Implementation and Challenges in Cloud Computing
Keywords:
Cloud Computing; Communication; Information Technology, ImplementationAbstract
Cloud computing, an emerging field in Information Technology (IT), resides at the crossroads of three principal trends: standardization, virtualization, and the service-oriented approach to IT, leveraging the internet as its primary medium. Acting as a key platform for distributing resources such as infrastructure, software, business processes, applications, and hardware, cloud computing simplifies usage. Users or developers can now benefit from these services, even without specific knowledge, expertise, or control over the underlying technology infrastructure. Fundamentally, cloud computing embraces a blend of Software as a Service (SaaS), Infrastructure as a Service (IaaS), and Platform as a Service (PaaS). The focus of this review is to analyze the scientific literature on cloud computing. In this study thoroughly researched more than dozens of papers and find the core challenges.
References
K. I. Taher, R. H. Saeed, R. K. Ibrahim, Z. N. Rashid, L. M. Haji, N. Omar, and H. I. Dino, “Efficiency of semantic web implementation on cloud computing: A review,” Qubahan Academic Journal, vol. 1, no. 3, pp. 1-9, 2021.
Z. S. Ageed, R. K. Ibrahim, and M. A. Sadeeq, “Unified ontology implementation of cloud computing for distributed systems,” Current Journal of Applied Science and Technology, vol. 39, no. 34, pp. 82-97, 2020.
M. A Vouk, “Cloud computing–issues, research and implementations,” Journal of computing and information technology, vol. 16, no. 4, pp. 235-246, 2008.
M. Mamun-Ibn-Abdullah and M. H. Kabir, “A multilayer security framework for cloud computing in Internet of Things (IoT) domain,” Journal of Computer and Communications, vol. 9, no. 07, pp. 31-42, 2021.
B. Peng, B. Cui, and X. Li, “Implementation issues of a cloud computing platform,” IEEE Data Eng. Bull., vol. 32, no. 1, pp. 59-66, 2009.
T. Ahmad, M. A. Haque, K. Al-Nafjan, and A. A. Ansari, “Development of cloud computing and security issues,” In Information and Knowledge Management, vol. 3, no. 1, 2013.
Peng, J., Zhang, X., Lei, Z., Zhang, B., Zhang, W., & Li, Q. (2009, December). Comparison of several cloud computing platforms. In 2009 Second international symposium on information science and engineering (pp. 23-27). IEEE.
K. Munir and S. Palaniappan, “Secure cloud architecture,” Advanced Computing, vol. 4, no. 1, pp. 9, 2013.
Birk, D., & Wegener, C. (2011, May). Technical issues of forensic investigations in cloud computing environments. In 2011 Sixth IEEE international workshop on systematic approaches to digital forensic engineering (pp. 1-10). IEEE.
J. Peng, X. Zhang, Z. Lei, B. Zhang, W. Zhang, and Q. Li, “Comparison of several cloud computing platforms,” In 2009 Second international symposium on information science and engineering (pp. 23-27). IEEE, 2009.
H. C. Lim, S. Babu, J. S. Chase, and S. S. Parekh, “Automated control in cloud computing: challenges and opportunities,” In Proceedings of the 1st workshop on Automated control for datacenters and clouds (pp. 13-18), 2009.
M. Sayed, S. A. Wadho, U. Shaikh, A. Bhutto, A. A. Shah, and F. B. Shaikh, “Quality of Service Challenges in Cloud Computing,” Journal of Information & Communication Technology (JICT), vol. 15, no. 2, 2012.
H. C. Lim, S. Babu, J. S. Chase, and S. S. Parekh, “Automated control in cloud computing: challenges and opportunities,” In Proceedings of the 1st workshop on Automated control for datacenters and clouds (pp. 13-18), 2009.
D. Birk and C. Wegener, “Technical issues of forensic investigations in cloud computing environments,” In 2011 Sixth IEEE international workshop on systematic approaches to digital forensic engineering (pp. 1-10). IEEE, 2011.
L. S. Nishad, J. Paliwal, R. Pandey, S. Beniwal, and S. Kumar, “Security, privacy issues and challenges in cloud computing: A survey,” In Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies (pp. 1-7), 2016.
S. Zhang, S. Zhang, X. Chen, and X. Huo, Cloud computing research and development trend,” In 2010 Second international conference on future networks (pp. 93-97). IEEE, 2010.
L. R. Rewatkar and U. L. Lanjewar, “Implementation of cloud computing on web application,” International Journal of Computer Applications, vol. 2, no. 8, 28-32, 2010.
T. J. Jeyaprabha and G. Sumathi, “Security Enhancements at Distributed Data Centers Using Turbo Codes,” Compusoft Journal, Special Issue, 2016.
Sharma, D. K., Chakravarthi, D. S., Shaikh, A. A., Ahmed, A. A. A., Jaiswal, S., & Naved, M. (2023). The aspect of vast data management problem in healthcare sector and implementation of cloud computing technique. Materials Today: Proceedings, 80, 3805-3810.
C. A. Lee, “A perspective on scientific cloud computing,” In Proceedings of the 19th ACM International Symposium on High Performance Distributed Computing (pp. 451-459), 2010.
R. G. Lennon, L. A. Skår, M. Udnæs, A. J. Berre, A. Zeid, D. Roman, ..., and W. J. van den Heuvel, “Best practices in cloud computing: designing for the cloud,”. In Proceedings of the 24th ACM SIGPLAN conference companion on Object oriented programming systems languages and applications (pp. 775-776), 2009.
A. Guazzelli, K. Stathatos, and M. Zeller, “Efficient deployment of predictive analytics through open standards and cloud computing. ACM SIGKDD Explorations Newsletter”, vol. 11, no. 1, pp. 32-38, 2009.
J. Du, W. Wei, X. Gu, and T. Yu, “RunTest: Assuring integrity of dataflow processing in cloud computing infrastructures”, In Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security (pp. 293-304), 2010.
B. Di Martino, G. Cretella, and A. Esposito, “Towards a unified owl ontology of cloud vendors' appliances and services at paas and saas level,”. In 2014 Eighth International Conference on Complex, Intelligent and Software Intensive Systems (pp. 570-575). IEEE, 2014.
S. A. Wadho, A. Yichiet, M. L. Gan, L. C. Kang, R. Akbar and R. Kumar, "Emerging Ransomware Attacks: Improvement and Remedies - A Systematic Literature Review," 2023 4th International Conference on Artificial Intelligence and Data Sciences (AiDAS), IPOH, Malaysia, 2023, pp. 148-153, doi: 10.1109/AiDAS60501.2023.10284647.
P. Bellini, D. Cenni, and P. Nesi, “Smart cloud engine and solution based on knowledge base,” Procedia Computer Science, 2015. 68: pp. 3-16, 2014.
T. S. Somasundaram, K. Govindarajan, U. Kiruthika, and R. Buyya, “Semantic-enabled CARE Resource Broker (SeCRB) for managing grid and cloud environment,” The Journal of Supercomputing, vol. 68, pp. 509-556, 2014.
H. Brabra, A. Mtibaa, L. Sliman, W. Gaaloul, and F. Gargouri, “Semantic web technologies in cloud computing: a systematic literature review,” In 2016 IEEE International Conference on Services Computing (SCC) (pp. 744-751). IEEE, 2016.
R. Das, and M. M. Inuwa, “A review on fog computing: issues, characteristics, challenges, and potential applications,” Telematics and Informatics Reports, pp. 100049, 2023.
Sayed, M., Wadho, S. A., Shaikh, U., Bhutto, A., Shah, A. A., & Shaikh, F. B. (2021). Quality of Service Challenges in Cloud Computing. Journal of Information & Communication Technology (JICT), 15(2).
N. K. Pandey, K. Kumar, G. Saini, and A. K. Mishra, “Security issues and challenges in cloud of things-based applications for industrial automation,” Annals of Operations Research, pp. 1-20, 2023.
M. Yenugula, S. Sahoo, and S. Goswami, “Cloud computing in supply chain management: Exploring the relationship,” Management Science Letters, vol. 13, no. 3, pp. 193-210, 2023.
Downloads
Published
Issue
Section
License
Copyright (c) 2023 ILMA University
This work is licensed under a Creative Commons Attribution 4.0 International License.