PreprintPDF Available
Preprints and early-stage research may not have been peer reviewed yet.

Abstract

Cloud computing is a key technological development in the information technology industry. It is one of the best techniques for managing and allocating a lot of information and resources across the entire internet. Technically speaking, cloud computing refers to accessing IT infrastructure through a computer network without having to install anything on your personal computer. Businesses can modify their resource levels to match their operational needs by utilizing cloud computing. Organizations and corporations can cut infrastructural costs with the use of cloud computing. Organizations can test their applications more quickly, with better management, and with less upkeep. The IT team can adapt resources to changing and erratic requirements thanks to cloud computing. There is proof that cloud computing has a role in everyday life thanks to various applications in various contexts. This essay will cover every aspect of cloud computing, including its architecture, traits, types, service models, advantages, and challenges.
A RESEARCH ON CLOUD COMPUTING
Benneth Chukwuemeka Uzoma
Information Technology
Bournemouth University
Poole, Dorset
s5431929@bournemouth.ac.uk
Isokpehi Bonaventure Okhuoya
Information Technology
Bournemouth University
Poole, Dorset
s5439977@bournemouth.ac.uk
Abstract Cloud computing is a key technological
development in the information technology industry. It
is one of the best techniques for managing and
allocating a lot of information and resources across the
entire internet. Technically speaking, cloud computing
refers to accessing IT infrastructure through a
computer network without having to install anything
on your personal computer. Businesses can modify
their resource levels to match their operational needs
by utilizing cloud computing. Organizations and
corporations can cut infrastructural costs with the use
of cloud computing. Organizations can test their
applications more quickly, with better management,
and with less upkeep. The IT team can adapt resources
to changing and erratic requirements thanks to cloud
computing. There is proof that cloud computing has a
role in everyday life thanks to various applications in
various contexts. This essay will cover every aspect of
cloud computing, including its architecture, traits,
types, service models, advantages, and challenges.
Keywords Cloud computing, Architecture,
characteristics, Types, Service model, Benefits and
Challenges
I. INTRODUCTION
The development of cloud computing has significantly
changed how the IT sector functions today. Cloud
computing makes it possible to investigate better IT
services with lower expenses and less investment. The
popularity of software as a service has increased
because of cloud computing's impact on how IT
hardware is developed and procured. It is an internet-
based technology that gives users access to server-
stored data as a service whenever they want.
Customers only pay for the service they use because it
is a pay-as-you-go service. Cloud computing is as a
computing model in which massively scalable IT-
enabled capabilities are offered as a service to
numerous customers. It is the use of internet-based
computer technology for a variety of services (as
storage capacity, processing power, business
applications, or components). [1]. It is a set of
network-enabled services that offer scalable,
guaranteed, typically customized, relatively affordable
services in an easy-to-use manner. [2]. Cloud
computing is defined as a computing approach in
which enormously scalable IT-related capabilities are
delivered as a service through the internet to various
external consumers.[3]. This is an information
technology service paradigm in which hardware and
software are given to consumers on demand across a
network without the use of a device or location. [4].
The National Institute of Standards and Technology
defines cloud computing as a model for allowing
ubiquitous, convenient, a shared pool of customized
computing resources, and services that can be swiftly
supplied and deployed with minimum administrative
work or service contact. [5].Cloud computing are of
four types namely private cloud, public cloud,
community cloud, and hybrid cloud.. There are three
popular service models in cloud computing.They are
as follows:.. Platform as a service, infrastructure as a
service, and software as a service .These are all
examples of cloud computing..There are some
challenges to be considered in choosing a solution,
they also present tremendous chances with significant
rewards. This research will present an overview of
cloud computing architecture, features, and service
models, as well as discuss their advantages and
challenges.
II. HISTORY, LITERATURE REVIEW AND
METHODOLOGY ON CLOUD COMPUTING
A. History of cloud computing
Cloud computing was developed by John McCarthy in
1960.. "The use of computers,as a subject of research
may be arranged as a public utility
eventually."According to Parkhill in The computer
utility challenges [6]. The name "Cloud" computing
was introduced in telecommunication industry as a
virtual private network. .There was wastage of
Bandwidth using point-point data lines.Network
utilization was balanced using virtual private network..
Servers and network infrastructure are now included.
Cloud computing has been widely used by industry
participants. Amazon introduced Amazon web services
and this has been of great help to their business..
Furthermore, Google and IBM have both launched
cloud computing research. Eucalyptus was the first
open-source platform for private cloud deployment.
B. Literature review on cloud computing
Cloud computing, also known as the internet, was first
proposed by American Psychologist and Computer
scientist Lickliter J.C in 1960 with the aim of
connecting information, data, and people together
globally. As the years go on, the evolution of cloud
computing started around 2006 when Amazon
introduced “Amazon web services (AWS)” as an
elastic cloud computing. In 2008, Google introduced
the “Beta” version of search engine. In 2012, Oracle
rolled out Oracle cloud computing. Since the
Introduction of cloud computing by many
organizations, literature on the application,
significance and management of cloud computing have
been published over the years. For instance, [7]
focused on the adoption of internet computing in the
information technology industry in some developing
countries. The study focused on how the major
information management industry in Pakistan used a
constructive questionnaire to gather information about
the employees via email to validate the prototype). [8]
recommended that, to encourage better performance to
increase the effectiveness and enhancement of data
storage, the network providers must perform some new
tasks to increase the storage capacity of online data.
[9] evaluated how much larger memory space was
available in 2018 by using cloud housed 5347EB to
save data. This spacious memory allowed
organizations to store, examine, and acquire valuable
data on customers' information, interests, and
reactions. [10] proposed an internet computing device
that allows small companies to save and distribute
data. In recent years, there has been an upsurge in how
hackers have breached cloud computing security by
targeting computers to steal valuable data and damage
data stored using ransomware. [11] Emphasizing the
high-security level of cloud computing firms. Hackers
have acquired substantial smoothness in their exertion;
this has compelled organizations to spend quality time
and effort to develop an approach to keep data safe and
detect malware. These continuous attacks alert security
experts to enlarge their security and response time. [8]
To carry out this, firms must hire security experts who
are ready to keep data safe and sensitive information
away from hackers.
Likewise, the research conducted by [12] estimated the
use of the 5G network launched by the internet service
provider to increase the quality of services on the
internet. The launching of the 5G network in 2019
with a better speed for customers to access and load
customers information faster than the previous
networks, also enabling people and organizations to
send and receive information in real-time.
Furthermore, due to the widespread availability and
improvement of smartphones, mobile cloud computing
must be managed in terms of supporting apps and
processing capacity. According to [13], mobile cloud
computing is the combination of mobile and cloud
computing to provide mobile devices with processing
power, memory, and storage (2013). On the other
hand, [14] referred to mobile cloud computing in
another study as mobile cloud computing. [13] focused
on its applications, security, and uniform standard that
can improve the hardware and battery life of mobile
devices. [15] highlighted the importance of mobile
cloud computing on social network services like video
generation, gaming, and image management. This
study pointed at two mobile cloud computing models-
(2009), and the importance of intelligent access
strategies was accentuated by [16] in their journal on
cloud computing in bank industry, it was found that,
financial institutions are embracing new technologies
to gain a competitive advantage in the banking
industry and about 41% of the total 391 sampled
commercial banks and other financial institutions have
incorporated cloud computing and others have clearly
stated and developed plans to do so. The study pointed
out how cloud computing can interact with the newly
spring-up technologies to ensure mutual advantage,
increase cost benefits, control operational risks
involved in the integration of cloud computing with
bank sector activities, and maximize profit efficiency
which was done by the launching of "internet plus"
introduced by the government of China to conduct a
research on the largest banking system, the Chinese
banking sector in November 2012, in which cloud
computing played a crucial role as a part of national
strategies. Another related research conducted on the
dynamic workflow scheduling algorithm in cloud
computing was researched by [18] The study focused
on the use of cloud computing resources to perform
workflow tasks, the study designed a problem
scheduling dynamic workflow as a dynamic multi-
objective optimization problem (DMOP), the source of
dynamism is both resource failure and the possibility
of modifying the number of objectives during the
period. The study proposed a predictive-based
dynamic multi-objective evolutionary algorithm
known as the NN-DNSGA-ii algorithm that
outperformed the other choices by merging an
artificial neural network with the DNSGA-ii.
In machine learning cloud computing, the
development of a machine learning approach is
generally employed. Computer vision, pattern
recognition, and bioinformatics are all used in various
businesses [19] The development of machine learning
techniques has benefited large-scale computer systems
[25]. [29] outlines Google's efforts to correct
electricity use, maximize profit efficiency, and
increase efficiency. Despite the previous works on
machine learning algorithms in cloud computing there
still existed uncertainty in the integration of machine
learning into cloud computing management, as a result
[26] presented a model to reinforce data usage from a
thorough analysis of the two most major data controls
resource management research activities to consolidate
previous works based on objective model.
Using cloud computing to develop knowledge
ambidexterity [20] Using a longitudinal case study,
they examined how cloud computing has contributed
to the development of knowledge ambidexterity (K-
AMB) by adopting a cross-theory technique to assess
the link that exists between information management
principles and ambidexterity. Prior studies revealed
that with the use of digital technology, knowledge
ambidexterity in efficiency might be obtained [27],
The study examined a framework connection that
exists between cloud computing and knowledge
ambidexterity, and KM actions from a factual
perspective to investigate how SMEs allow knowledge
ambidexterity innovation capabilities and stated the
major.
In the research on Securing authentication scheme in
cloud computing with a glimpse of an artificial neural
network, [30], focused on the survey of the cloud
security issues and authentication scheme, and offer a
glimpse of an artificial neural network applied to the
cloud security environment to provide users access
management with proper cloud security to deny access
from unauthorized person to access confidential data.
To achieve cloud security. The study set out security
goals to ensure data security that includes
authentication, confidentiality, integrity, and
accountability. [21] discussed the development of
block cipher using a neural network to achieve the
elementary. [21] estimated a Hopfield neutral network
and password authentication, this was achieved by a
pattern recall approach in which the data array of
encrypted passwords is hoarded on the server, and the
unplanned pattern recall approach used sparse coding
algorithms. Therefore, based on the artificial neural
network new cryptography is essential.
In a study regarding job scheduling in cloud
computing using a hybrid moth search algorithm, [28]
developed a similar algorithm with the aim of solving
the problem associated with cloud task scheduling to
minimize the required time to program a list of jobs on
different virtual machines. [23] performed a
differential evaluation using two techniques known as
photo taxis and levy flight possessed consideration and
squeezing ability to improve the already existing moth
search algorithm (MSA), (DE), since the performance
of the approach relies on the improvement on the
improved MSA to carry-out task scheduling in cloud
computing. Cloud computing in the management of
education institutions analyzed the role of cloud
computing in the management of educational
institutions and how the adoption can help to reduce
information technology costs while also achieving
better adaptability and portability. put forward a well-
detailed introduction to the practice of cloud
computing in higher institutions. [24] evaluate the
initial position of the institution management and how
it will gear the incorporation into cloud computing that
is more reliable and efficient. They analyzed the
structural technologies and interconnected
components; they also initiated new services that will
take in place of many types of computational resources
presently used. In that view, they also considered that
grid computing will be engaged in a pivot role in
illustrating how cloud services will be offered. They
also developed a model that will meet the needs of the
students, procurement, finance, and accounting
department, etc. These services are controlled by the
cloud network provider to users every time they
demand.
C. Methodology
According to [34], the research technique approaches
and methods form the research methodology used in
collecting information regarding different parts of a
problem. The method adopted is descriptive method.
Materials for the writing was sourced through Google
scholar, Scopus. We came across different views about
cloud computing by different authors. Different
authors had their own definition of cloud computing.
The key thing we discovered about cloud computing is
that you pay as you use the service.
III. CLOUD COMPUTING ARCHITECTURE
The services delivered by cloud computing are
classified into three types. The front and back ends
[31]. The front end and back end are connected
through a network, which is usually the network. The
front end of a system is seen by the client (user), but
the back end is the system cloud. On the back end are
the client's computers, servers, and data storage. A
centralized server oversees system management, traffic
monitoring, and client requests. It employs specialized
software known as protocols and follows
predetermined standards. The following are the levels
and services of cloud computing architecture. The
client, the application, the platform, the infrastructure,
and the server [31]. A cloud customer is a collection of
computer hardware and software that leverages cloud
computing to offer applications designed specifically
to deliver cloud services [31]. The three forms of cloud
computing are listed below.
Cloud architectures are used by a variety of
applications, including web-based back-office bulk
processing systems. These are a few examples.
Processing pipelines for document processing
to OCR:
This converts millions of pages and pictures
into searchable raw text and converts
thousands of documents from Microsoft Word
to PDF.
Pipelines for image processing that may
encrypt MPEG or AVI movies. developing an
index for web crawlers Millions of records are
searched through data mining.
System for batch processing: this type of
system is a Back-office application that can be
seen in the banking, insurance, and retail
industries. log analysis is used to generate
daily and weekly reports.
Night builds perform concurrent automated
builds of the source code repository each
night. Deployment testing and automated unit
testing carry out functional, quality, and load
testing on many configurations.
Websites This includes websites that scale
automatically during the day but are redundant
at night. Instant websites are websites
designed specifically for conferences or
events. Seasonal websites operate according to
the seasons, such as during the holidays or tax
season. Model for cloud computing services
In addition to the five qualities, the following three
service models are used to categorize cloud services.
A. Infrastructure-as-a-service (LaaS)
Cloud users directly make use of the necessary
computer resources and information technology
infrastructure, such as processing, storage, networks,
and other, that are made available by the cloud. In the
(IaaS) cloud, virtualization is frequently used to
combine and separate physical resources as needed to
meet the variable resource demands of cloud users.
The core virtualization strategy involves creating
distinct virtual machines (VM) that are isolated from
both the underlying hardware and other VMs. Since
numerous instances (from separate cloud users) can
operate on a single application thanks to the multi-
tenancy paradigm, the software architecture of the
application is altered. Contrary to that model, this
tactic is different. Google, App Engine, Microsoft
Azure, Java, and developer tools are a few examples of
infrastructure as a service.
B. Platform as a service (PaaS)
A platform for development known as "platform as a
service" enables users of the cloud to build cloud
services and apps by supporting the whole "software
lifecycle." In contrast to SaaS, which only hosts
finished cloud applications, this provides a
development platform that hosts both finished and in-
progress cloud applications. As a result, PaaS offers
development infrastructure such as configuration
management, tools, programming environments, and
other components in addition to a hosting
environment. Microsoft Azure, Google App Engine,
developer tools, and Java are a few examples of PaaS.
C. Software as a service (SaaS)
A variety of customers with access to networks can
access the program that cloud customers publish in a
hosting environment (such as web browsers). To
achieve economies of scale and optimization in terms
of speed, availability, disaster recovery, maintenance,
and security, users of the applications of various cloud
consumers are grouped on the SaaS cloud in a single
logical environment.
The cloud infrastructure commonly employs a multi-
tenancy system architecture and is not under the
user's control. Examples include Salesforce, Google
Docs, and Google.
D. Data storage as service (DaaS)
Virtualized storage that is made available on
demand is now a separate cloud service called data
storage service. Excellent data storage service. as a
unique IaaS type. This is due to the fact that expensive
upfront expenses for on-premises enterprise database
systems are sometimes associated with dedicated
servers, software licenses, post-delivery services, and
internal IT maintenance. Customers can use DaaS to
pay only for the services they use rather than obtaining
a site license for the entire database. Along with more
traditional storage interfaces like file systems and
relational database management systems (RDBMS),
which are frequently too big, too slow, and quite
expensive, some data storage service providers also
offer table-style abstractions that store and retrieve a
sizable amount of data in a highly compressed
timescale.
IV. CHARACTERISTICS OF CLOUD
COMPUTING
According to the National Institute of Standards
and Technology [5], cloud computing has five features
that make it suitable for information technology
applications and services.
A. On-demand self service
On-demand self-service: Cloud services such as server
time, storage, web applications, computing power, and
networks may be delivered automatically to consumers
as needed, eliminating the need for human interaction.
B. Resource pooling
Cloud providers pool their computing resources
together to accommodate multiple customers. This is
accomplished either through virtualization, which uses
virtual machines to replicate physical hardware or
through "multi-tenancy," which allows multiple users
of the same resources. This is made possible by having
various physical and virtual resources that are
dynamically assigned and reassigned in response to
changing consumer demand (Mell,2009) [32].
The concept of a pool-oriented computing paradigm is
inspired by economies of scale and resource
specialization. Physical computing resources have
resulted in this community paradigm. It suggests that
the customers are unaware of the available resources.
Consumers are oblivious to the origins, location, and
physical composition of the resources they utilize.
Customers are unable to identify the place in certain
clouds where their data is supposed to be kept. This
enables resource pooling without exposing the
resource provider's management structure and allows
for fully flexible resource offering to clients.
C. Broad network access
Numerous clients (applications) that access the
required computer resources through a network,
mostly the internet, employ a range of platforms,
including laptops, microcomputers, and mobile
phones, all of which are present at the consumer's end.
The benefits of cloud computing can be expanded
thanks to broadband network connectivity.
D. Rapid elasticity
Numerous clients (applications) that access the
required computer resources through a network,
mostly the internet, employ a range of platforms,
including laptops, microcomputers, and mobile
phones, all of which are present at the consumer's end.
The benefits of cloud computing can be expanded
thanks to broadband network connectivity. Numerous
clients (applications) that access the required computer
resources through a network, mostly the internet,
employ a range of platforms, including laptops,
microcomputers, and mobile phones, all of which are
present at the consumer's end. The benefits of cloud
computing can be expanded thanks to broadband
network connectivity.
E. Measured service
In a cloud environment, multiple users may share
computer resources (multi-tenancy), but the cloud
infrastructure may make use of tools to monitor how
each user is using these resources. The cloud
computing metering methods enable for the individual
invoicing of numerous cloud users.
V. CLOUD COMPUTING DEPLOYMENT TYPE
There are basically three types of cloud, private cloud,
public cloud, and hybrid cloud. These are classified
based on the size of the network, security, and the
number of users
A. Private cloud
A private cloud is developed and maintained
especially for a single firm, but the administrator also
allows outside companies to use the cloud. The private
cloud allows for on-site or off-site activities. The
private cloud provides good cost management, cost
control, privacy, and energy efficiency. Private clouds
have a limited capacity and are restricted to a certain
area.
B. Public cloud
This is a cloud computing service that the public
or anyone can use or purchase. It is provided by a third
party over the public internet. Customers using this
type of service only pay for the services they really
utilize. If they have internet availability, every
employee of the organization can use the programme
from any office or branch using whatever device they
choose.
C. Community cloud
Several institutions or organizations with similar
objectives host a community cloud. It is frequently
used in universities for both teaching and research.
Businesses have the option of managing the cloud
system themselves, either on- or off-site, or by
outsourcing with a different organization to handle
daily system operations.
D. Hybrid cloud
Different cloud systems comprise a hybrid cloud. It
typically consists of two or more distinct clouds. For
instance, a company may opt to use the public cloud
for daily operations while storing sensitive data in their
own data center. Using a hybrid cloud could have
several advantages. Large and well-known
organizations are more likely to make significant
investments in the infrastructure needed to offer
resources internally. Safety is an additional factor.
VI. BENEFITS AND CHALLENGES OF CLOUD
COMPUTING
There are many benefits cloud computing offers to its
users that encourages them to adopt it. Cost reduction,
increased productivity and easy scalability are the
main benefits of adopting cloud computing.
A. Cost reduction
The usage of the software as a service enables
commercial organizations to pay less for information
technology resources, improving both the performance
and profitability of their operations. Customers are
required to pay according to their usage. Customers
that need an application for a brief period, pay the
application's license fees. The cost of purchasing
unneeded resources and apps is reduced by the cloud-
based solution. Users may benefit from continual
upgrades and maintenance without the costs and time
constraints associated with it in this case because the
service provider owns and hosts. Clients who use
cloud computing technology are not required to create
data backups. For the storage of data, cloud service
providers use several redundant locations. This is
acceptable for business continuity and incident
recovery. Business enterprises are not concerned about
data loss and recovery from backups [33].
B. Increased productivity
Due to the rapid growth of technology, consumers are
becoming more demanding. They need the products
sooner and in reduced hours. To use information
technology solutions like collaborative online services
and remote access applications, businesses must
adhere to these standards. Business applications for
cloud computing must be accessible through computer
systems that are online or in the cloud. accessibility to
the programmes that are constantly and everywhere
open to users. Organizations and businesspersons can
use cloud-based apps provided by various suppliers to
arrange meetings and send and receive emails or
messages. Additionally, cloud computing has
improved mobility. Businesses can use a laptop or
smartphone equipped with a web browser to access
cloud services.
C. Scalability
Cloud computing is a scalable model which enables
on-demand company scalability. Examples are SaaS,
PaaS, IaaS. Scalability is another feature of cloud
computing that can be beneficial. Depending on the
current demand for services, a business can reduce the
number of virtual servers it uses at any time. The room
they require or adjust it to their preferred pattern of
growth. This is cost effective especially for smaller
businesses that are trying to save cost. Small
businesses do not have to pay a fixed amount for a
dedicated data center hosting but can scale up the kind
of space needed on a dedicated server. This really
saves the company cost.
CLOUD COMPUTING CHALLENGES
Cloud computing technologies has numerous
challenges for several sectors of handling data and
information. Consequently, if you choose to deploy
cloud infrastructure services, you may face the
following difficulties and dangers.
[35]
A. Security and privacy
These include the organizational and technical
difficulties of maintaining a sufficient level of data
privacy and security in cloud services. This guarantees
that serious security and privacy problems about the
security and privacy of crucial or sensitive data for a
business, like banks, arise when government entities
use the cloud. Although it is widely accepted that
service level agreements between cloud service
providers and customers are required, there are
currently no formal safety requirements. Things like
machine detection, side-channel assaults, encryption,
and authentication are among the data security and
privacy issues.
B. Interoperability and portability
Service portability between different cloud providers is
leading to several issues. Due to the lack of defined
formats and interfaces for managing virtual appliances
and uniform interfaces for interacting with different
clouds, this issue exists. There is currently no standard
way to communicate with clouds. Instead, many cloud
providers present various APIs. Standardizing APIs
among the many cloud service providers is necessary
to develop a common cloud interface.
C. Legal issues
The use of cloud resources as a utility has raised
numerous legal concerns.Data placement is the
primary problem.Different regions and jurisdictions
have very different laws and regulations regarding
where,how,and how long data should be
stored.Regarding the disclosure of data in general and
sensitive data in particular for instance data from
financial and health sector.,compliance requirements
may differ.In addition to the issues of identity
definition, such as users versus system and issues of
authentication and authorization.,another significant
issue is the absence of comprehensive legislation on
liability in the cloud.
D. Economic Challenges
The cost of the physical infrastructure and the
administrative costs connected to it are essential in
determining the viability of the business from an
economic perspective.. This issue has to do with the
cost-benefit element of cloud computing. Cloud
service companies must develop efficient monetization
plans that will yield a respectable return on their
efforts. The plan calls for developing viable pricing
structures, implementing licensing plans, and grouping
resources. Since diverse providers handle invoicing
and payments, it might be difficult to ascertain the
type,calibre,and availability of services that the
consumer is paying for.Financial benchmarking and
evaluation of various providers are therefore
challenging.
E. Data Management
Due to the increased data-intensive applications that
cloud computing enables at the largest scale, there is
an increased need for efficient data management
solutions.Data storage falls under this heading..Data
segmentation,recovery,location,authenticity,anonymiz
ation,and backup are all parts of data.Data retrieval
and processing are additional problems with cloud
computing across different data centers.
F. Service Management
Service management faced various difficulties with the
cloud-based IT strategy. The capacity to offer
individualized and more context-sensitive services
present another difficulty. For a variety of reasons,
managing the service life cycle and service registry has
proven to be difficult.
G. Quality
The fundamental problem in the field of cloud service
quality is the design and implementation of service-
level agreements.. Lack of a service-level contract
between cloud firms makes adoption of cloud
computing more difficult since it impacts user
confidence in the dependability and availability of
services. Negotiation and benchmarking are
challenging due to the lack of a clear set of service
level targets and quality of service assessments. The
quality of the user experience, especially in
multimedia, streaming video, and online gaming.
CONCLUSION
In this research, we discussed the architecture, types,
characteristics of cloud computing is key in
information technology as it reduces cost for
organizations and makes it easier to access files. It also
helps to reduce data delay and redundancy. Any
organization that wants to adopt cloud computing
should consider the key challenges which is security
and privacy.
REFERENCES
[1] Haynie, M. “Enterprise Cloud Services: Deriving
business value from cloud computing. Microfocus,
Tech. Report, 2009.
[2] L. Wang, J. Tao, M. Kunze, A. C. Castellanos, D.
Kramer, and W. Karl, “Scientific cloud
computing: Early definition and experience,” 2008
10th IEEE International Conference on High
Performance Computing and Communications,
2008.
[3] Plummer, D.C, Bittman, T.J, Austin, T, Cearley,
D.W. and Smith, D.M, “Cloud computing:
Defining and describing an emerging
phenomenon”, Gartner, June 17, pp.1-9, 2008.
[4] Marston, S, Li, Z, Bandyopadhyay, S, Zhang, J.
and Ghalsasi, A, “Cloud computing—The business
perspective”, Decision support systems, 51(1),
pp.176-189, 2011.
[5] P. mell and T. Grance, “The NIST Definition of
cloud computing Recommendations of standards
and Technology” Nat.l Stand. Technol.lab, Vol.
145, p.7, 2011.
[6] M. Bamiah, S. Brohi, S. Chuprat, and M. N. Brohi,
“Cloud implementation security challenges,” 2012
International Conference on Cloud Computing
Technologies, Applications and Management
(ICCCTAM), 2012.
[7] A. Hassan, S. H. Bhatti, S. Shujaat, and Y. Hwang,
“To adopt or not to adopt? the determinants of
cloud computing adoption in Information
Technology Sector,” Decision Analytics Journal,
vol. 5, p. 100138, 2022.
[8] I. Baldini, P. Castro, K. Chang, P. Cheng, S. Fink,
V. Ishakian, N. Mitchell, V. Muthusamy, R.
Rabbah, A. Slominski, and P. Suter, “Serverless
Computing: Current Trends and open
problems,” Research Advances in Cloud
Computing, pp. 120, 2017.
[9] “Service Provider Network and Technology
Services,” Cisco, 20-Jun-2022. [Online].
Available:
https://www.cisco.com/c/en/us/solutions/collateral
/service-provider/global-cloud-index-gci/white-
paper-c11-738085.html. [Accessed: 14-Dec-
2022].
[10] K. Kitchen, “Ransomware is coming. it'll make
you wannacry.,” The Heritage Foundation.
[Online]. Available:
https://www.heritage.org/technology/commentary/
ransomware-coming-itll-make-you-wannacry.
[Accessed: 14-Dec-2022].
[11] D. Dempsey and F. Kelliher, “Industry trends in
cloud computing,” Palgrave Macmillan, 2018.
[12] A. ur Khan, M. Othman, S. A. Madani, and S. U.
Khan, “A survey of Mobile Cloud Computing
Application models,” IEEE Communications
Surveys & Tutorials, vol. 16, no. 1, pp. 393413,
2014.
[13] A. ur Khan, M. Othman, S. A. Madani, and S. U.
Khan, “A survey of Mobile Cloud Computing
Application models,” IEEE Communications
Surveys & Tutorials, vol. 17, no. 1, pp. 393413,
2014.
[14] Huang, D, “Mobile cloud computing”. IEEE
COMSOC Multimedia Communications Technical
Committee (MMTC) E-Letter, 6(10), pp.27-31,
2011.
[15] N. Taleb and E. A. Mohamed, “Cloud computing
trends: A literature review,” Academic Journal of
Interdisciplinary Studies, vol. 9, no. 1, p. 91,
2020.
[16] N. Taleb and E. A. Mohamed, “Cloud computing
trends: A literature review,” Academic Journal of
Interdisciplinary Studies, vol. 9, no. 1, p. 91,
2020.
[17] J. Sun, K. Harimaya, and N. Yamori, “Regional
Economic Development, strategic investors, and
efficiency of Chinese city commercial
banks,” Journal of Banking & Finance, vol. 37,
no. 5, pp. 16021611, 2013.
[18] G. Ismayilov and H. R. Topcuoglu, “Neural
network based multi-objective evolutionary
algorithm for Dynamic Workflow Scheduling in
cloud computing,” Future Generation Computer
Systems, vol. 102, pp. 307322, 2020.
[19] M. N. Injadat, A. Moubayed, A. B. Nassif, and A.
Shami, “Machine learning towards Intelligent
Systems: Applications, challenges, and
opportunities,” Artificial Intelligence Review, vol.
54, no. 5, pp. 32993348,2021.
[20] M. Saratchandra, A. Shrestha, and P. A. Murray,
“Building knowledge ambidexterity using cloud
computing: Longitudinal case studies of smes
experiences,” International Journal of Information
Management, vol. 67, p. 102551, 2022.
[21] P. Kotlarz and Z. Kotulski, “Neural network as a
programmable block cipher,” Advances in
Information Processing and Protection, pp. 241
250.
[22] L. Wang, J. Tao, M. Kunze, A. C. Castellanos, D.
Kramer, and W. Karl, “Scientific cloud
computing: Early definition and experience,” 2008
10th IEEE International Conference on High
Performance Computing and Communications,
2008.
[23] M. Jalali, A. Bouyer, B. Arasteh, and M. Moloudi,
“The effect of cloud computing technology in
Personalization and education improvements and
its challenges,” Procedia - Social and Behavioural
Sciences, vol. 83, pp. 655658, 2013.
[24] K. A. Delic and J. A. Riley, “Enterprise
knowledge clouds: Next generation KM
systems?” 2009 International Conference on
Information, Process, and Knowledge
Management, 2009.
[25] Z. Zhou, F. Li, H. Zhu, H. Xie, J. H. Abawajy, and
M. U. Chowdhury, “An improved genetic
algorithm using greedy strategy toward task
scheduling optimization in Cloud
Environments,” Neural Computing and
Applications, vol. 32, no. 6, pp. 15311541, 2019.
[26] J. Sun, K. Harimaya, and N. Yamori, “Regional
Economic Development, strategic investors, and
efficiency of Chinese city commercial
banks,” Journal of Banking & Finance, vol. 37,
no. 5, pp. 16021611, 2013.
[27] V. Scuotto, E. Arrigo, E. Candelo, and M. Nicotra,
“Ambidextrous innovation orientation effected by
the digital transformation,” Business Process
Management Journal, vol. 26, no. 5, pp. 1121
1140, 2019.
[28] M. A. Elaziz, S. Xiong, K. P. N. Jayasena, and L.
Li, “Task scheduling in cloud computing based on
hybrid moth search algorithm and differential
evolution,” Knowledge-Based Systems, vol. 169,
pp. 3952, 2019.
[29] “Jeff Dean on machine learning, part 3: How
machine learning is being used at google | google
cloud blog,” Google. [Online]. Available:
https://cloud.google.com/blog/products/gcp/jeff-
dean-on-machine-learning-part-3-how-machine-
learning-is being-used-at-google/. [Accessed: 14-
Dec-2022].
[30] S. A. Sheik and A. P. Muniyandi, “Secure
authentication schemes in cloud computing with
glimpse of Artificial Neural Networks: A
Review,” Cyber Security and Applications, vol. 1,
p. 100002, 2023.
[31] Y. Jadeja and K. Modi, “Cloud computing -
concepts, architecture and challenges,” 2012
International Conference on Computing,
Electronics and Electrical Technologies
(ICCEET), 2012.
[32] P. M. Mell and T. Grance, “The NIST definition of
cloud computing,” 2011.
[33] “12 benefits of cloud computing and its
advantages,” Salesforce.com. [Online]. Available:
https://www.salesforce.com/products/platform/bes
t-practices/benefits-of-cloud-computing/.
[Accessed: 14-Dec-2022].
[34] H. Engward, “Research methodology: A step by
step guide for Beginners Ranjit Kumar Research
methodology: A step by step guide for beginners
sage £26.99 440pp 9781849203012
1849203016,” Nurse Researcher, vol. 19, no. 3,
pp. 4545, 2012.
[35] VeritisAdmin, “Cloud computing trends,
Challenges & Benefits,” Go to Veritis Group Inc.,
12-Oct-2022. [Online]. Available:
https://www.veritis.com/blog/cloud-computing-
trends-challenges-and-benefits/. [Accessed: 15-
Dec-2022].
ResearchGate has not been able to resolve any citations for this publication.
Article
Full-text available
Cloud computing is an emerging distributed system that provides flexible and dynamically scalable computing resources for use at low cost. Task scheduling in cloud computing environment is one of the main problems that need to be addressed in order to improve system performance and increase cloud consumer satisfaction. Although there are many task scheduling algorithms, existing approaches mainly focus on minimizing the total completion time while ignoring workload balancing. Moreover, managing the quality of service (QoS) of the existing approaches still needs to be improved. In this paper, we propose a novel algorithm named MGGS (modified genetic algorithm (GA) combined with greedy strategy). The proposed algorithm leverages the modified GA algorithm combined with greedy strategy to optimize task scheduling process. Different from existing algorithms, MGGS can find an optimal solution using fewer number of iterations. To evaluate the performance of MGGS, we compared the performance of the proposed algorithm with several existing algorithms based on the total completion time, average response time, and QoS parameters. The results obtained from the experiments show that MGGS performs well as compared to other task scheduling algorithms.
Chapter
Full-text available
Serverless computing has emerged as a new compelling paradigm for the deployment of applications and services. It represents an evolution of cloud programming models, abstractions, and platforms, and is a testament to the maturity and wide adoption of cloud technologies. In this chapter, we survey existing serverless platforms from industry, academia, and open source projects, identify key characteristics and use cases, and describe technical challenges and open problems.
Article
Full-text available
With emergence of electronic systems and removal of paper, virtual technologies and electronics are becoming important. This paper discusses the importance of electronic training and emphasizes on its qualitative and quantitative development for some organizations or technical science and engineering students. The main focus of paper is on utilizing grounds of training based on usual network infrastructures such as internet or advanced distributed systems such as cloud computing environments. Finally, in new environments such as cloud computing, service composition and presenting virtual machine based on student's requirements and abilities significantly is more important that we address some problems in this issues.
Article
This research is mainly focused on the adoption of cloud computing in the information technology (IT) industry of a developing country, Pakistan by using the theoretical lens of technology acceptance model (TAM) and Elaboration Likelihood Model (ELM). Cloud computing, being one of the latest technologies in the field of IT, has been recently adopted by organizations around the globe, although developing nations have recently started using this technology in their supply chain processes. This study involved the employees of IT industry working in the capital city of Pakistan, i.e. Islamabad. Sample respondents consisted of 213 employees of the IT based organization. Data was collected online by employing structured questionnaires based on past literature. The results revealed that there exists a positive and significant relationship between perceived security, argument advantage, source credibility and perceived usefulness. Additionally, the outcome of the study supported the significant relationships between perceived usefulness and attitude towards adoption of cloud computing, perceived usefulness and intention to adopt cloud computing, and attitude towards cloud computing and intention to adopt cloud computing. The research study has managerial and practical implications. It is one of first of its kind that explores some of the factors leading to adoption of cloud computing in of IT companies in Pakistan.
Article
Using a longitudinal multisite case study research design, this study demonstrates how cloud computing helps to build knowledge ambidexterity (K-AMB) capabilities in small- and medium-sized enterprises (SMEs). A cross-theory approach is used to highlight the connections between ambidexterity and knowledge management theories as a basis to explore the benefits of K-AMB capabilities for SMEs. The study investigates how the focus on knowledge exploitation by SMEs limits innovation which can be reconciled using cloud computing by creating multiple ambidextrous knowledge opportunities. In relation to cloud computing and knowledge ambidexterity, the study is the first to measure the effects of a temporal lag in the K-AMB processes resulting in enhanced employee-driven innovation. The results showed that over a 12-month period, employee-driven innovation was significantly amplified from the application of cloud computing that supported more sophisticated ambidextrous processes of knowledge management. The results significantly shift mindsets about the revelatory value of cloud computing to promote K-AMB in SMEs. We draw novel insights to the theory of ambidexterity by proposing that digital technologies and employee innovation contexts lie side-by-side and play an important role in building K-AMB capabilities in SMEs.
Article
Purpose The purpose of this paper is to introduce a new perspective on ambidextrous innovation orientation looking at how the current digital transformation is accepted in the fashion industry in Italy. Precisely, the objective of the paper is to test whether the use of social media platforms positively influences ambidextrous innovation orientation in fashion companies. Design/methodology/approach Empirical quantitative research was carried out on a sample of 853 small- to medium-sized enterprises (SMEs) operating in the fashion industry in Italy. Using a logistic regression methodology, four hypotheses were tested to verify the correlation of four dimensions of social media platforms with an ambidextrous innovation orientation among fashion firms. Findings The four hypotheses were validated: the structural dimension, the relational behaviour dimension, the cognitive dimension and knowledge transfer practices of social media platforms were proven to positively influence ambidextrous innovation orientation in fashion firms. Research limitations/implications Though this is one of the few research studies that offers a quantitative analysis in this field, it could be further developed, for instance by extending the sample of firms to SMEs operating in other countries or by comparing multinationals with SMEs. Originality/value This paper provides an original contribution to studies on the use of social media to promote ambidexterity in firms, which has only been studied to a limited extent in the extant literature. From this perspective, the originality of the study is further strengthened by the unique context of analysis, namely, the fashion industry in Italy.
Article
Workflow scheduling is a largely studied research topic in cloud computing, which targets to utilize cloud resources for workflow tasks by considering the objectives specified in QoS. In this paper, we model dynamic workflow scheduling problem as a dynamic multi-objective optimization problem (DMOP) where the source of dynamism is based on both resource failures and the number of objectives which may change over time. Software faults and/or hardware faults may cause the first type of dynamism. On the other hand, confronting real-life scenarios in cloud computing may change number of objectives at runtime during the execution of a workflow. In this study, we propose a prediction-based dynamic multi-objective evolutionary algorithm, called NN-DNSGA-II algorithm, by incorporating artificial neural network with the NSGA-II algorithm. Additionally, five leading non-prediction based dynamic algorithms from the literature are adapted for the dynamic workflow scheduling problem. Scheduling solutions are found by the consideration of six objectives: minimization of makespan, cost, energy and degree of imbalance; and maximization of reliability and utilization. The empirical study based on real-world applications from Pegasus workflow management system reveals that our NN-DNSGA-II algorithm significantly outperforms the other alternatives in most cases with respect to metrics used for DMOPs with unknown true Pareto-optimal front, including the number of non-dominated solutions, Schott’s spacing and Hypervolume indicator.
Article
This paper presents an alternative method for cloud task scheduling problem which aims to minimize makespan that required to schedule a number of tasks on different Virtual Machines (VMs). The proposed method is based on the improvement of the Moth Search Algorithm (MSA) using the Differential Evolution (DE). The MSA simulates the behavior of moths to fly towards the source of light in nature through using two concepts, the phototaxis and Levy flights that represent the exploration and exploitation ability respectively. However, the exploitation ability is still needed to be improved, therefore, the DE can be used as local search method. In order to evaluate the performance of the proposed MSDE algorithm, a set of three experimental series are performed. The first experiment aims to compare the traditional MSA and the proposed algorithm to solve a set of twenty global optimization problems. Meanwhile, in second and third experimental series the performance of the proposed algorithm to solve the cloud task scheduling problem is compared against other heuristic and meta-heuristic algorithms for synthetical and real trace data, respectively. The results of the two experimental series show that the proposed algorithm outperformed other algorithms according to the performance measures.
Article
THIS IS a practical introductory text for healthcare students with minimal understanding of the research process. The focus of the text integrates quantitative and qualitative methodologies through the following operational steps.