File | Description | Size | Format | |
---|---|---|---|---|
Zhang_princeton_0181D_12300.pdf | 8.63 MB | Adobe PDF |
Items in Dataspace are protected by copyright, with all rights reserved, unless otherwise indicated.
A not-for-profit organization, IEEE is the world's largest technical professional organization dedicated to advancing technology for the benefit of humanity. © Copyright 2024 IEEE - All rights reserved. Use of this web site signifies your agreement to the terms and conditions.
Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 1036))
Included in the following conference series:
13 Accesses
Access control management systems play a crucial role in the infrastructure of cloud computing, relying on providing and managing access to computer resources. These systems employ strict access control procedures to guarantee the security and privacy of data. Service providers have the authority to establish and implement access policies, giving individuals and entities certain permissions. This entails confirming user identities, assigning the proper rights, and keeping an eye on activity via tracking and evaluating. An overview of the access control concept is given in this study, with an emphasis on role-based access control. It provides a thorough explanation of this kind of access control system and presents a few recent examples of how this idea is being used in successful works.
This is a preview of subscription content, log in via an institution to check access.
Subscribe and save.
Tax calculation will be finalised at checkout
Purchases are for personal use only
Institutional subscriptions
Mohammed, S.J., Taha, D.B.: From cloud computing security towards homomorphic encryption: a comprehensive review. TELKOMNIKA (Telecommunication Computing Electronics and Control) 19 (4), 1152–1161 (2021)
Article Google Scholar
Sun, P.: Security and privacy protection in cloud computing: Discussions and challenges. J. Netw. Comput. Appl. 160 , 102642 (2020)
Verma, D.K., Sharma, T.: Issues and challenges in cloud computing. Int. J. Adv. Res. Comput. Commun. Eng. 8 , 188–195 (2019)
Google Scholar
Puri, G.S., Tiwary, R., Shukla, S.: A review on cloud computing. In: 2019 9th International Conference on Cloud Computing, Data Science & Engineering (Confluence). IEEE (2019)
Yan, L., Hao, X., Cheng, Z., Zhou, R.: Cloud computing security and privacy. In: Proceedings of the 2018 International Conference on Big Data and Computing, pp. 119–123 (2018). https://doi.org/10.1145/3220199.3220217
Mohammed, S.J., Taha, D.B.: Privacy preserving algorithm using Chao-Scattering of partial homomorphic encryption. In: Journal of Physics: Conference Series, Vol. 1963, No. 1, p. 012154. IOP Publishing (2021)
Subramanian, N., Jeyaraj, A.: Recent security challenges in cloud computing. Comput. Electr. Eng. 71 , 28–42 (2018)
Tabrizchi, H., Kuchaki Rafsanjani, M.: A survey on security challenges in cloud computing: issues, threats, and solutions. J. Supercomput. 76 , 9493–9532 (2020)
Kumar, G.: A review on data protection of cloud computing security, benefits, risks and suggestions. United Int. J. Res. Technol. 1 (2), 26–34 (2019)
Ahmed, I.: A brief review: security issues in cloud computing and their solutions. TELKOMNIKA Telecommunication, Computing, Electronics and Control 17 (6), 2812–2817 (2019). https://doi.org/10.12928/telkomnika.v17i6.12490
Basu, S., Bardhan, A., Gupita, K., Saha, P.: Cloud computing security challenges & solutions-a survey. In: IEEE 8th Annual Computing and Communication Workshop and Conference (CCWC), 347–356 (2018). https://doi.org/10.1109/CCWC.2018.8301700
Mohammed, S.J., Taha, D.B.: Paillier cryptosystem enhancement for Homomorphic Encryption technique. Multimedia Tools and Applications, 1–13 (2023)
Mohammed, S.J., Taha, D.B.: Performance evaluation of RSA, ElGamal, and paillier partial homomorphic encryption algorithms. In: 2022 International Conference on Computer Science and Software Engineering (CSASE), pp. 89–94. IEEE (2022)
Gill, S.H., et al.: Security and privacy aspects of cloud computing: a smart campus case study. Intell. Autom. Soft Comput. 31 (1), 117–128 (2022)
El Sibai, R., et al.: A survey on access control mechanisms for cloud computing. Trans. Emerg. Telecommun. Technolo. 31 (2), e3720 (2020)
Mahmood, N.Z., Ahmed, S.R., Al-Hayaly, A.F., Algburi, S., Rasheed, J.: The evolution of administrative information systems: assessing the revolutionary impact of artificial intelligence. In: 2023 7th International Symposium on Multidisciplinary Studies and Innovative Technologies (ISMSIT), pp. 1–7. Ankara, Turkiye (2023)
Sifou, F., Kartit, A., Hammouch, A.: Different access control mechanisms for data security in cloud computing. In: Proceedings of the 2017 International Conference on Cloud and Big Data Computing (2017)
Agrawal, N., Tapaswi, S.: A trustworthy agent-based encrypted access control method for mobile cloud computing environment. Pervasive Mobile Comput. 52 , 13–28 (2019)
Charanya, R., Aramudhan, M.: Survey on access control issues in cloud computing. In: 2016 International Conference on Emerging Trends in Engineering, Technology and Science (ICETETS), pp. 1–4. Pudukkottai, India (2016). https://doi.org/10.1109/ICETETS.2016.7603014
Ahmed, S.R., Ahmed, A.K., Jwmaa, S.J.: Analyzing the employee turnover by using decision tree algorithm. In: 2023 5th International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA) (2023)
Cai, F., Zhu, N., He, J., et al.: Survey of access control models and technologies for cloud computing. Cluster Comput 22 (Suppl 3), 6111–6122 (2019)
Kashmar, N., Adda, M., Atieh, M.: From access control models to access control metamodels: a survey. In: Advances in Information and Communication: Proceedings of the 2019 Future of Information and Communication Conference (FICC), Volume 2. Springer International Publishing (2020)
Xu, J., et al.: Role-based access control model for cloud storage using identity-based cryptosystem. Mobile Netw. Appl. 26 , 1475–1492 (2021)
O’Connor, A., Loomis, R.: Economic analysis of role-based access control (No. RTI Project Number 0211876), p. 132. RTI International (2010)
Uddin, M., Islam, S., Al-Nemrat, A.: A dynamic access control model using authorising workflow and task-role-based access control. Ieee Access 7 , 166676–166689 (2019)
Harnal, S., Chauhan, R.K.: Efficient and Flexible Role-Based Access Control (EFRBAC) Mechanism for Cloud. EAI Endorsed Trans. Scalable Info. Sys. 7 (26), e1–e1 (2020)
Alshamsi, A.S., Maamar, Z., Kuhail, M.-A.: Towards an approach for weaving open digital rights language into role-based access control. In: 2023 International Conference on IT Innovation and Knowledge Discovery (ITIKD). IEEE (2023)
Wang, W., et al.: The design of a trust and role based access control model in cloud computing. In: 2011 6th International conference on pervasive computing and applications. Ieee (2011)
Dongdong, L., et al.: Role-based access control in educational administration system. In: MATEC Web of Conferences. Vol. 139. EDP Sciences (2017)
Bouadjemi, A., Abdi, M.K.: Towards an extension of RBAC model. Int. J. Comput. Digi. Sys. 10 , 1–11 (2020)
Huang, H., et al.: Handling least privilege problem and role mining in RBAC. Journal of Combinatorial Optimization 30 , 63–86 (2015)
Aftab, M.U., et al.: Permission-based separation of duty in dynamic role-based access control model. Symmetry 11 (5), 669 (2019)
Lu, S., et al.: Implementing web-based e-Health portal systems. Department of Computer Science and CIISE. Concordia University (2017)
Abdulateef, O.G., Abdullah, A.I., Ahmed, S.R., Mahdi, M.S.: Vehicle license plate detection using deep learning. In: 2022 International Symposium on Multidisciplinary Studies and Innovative Technologies (ISMSIT) (2022)
Tianyi, Z., Weidong, L., Jiaxing, S.: An efficient role based access control system for cloud computing. In: 2011 IEEE 11th International Conference on Computer and Information Technology, pp. 97–102. Paphos, Cyprus (2011). https://doi.org/10.1109/CIT.2011.36
Tang, Z., et al.: A new RBAC based access control model for cloud computing. In: Advances in Grid and Pervasive Computing: 7th International Conference, GPC 2012, Hong Kong, China, May 11–13, 2012. Proceedings 7. Springer Berlin Heidelberg (2012)
Uzun, E., et al.: Analyzing temporal role based access control models. In: Proceedings of the 17th ACM symposium on Access Control Models and Technologies (2012)
Ferrara, A.L., et al.: Vac-verifier of administrative role-based access control policies. In: Computer Aided Verification: 26th International Conference, CAV 2014, Held as Part of the Vienna Summer of Logic, VSL 2014, Vienna, Austria, July 18–22, 2014. Proceedings 26. Springer International Publishing (2014)
Zhou, L., Varadharajan, V., Hitchens, M.: Achieving secure role-based access control on encrypted data in cloud storage. IEEE Trans. Inf. Forensics Secur. 8 (12), 1947–1960 (2013). https://doi.org/10.1109/TIFS.2013.2286456
Ranise, S., Truong, A., Viganò, L.: Automated analysis of RBAC policies with temporal constraints and static role hierarchies. In: Proceedings of the 30th Annual ACM Symposium on Applied Computing (2015)
Yaseen, B.T., Kurnaz, S., Ahmed, S.R.: Detecting and classifying drug interaction using data mining techniques. In: 2022 International Symposium on Multidisciplinary Studies and Innovative Technologies (ISMSIT) (2022)
Huang, L., Xiong, Z., Wang, G.: A trust-role access control model facing cloud computing. In: 2016 35th Chinese Control Conference (CCC). IEEE (2016)
Ghafoorian, M., Abbasinezhad-Mood, D., Shakeri, H.: A thorough trust and reputation based RBAC model for secure data storage in the cloud. IEEE Trans. Parallel Distrib. Syst. 30 (4), 778–788 (2018)
Shahen, J., Niu, J., Tripunitara, M.: Cree: a performant tool for safety analysis of administrative temporal role-based access control (ATRBAC) policies. IEEE Trans. Dependable Secure Comput. 18 (5), 2349–2364 (2019)
Baig, U., et al.: Secure role based access control data sharing approach and cloud environment. IRJMETS (International Research Journal of Modernization in Engineering Technology and Science) 5 (3), 7.868 (2023)
Download references
The authors are very grateful to the University of Mosul/College of Computer Science and Mathematics for their facilities, which helped improve the quality of this work.
Authors and affiliations.
Department of Computer Science, College of Computer Science and Mathematics, University of Mosul, 41002, Mosul, Iraq
Alaa J. Mohammed & Saja J. Mohammed
You can also search for this author in PubMed Google Scholar
Correspondence to Alaa J. Mohammed .
Editors and affiliations.
Department of Computer Engineering, Istanbul Sabahattin Zaim University, Istanbul, Türkiye
Jawad Rasheed
Council for Scientific and Industrial Research (CSIR), Pretoria, South Africa
Adnan M. Abu-Mahfouz
School of Electronics, Electrical Engineering and Computer Science, Queen's University Belfast, Belfast, UK
Muhammad Fahim
Reprints and permissions
© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG
Cite this paper.
Mohammed, A.J., Mohammed, S.J. (2024). Securing Cloud Computing Using Access Control Systems: A Comprehensive Review. In: Rasheed, J., Abu-Mahfouz, A.M., Fahim, M. (eds) Forthcoming Networks and Sustainability in the AIoT Era. FoNeS-AIoT 2024. Lecture Notes in Networks and Systems, vol 1036. Springer, Cham. https://doi.org/10.1007/978-3-031-62881-8_9
DOI : https://doi.org/10.1007/978-3-031-62881-8_9
Published : 26 June 2024
Publisher Name : Springer, Cham
Print ISBN : 978-3-031-62880-1
Online ISBN : 978-3-031-62881-8
eBook Packages : Intelligent Technologies and Robotics Intelligent Technologies and Robotics (R0)
Anyone you share the following link with will be able to read this content:
Sorry, a shareable link is not currently available for this article.
Provided by the Springer Nature SharedIt content-sharing initiative
Policies and ethics
Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser .
Enter the email address you signed up with and we'll email you a reset link.
Cloud computing offers a variety of services like computational platform, computational power, storage and applications by means of the web. The cloud services have brought business supporting technology that attracts different companies around the globe. Despite the fact that Cloud computing has been deployed and utilized in part of the world, security in the cloud computing is still in its outset. These days hearing cyber-attacks news became familiar. Companies around in the globe experience different security incident, in which sensitive, protected or confidential information is seen, copied, transmitted, stolen, or lost by people who are not authorized to do so. Hence, with an expanding number of companies resorting to use cloud services, it is very important defining an effective security policy in order to secure the information. The aim of this study is to define an effective security policy for companies using cloud computing. Many companies already have security policies in place to protect their data. However, especially in a cloud situation, policy are neither likely to be up to date nor likely to be effective, due to the constant change in attack threats. Security threats and vulnerability have been giving credit to attackers to access the information of different users. First, this study identifies security challenges, companies need to guard against it in order to define an effective security policy with the corresponding existing solutions. Through the study 31 security challenges identified which companies need to aware of it and take into account when they set the companies security goals. The identified security challenges categorized into management and technical challenges. The management security challenges discussed, where the company often go wrong while technical challenges presented the security challenges related to cloud technology. Second, one of the main contributions of this study is a security policy model. The proposed security policy model can help the organization to address security challenges effectively in security policy. The model contains five elements Security Goals, Policies, Security Mechanisms, Security Requirements and Security Challenges. Security challenges addressed in security policy by passing through the steps exist in the security policy model. This will be a continuous process that must continue infinitely due to the ever changing nature of the Security Challenges. Generally,the model is used to define an effective security policy that to ensure organizations assets protected and as well the desired security goals of the company are meet.
International Journal of Cloud Computing and Services Science (IJ-CLOSER)
Muhammad Tariq
Cloud computing has recently emerged as new computing paradigm which basically aims to provide customized, reliable, dynamic services over the internet. Cost and security are influential issues to deploy cloud computing in large enterprise. Privacy and security are very important issues in terms of user trust and legal compliance. Information Security (IS) metrics are best tool used to measure the efficiency, performance, effectiveness and impact of the security constraints. It is very hard issue to get maximum benefits from Information security metrics in cloud computing. The aim of this paper is to discuss security issues of cloud computing, and propose basic building blocks of information security metrics framework for cloud computing. This framework helps cloud users to create information security metrics, analyze cloud threats, processing on cloud threats to mitigate them and threat assessment.
Emad Abu Shanab
—Cloud computing is a new development of grid, parallel, and distributed computing with visualization techniques. It is changing the IT industry in a prominent way. Cloud computing has grown due to its advantages like storage capacity, resources pooling and multi-tenancy. On the other hand, the cloud is an open environment and since all the services are offered over the Internet, there is a great deal of uncertainty about security and privacy at various levels. This paper aims to address security and privacy issues threatening the cloud computing adoption by end users. Cloud providers are mindful of cloud security and privacy issues and are working hardly to address them. Few of these threats have been addressed, but many more threats still unsolved. This paper focused on cloud computing security and privacy threats, challenges, and issues. Furthermore, some of the countermeasures to these threats will be discussed and synthesized. Finally, possible solutions for each type of threats will be introduced before we end with conclusions and future work.
Advanced Computing: An International Journal ( ACIJ )
Advanced Computing: An International Journal ( ACIJ ) , Kashif Munir
Cloud computing is set of resources and services offered through the Internet. Cloud services are delivered from data centers located throughout the world. Cloud computing facilitates its consumers by providing virtual resources via internet. The biggest challenge in cloud computing is the security and privacy problems caused by its multi-tenancy nature and the outsourcing of infrastructure, sensitive data and critical applications. Enterprises are rapidly adopting cloud services for their businesses, measures need to be developed so that organizations can be assured of security in their businesses and can choose a suitable vendor for their computing needs. Cloud computing depends on the internet as a medium for users to access the required services at any time on pay-per-use pattern. However this technology is still in its initial stages of development, as it suffers from threats and vulnerabilities that prevent the users from trusting it. Various malicious activities from illegal users have threatened this technology such as data misuse, inflexible access control and limited monitoring. The occurrence of these threats may result into damaging or illegal access of critical and confidential data of users. In this paper we identify the most vulnerable security threats/attacks in cloud computing, which will enable both end users and vendors t o k n o w a b o u t the k e y se c ur it y threats associated with cloud computing and propose relevant solution directives to strengthen security in the Cloud environment. We also propose secure cloud architecture for organizations to strengthen the security.
Mohammed Nihal
—Cloud computing enables the sharing of resources such as storage, network, applications and software through internet. Cloud users can lease multiple resources according to their requirements, and pay only for the services they use. However, despite all cloud benefits there are many security concerns related to hardware, virtualization, network, data and service providers that act as a significant barrier in the adoption of cloud in the IT industry. In this paper, we survey the top security concerns related to cloud computing. For each of these security threats we describe, i) how it can be used to exploit cloud components and its effect on cloud entities such as providers and users, and ii) the security solutions that must be taken to prevent these threats. These solutions include the security techniques from existing literature as well as the best security practices that must be followed by cloud administrators.
Madhvi Popli
Masood Shah , Abdul Salam Shah
Cloud computing has attracted users due to high speed and bandwidth of the internet. The e-commerce systems are best utilizing the cloud computing. The cloud can be accessed by a password and username and is completely dependent upon the internet. The threats to confidentiality, integrity, authentication and other vulnerabilities that are associated with the internet are also associated with cloud. The internet and cloud can be secured from threats by ensuring proper security and authorization. The channel between user and cloud server must be secured with a proper authorization mechanism. The research has been carried out and different models have been proposed by the authors to ensure the security of clouds. In this paper, we have critically analyzed the already published literature on the security and authorization of the internet and cloud.
IOSR Journals
Cloud computing is set of resources and services offered through the Internet. Cloud services are delivered from data centers located throughout the world. Cloud computing facilitates its consumers by providing virtual resources via internet. General example of cloud services is Google apps, provided by Google and Microsoft SharePoint. The rapid growth in field of " cloud computing " also increases severe security concerns. This paper aims to identify security threats in cloud computing, which will enable both end users and vendors to know about the key security threats associated with cloud computing.
Marjan Gusev
Ahmad Waqas
This research paper aims to explore the underlying cloud computing architectures with respect to security and auditing services. As most of the standards have not been defined yet for cloud computing, academic and industrial researchers are participating with their ideas and proofs. We have surveyed and classified the available cloud computing architectures into three categories which are 1) Architecture of Cloud Computing Security and Auditing, 2) Data Storage Security, Privacy and Auditing of Data Leakage, and 3) Security and Auditing of Malicious Acts. This taxonomy and analysis of existing cloud architectures will be helpful to address the primary issues focusing the security and auditing perspectives in future research.
Khaled M . Khan
Loading Preview
Sorry, preview is currently unavailable. You can download the paper by clicking the button above.
IJERA Journal
2013 International Conference on Advanced Computer Science Applications and Technologies
Zulkefli Muhammed Yusof
Abhijeet Rai
Dr. Praveen S . Challagidad
IRJET Journal
Challenges and opportunities with cloud computing.
A comprehensive review on cloud computing security, security challenges over cloud environment from service provider prospective, cloud security: a big challenge, issues and solutions, cloud computing: security issues and security methods, a survey on security issues and vulnerabilities on cloud computing, confidentiality of database for secure information in cloud computing using table collide storage model, study of data security and privacy preserving solutions in cloud computing, 27 references, cloud security issues, cloud computing: distributed internet computing for it and scientific research, cloud security: a comprehensive guide to secure cloud computing, on technical security issues in cloud computing, a survey on security issues in service delivery models of cloud computing, ensuring data storage security in cloud computing, the insider threat in cloud computing, cloud security and privacy, securing cloud from ddos attacks using intrusion detection system in virtual machine, multi-level authentication technique for accessing cloud services, related papers.
Showing 1 through 3 of 0 Related Papers
You are accessing a machine-readable page. In order to be human-readable, please install an RSS reader.
All articles published by MDPI are made immediately available worldwide under an open access license. No special permission is required to reuse all or part of the article published by MDPI, including figures and tables. For articles published under an open access Creative Common CC BY license, any part of the article may be reused without permission provided that the original article is clearly cited. For more information, please refer to https://www.mdpi.com/openaccess .
Feature papers represent the most advanced research with significant potential for high impact in the field. A Feature Paper should be a substantial original Article that involves several techniques or approaches, provides an outlook for future research directions and describes possible research applications.
Feature papers are submitted upon individual invitation or recommendation by the scientific editors and must receive positive feedback from the reviewers.
Editor’s Choice articles are based on recommendations by the scientific editors of MDPI journals from around the world. Editors select a small number of articles recently published in the journal that they believe will be particularly interesting to readers, or important in the respective research area. The aim is to provide a snapshot of some of the most exciting work published in the various research areas of the journal.
Original Submission Date Received: .
Find support for a specific problem in the support section of our website.
Please let us know what you think of our products and services.
Visit our dedicated information section to learn more about MDPI.
Towards sustainable cloud computing: load balancing with nature-inspired meta-heuristic algorithms.
2.1. cloud computing characteristics, 2.2. role of load balancing in cloud computing, 2.3. load-balancing challenges, 2.4. load-balancing policies, 2.5. meta-heuristic algorithms, 2.6. classification of load-balancing algorithms, 3. meta-heuristic algorithms for cloud load balancing, 3.1. ant colony optimization algorithm, 3.2. artificial bee colony algorithm, 3.3. genetic algorithm, 3.4. particle swarm optimization algorithm, 3.5. bat algorithm, 3.6. whale optimization algorithm, 3.7. simulated annealing algorithm, 3.8. biogeography-based optimization algorithm, 3.9. firefly algorithm, 3.10. grey wolf optimizer, 4. discussion.
6. conclusions, author contributions, data availability statement, conflicts of interest.
Click here to enlarge figure
Reference | Main Objective | Targeted Issue | Key Contributions |
---|---|---|---|
Gao and Wu [ ] | Optimal resource utilization and load avoidance | Task distribution and coordination in cloud computing | Efficient load balancing in cloud computing using ACO with improved network performance. |
Muteeh et al. [ ] | Efficient resource utilization and load balancing | Load balancing in cloud computing | Significant reduction in execution time and cost in cloud resource utilization. |
Xu et al. [ ] | Achieving load balancing and enhancing resource utilization | Multidimensional resource load balancing across physical machines | Improved resource utilization and load balancing in cloud computing through ACO-based VM allocation. |
Gabhane et al. [ ] | Enhancing multi-resource load balancing | Multi-resource load balancing | Outperformance of existing optimization methods in terms of data delivery and processing. |
Bui et al. [ ] | Balancing the interests of service providers and customers | VM provisioning and load balancing | Use of coefficients for achieving load balancing in VM provisioning. |
Ragmani et al. [ ] | Enhancing load balancing and response time | Load balancing in the cloud | Superior load balancing and response time using Fuzzy-ACO. |
Mohammadian et al. [ ] | Evenly distributing the workload across systems | Load balancing in data centers | Improved response time, imbalance degree, makespan, and resource utilization. |
Raghav and Vyas [ ] | Hybrid approach for load balancing | Load balancing in cloud computing | Improved performance compared to standalone ACO and bird swarm optimization. |
Minarolli [ ] | Distributed task scheduling using swarm intelligence | Task allocation during high-load conditions | Superior outcomes compared to distributed scheduling based solely on ACO or queue load information. |
Amer et al. [ ] | Efficient resource allocation and cloud performance enhancement | Multi-objective scheduling challenges | Efficient resource allocation, cloud performance enhancement, and increased profits. |
Reference | Main Objective | Targeted Issue | Key Contributions |
---|---|---|---|
Kruekaew and Kimpan [ ] | Optimizing task scheduling and resource utilization | Scheduling optimization and load balancing in cloud computing | Improved makespan, cost reduction, load balancing, increased throughput, and resource utilization. |
Kruekaew and Kimpan [ ] | Enhanced VM scheduling | VM scheduling in cloud computing | Superior VM scheduling in both homogeneous and heterogeneous environments. |
Kumar and Chaturvedi [ ] | Load balancing for efficient VM scheduling | Load distribution across VMs in cloud computing | Superior average VM load distribution, high accuracy, and low complexity compared to existing methods. |
Janakiraman and Priya [ ] | Optimizing resource allocation in cloud environments | Resource allocation challenges in cloud computing | Minimizing load variance, makespan, connection deviations, imbalance degree, and maximizing throughput. |
Tabagchi Milan et al. [ ] | Improving QoS and reducing energy consumption | QoS and energy efficiency in green computing | Enhanced QoS, reduced makespan, and minimized energy usage compared to alternatives. |
Sefati and Halunga [ ] | Optimized service selection in cloud computing | Service selection and allocation optimization in cloud computing | Improvements in reliability, availability, and cost-effectiveness in service selection and allocation. |
Reference | Main Objective | Targeted Issue | Key Contributions |
---|---|---|---|
Makasarwala and Hazari [ ] | Enhancing real-world applicability of load balancing | Cloud computing load balancing | Incorporation of time-based request priority for improved real-world relevance and superior performance. |
Saadat and Masehian [ ] | Swift optimization and user satisfaction improvement | Load balancing in cloud computing | Achieving superior solutions faster, enhancing user satisfaction, and elevating cloud computing load balancing. |
Gulbaz et al. [ ] | Simultaneous improvement in makespan and load balancing | Load balancing in computing systems | An effective load-balancing mechanism considers the actual VM load and significantly improves makespan, throughput, and load balancing. |
Reference | Main Objective | Targeted Issue | Key Contributions |
---|---|---|---|
Pradhan and Bisoy [ ] | Optimizing task scheduling in cloud environments | Task scheduling and resource utilization in the cloud | Superior performance in minimizing makespan and maximizing resource utilization. |
Alguliyev et al. [ ] | Task-based load balancing in the cloud | Load balancing and task migration in cloud computing | Achieves optimal task scheduling, equitable task distribution, and reduced time consumption for task-to-VM assignments. |
Mapetu et al. [ ] | Efficient task scheduling and load balancing in cloud computing | Task scheduling and load balancing | Outperforms existing heuristic and meta-heuristic algorithms in enhancing task scheduling and load distribution. |
Malik and Suman [ ] | Optimal load distribution and task scheduling in cloud computing | Task scheduling and VM load balancing | Balanced VM loads, reduced response times, and superior performance over existing systems in task scheduling and load distribution. |
Reference | Main Objective | Targeted Issue | Key Contributions |
---|---|---|---|
Sharma et al. [ ] | Fulfilling load balancer objectives using the bat algorithm | Load balancing and its impact on response time | Acknowledged the impact of load balancing on response time and aims for future work on job migration algorithm development. |
Ullah and Chakir [ ] | Enhancing task distribution within cloud computing’s VMs | Task distribution and load balancing in cloud computing | Outperforms standard techniques, significantly boosting the accuracy and efficiency of cloud data centers. |
Zheng and Wang [ ] | Enhancing cloud computing service quality through a hybrid multi-objective bat algorithm | Service quality improvement in cloud computing | Superior performance over multiple optimization algorithms, particularly regarding makespan, imbalance degree, throughput, and cost. |
Reference | Main Objective | Targeted Issue | Key Contributions |
---|---|---|---|
Ramya and Ayothi [ ] | Enhancing cloud performance through load balancing | Cloud performance optimization | Improved throughput, reliability, makespan, and resource allocation in CloudSim experiments. |
Strumberger et al. [ ] | Tackling cloud resource scheduling challenges | Cloud resource scheduling | Consistently outperforms the original whale optimization algorithm and other heuristics and meta-heuristics in enhancing cloud resource scheduling. |
Ni et al. [ ] | Multi-objective task scheduling in cloud computing | Task scheduling, resource utilization, and load balancing | Improved task completion time, VM load balance, and resource utilization compared to other meta-heuristic algorithms. |
Reference | Main Objective | Targeted Issue | Key Contributions |
---|---|---|---|
Sabar and Song [ ] | Novel load-balancing technique combining simulated annealing (SA) with grammatical evolution (GE) | Load balancing and parameter tuning in SA | Superiority over state-of-the-art algorithms in achieving load balancing, particularly for the Google machine reassignment problem. |
Hanine and Benlahmar [ ] | Achieving workload balance among VMs | Workload balance among VMs | Improved task allocation with fewer iterations compared to standard SA. |
Kumar et al. [ ] | Minimizing execution time and ensuring load balance in job scheduling | Job scheduling and load balancing | Optimal solutions outperform various algorithms and significantly reduce job schedule execution times. |
Reference | Main Objective | Targeted Issue | Key Contributions |
---|---|---|---|
Ghobaei-Arani [ ] | Optimizing cloud application execution through workload clustering and resource provisioning | Workload clustering and QoS-aware resource provisioning | Reduction in delay, SLA violations, cost, and energy consumption compared to alternatives, confirming superiority in optimizing cloud application execution. |
Bouhank and Daoudi [ ] | Minimizing resource wastage and power consumption during VM placement | Resource optimization in VM placement | Improved efficiency, convergence, and solution coverage compared to other multi-objective approaches for VM placement. |
Reference | Main Objective | Targeted Issue | Key Contributions |
---|---|---|---|
Devaraj et al. [ ] | Balancing load distribution, enhancing resource utilization, and reducing task response times | Load balancing in cloud computing | Achieves balanced load distribution, enhanced resource utilization, and reduced task response times, outperforming alternatives in simulations. |
RM et al. [ ] | Integrating domains for energy-efficient Internet of Everything (IoE) services | Energy efficiency and traffic reduction in IoT networks | Superiority in extending IoT network lifetimes and significantly reducing traffic burdens compared to state-of-the-art techniques. |
Sekaran et al. [ ] | Optimizing task distribution for improved mobile learning system accuracy | Load balancing in cloud servers for m-learning | Potential to boost throughput and response times in mobile and cloud environments by addressing load imbalance in cloud servers for m-learning. |
Reference | Main Objective | Targeted Issue | Key Contributions |
---|---|---|---|
Gohil and Patel [ ] | Enhancing system performance and resource utilization equity in cloud computing | Load balancing in cloud computing | Enhanced convergence rates and implementation simplicity compared to other optimization techniques, promising potential for advancing cloud load balancing. |
Sefati et al. [ ] | Achieving effective load balancing with resource reliability consideration | Load balancing and resource allocation in cloud computing | Superior performance over alternatives, with reduced costs, response times, and optimal solutions in CloudSim-based simulations, addressing cloud-based load-balancing challenges effectively. |
The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
Li, P.; Wang, H.; Tian, G.; Fan, Z. Towards Sustainable Cloud Computing: Load Balancing with Nature-Inspired Meta-Heuristic Algorithms. Electronics 2024 , 13 , 2578. https://doi.org/10.3390/electronics13132578
Li P, Wang H, Tian G, Fan Z. Towards Sustainable Cloud Computing: Load Balancing with Nature-Inspired Meta-Heuristic Algorithms. Electronics . 2024; 13(13):2578. https://doi.org/10.3390/electronics13132578
Li, Peiyu, Hui Wang, Guo Tian, and Zhihui Fan. 2024. "Towards Sustainable Cloud Computing: Load Balancing with Nature-Inspired Meta-Heuristic Algorithms" Electronics 13, no. 13: 2578. https://doi.org/10.3390/electronics13132578
Article access statistics, further information, mdpi initiatives, follow mdpi.
Subscribe to receive issue release notifications and newsletters from MDPI journals
You're reading a free article with opinions that may differ from The Motley Fool's Premium Investing Services. Become a Motley Fool member today to get instant access to our top analyst recommendations, in-depth research, investing resources, and more. Learn More
The tech giant has become a profit machine -- and that won't change anytime soon.
If the last few years have anything to teach us, it's to never bet against America's big tech. With shares up 104% over the previous five years, Amazon ( AMZN 1.21% ) has navigated both the COVID-19 pandemic and the 2022 inflation crisis while keeping shareholder value intact (although it was a bumpy ride). Let's explore what the next half-decade could have in store for the diversified technology conglomerate.
While Amazon has successfully diversified itself into businesses ranging from cloud computing to artificial intelligence ( AI ) , its foundation remains e-commerce. In 2022, this sprawling segment had begun to underperform because of COVID-era overexpansion and high inflation, which squeezed consumer purchasing power. But now, those challenges are in the past.
Amazon's first-quarter net sales rose 13% year over year to $143.3 billion. But more importantly, its operating income surged more than threefold from $4.8 billion to $15.3 billion over the same time frame.
This transformation was partially driven by significant cost savings in North American e-commerce (where management increased operating income by 455% to $4.98 billion) and international e-commerce (where they swung from a loss of $1.25 billion to a gain of $903 million). Amazon's new decentralized fulfillment network and layoffs are transforming its bottom line, allowing it to focus on exciting new growth drivers.
Amazon's cloud computing division, Amazon Web Services (AWS), will be the key to its future growth. Like with e-commerce, management has targeted significant layoffs here. And it has paid off, with operating profits jumping 84% to $9.4 billion.
Over the next five years, investors can expect this segment to enjoy continued growth as it benefits from increased AI-related demand -- particularly from start-ups like Anthropic, which uses its industry-leading cloud platform for storage and data management.
Amazon boasts its own custom AI training chips (Inferentia and Trainium), designed to attract clients to AWS's cloud services by offering competitive training speeds at potentially lower costs.
Image source: Getty Images.
But growth plans aren't limited to AWS. According to the Financial Times , management aims to develop a new retail channel to ship goods to American shippers directly from warehouses in China. Delivery times will be significantly longer than Amazon's typical one-to-two-day waits but will involve significant cost savings for consumers.
Unlike AWS, this new retail channel probably won't generate high-margin growth. However, it could help Amazon protect its market share from low-cost Chinese rivals like Temu (a subsidiary of PDD Holdings ) or Shein.
Long-term investors should always consider valuation when picking a stock because this data shows how much of your buy thesis has already been priced in by other market participants. For Amazon, a forward price-to-earnings (P/E) multiple of 43 means its shares are valued slightly higher than the Nasdaq-100 average of 31.
This looks like a fair premium to pay, considering the company's bottom-line momentum and new growth opportunities in AI technology. The stock looks likely to continue outperforming over the next five years. And it's not too late to buy.
John Mackey, former CEO of Whole Foods Market, an Amazon subsidiary, is a member of The Motley Fool’s board of directors. Will Ebiefung has no position in any of the stocks mentioned. The Motley Fool has positions in and recommends Amazon. The Motley Fool has a disclosure policy .
Invest better with The Motley Fool. Get stock recommendations, portfolio guidance, and more from The Motley Fool's premium services.
As enterprises seek ways to reduce their environmental footprints, one popular way is to migrate on-premises networking infrastructure to third-party csps..
The cloud can almost do it all. But the cloud is more than a way to access corporate resources. It can also help organizations achieve their goals around green and sustainable technology.
Cloud networking sustainability strategies minimize energy consumption and help reduce a company's overall carbon footprint -- especially compared with a typical on-premises infrastructure.
IT systems, and networking in particular, consume vast amounts of energy . The internet, for example, relies on hundreds of data centers worldwide, in addition to myriad switching centers. All this infrastructure is necessary to connect businesses and consumers to websites, wireless services and each other.
Major cloud service providers (CSPs), such as AWS, Microsoft and Google, use significant amounts of energy, as do telecom carriers powering their switching offices and network data centers. But the electricity needed to power these systems comes at an environmental cost: Even as utilities generate this power, they release tons of greenhouse gases into the atmosphere.
The challenge, then, is how major service providers can continue to function as they take steps to protect the environment. They do this by deploying energy-efficient and eco-friendly infrastructure elements wherever possible.
Enterprises face the same challenge as they focus on green technology and sustainability measures to limit the environmental effects of their switching and routing devices.
Organizations that transfer their IT infrastructure to an external CSP rely on the provider's ability to stay operational. But users must prepare for risks and costs associated with cloud-based IT services.
Figure 1 depicts a typical configuration where an organization and its data center connect to multiple network services.
All networking services connect through a local telephone company or non-telecom service provider. The company must have sustainability practices and procedures in place to minimize its carbon footprint and energy usage.
By contrast, Figure 2 depicts an all-cloud configuration where the provider delivers networking services. The provider might deliver services via wireless connections or through a telecom provider, but all networking technology resides within the cloud.
When all or most networking resources reside in the cloud, it becomes less of an issue to focus on sustainability and manage an environmentally friendly infrastructure. Sustainability benefits of a cloud network infrastructure include the following:
As CSPs realize they use significant amounts of energy, many plan to reduce their dependence on energy provided by fossil fuels. As a result, this decreases the amount of greenhouse gases released into the atmosphere.
One way to reduce energy consumption is through the use of renewable energy sources, such as solar, geothermal and wind. Enterprise customers, meanwhile, no longer have to maintain their own on-premises systems. The need for the enterprise data center might no longer exist.
Enterprises can reduce their need to purchase networking components by migrating their in-house systems to those operated by external CSPs. Endpoint devices remain on-site, but enterprises can use energy-efficient components to reduce their power consumption.
When networking resides in the cloud, employees can access resources from any location, which, in turn, enables remote work. Remote work minimizes commuting and reduces travel-created emissions. In addition, remote work reduces the prevalence of energy-inefficient office equipment, HVAC systems, lighting and security systems.
Many businesses, however, have asked employees to transition from mostly remote to in-office schedules. Even with employees in the office less frequently, employers who adopt a hybrid approach must account for energy needed for equipment to support workers when they come into the office.
Businesses might want to consider a hybrid arrangement approach, with mission-critical systems located on-site and less critical assets located in a cloud.
While enterprises might consider transitioning networking systems to a cloud platform, particularly from environment and sustainability perspectives, they face some risks with handing over networking resources to a CSP.
Caveats to all-cloud networking include the following:
Businesses might want to consider a hybrid arrangement approach, with mission-critical systems located on-site and less critical assets located in a cloud. From a sustainability perspective, this approach might enable users to strike a balance as they rely on cloud services in a configuration that benefits the business and remains eco-friendly.
Advances in technology give users many options to manage their technology requirements. A cloud networking sustainability strategy can yield important environmental benefits to users, but the organization should still consider its business needs.
Paul Kirvan is an independent consultant, IT auditor, technical writer, editor and educator. He has more than 25 years of experience in business continuity, disaster recovery, security, enterprise risk management, telecom and IT auditing.
Organizations have ramped up their use of communications platform as a service and APIs to expand communication channels between ...
Google will roll out new GenAI in Gmail and Docs first and then other apps throughout the year. In 2025, Google plans to ...
For successful hybrid meeting collaboration, businesses need to empower remote and on-site employees with a full suite of ...
For organizations that value convenience and UX, zero touch could be an ideal Android Enterprise enrollment method. Learn about ...
Apple has built a Private Cloud Compute server to process and then delete data sent from Apple Intelligence running on an iPhone,...
When setting up Android Enterprise devices, there are several enrollment methods IT should consider. Admins should learn how to ...
Lenovo sets itself apart from others by offering configured AI products to speed deployment and shape direction, while also ...
In today's world of security threats, it's critical to keep OSes up to date. As the end-of-life date for CentOS 7 approaches, ...
With many organizations developing or evaluating generative AI initiatives, HPE increased its commitment to the space through a ...
IT service providers are upskilling a large portion of their workforces on the emerging technology. The campaign seeks to boost ...
Early-stage companies featured at MIT Sloan's annual CIO event tap partners to speed up technology deployment and broaden their ...
Kaseya's pledge to partners promises more pricing controls and a new subscription service that lets MSPs manage and secure their ...
IMAGES
VIDEO
COMMENTS
THE CONCEPT OF CLOUD COMPUTING AND THE MAIN SECURITY ISSUES IN IT. This thesis focuses on studying and analyzing the Cloud Computing technology in concept and its security, which is still a developing technology with great convenience and portability for exchanging information over the Internet via different platforms.
This thesis depicts major Figure 1. Security Issues in the Cloud Computing. vulnerabilities and challenges in cloud computing such as "Cloud Storage Misconfiguration", "Insecure APIs" and "Theft of Intellectual Property" while implementing Cloud Computing services for any organization. 2.1 Cloud Computing Security threats.
cability in cloud computing. Current research in cloud data protection primarily falls into three main categories: 1) Authentication & Access Control, 2) Encryption, and 3) Intrusion Detection. This thesis examines the various mechanisms that currently exist to protect data being stored in a public cloud computing environment. It also looks at ...
7.1. Challenges. Via analysis and contrast, we observe that cloud computing security protection work has achieved satisfactory research results. However, many problems remain, which prompt the consideration of a variety of security factors and continuous improvements in defense technology and security strategies. 1.
Cloud security is dependent primarily on SaaS layers and web applications because they mainly offer cloud services. Therefore, the availability and security of the overall cloud services are dependent on the overall safety of the APIs, software applications, and web browsers [17]. Table 8. Common security attacks.
the security architecture, which can be operated across two or more clouds with different security approaches. This thesis researched security approaches to architecting hybrid cloud security, by evaluating security implementations and coming up with recommendations on se-curity posturing.
Cloud computing paradigms are gaining widespread acceptance due to the various benefits they offer. These include cost-effectiveness, time savings and efficient
Masters Thesis Security in Cloud Computing (Exploring the Evolution and Future of Cloud Cryptography) Cloud computing has grown in importance over the years. It is projected to grow with many organizations expected to digitally transform their business and shift to cloud platforms due to the technology's scalability and multiple other benefits ...
One counter technique is the use of intrusion detection systems (IDSs), which detect attacks within the cloud environment by monitoring traffic activity. However, since the computing environment varies from the environments of most traditional systems, it is difficult for IDSs to identify attacks and continual changes in attack patterns.
Security Analysis and Framework of Cloud Computing with Parity-Based Partially Distributed File System By Ali Asghary Karahroudy July, 2011 Director of Thesis or Dissertation: Dr. M.H.N. Tabrizi Major Department: Department of Computer Science Abstract - Cloud computing offers massive scalability, immediate availability, and low cost
Cloud computing (CC) gained a widespread acceptance as a paradigm of computing. The main aim of CC is to reduce the need for customers' investment in new hardware or software by offering flexible cloud services, with a user reaping the benefits of the pay per use approach. CC demands addressing many security and privacy issues: both problems (vulnerabilities, threats, and attacks) and ...
Cloud computing has become a widely exploited research area in academia and industry. Cloud computing benefits both cloud services providers (CSPs) and consumers. The security challenges associated with cloud computing have been widely studied in the literature. This systematic literature review (SLR) is aimed to review the existing research studies on cloud computing security, threats, and ...
Cloud computing has gained huge attention over the past decades because of continuously increasing demands. There are several advantages to organizations moving toward cloud-based data storage solutions. These include simplified IT infrastructure and management, remote access from effectively anywhere in the world with a stable Internet connection and the cost efficiencies that cloud computing ...
N. Amara, Huang Zhiqui, Awais Ali [1] conducted a survey of Cloud Computing Security Threats and Attacks with their Mitigation Techniques. This paper discussed the architectural principles of ...
In this research the SLR is undertaken to discover published papers related to the security challenges and mitigation techniques in Cloud Computing associated with security attacks. To achieve the research objectives we selected the papers published between 2001 and 2010.
Cloud Computing is an emerging paradigm that is based on the concept of distributed computing. Its definition is related to the use of computer resources which are offered as a service. As with any novel technology, Cloud Computing is subject to security threats, vulnerabilities, and attacks. Recently, the studies on security impact include the interaction of software, people and services on ...
This dissertation proposes a new architectural framework, CloudMonatt, to detect and mitigate potential security threats targeting customers' VMs in cloud computing. CloudMonatt monitors the security health of VMs and attests to customers if they are getting their desired security. It takes actions to mitigate the potential threats that can ...
Abstract: Cloud computing, with all of the numerous benefits it offers, has in recent years brought about a lot of major change in the ways in which people work and live. However, issues over security continue to be a key worry for a large number of individuals who are considering using cloud computing; this presents a significant barrier to the widespread adoption of this technology.
Nowadays the world is facing a new model of computing, on-demand computing, which is cloud computing, where everything that a computer system can provide is provided as a service in a cloud model when connected to a network [].Cloud computing is a technology that provides services to users that enable them to access computing resources and store data and applications through the Internet [].
This Magister thesis aims to identify the security issues of virtualization in the cloud computing environments and also reviewing the mitigation techniques in order to improve the security of cloud systems. Systematic literature review or systematic review is performed in this study for finding ... 2.2-Security issues of cloud computing ...
This thesis discusses the major types of cybersecurity attacks. In particular, it discusses the essential process, needs, and a secure protocol that can be easily understood by beginners or those who are interested in using cloud computing as their daily services to counter potential network threats. The thesis deliberates the concept of ...
Objectives: This thesis aims to identify security challenges for adapt- ... For this the objective is to identify exist-ing cloud computing security challenges and their solutions. Identify the challenges that have no mitigation strategies and gather solution-s/guidelines/practices from practitioners, for a challenge with more ...
1.5 Thesis Organization Chapter 1: Introduction; contains introduction about cloud computing and problems need to be addresses. The chapter also discusses the objective and structure of the thesis. Chapter 2: Cloud Computing and Security; Contains detail discussion about cloud computing, cloud security, and security policy.
This survey paper aims to analyze the various unresolved security threats in cloud computing which are affecting the various stake-holders linked to it and describes the pros and cons of the existing security strategy and introduces the existing issues in cloud Computing such as data integrity, data segregation, and security and so on.
Security Issues in Cloud Computing Technology, Attributes and concerns towards it. September 2012; Thesis for: Masters; Authors: Kiran Kumar. De Montfort University; Download full-text PDF Read ...
Cloud computing is considered suitable for organizations thanks to its flexibility and the provision of digital services via the Internet. The cloud provides nearly limitless computing resources on demand without any upfront costs or long-term contracts, enabling organizations to meet their computing needs more economically. Furthermore, cloud computing provides higher security, scalability ...
Securing Azure Functions is paramount to protecting sensitive data and maintaining the application's security and resilience. Organizations can mitigate potential risks by implementing security measures, such as role-based access control (), encryption and regular security assessments.Logging and monitoring mechanisms can provide valuable insights into any security incidents or possible ...
Amazon's cloud computing division, Amazon Web Services (AWS), will be the key to its future growth. Like with e-commerce, management has targeted significant layoffs here.
Cloud networking sustainability strategies minimize energy consumption and help reduce a company's overall carbon footprint -- especially compared with a typical on-premises infrastructure.. What is network sustainability? IT systems, and networking in particular, consume vast amounts of energy.The internet, for example, relies on hundreds of data centers worldwide, in addition to myriad ...
cloud server enhances data security and privacy in cloud computing. The thesis is carried out in order to prove that building a private cloud server with end-to-end encryption not only enhances data security but also allows users to take the leading in securing their own con-fidential data.