. 76, no. 12, pp. 9493–9532, 2020.
M. J. Khan et al., ‘Identifying Challenges for Clients in Adopting Sustainable Public Cloud Computing’, Sustainability, vol. 14, no. 16, p. 9809, 2022.
Y. Zhang, R. H. Deng, S. Xu, J. Sun, Q. Li, and D. Zheng, ‘Attribute-based encryption for cloud computing access control: A survey’, ACM Comput. Surv., vol. 53, no. 4, pp. 1–41, 2020.
M. Sharma, R. Kumar, and A. Jain, ‘Load balancing in cloud computing environment: A broad perspective’, in Intelligent Data Communication Technologies and Internet of Things: Proceedings of ICICI 2020, 2021, pp. 535–551.