Downloadable Content

security in cloud computing thesis

Security in Cloud Computing (Exploring the Evolution and Future of Cloud Cryptography)

  • Masters Thesis
  • Arian, Omid
  • Ebrahimi, Mahdi
  • McIlhenny, Robert
  • Karamian, Vahe
  • Computer Science
  • California State University, Northridge
  • Dissertations, Academic -- CSUN -- Computer Science.
  • Cryptography
  • Cloud Computing
  • New Technologies
  • http://hdl.handle.net/20.500.12680/qb98mn66k
  • by Omid Arian

California State University, Northridge

Thumbnail Title Date Uploaded Visibility Actions
2023-05-31 Public

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

ScholarWorks at WMU

  • < Previous

Home > Graduate College > Theses > 919

Masters Theses

Security and privacy in cloud computing.

Ramakrishnan Krishnan

Date of Award

Spring 2017

Degree Name

Master of Science

Computer Science

First Advisor

Dr. Leszek T. Lilien

Second Advisor

Dr. John Kapenga

Third Advisor

Dr. Ikhlas Abdul Qader

Cloud, cloud security, cloud privacy, intertwined security and privacy, cloud based services

Access Setting

Masters Thesis-Open Access

Cloud computing (CC) gained a widespread acceptance as a paradigm of computing. The main aim of CC is to reduce the need for customers' investment in new hardware or software by offering flexible cloud services, with a user reaping the benefits of the pay per use approach. CC demands addressing many security and privacy issues : both problems (vulnerabilities, threats, and attacks) and solutions (controls). The thesis discusses all these classes of problems and solutions, categorizing them as either security-related issues, privacy-related issues, or intertwined security and privacy issues. The main contributions of the thesis are twofold: first, using the above categorization of the issues; and second, the literature review of the security and privacy issues in CC within the categorization framework. The major lessons learned during this research include confirmation of the decisive role that security and privacy solutions play and will continue to play in adopting CC by customers; understanding numerous vulnerabilities, threats, and attacks; and identifying controls for these problems. In addition, the sheer number of references to trust (in both problems and solutions), demonstrated a significant role of trust in CC.

Recommended Citation

Krishnan, Ramakrishnan, "Security and Privacy in Cloud Computing" (2017). Masters Theses . 919. https://scholarworks.wmich.edu/masters_theses/919

Since July 06, 2017

Included in

Information Security Commons

ScholarWorks

Advanced Search

  • Notify me via email or RSS
  • Collections
  • Disciplines

Author Corner

  • Graduate College

Western Michigan University Libraries, Kalamazoo MI 49008-5353 USA | (269) 387-5611

Home | About | FAQ | My Account | Accessibility Statement

Privacy | Copyright

  • Princeton University Doctoral Dissertations, 2011-2024
  • Electrical Engineering
Title: Detection and Mitigation of Security Threats in Cloud Computing
Authors: 
Advisors: 
Contributors: Electrical Engineering Department
Keywords: 
Subjects: 
Issue Date: 2017
Publisher: Princeton, NJ : Princeton University
Abstract: Infrastructure-as-a-Service (IaaS) clouds provide computation and storage services to enterprises and individuals with increased elasticity and low cost. Cloud customers rent resources in the form of virtual machines (VMs). However, these VMs may face various security threats. This dissertation proposes a new architectural framework, CloudMonatt, to detect and mitigate potential security threats targeting customers’ VMs in cloud computing. CloudMonatt monitors the security health of VMs and attests to customers if they are getting their desired security. It takes actions to mitigate the potential threats that can compromise the security properties requested. We design cloud management and security services, and define new hardware-software modules in cloud servers to provide the underlying measurements. We define secure communications protocols to guarantee that the monitoring service takes place in an unforgeable way. To demonstrate how CloudMonatt can enhance the VMs’ security, we consider a variety of threats and their defenses that can be integrated in CloudMonatt. We first consider threats on resource availability. We design a set of memory Denial-of-Service (DoS) attacks: an attacker VM can abuse the shared memory resources to significantly degrade a victim VM’s performance. Then we statistically monitor VMs’ resource consumption behaviors to detect these attacks, and use resource throttling to mitigate the availability threats. Next, we consider subtle attacks on confidentiality, specifically cache side-channel attacks. An attacker VM can exploit a shared CPU cache to steal information from the victim VM. We collect VMs’ micro-architectural behaviors and use a combination of signature and anomaly detection techniques to identify the existence of various side-channel attacks. We use targeted VM migration to eliminate these confidentiality threats. Then, we consider attacks on system integrity within a VM. We show how to protect a VM’s system integrity from malware, using Virtual Machine Introspection (VMI) to passively collect information for malware detection and also actively change the VM’s execution paths to defeat the potential malware. In summary, CloudMonatt is a general-purpose architecture for providing VM security monitoring and protection to cloud customers. We hope CloudMonatt can be a foundation for future work on protecting VMs’ security health in cloud computing.
URI: 
Alternate format: The Mudd Manuscript Library retains one bound copy of each dissertation. Search for these copies in the library's main catalog:
Type of Material: Academic dissertations (Ph.D.)
Language: en
Appears in Collections:
File Description SizeFormat 
Zhang_princeton_0181D_12300.pdf8.63 MBAdobe PDF

Items in Dataspace are protected by copyright, with all rights reserved, unless otherwise indicated.

IEEE Account

  • Change Username/Password
  • Update Address

Purchase Details

  • Payment Options
  • Order History
  • View Purchased Documents

Profile Information

  • Communications Preferences
  • Profession and Education
  • Technical Interests
  • US & Canada: +1 800 678 4333
  • Worldwide: +1 732 981 0060
  • Contact & Support
  • About IEEE Xplore
  • Accessibility
  • Terms of Use
  • Nondiscrimination Policy
  • Privacy & Opting Out of Cookies

A not-for-profit organization, IEEE is the world's largest technical professional organization dedicated to advancing technology for the benefit of humanity. © Copyright 2024 IEEE - All rights reserved. Use of this web site signifies your agreement to the terms and conditions.

Securing Cloud Computing Using Access Control Systems: A Comprehensive Review

  • Conference paper
  • First Online: 26 June 2024
  • Cite this conference paper

security in cloud computing thesis

  • Alaa J. Mohammed 12 &
  • Saja J. Mohammed 12  

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 1036))

Included in the following conference series:

  • International Conference on Forthcoming Networks and Sustainability in the AIoT Era

13 Accesses

Access control management systems play a crucial role in the infrastructure of cloud computing, relying on providing and managing access to computer resources. These systems employ strict access control procedures to guarantee the security and privacy of data. Service providers have the authority to establish and implement access policies, giving individuals and entities certain permissions. This entails confirming user identities, assigning the proper rights, and keeping an eye on activity via tracking and evaluating. An overview of the access control concept is given in this study, with an emphasis on role-based access control. It provides a thorough explanation of this kind of access control system and presents a few recent examples of how this idea is being used in successful works.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save.

  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
  • Available as EPUB and PDF
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Mohammed, S.J., Taha, D.B.: From cloud computing security towards homomorphic encryption: a comprehensive review. TELKOMNIKA (Telecommunication Computing Electronics and Control) 19 (4), 1152–1161 (2021)

Article   Google Scholar  

Sun, P.: Security and privacy protection in cloud computing: Discussions and challenges. J. Netw. Comput. Appl. 160 , 102642 (2020)

Verma, D.K., Sharma, T.: Issues and challenges in cloud computing. Int. J. Adv. Res. Comput. Commun. Eng. 8 , 188–195 (2019)

Google Scholar  

Puri, G.S., Tiwary, R., Shukla, S.: A review on cloud computing. In: 2019 9th International Conference on Cloud Computing, Data Science & Engineering (Confluence). IEEE (2019)

Yan, L., Hao, X., Cheng, Z., Zhou, R.: Cloud computing security and privacy. In: Proceedings of the 2018 International Conference on Big Data and Computing, pp. 119–123 (2018). https://doi.org/10.1145/3220199.3220217

Mohammed, S.J., Taha, D.B.: Privacy preserving algorithm using Chao-Scattering of partial homomorphic encryption. In: Journal of Physics: Conference Series, Vol. 1963, No. 1, p. 012154. IOP Publishing (2021)

Subramanian, N., Jeyaraj, A.: Recent security challenges in cloud computing. Comput. Electr. Eng. 71 , 28–42 (2018)

Tabrizchi, H., Kuchaki Rafsanjani, M.: A survey on security challenges in cloud computing: issues, threats, and solutions. J. Supercomput. 76 , 9493–9532 (2020)

Kumar, G.: A review on data protection of cloud computing security, benefits, risks and suggestions. United Int. J. Res. Technol. 1 (2), 26–34 (2019)

Ahmed, I.: A brief review: security issues in cloud computing and their solutions. TELKOMNIKA Telecommunication, Computing, Electronics and Control 17 (6), 2812–2817 (2019). https://doi.org/10.12928/telkomnika.v17i6.12490

Basu, S., Bardhan, A., Gupita, K., Saha, P.: Cloud computing security challenges & solutions-a survey. In: IEEE 8th Annual Computing and Communication Workshop and Conference (CCWC), 347–356 (2018). https://doi.org/10.1109/CCWC.2018.8301700

Mohammed, S.J., Taha, D.B.: Paillier cryptosystem enhancement for Homomorphic Encryption technique. Multimedia Tools and Applications, 1–13 (2023)

Mohammed, S.J., Taha, D.B.: Performance evaluation of RSA, ElGamal, and paillier partial homomorphic encryption algorithms. In: 2022 International Conference on Computer Science and Software Engineering (CSASE), pp. 89–94. IEEE (2022)

Gill, S.H., et al.: Security and privacy aspects of cloud computing: a smart campus case study. Intell. Autom. Soft Comput. 31 (1), 117–128 (2022)

El Sibai, R., et al.: A survey on access control mechanisms for cloud computing. Trans. Emerg. Telecommun. Technolo. 31 (2), e3720 (2020)

Mahmood, N.Z., Ahmed, S.R., Al-Hayaly, A.F., Algburi, S., Rasheed, J.: The evolution of administrative information systems: assessing the revolutionary impact of artificial intelligence. In: 2023 7th International Symposium on Multidisciplinary Studies and Innovative Technologies (ISMSIT), pp. 1–7. Ankara, Turkiye (2023)

Sifou, F., Kartit, A., Hammouch, A.: Different access control mechanisms for data security in cloud computing. In: Proceedings of the 2017 International Conference on Cloud and Big Data Computing (2017)

Agrawal, N., Tapaswi, S.: A trustworthy agent-based encrypted access control method for mobile cloud computing environment. Pervasive Mobile Comput. 52 , 13–28 (2019)

Charanya, R., Aramudhan, M.: Survey on access control issues in cloud computing. In: 2016 International Conference on Emerging Trends in Engineering, Technology and Science (ICETETS), pp. 1–4. Pudukkottai, India (2016). https://doi.org/10.1109/ICETETS.2016.7603014

Ahmed, S.R., Ahmed, A.K., Jwmaa, S.J.: Analyzing the employee turnover by using decision tree algorithm. In: 2023 5th International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA) (2023)

Cai, F., Zhu, N., He, J., et al.: Survey of access control models and technologies for cloud computing. Cluster Comput 22 (Suppl 3), 6111–6122 (2019)

Kashmar, N., Adda, M., Atieh, M.: From access control models to access control metamodels: a survey. In: Advances in Information and Communication: Proceedings of the 2019 Future of Information and Communication Conference (FICC), Volume 2. Springer International Publishing (2020)

Xu, J., et al.: Role-based access control model for cloud storage using identity-based cryptosystem. Mobile Netw. Appl. 26 , 1475–1492 (2021)

O’Connor, A., Loomis, R.: Economic analysis of role-based access control (No. RTI Project Number 0211876), p. 132. RTI International (2010)

Uddin, M., Islam, S., Al-Nemrat, A.: A dynamic access control model using authorising workflow and task-role-based access control. Ieee Access 7 , 166676–166689 (2019)

Harnal, S., Chauhan, R.K.: Efficient and Flexible Role-Based Access Control (EFRBAC) Mechanism for Cloud. EAI Endorsed Trans. Scalable Info. Sys. 7 (26), e1–e1 (2020)‏

Alshamsi, A.S., Maamar, Z., Kuhail, M.-A.: Towards an approach for weaving open digital rights language into role-based access control. In: 2023 International Conference on IT Innovation and Knowledge Discovery (ITIKD). IEEE (2023)

Wang, W., et al.: The design of a trust and role based access control model in cloud computing. In: 2011 6th International conference on pervasive computing and applications. Ieee (2011)

Dongdong, L., et al.: Role-based access control in educational administration system. In: MATEC Web of Conferences. Vol. 139. EDP Sciences (2017)

Bouadjemi, A., Abdi, M.K.: Towards an extension of RBAC model. Int. J. Comput. Digi. Sys. 10 , 1–11 (2020)

Huang, H., et al.: Handling least privilege problem and role mining in RBAC. Journal of Combinatorial Optimization 30 , 63–86 (2015)

Aftab, M.U., et al.: Permission-based separation of duty in dynamic role-based access control model. Symmetry 11 (5), 669 (2019)

Lu, S., et al.: Implementing web-based e-Health portal systems. Department of Computer Science and CIISE. Concordia University (2017)

Abdulateef, O.G., Abdullah, A.I., Ahmed, S.R., Mahdi, M.S.: Vehicle license plate detection using deep learning. In: 2022 International Symposium on Multidisciplinary Studies and Innovative Technologies (ISMSIT) (2022)

Tianyi, Z., Weidong, L., Jiaxing, S.: An efficient role based access control system for cloud computing. In: 2011 IEEE 11th International Conference on Computer and Information Technology, pp. 97–102. Paphos, Cyprus (2011). https://doi.org/10.1109/CIT.2011.36

Tang, Z., et al.: A new RBAC based access control model for cloud computing. In: Advances in Grid and Pervasive Computing: 7th International Conference, GPC 2012, Hong Kong, China, May 11–13, 2012. Proceedings 7. Springer Berlin Heidelberg (2012)

Uzun, E., et al.: Analyzing temporal role based access control models. In: Proceedings of the 17th ACM symposium on Access Control Models and Technologies (2012)

Ferrara, A.L., et al.: Vac-verifier of administrative role-based access control policies. In: Computer Aided Verification: 26th International Conference, CAV 2014, Held as Part of the Vienna Summer of Logic, VSL 2014, Vienna, Austria, July 18–22, 2014. Proceedings 26. Springer International Publishing (2014)

Zhou, L., Varadharajan, V., Hitchens, M.: Achieving secure role-based access control on encrypted data in cloud storage. IEEE Trans. Inf. Forensics Secur. 8 (12), 1947–1960 (2013). https://doi.org/10.1109/TIFS.2013.2286456

Ranise, S., Truong, A., Viganò, L.: Automated analysis of RBAC policies with temporal constraints and static role hierarchies. In: Proceedings of the 30th Annual ACM Symposium on Applied Computing (2015)‏

Yaseen, B.T., Kurnaz, S., Ahmed, S.R.: Detecting and classifying drug interaction using data mining techniques. In: 2022 International Symposium on Multidisciplinary Studies and Innovative Technologies (ISMSIT) (2022)

Huang, L., Xiong, Z., Wang, G.: A trust-role access control model facing cloud computing. In: 2016 35th Chinese Control Conference (CCC). IEEE (2016)

Ghafoorian, M., Abbasinezhad-Mood, D., Shakeri, H.: A thorough trust and reputation based RBAC model for secure data storage in the cloud. IEEE Trans. Parallel Distrib. Syst. 30 (4), 778–788 (2018)

Shahen, J., Niu, J., Tripunitara, M.: Cree: a performant tool for safety analysis of administrative temporal role-based access control (ATRBAC) policies. IEEE Trans. Dependable Secure Comput. 18 (5), 2349–2364 (2019)

Baig, U., et al.: Secure role based access control data sharing approach and cloud environment.‏ IRJMETS (International Research Journal of Modernization in Engineering Technology and Science) 5 (3), 7.868 (2023)

Download references

Acknowledgements

The authors are very grateful to the University of Mosul/College of Computer Science and Mathematics for their facilities, which helped improve the quality of this work.

Author information

Authors and affiliations.

Department of Computer Science, College of Computer Science and Mathematics, University of Mosul, 41002, Mosul, Iraq

Alaa J. Mohammed & Saja J. Mohammed

You can also search for this author in PubMed   Google Scholar

Corresponding author

Correspondence to Alaa J. Mohammed .

Editor information

Editors and affiliations.

Department of Computer Engineering, Istanbul Sabahattin Zaim University, Istanbul, Türkiye

Jawad Rasheed

Council for Scientific and Industrial Research (CSIR), Pretoria, South Africa

Adnan M. Abu-Mahfouz

School of Electronics, Electrical Engineering and Computer Science, Queen's University Belfast, Belfast, UK

Muhammad Fahim

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Cite this paper.

Mohammed, A.J., Mohammed, S.J. (2024). Securing Cloud Computing Using Access Control Systems: A Comprehensive Review. In: Rasheed, J., Abu-Mahfouz, A.M., Fahim, M. (eds) Forthcoming Networks and Sustainability in the AIoT Era. FoNeS-AIoT 2024. Lecture Notes in Networks and Systems, vol 1036. Springer, Cham. https://doi.org/10.1007/978-3-031-62881-8_9

Download citation

DOI : https://doi.org/10.1007/978-3-031-62881-8_9

Published : 26 June 2024

Publisher Name : Springer, Cham

Print ISBN : 978-3-031-62880-1

Online ISBN : 978-3-031-62881-8

eBook Packages : Intelligent Technologies and Robotics Intelligent Technologies and Robotics (R0)

Share this paper

Anyone you share the following link with will be able to read this content:

Sorry, a shareable link is not currently available for this article.

Provided by the Springer Nature SharedIt content-sharing initiative

  • Publish with us

Policies and ethics

  • Find a journal
  • Track your research

Academia.edu no longer supports Internet Explorer.

To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to  upgrade your browser .

Enter the email address you signed up with and we'll email you a reset link.

  • We're Hiring!
  • Help Center

paper cover thumbnail

Thesis for MS (Computer Science) DEFINING AN EFFECTIVE SECURITY POLICY FOR COMPANIES USING CLOUD COMPUTING

Profile image of jafar muzeyin

Cloud computing offers a variety of services like computational platform, computational power, storage and applications by means of the web. The cloud services have brought business supporting technology that attracts different companies around the globe. Despite the fact that Cloud computing has been deployed and utilized in part of the world, security in the cloud computing is still in its outset. These days hearing cyber-attacks news became familiar. Companies around in the globe experience different security incident, in which sensitive, protected or confidential information is seen, copied, transmitted, stolen, or lost by people who are not authorized to do so. Hence, with an expanding number of companies resorting to use cloud services, it is very important defining an effective security policy in order to secure the information. The aim of this study is to define an effective security policy for companies using cloud computing. Many companies already have security policies in place to protect their data. However, especially in a cloud situation, policy are neither likely to be up to date nor likely to be effective, due to the constant change in attack threats. Security threats and vulnerability have been giving credit to attackers to access the information of different users. First, this study identifies security challenges, companies need to guard against it in order to define an effective security policy with the corresponding existing solutions. Through the study 31 security challenges identified which companies need to aware of it and take into account when they set the companies security goals. The identified security challenges categorized into management and technical challenges. The management security challenges discussed, where the company often go wrong while technical challenges presented the security challenges related to cloud technology. Second, one of the main contributions of this study is a security policy model. The proposed security policy model can help the organization to address security challenges effectively in security policy. The model contains five elements Security Goals, Policies, Security Mechanisms, Security Requirements and Security Challenges. Security challenges addressed in security policy by passing through the steps exist in the security policy model. This will be a continuous process that must continue infinitely due to the ever changing nature of the Security Challenges. Generally,the model is used to define an effective security policy that to ensure organizations assets protected and as well the desired security goals of the company are meet.

Related Papers

International Journal of Cloud Computing and Services Science (IJ-CLOSER)

Muhammad Tariq

Cloud computing has recently emerged as new computing paradigm which basically aims to provide customized, reliable, dynamic services over the internet. Cost and security are influential issues to deploy cloud computing in large enterprise. Privacy and security are very important issues in terms of user trust and legal compliance. Information Security (IS) metrics are best tool used to measure the efficiency, performance, effectiveness and impact of the security constraints. It is very hard issue to get maximum benefits from Information security metrics in cloud computing. The aim of this paper is to discuss security issues of cloud computing, and propose basic building blocks of information security metrics framework for cloud computing. This framework helps cloud users to create information security metrics, analyze cloud threats, processing on cloud threats to mitigate them and threat assessment.

security in cloud computing thesis

Emad Abu Shanab

—Cloud computing is a new development of grid, parallel, and distributed computing with visualization techniques. It is changing the IT industry in a prominent way. Cloud computing has grown due to its advantages like storage capacity, resources pooling and multi-tenancy. On the other hand, the cloud is an open environment and since all the services are offered over the Internet, there is a great deal of uncertainty about security and privacy at various levels. This paper aims to address security and privacy issues threatening the cloud computing adoption by end users. Cloud providers are mindful of cloud security and privacy issues and are working hardly to address them. Few of these threats have been addressed, but many more threats still unsolved. This paper focused on cloud computing security and privacy threats, challenges, and issues. Furthermore, some of the countermeasures to these threats will be discussed and synthesized. Finally, possible solutions for each type of threats will be introduced before we end with conclusions and future work.

Advanced Computing: An International Journal ( ACIJ )

Advanced Computing: An International Journal ( ACIJ ) , Kashif Munir

Cloud computing is set of resources and services offered through the Internet. Cloud services are delivered from data centers located throughout the world. Cloud computing facilitates its consumers by providing virtual resources via internet. The biggest challenge in cloud computing is the security and privacy problems caused by its multi-tenancy nature and the outsourcing of infrastructure, sensitive data and critical applications. Enterprises are rapidly adopting cloud services for their businesses, measures need to be developed so that organizations can be assured of security in their businesses and can choose a suitable vendor for their computing needs. Cloud computing depends on the internet as a medium for users to access the required services at any time on pay-per-use pattern. However this technology is still in its initial stages of development, as it suffers from threats and vulnerabilities that prevent the users from trusting it. Various malicious activities from illegal users have threatened this technology such as data misuse, inflexible access control and limited monitoring. The occurrence of these threats may result into damaging or illegal access of critical and confidential data of users. In this paper we identify the most vulnerable security threats/attacks in cloud computing, which will enable both end users and vendors t o k n o w a b o u t the k e y se c ur it y threats associated with cloud computing and propose relevant solution directives to strengthen security in the Cloud environment. We also propose secure cloud architecture for organizations to strengthen the security.

Mohammed Nihal

—Cloud computing enables the sharing of resources such as storage, network, applications and software through internet. Cloud users can lease multiple resources according to their requirements, and pay only for the services they use. However, despite all cloud benefits there are many security concerns related to hardware, virtualization, network, data and service providers that act as a significant barrier in the adoption of cloud in the IT industry. In this paper, we survey the top security concerns related to cloud computing. For each of these security threats we describe, i) how it can be used to exploit cloud components and its effect on cloud entities such as providers and users, and ii) the security solutions that must be taken to prevent these threats. These solutions include the security techniques from existing literature as well as the best security practices that must be followed by cloud administrators.

Madhvi Popli

Masood Shah , Abdul Salam Shah

Cloud computing has attracted users due to high speed and bandwidth of the internet. The e-commerce systems are best utilizing the cloud computing. The cloud can be accessed by a password and username and is completely dependent upon the internet. The threats to confidentiality, integrity, authentication and other vulnerabilities that are associated with the internet are also associated with cloud. The internet and cloud can be secured from threats by ensuring proper security and authorization. The channel between user and cloud server must be secured with a proper authorization mechanism. The research has been carried out and different models have been proposed by the authors to ensure the security of clouds. In this paper, we have critically analyzed the already published literature on the security and authorization of the internet and cloud.

IOSR Journals

Cloud computing is set of resources and services offered through the Internet. Cloud services are delivered from data centers located throughout the world. Cloud computing facilitates its consumers by providing virtual resources via internet. General example of cloud services is Google apps, provided by Google and Microsoft SharePoint. The rapid growth in field of " cloud computing " also increases severe security concerns. This paper aims to identify security threats in cloud computing, which will enable both end users and vendors to know about the key security threats associated with cloud computing.

Marjan Gusev

Ahmad Waqas

This research paper aims to explore the underlying cloud computing architectures with respect to security and auditing services. As most of the standards have not been defined yet for cloud computing, academic and industrial researchers are participating with their ideas and proofs. We have surveyed and classified the available cloud computing architectures into three categories which are 1) Architecture of Cloud Computing Security and Auditing, 2) Data Storage Security, Privacy and Auditing of Data Leakage, and 3) Security and Auditing of Malicious Acts. This taxonomy and analysis of existing cloud architectures will be helpful to address the primary issues focusing the security and auditing perspectives in future research.

Khaled M . Khan

Loading Preview

Sorry, preview is currently unavailable. You can download the paper by clicking the button above.

RELATED PAPERS

IJERA Journal

2013 International Conference on Advanced Computer Science Applications and Technologies

Zulkefli Muhammed Yusof

Abhijeet Rai

Dr. Praveen S . Challagidad

IRJET Journal

RELATED TOPICS

  •   We're Hiring!
  •   Help Center
  • Find new research papers in:
  • Health Sciences
  • Earth Sciences
  • Cognitive Science
  • Mathematics
  • Computer Science
  • Academia ©2024
  • Corpus ID: 18061976

Cloud Computing: Security Issues and Research Challenges

  • R. Padhy , M. Patra , +1 author Oracle India Pvt
  • Published 2011
  • Computer Science, Engineering

Figures from this paper

figure 1

227 Citations

Challenges and opportunities with cloud computing.

  • Highly Influenced

Security and privacy issues for cloud computing and its challenges

A comprehensive review on cloud computing security, security challenges over cloud environment from service provider prospective, cloud security: a big challenge, issues and solutions, cloud computing: security issues and security methods, a survey on security issues and vulnerabilities on cloud computing, confidentiality of database for secure information in cloud computing using table collide storage model, study of data security and privacy preserving solutions in cloud computing, 27 references, cloud security issues, cloud computing: distributed internet computing for it and scientific research, cloud security: a comprehensive guide to secure cloud computing, on technical security issues in cloud computing, a survey on security issues in service delivery models of cloud computing, ensuring data storage security in cloud computing, the insider threat in cloud computing, cloud security and privacy, securing cloud from ddos attacks using intrusion detection system in virtual machine, multi-level authentication technique for accessing cloud services, related papers.

Showing 1 through 3 of 0 Related Papers

Information

  • Author Services

Initiatives

You are accessing a machine-readable page. In order to be human-readable, please install an RSS reader.

All articles published by MDPI are made immediately available worldwide under an open access license. No special permission is required to reuse all or part of the article published by MDPI, including figures and tables. For articles published under an open access Creative Common CC BY license, any part of the article may be reused without permission provided that the original article is clearly cited. For more information, please refer to https://www.mdpi.com/openaccess .

Feature papers represent the most advanced research with significant potential for high impact in the field. A Feature Paper should be a substantial original Article that involves several techniques or approaches, provides an outlook for future research directions and describes possible research applications.

Feature papers are submitted upon individual invitation or recommendation by the scientific editors and must receive positive feedback from the reviewers.

Editor’s Choice articles are based on recommendations by the scientific editors of MDPI journals from around the world. Editors select a small number of articles recently published in the journal that they believe will be particularly interesting to readers, or important in the respective research area. The aim is to provide a snapshot of some of the most exciting work published in the various research areas of the journal.

Original Submission Date Received: .

  • Active Journals
  • Find a Journal
  • Proceedings Series
  • For Authors
  • For Reviewers
  • For Editors
  • For Librarians
  • For Publishers
  • For Societies
  • For Conference Organizers
  • Open Access Policy
  • Institutional Open Access Program
  • Special Issues Guidelines
  • Editorial Process
  • Research and Publication Ethics
  • Article Processing Charges
  • Testimonials
  • Preprints.org
  • SciProfiles
  • Encyclopedia

electronics-logo

Article Menu

security in cloud computing thesis

  • Subscribe SciFeed
  • Recommended Articles
  • Google Scholar
  • on Google Scholar
  • Table of Contents

Find support for a specific problem in the support section of our website.

Please let us know what you think of our products and services.

Visit our dedicated information section to learn more about MDPI.

JSmol Viewer

Towards sustainable cloud computing: load balancing with nature-inspired meta-heuristic algorithms.

security in cloud computing thesis

1. Introduction

  • Nature-inspired meta-heuristic focus: Unlike other research primarily examining traditional load-balancing solutions, this study delves further into nature-inspired meta-heuristic algorithms. This study examines the benefits, distinctive characteristics, and present use of cloud computing, providing a fresh viewpoint.
  • Comparative performance evaluation: Our approach involves surveying current meta-heuristic algorithms, conducting a thorough study, and comparing their performance using actual data obtained from case studies and experiments. This technique allows us to determine which algorithms are most suited for certain cloud resource load-balancing situations we have established.
  • Integration of heuristic initial solutions: Our study emphasizes the significance of using typical heuristic methods to provide initial solutions for meta-heuristics to enhance the overall optimization process. This hybrid technique has received little attention in the existing literature and represents a novel addition to the discipline.

2. Background

2.1. cloud computing characteristics, 2.2. role of load balancing in cloud computing, 2.3. load-balancing challenges, 2.4. load-balancing policies, 2.5. meta-heuristic algorithms, 2.6. classification of load-balancing algorithms, 3. meta-heuristic algorithms for cloud load balancing, 3.1. ant colony optimization algorithm, 3.2. artificial bee colony algorithm, 3.3. genetic algorithm, 3.4. particle swarm optimization algorithm, 3.5. bat algorithm, 3.6. whale optimization algorithm, 3.7. simulated annealing algorithm, 3.8. biogeography-based optimization algorithm, 3.9. firefly algorithm, 3.10. grey wolf optimizer, 4. discussion.

  • Complex optimization: Load balancing in cloud computing involves distributing tasks and workloads across multiple servers or VMs to ensure efficient resource utilization and reduced response times. This task is often a complex optimization problem that requires finding optimal or near-optimal solutions. Nature-inspired algorithms provide powerful optimization techniques to tackle these challenges.
  • Global search: Cloud environments can have numerous variables and constraints, making it challenging to find the best solution. Nature-inspired algorithms, such as genetic algorithms, particle swarm optimization, and ant colony optimization, are designed to perform global searches in the solution space, helping to find solutions that traditional algorithms might miss.
  • Flexibility and adaptability: Nature-inspired algorithms are often designed to adapt and evolve, mimicking the ability of natural systems to adapt to changing environments. In cloud computing, workloads and resource availability can vary dynamically. These algorithms can help adapt load-balancing strategies to changing conditions effectively.
  • Parallelism and scalability: Cloud environments are inherently parallel and scalable. Many nature-inspired algorithms can be easily parallelized, allowing them to leverage the distributed nature of cloud computing resources. This makes them well-suited for addressing load-balancing challenges in large-scale cloud environments.
  • Multi-objective optimization: Load balancing often involves optimizing multiple objectives simultaneously, such as minimizing response time, maximizing resource utilization, and minimizing energy consumption. Nature-inspired algorithms can handle multi-objective optimization, allowing cloud administrators to find trade-offs among different goals.
  • Dynamic nature: Some nature-inspired algorithms, like particle swarm optimization, mimic the behavior of particles moving through a solution space. This dynamic nature aligns well with the dynamic nature of load balancing in cloud computing, where workloads and resources change over time.
  • Exploration and exploitation: Nature-inspired algorithms strike a balance between exploration (searching for new and unexplored areas of the solution space) and exploitation (refining solutions in promising regions). This is vital for finding optimal or near-optimal solutions to load-balancing problems.
  • Heuristic solutions: Load-balancing problems are often NP-hard, meaning that finding an optimal solution in a reasonable amount of time is practically impossible. Nature-inspired algorithms provide heuristic solutions that can efficiently find good solutions even for highly complex and large-scale load-balancing instances.
  • Domain-agnostic: Nature-inspired algorithms are generally domain-agnostic and can be applied to various problems, including load balancing in cloud computing. They can adapt to different system architectures and characteristics.
  • Earliest Deadline First (EDF): Tasks are prioritized according to their deadlines, with the tasks with the earliest dates given more priority. This strategy is efficient in time-sensitive situations where fulfilling deadlines is essential.
  • Least Laxity First (LLF): Similar to EDF, LLF arranges jobs according to the amount of time available before their deadlines, known as slack time or laxity. Tasks with the lowest amount of flexibility are assigned more importance, guaranteeing prompt completion.
  • First-Fit Decreasing (FFD): The tasks are arranged in descending order based on their size, then assigned to the first available resource to accommodate them. This strategy optimally allocates jobs within restricted resources, minimizes fragmentation, and enhances resource use.
  • Best-Fit Decreasing (BFD): Like FFD, tasks are assigned to the resource that has the lowest remaining capacity following the assignment. The objective of this strategy is to reduce the amount of unused space and enhance the efficiency of packing.
  • Greedy algorithms: These algorithms use local, optimal decisions at each stage in the expectation of discovering a global optimum. For instance, a greedy load balancer may allocate each incoming job to the server with the lowest current load, with the objective of gradually achieving load balance.
  • Dynamic policy selection: The scheduler assesses many policies in real time and selects the one that most effectively aligns with the present workload and system condition. This flexibility improves efficiency and the usage of resources.
  • Policy portfolio: The portfolio comprises a varied range of scheduling policies, including round-robin, least-connection, and FCFS. This enables the scheduler to seamlessly transition between policies as required in order to optimize performance.

5. Open Issues and Future Directions

6. conclusions, author contributions, data availability statement, conflicts of interest.

  • Pourghebleh, B.; Anvigh, A.A.; Ramtin, A.R.; Mohammadi, B. The importance of nature-inspired meta-heuristic algorithms for solving virtual machine consolidation problem in cloud environments. Clust. Comput. 2021 , 24 , 2673–2696. [ Google Scholar ] [ CrossRef ]
  • Hayyolalam, V.; Pourghebleh, B.; Chehrehzad, M.R.; Kazem, A.A.P. Single-objective service composition methods in cloud manufacturing systems: Recent techniques, classification, and future trends. Concurr. Comput. Pract. Exp. 2022 , 34 , e6698. [ Google Scholar ] [ CrossRef ]
  • Pourghebleh, B.; Hayyolalam, V. A comprehensive and systematic review of the load balancing mechanisms in the Internet of Things. Clust. Comput. 2019 , 23 , 641–661. [ Google Scholar ] [ CrossRef ]
  • Afzal, S.; Kavitha, G. Load balancing in cloud computing—A hierarchical taxonomical classification. J. Cloud Comput. 2019 , 8 , 22. [ Google Scholar ] [ CrossRef ]
  • Kumar, P.; Kumar, R. Issues and challenges of load balancing techniques in cloud computing: A survey. ACM Comput. Surv. (CSUR) 2019 , 51 , 1–35. [ Google Scholar ] [ CrossRef ]
  • Shafiq, D.A.; Jhanjhi, N.Z.; Abdullah, A.; Alzain, M.A. A load balancing algorithm for the data centres to optimize cloud computing applications. IEEE Access 2021 , 9 , 41731–41744. [ Google Scholar ] [ CrossRef ]
  • Agrawal, N.; Tapaswi, S. Defense mechanisms against DDoS attacks in a cloud computing environment: State-of-the-art and research challenges. IEEE Commun. Surv. Tutor. 2019 , 21 , 3769–3795. [ Google Scholar ] [ CrossRef ]
  • Zhang, W.-Z.; Elgendy, I.A.; Hammad, M.; Iliyasu, A.M.; Du, X.; Guizani, M.; El-Latif, A.A.A. Secure and optimized load balancing for multitier IoT and edge-cloud computing systems. IEEE Internet Things J. 2020 , 8 , 8119–8132. [ Google Scholar ] [ CrossRef ]
  • Mazumder, A.M.R.; Uddin, K.A.; Arbe, N.; Jahan, L.; Whaiduzzaman, M. Dynamic task scheduling algorithms in cloud computing. In Proceedings of the 2019 3rd International conference on Electronics, Communication and Aerospace Technology (ICECA), Coimbatore, India, 12–14 June 2019; IEEE: Piscataway, NJ, USA; pp. 1280–1286. [ Google Scholar ]
  • Saeik, F.; Avgeris, M.; Spatharakis, D.; Santi, N.; Dechouniotis, D.; Violos, J.; Leivadeas, A.; Athanasopoulos, N.; Mitton, N.; Papavassiliou, S. Task offloading in Edge and Cloud Computing: A survey on mathematical, artificial intelligence and control theory solutions. Comput. Netw. 2021 , 195 , 108177. [ Google Scholar ] [ CrossRef ]
  • Hayyolalam, V.; Pourghebleh, B.; Kazem, A.A.P. Trust management of services (TMoS): Investigating the current mechanisms. Trans. Emerg. Telecommun. Technol. 2020 , 31 , e4063. [ Google Scholar ] [ CrossRef ]
  • Zhang, W.; Chen, L.; Luo, J.; Liu, J. A two-stage container management in the cloud for optimizing the load balancing and migration cost. Future Gener. Comput. Syst. 2022 , 135 , 303–314. [ Google Scholar ] [ CrossRef ]
  • Tawfeeg, T.M.; Yousif, A.; Hassan, A.; Alqhtani, S.M.; Hamza, R.; Bashir, M.B.; Ali, A. Cloud Dynamic Load Balancing and Reactive Fault Tolerance Techniques: A Systematic Literature Review (SLR). IEEE Access 2022 , 10 , 71853–71873. [ Google Scholar ] [ CrossRef ]
  • Kong, L.; Mapetu, J.P.B.; Chen, Z. Heuristic load balancing based zero imbalance mechanism in cloud computing. J. Grid Comput. 2020 , 18 , 123–148. [ Google Scholar ] [ CrossRef ]
  • Kumar, K. P2BED-C: A novel peer to peer load balancing and energy efficient technique for data-centers over cloud. Wirel. Pers. Commun. 2022 , 123 , 311–324. [ Google Scholar ] [ CrossRef ]
  • Liang, B.; Dong, X.; Wang, Y.; Zhang, X. A low-power task scheduling algorithm for heterogeneous cloud computing. J. Supercomput. 2020 , 76 , 7290–7314. [ Google Scholar ] [ CrossRef ]
  • Raza, M.S.; Wei, J.; Muslam, M.M.A. A Succinct Review of Intelligent Computational Techniques in Green Cloud Computing. In Proceedings of the 2020 International Conference on Communications, Signal Processing, and their Applications (ICCSPA, Sharjah, United Arab Emirates, 16–18 March 2021; IEEE: Piscataway, NJ, USA, 2021; pp. 1–4. [ Google Scholar ]
  • Li, C.; Sun, H.; Tang, H.; Luo, Y. Adaptive resource allocation based on the billing granularity in edge-cloud architecture. Comput. Commun. 2019 , 145 , 29–42. [ Google Scholar ] [ CrossRef ]
  • Ebrahim, M.; Hafid, A. Resilience and load balancing in Fog networks: A Multi-Criteria Decision Analysis approach. Microprocess. Microsyst. 2023 , 101 , 104893. [ Google Scholar ] [ CrossRef ]
  • Kumar, Y.; Kaul, S.; Hu, Y.-C. Machine learning for energy-resource allocation, workflow scheduling and live migration in cloud computing: State-of-the-art survey. Sustain. Comput. Inform. Syst. 2022 , 36 , 100780. [ Google Scholar ] [ CrossRef ]
  • Motlagh, A.A.; Movaghar, A.; Rahmani, A.M. Task scheduling mechanisms in cloud computing: A systematic review. Int. J. Commun. Syst. 2020 , 33 , e4302. [ Google Scholar ] [ CrossRef ]
  • Neelakantan, P.; Yadav, N.S. An Optimized Load Balancing Strategy for an Enhancement of Cloud Computing Environment. Wirel. Pers. Commun. 2023 , 131 , 1745–1765. [ Google Scholar ] [ CrossRef ]
  • Li, K.; Chang, C.; Yun, K.; Zhang, J. Research on Container Migration Mechanism of Power Edge Computing on Load Balancing. In Proceedings of the 2021 IEEE 6th International Conference on Cloud Computing and Big Data Analytics (ICCCBDA), Chengdu, China, 24–26 April 2021; IEEE: Piscataway, NJ, USA; pp. 386–390. [ Google Scholar ]
  • Guo, X.-Q.; Chen, W.-N.; Wei, F.-F.; Mao, W.-T.; Hu, X.-M.; Zhang, J. Edge–Cloud Co-Evolutionary Algorithms for Distributed Data-Driven Optimization Problems. IEEE Trans. Cybern. 2022 , 53 , 6598–6611. [ Google Scholar ] [ CrossRef ] [ PubMed ]
  • Kannan, K.; Sunitha, G.; Deepa, S.; Babu, D.V.; Avanija, J. A multi-objective load balancing and power minimization in cloud using bio-inspired algorithms. Comput. Electr. Eng. 2022 , 102 , 108225. [ Google Scholar ] [ CrossRef ]
  • Qawqzeh, Y.; Alharbi, M.T.; Jaradat, A.; Sattar, K.N.A. A review of swarm intelligence algorithms deployment for scheduling and optimization in cloud computing environments. PeerJ Comput. Sci. 2021 , 7 , e696. [ Google Scholar ] [ CrossRef ] [ PubMed ]
  • Sridharan, S.; Subramanian, R.K.; Srirangan, A.K. Physics based meta heuristics in manufacturing. Mater. Today Proc. 2021 , 39 , 805–811. [ Google Scholar ] [ CrossRef ]
  • Camacho-Villalón, C.L.; Dorigo, M.; Stützle, T. Exposing the grey wolf, moth-flame, whale, firefly, bat, and antlion algorithms: Six misleading optimization techniques inspired by bestial metaphors. Int. Trans. Oper. Res. 2023 , 30 , 2945–2971. [ Google Scholar ] [ CrossRef ]
  • Gao, R.; Wu, J. Dynamic load balancing strategy for cloud computing with ant colony optimization. Future Internet 2015 , 7 , 465–483. [ Google Scholar ] [ CrossRef ]
  • Muteeh, A.; Sardaraz, M.; Tahir, M. MrLBA: Multi-resource load balancing algorithm for cloud computing using ant colony optimization. Clust. Comput. 2021 , 24 , 3135–3145. [ Google Scholar ] [ CrossRef ]
  • Xu, P.; He, G.; Li, Z.; Zhang, Z. An efficient load balancing algorithm for virtual machine allocation based on ant colony optimization. Int. J. Distrib. Sens. Netw. 2018 , 14 , 1550147718793799. [ Google Scholar ] [ CrossRef ]
  • Gabhane, J.P.; Pathak, S.; Thakare, N.M. A novel hybrid multi-resource load balancing approach using ant colony optimization with Tabu search for cloud computing. Innov. Syst. Softw. Eng. 2023 , 19 , 81–90. [ Google Scholar ] [ CrossRef ]
  • Bui, K.T.; Pham, T.V.; Tran, H.C. A load balancing game approach for VM provision cloud computing based on ant colony optimization. In Proceedings of the Context-Aware Systems and Applications: 5th International Conference, ICCASA 2016, Thu Dau Mot, Vietnam, 24–25 November 2016; Proceedings 5. Springer: Berlin/Heidelberg, Germany, 2017; pp. 52–63. [ Google Scholar ]
  • Ragmani, A.; Elomri, A.; Abghour, N.; Moussaid, K.; Rida, M. An improved hybrid fuzzy-ant colony algorithm applied to load balancing in cloud computing environment. Procedia Comput. Sci. 2019 , 151 , 519–526. [ Google Scholar ] [ CrossRef ]
  • Mohammadian, V.; Navimipour, N.J.; Hosseinzadeh, M.; Darwesh, A. LBAA: A novel load balancing mechanism in cloud environments using ant colony optimization and artificial bee colony algorithms. Int. J. Commun. Syst. 2023 , 36 , e5481. [ Google Scholar ] [ CrossRef ]
  • Raghav, Y.Y.; Vyas, V. ACBSO: A hybrid solution for load balancing using ant colony and bird swarm optimization algorithms. Int. J. Inf. Technol. 2023 , 15 , 2847–2857. [ Google Scholar ] [ CrossRef ]
  • Minarolli, D. A Distributed Task Scheduling Approach for Cloud Computing Based on Ant Colony Optimization and Queue Load Information. In Proceedings of the International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, Tirana, Albania, 27–29 October 2022; Springer: Berlin/Heidelberg, Germany, 2022; pp. 13–24. [ Google Scholar ]
  • Amer, D.A.; Attiya, G.; Ziedan, I. An efficient multi-objective scheduling algorithm based on spider monkey and ant colony optimization in cloud computing. Clust. Comput. 2023 , 27 , 1799–1819. [ Google Scholar ] [ CrossRef ]
  • Kruekaew, B.; Kimpan, W. Multi-objective task scheduling optimization for load balancing in cloud computing environment using hybrid artificial bee colony algorithm with reinforcement learning. IEEE Access 2022 , 10 , 17803–17818. [ Google Scholar ] [ CrossRef ]
  • Kruekaew, B.; Kimpan, W. Enhancing of artificial bee colony algorithm for virtual machine scheduling and load balancing problem in cloud computing. Int. J. Comput. Intell. Syst. 2020 , 13 , 496–510. [ Google Scholar ] [ CrossRef ]
  • Kumar, R.; Chaturvedi, A. Improved cuckoo search with artificial bee colony for efficient load balancing in cloud computing environment. In Proceedings of the Smart Innovations in Communication and Computational Sciences: Proceedings of ICSICCS 2020, Dallas, TX, USA; Springer: Berlin/Heidelberg, Germany, 2021; pp. 123–131. [ Google Scholar ]
  • Janakiraman, S.; Priya, M.D. Improved artificial bee colony using monarchy butterfly optimization algorithm for load balancing (IABC-MBOA-LB) in cloud environments. J. Netw. Syst. Manag. 2021 , 29 , 39. [ Google Scholar ] [ CrossRef ]
  • Milan, S.T.; Navimipour, N.J.; Bavil, H.L.; Yalcin, S. A QoS-based technique for load balancing in green cloud computing using an artificial bee colony algorithm. J. Exp. Theor. Artif. Intell. 2023 , 1–36. [ Google Scholar ] [ CrossRef ]
  • Sefati, S.S.; Halunga, S. A hybrid service selection and composition for cloud computing using the adaptive penalty function in genetic and artificial bee colony algorithm. Sensors 2022 , 22 , 4873. [ Google Scholar ] [ CrossRef ] [ PubMed ]
  • Makasarwala, H.A.; Hazari, P. Using genetic algorithm for load balancing in cloud computing. In Proceedings of the 2016 8th International Conference on Electronics, Computers and Artificial Intelligence (ECAI), Ploiesti, Romania, 30 June–2 July 2016; IEEE: Piscataway, NJ, USA, 2016; pp. 1–6. [ Google Scholar ]
  • Saadat, A.; Masehian, E. Load balancing in cloud computing using genetic algorithm and fuzzy logic. In Proceedings of the 2019 International Conference on Computational Science and Computational Intelligence (CSCI), Las Vegas, NV, USA, 5–7 December 2019; IEEE: Piscataway, NJ, USA, 2019; pp. 1435–1440. [ Google Scholar ]
  • Gulbaz, R.; Siddiqui, A.B.; Anjum, N.; Alotaibi, A.A.; Althobaiti, T.; Ramzan, N. Balancer genetic algorithm—A novel task scheduling optimization approach in cloud computing. Appl. Sci. 2021 , 11 , 6244. [ Google Scholar ] [ CrossRef ]
  • Pradhan, A.; Bisoy, S.K. A novel load balancing technique for cloud computing platform based on PSO. J. King Saud Univ.-Comput. Inf. Sci. 2022 , 34 , 3988–3995. [ Google Scholar ] [ CrossRef ]
  • Alguliyev, R.M.; Imamverdiyev, Y.N.; Abdullayeva, F.J. PSO-based load balancing method in cloud computing. Autom. Control Comput. Sci. 2019 , 53 , 45–55. [ Google Scholar ] [ CrossRef ]
  • Mapetu, J.P.B.; Chen, Z.; Kong, L. Low-time complexity and low-cost binary particle swarm optimization algorithm for task scheduling and load balancing in cloud computing. Appl. Intell. 2019 , 49 , 3308–3330. [ Google Scholar ] [ CrossRef ]
  • Malik, M.; Suman. Lateral Wolf Based Particle Swarm Optimization (LW-PSO) for Load Balancing on Cloud Computing. Wirel. Pers. Commun. 2022 , 125 , 1125–1144. [ Google Scholar ] [ CrossRef ]
  • Sharma, S.; Luhach, A.K.; Sinha, S. An optimal load balancing technique for cloud computing environment using bat algorithm. Indian J. Sci. Technol. 2016 , 9 , 1–4. [ Google Scholar ] [ CrossRef ]
  • Ullah, A.; Chakir, A. Improvement for tasks allocation system in VM for cloud datacenter using modified bat algorithm. Multimed. Tools Appl. 2022 , 81 , 29443–29457. [ Google Scholar ] [ CrossRef ] [ PubMed ]
  • Zheng, J.; Wang, Y. A hybrid multi-objective bat algorithm for solving cloud computing resource scheduling problems. Sustainability 2021 , 13 , 7933. [ Google Scholar ] [ CrossRef ]
  • Ramya, K.; Ayothi, S. Hybrid dingo and whale optimization algorithm-based optimal load balancing for cloud computing environment. Trans. Emerg. Telecommun. Technol. 2023 , 34 , e4760. [ Google Scholar ] [ CrossRef ]
  • Strumberger, I.; Bacanin, N.; Tuba, M.; Tuba, E. Resource scheduling in cloud computing based on a hybridized whale optimization algorithm. Appl. Sci. 2019 , 9 , 4893. [ Google Scholar ] [ CrossRef ]
  • Ni, L.; Sun, X.; Li, X.; Zhang, J. GCWOAS2: Multiobjective task scheduling strategy based on Gaussian cloud-whale optimization in cloud computing. Comput. Intell. Neurosci. 2021 , 2021 , 5546758. [ Google Scholar ] [ CrossRef ]
  • Sabar, N.R.; Song, A. Grammatical evolution enhancing simulated annealing for the load balancing problem in cloud computing. in Proc. Genet. Evol. Comput. Conf. 2016 , 2016 , 997–1003. [ Google Scholar ]
  • Hanine, M.; Benlahmar, E.-H. A load-balancing approach using an improved simulated annealing algorithm. J. Inf. Process. Syst. 2020 , 16 , 132–144. [ Google Scholar ]
  • Kumar, S.; Singh, G.; Prakash, S. A Performance Improvement Model for Cloud Computing Using Simulated Annealing Algorithm. Int. J. Softw. Innov. (IJSI) 2022 , 10 , 1–17. [ Google Scholar ]
  • Ghobaei-Arani, M. A workload clustering based resource provisioning mechanism using Biogeography based optimization technique in the cloud based systems. Soft Comput. 2021 , 25 , 3813–3830. [ Google Scholar ] [ CrossRef ]
  • Bouhank, A.; Daoudi, M. Non-dominated ranking biogeography based optimization algorithm for virtual machine placement in cloud Computing. In Intelligent Computing: Proceedings of the 2021 Computing Conference ; Springer: Berlin/Heidelberg, Germany, 2022; Volume 1, pp. 423–438. [ Google Scholar ]
  • Devaraj, A.F.S.; Elhoseny, M.; Dhanasekaran, S.; Lydia, E.L.; Shankar, K. Hybridization of firefly and improved multi-objective particle swarm optimization algorithm for energy efficient load balancing in cloud computing environments. J. Parallel Distrib. Comput. 2020 , 142 , 36–45. [ Google Scholar ] [ CrossRef ]
  • RM, S.P.; Bhattacharya, S.; Maddikunta, P.K.R.; Somayaji, S.R.K.; Lakshmanna, K.; Kaluri, R.; Hussien, A.; Gadekallu, T.R. Load balancing of energy cloud using wind driven and firefly algorithms in internet of everything. J. Parallel Distrib. Comput. 2020 , 142 , 16–26. [ Google Scholar ] [ CrossRef ]
  • Sekaran, K.; Khan, M.S.; Patan, R.; Gandomi, A.H.; Krishna, P.V.; Kallam, S. Improving the response time of m-learning and cloud computing environments using a dominant firefly approach. IEEE Access 2019 , 7 , 30203–30212. [ Google Scholar ] [ CrossRef ]
  • Gohil, B.N.; Patel, D.R. A hybrid GWO-PSO algorithm for load balancing in cloud computing environment. In Proceedings of the 2018 Second International Conference on Green Computing and Internet of Things (ICGCIoT), Bangalore, India, 16–18 August 2018; IEEE: Piscataway, NJ, USA, 2018; pp. 185–191. [ Google Scholar ]
  • Sefati, S.; Mousavinasab, M.; Farkhady, R.Z. Load balancing in cloud computing environment using the Grey wolf optimization algorithm based on the reliability: Performance evaluation. J. Supercomput. 2022 , 78 , 18–42. [ Google Scholar ] [ CrossRef ]
  • Sekaran, R.; Munnangi, A.K.; Rajeyyagari, S.; Ramachandran, M.; Al-Turjman, F. Ant colony resource optimization for Industrial IoT and CPS. Int. J. Intell. Syst. 2021 , 37 , 10513–10532. [ Google Scholar ] [ CrossRef ]
  • Karaboga, D.; Akay, B. A comparative study of artificial bee colony algorithm. Appl. Math. Comput. 2009 , 214 , 108–132. [ Google Scholar ] [ CrossRef ]
  • Zhao, F.; Zeng, X. Simulated annealing–genetic algorithm for transit network optimization. J. Comput. Civ. Eng. 2006 , 20 , 57–68. [ Google Scholar ] [ CrossRef ]
  • Shami, T.M.; El-Saleh, A.A.; Alswaitti, M.; Al-Tashi, Q.; Summakieh, M.A.; Mirjalili, S. Particle swarm optimization: A comprehensive survey. IEEE Access 2022 , 10 , 10031–10061. [ Google Scholar ] [ CrossRef ]
  • Yang, X.S.; Gandomi, A.H. Bat algorithm: A novel approach for global engineering optimization. Eng. Comput. 2012 , 29 , 464–483. [ Google Scholar ] [ CrossRef ]
  • Mirjalili, S.; Lewis, A. The whale optimization algorithm. Adv. Eng. Softw. 2016 , 95 , 51–67. [ Google Scholar ] [ CrossRef ]
  • Amine, K. Multiobjective simulated annealing: Principles and algorithm variants. Adv. Oper. Res. 2019 , 2019 , 8134674. [ Google Scholar ] [ CrossRef ]
  • Simon, D. Biogeography-based optimization. IEEE Trans. Evol. Comput. 2008 , 12 , 702–713. [ Google Scholar ] [ CrossRef ]
  • Yang, X.-S.; He, X. Firefly algorithm: Recent advances and applications. Int. J. Swarm Intell. 2013 , 1 , 36–50. [ Google Scholar ] [ CrossRef ]
  • Mirjalili, S.; Mirjalili, S.M.; Lewis, A. Grey wolf optimizer. Adv. Eng. Softw. 2014 , 69 , 46–61. [ Google Scholar ] [ CrossRef ]

Click here to enlarge figure

ReferenceMain ObjectiveTargeted IssueKey Contributions
Gao and Wu [ ] Optimal resource utilization and load avoidanceTask distribution and coordination in cloud computingEfficient load balancing in cloud computing using ACO with improved network performance.
Muteeh et al. [ ]Efficient resource utilization and load balancingLoad balancing in cloud computingSignificant reduction in execution time and cost in cloud resource utilization.
Xu et al. [ ] Achieving load balancing and enhancing resource utilizationMultidimensional resource load balancing across physical machinesImproved resource utilization and load balancing in cloud computing through ACO-based VM allocation.
Gabhane et al. [ ]Enhancing multi-resource load balancingMulti-resource load balancingOutperformance of existing optimization methods in terms of data delivery and processing.
Bui et al. [ ] Balancing the interests of service providers and customersVM provisioning and load balancingUse of coefficients for achieving load balancing in VM provisioning.
Ragmani et al. [ ] Enhancing load balancing and response timeLoad balancing in the cloudSuperior load balancing and response time using Fuzzy-ACO.
Mohammadian et al. [ ] Evenly distributing the workload across systemsLoad balancing in data centersImproved response time, imbalance degree, makespan, and resource utilization.
Raghav and Vyas [ ] Hybrid approach for load balancingLoad balancing in cloud computingImproved performance compared to standalone ACO and bird swarm optimization.
Minarolli [ ] Distributed task scheduling using swarm intelligenceTask allocation during high-load conditionsSuperior outcomes compared to distributed scheduling based solely on ACO or queue load information.
Amer et al. [ ]Efficient resource allocation and cloud performance enhancementMulti-objective scheduling challengesEfficient resource allocation, cloud performance enhancement, and increased profits.
ReferenceMain ObjectiveTargeted IssueKey Contributions
Kruekaew and Kimpan [ ] Optimizing task scheduling and resource utilizationScheduling optimization and load balancing in cloud computingImproved makespan, cost reduction, load balancing, increased throughput, and resource utilization.
Kruekaew and Kimpan [ ] Enhanced VM schedulingVM scheduling in cloud computingSuperior VM scheduling in both homogeneous and heterogeneous environments.
Kumar and Chaturvedi [ ] Load balancing for efficient VM schedulingLoad distribution across VMs in cloud computingSuperior average VM load distribution, high accuracy, and low complexity compared to existing methods.
Janakiraman and Priya [ ] Optimizing resource allocation in cloud environmentsResource allocation challenges in cloud computingMinimizing load variance, makespan, connection deviations, imbalance degree, and maximizing throughput.
Tabagchi Milan et al. [ ] Improving QoS and reducing energy consumptionQoS and energy efficiency in green computingEnhanced QoS, reduced makespan, and minimized energy usage compared to alternatives.
Sefati and Halunga [ ] Optimized service selection in cloud computingService selection and allocation optimization in cloud computingImprovements in reliability, availability, and cost-effectiveness in service selection and allocation.
ReferenceMain ObjectiveTargeted IssueKey Contributions
Makasarwala and Hazari [ ] Enhancing real-world applicability of load balancingCloud computing load balancingIncorporation of time-based request priority for improved real-world relevance and superior performance.
Saadat and Masehian [ ] Swift optimization and user satisfaction improvementLoad balancing in cloud computingAchieving superior solutions faster, enhancing user satisfaction, and elevating cloud computing load balancing.
Gulbaz et al. [ ] Simultaneous improvement in makespan and load balancingLoad balancing in computing systemsAn effective load-balancing mechanism considers the actual VM load and significantly improves makespan, throughput, and load balancing.
ReferenceMain ObjectiveTargeted IssueKey Contributions
Pradhan and Bisoy [ ] Optimizing task scheduling in cloud environmentsTask scheduling and resource utilization in the cloudSuperior performance in minimizing makespan and maximizing resource utilization.
Alguliyev et al. [ ] Task-based load balancing in the cloudLoad balancing and task migration in cloud computingAchieves optimal task scheduling, equitable task distribution, and reduced time consumption for task-to-VM assignments.
Mapetu et al. [ ] Efficient task scheduling and load balancing in cloud computingTask scheduling and load balancingOutperforms existing heuristic and meta-heuristic algorithms in enhancing task scheduling and load distribution.
Malik and Suman [ ] Optimal load distribution and task scheduling in cloud computingTask scheduling and VM load balancingBalanced VM loads, reduced response times, and superior performance over existing systems in task scheduling and load distribution.
ReferenceMain ObjectiveTargeted IssueKey Contributions
Sharma et al. [ ] Fulfilling load balancer objectives using the bat algorithmLoad balancing and its impact on response timeAcknowledged the impact of load balancing on response time and aims for future work on job migration algorithm development.
Ullah and Chakir [ ] Enhancing task distribution within cloud computing’s VMsTask distribution and load balancing in cloud computingOutperforms standard techniques, significantly boosting the accuracy and efficiency of cloud data centers.
Zheng and Wang [ ] Enhancing cloud computing service quality through a hybrid multi-objective bat algorithmService quality improvement in cloud computingSuperior performance over multiple optimization algorithms, particularly regarding makespan, imbalance degree, throughput, and cost.
ReferenceMain ObjectiveTargeted IssueKey Contributions
Ramya and Ayothi [ ] Enhancing cloud performance through load balancingCloud performance optimizationImproved throughput, reliability, makespan, and resource allocation in CloudSim experiments.
Strumberger et al. [ ] Tackling cloud resource scheduling challengesCloud resource schedulingConsistently outperforms the original whale optimization algorithm and other heuristics and meta-heuristics in enhancing cloud resource scheduling.
Ni et al. [ ] Multi-objective task scheduling in cloud computingTask scheduling, resource utilization, and load balancingImproved task completion time, VM load balance, and resource utilization compared to other meta-heuristic algorithms.
ReferenceMain ObjectiveTargeted IssueKey Contributions
Sabar and Song [ ] Novel load-balancing technique combining simulated annealing (SA) with grammatical evolution (GE)Load balancing and parameter tuning in SASuperiority over state-of-the-art algorithms in achieving load balancing, particularly for the Google machine reassignment problem.
Hanine and Benlahmar [ ] Achieving workload balance among VMsWorkload balance among VMsImproved task allocation with fewer iterations compared to standard SA.
Kumar et al. [ ] Minimizing execution time and ensuring load balance in job schedulingJob scheduling and load balancingOptimal solutions outperform various algorithms and significantly reduce job schedule execution times.
ReferenceMain ObjectiveTargeted IssueKey Contributions
Ghobaei-Arani [ ] Optimizing cloud application execution through workload clustering and resource provisioningWorkload clustering and QoS-aware resource provisioningReduction in delay, SLA violations, cost, and energy consumption compared to alternatives, confirming superiority in optimizing cloud application execution.
Bouhank and Daoudi [ ] Minimizing resource wastage and power consumption during VM placementResource optimization in VM placementImproved efficiency, convergence, and solution coverage compared to other multi-objective approaches for VM placement.
ReferenceMain ObjectiveTargeted IssueKey Contributions
Devaraj et al. [ ] Balancing load distribution, enhancing resource utilization, and reducing task response timesLoad balancing in cloud computingAchieves balanced load distribution, enhanced resource utilization, and reduced task response times, outperforming alternatives in simulations.
RM et al. [ ] Integrating domains for energy-efficient Internet of Everything (IoE) servicesEnergy efficiency and traffic reduction in IoT networksSuperiority in extending IoT network lifetimes and significantly reducing traffic burdens compared to state-of-the-art techniques.
Sekaran et al. [ ] Optimizing task distribution for improved mobile learning system accuracyLoad balancing in cloud servers for m-learningPotential to boost throughput and response times in mobile and cloud environments by addressing load imbalance in cloud servers for m-learning.
ReferenceMain ObjectiveTargeted IssueKey Contributions
Gohil and Patel [ ] Enhancing system performance and resource utilization equity in cloud computingLoad balancing in cloud computingEnhanced convergence rates and implementation simplicity compared to other optimization techniques, promising potential for advancing cloud load balancing.
Sefati et al. [ ] Achieving effective load balancing with resource reliability considerationLoad balancing and resource allocation in cloud computingSuperior performance over alternatives, with reduced costs, response times, and optimal solutions in CloudSim-based simulations, addressing cloud-based load-balancing challenges effectively.
The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

Li, P.; Wang, H.; Tian, G.; Fan, Z. Towards Sustainable Cloud Computing: Load Balancing with Nature-Inspired Meta-Heuristic Algorithms. Electronics 2024 , 13 , 2578. https://doi.org/10.3390/electronics13132578

Li P, Wang H, Tian G, Fan Z. Towards Sustainable Cloud Computing: Load Balancing with Nature-Inspired Meta-Heuristic Algorithms. Electronics . 2024; 13(13):2578. https://doi.org/10.3390/electronics13132578

Li, Peiyu, Hui Wang, Guo Tian, and Zhihui Fan. 2024. "Towards Sustainable Cloud Computing: Load Balancing with Nature-Inspired Meta-Heuristic Algorithms" Electronics 13, no. 13: 2578. https://doi.org/10.3390/electronics13132578

Article Metrics

Article access statistics, further information, mdpi initiatives, follow mdpi.

MDPI

Subscribe to receive issue release notifications and newsletters from MDPI journals

You're reading a free article with opinions that may differ from The Motley Fool's Premium Investing Services. Become a Motley Fool member today to get instant access to our top analyst recommendations, in-depth research, investing resources, and more. Learn More

Where Will Amazon Stock Be in 5 Years?

  • Amazon has executed an impressive turnaround after suffering weakness in 2022 and 2023.
  • A diverse set of businesses, along with constant innovation, should help maintain its bull run.
  • Motley Fool Issues Rare “All In” Buy Alert

NASDAQ: AMZN

Amazon Stock Quote

The tech giant has become a profit machine -- and that won't change anytime soon.

If the last few years have anything to teach us, it's to never bet against America's big tech. With shares up 104% over the previous five years, Amazon ( AMZN 1.21% ) has navigated both the COVID-19 pandemic and the 2022 inflation crisis while keeping shareholder value intact (although it was a bumpy ride). Let's explore what the next half-decade could have in store for the diversified technology conglomerate.

Reinforcing the foundation

While Amazon has successfully diversified itself into businesses ranging from cloud computing to artificial intelligence ( AI ) , its foundation remains e-commerce. In 2022, this sprawling segment had begun to underperform because of COVID-era overexpansion and high inflation, which squeezed consumer purchasing power. But now, those challenges are in the past.

Amazon's first-quarter net sales rose 13% year over year to $143.3 billion. But more importantly, its operating income surged more than threefold from $4.8 billion to $15.3 billion over the same time frame.

This transformation was partially driven by significant cost savings in North American e-commerce (where management increased operating income by 455% to $4.98 billion) and international e-commerce (where they swung from a loss of $1.25 billion to a gain of $903 million). Amazon's new decentralized fulfillment network and layoffs are transforming its bottom line, allowing it to focus on exciting new growth drivers.

Pivoting to new growth drivers

Amazon's cloud computing division, Amazon Web Services (AWS), will be the key to its future growth. Like with e-commerce, management has targeted significant layoffs here. And it has paid off, with operating profits jumping 84% to $9.4 billion.

Over the next five years, investors can expect this segment to enjoy continued growth as it benefits from increased AI-related demand -- particularly from start-ups like Anthropic, which uses its industry-leading cloud platform for storage and data management.

Amazon boasts its own custom AI training chips (Inferentia and Trainium), designed to attract clients to AWS's cloud services by offering competitive training speeds at potentially lower costs.

Three darts pinned to a dollar bill sign

Image source: Getty Images.

But growth plans aren't limited to AWS. According to the Financial Times , management aims to develop a new retail channel to ship goods to American shippers directly from warehouses in China. Delivery times will be significantly longer than Amazon's typical one-to-two-day waits but will involve significant cost savings for consumers.

Unlike AWS, this new retail channel probably won't generate high-margin growth. However, it could help Amazon protect its market share from low-cost Chinese rivals like Temu (a subsidiary of PDD Holdings ) or Shein.

Is Amazon stock still a buy?

Long-term investors should always consider valuation when picking a stock because this data shows how much of your buy thesis has already been priced in by other market participants. For Amazon, a forward price-to-earnings (P/E) multiple of 43 means its shares are valued slightly higher than the Nasdaq-100 average of 31.

This looks like a fair premium to pay, considering the company's bottom-line momentum and new growth opportunities in AI technology. The stock looks likely to continue outperforming over the next five years. And it's not too late to buy.

John Mackey, former CEO of Whole Foods Market, an Amazon subsidiary, is a member of The Motley Fool’s board of directors. Will Ebiefung has no position in any of the stocks mentioned. The Motley Fool has positions in and recommends Amazon. The Motley Fool has a disclosure policy .

Related Articles

Person holding a virtual globe with many applications

Premium Investing Services

Invest better with The Motley Fool. Get stock recommendations, portfolio guidance, and more from The Motley Fool's premium services.

  • Cloud and data center networking

security in cloud computing thesis

Cloud networking sustainability strategies yield benefits

As enterprises seek ways to reduce their environmental footprints, one popular way is to migrate on-premises networking infrastructure to third-party csps..

Paul Kirvan

  • Paul Kirvan

The cloud can almost do it all. But the cloud is more than a way to access corporate resources. It can also help organizations achieve their goals around green and sustainable technology.

Cloud networking sustainability strategies minimize energy consumption and help reduce a company's overall carbon footprint -- especially compared with a typical on-premises infrastructure.

What is network sustainability?

IT systems, and networking in particular, consume vast amounts of energy . The internet, for example, relies on hundreds of data centers worldwide, in addition to myriad switching centers. All this infrastructure is necessary to connect businesses and consumers to websites, wireless services and each other.

Major cloud service providers (CSPs), such as AWS, Microsoft and Google, use significant amounts of energy, as do telecom carriers powering their switching offices and network data centers. But the electricity needed to power these systems comes at an environmental cost: Even as utilities generate this power, they release tons of greenhouse gases into the atmosphere.

The challenge, then, is how major service providers can continue to function as they take steps to protect the environment. They do this by deploying energy-efficient and eco-friendly infrastructure elements wherever possible.

Enterprises face the same challenge as they focus on green technology and sustainability measures to limit the environmental effects of their switching and routing devices.

What is cloud network sustainability?

Organizations that transfer their IT infrastructure to an external CSP rely on the provider's ability to stay operational. But users must prepare for risks and costs associated with cloud-based IT services.

Figure 1 depicts a typical configuration where an organization and its data center connect to multiple network services.

Image that depicts how an organization and its data center connect to multiple network services.

All networking services connect through a local telephone company or non-telecom service provider. The company must have sustainability practices and procedures in place to minimize its carbon footprint and energy usage.

By contrast, Figure 2 depicts an all-cloud configuration where the provider delivers networking services. The provider might deliver services via wireless connections or through a telecom provider, but all networking technology resides within the cloud.

Diagram of an all-cloud networking architecture.

When all or most networking resources reside in the cloud, it becomes less of an issue to focus on sustainability and manage an environmentally friendly infrastructure. Sustainability benefits of a cloud network infrastructure include the following:

  • Cuts energy consumed by on-premises networks.
  • Reduces the number of power-hungry devices.
  • Enables remote work.

Cuts energy consumed by on-premises networks

As CSPs realize they use significant amounts of energy, many plan to reduce their dependence on energy provided by fossil fuels. As a result, this decreases the amount of greenhouse gases released into the atmosphere.

One way to reduce energy consumption is through the use of renewable energy sources, such as solar, geothermal and wind. Enterprise customers, meanwhile, no longer have to maintain their own on-premises systems. The need for the enterprise data center might no longer exist.

Reduces the number of power-hungry devices

Enterprises can reduce their need to purchase networking components by migrating their in-house systems to those operated by external CSPs. Endpoint devices remain on-site, but enterprises can use energy-efficient components to reduce their power consumption.

Enables remote work

When networking resides in the cloud, employees can access resources from any location, which, in turn, enables remote work. Remote work minimizes commuting and reduces travel-created emissions. In addition, remote work reduces the prevalence of energy-inefficient office equipment, HVAC systems, lighting and security systems.

Many businesses, however, have asked employees to transition from mostly remote to in-office schedules. Even with employees in the office less frequently, employers who adopt a hybrid approach must account for energy needed for equipment to support workers when they come into the office.

Businesses might want to consider a hybrid arrangement approach, with mission-critical systems located on-site and less critical assets located in a cloud.

Caveats to all-cloud networking

While enterprises might consider transitioning networking systems to a cloud platform, particularly from environment and sustainability perspectives, they face some risks with handing over networking resources to a CSP.

Caveats to all-cloud networking include the following:

  • It might be expensive to adopt an all-cloud infrastructure, so CIOs need to review the associated costs carefully.
  • It might not be practical to move networking services to a third party.
  • CSPs could limit access to company networking resources.
  • If a CSP has a technology outage , a business could lose its networking resources and potentially compromise its resiliency and reputation.
  • CSPs handle systems and data security, which could expose a business to cyberattacks.
  • CSP employees who manage enterprise resources might be unknown to users or might change frequently.
  • User resources, especially data and apps, might reside across multiple cloud data centers.

Businesses might want to consider a hybrid arrangement approach, with mission-critical systems located on-site and less critical assets located in a cloud. From a sustainability perspective, this approach might enable users to strike a balance as they rely on cloud services in a configuration that benefits the business and remains eco-friendly.

Advances in technology give users many options to manage their technology requirements. A cloud networking sustainability strategy can yield important environmental benefits to users, but the organization should still consider its business needs.

Paul Kirvan is an independent consultant, IT auditor, technical writer, editor and educator. He has more than 25 years of experience in business continuity, disaster recovery, security, enterprise risk management, telecom and IT auditing.

Dig Deeper on Cloud and data center networking

security in cloud computing thesis

NGMN sets out plan to gain better energy consumption in virtualised networks

JoeO’Halloran

Compare ESG tools from AWS, Azure and Google Cloud

WillKelly

9 top cloud storage security issues and how to contain them

PaulKirvan

Cloud-native firewalls are the next step in network security

JohnGrady

Organizations have ramped up their use of communications platform as a service and APIs to expand communication channels between ...

Google will roll out new GenAI in Gmail and Docs first and then other apps throughout the year. In 2025, Google plans to ...

For successful hybrid meeting collaboration, businesses need to empower remote and on-site employees with a full suite of ...

For organizations that value convenience and UX, zero touch could be an ideal Android Enterprise enrollment method. Learn about ...

Apple has built a Private Cloud Compute server to process and then delete data sent from Apple Intelligence running on an iPhone,...

When setting up Android Enterprise devices, there are several enrollment methods IT should consider. Admins should learn how to ...

Lenovo sets itself apart from others by offering configured AI products to speed deployment and shape direction, while also ...

In today's world of security threats, it's critical to keep OSes up to date. As the end-of-life date for CentOS 7 approaches, ...

With many organizations developing or evaluating generative AI initiatives, HPE increased its commitment to the space through a ...

IT service providers are upskilling a large portion of their workforces on the emerging technology. The campaign seeks to boost ...

Early-stage companies featured at MIT Sloan's annual CIO event tap partners to speed up technology deployment and broaden their ...

Kaseya's pledge to partners promises more pricing controls and a new subscription service that lets MSPs manage and secure their ...

IMAGES

  1. Trending Top 10 Cloud Computing Security Thesis Topics

    security in cloud computing thesis

  2. PhD Thesis in Cloud Computing Security (PhD Support)

    security in cloud computing thesis

  3. (PDF) Thesis for MS (Computer Science) DEFINING AN EFFECTIVE SECURITY

    security in cloud computing thesis

  4. Descriptive essay: Phd thesis cloud computing security

    security in cloud computing thesis

  5. Latest Cloud Computing Security Thesis Topics [Professional PhD Writers]

    security in cloud computing thesis

  6. List of thesis topics in cloud computing for computer science

    security in cloud computing thesis

VIDEO

  1. Enhancing Cloud Security: What's New in Microsoft Defender for Cloud

  2. Cloud task scheduling and resource allocation Artificial bee colony cloudsim projects

  3. Thales Case Study: Monsido selects CipherTrust Data Security Platform-as-a-Service

  4. 2024-05-14 Logika & Teknik Digital (TI114)

  5. Mobile Cloud Computing Thesis

  6. The World of RISCO

COMMENTS

  1. PDF THE CONCEPT OF CLOUD COMPUTING AND THE MAIN SECURITY ISSUES IN IT

    THE CONCEPT OF CLOUD COMPUTING AND THE MAIN SECURITY ISSUES IN IT. This thesis focuses on studying and analyzing the Cloud Computing technology in concept and its security, which is still a developing technology with great convenience and portability for exchanging information over the Internet via different platforms.

  2. PDF SECURITY ATTACKS IN CLOUD COMPUTING PrabinPandeyv2 (1)

    This thesis depicts major Figure 1. Security Issues in the Cloud Computing. vulnerabilities and challenges in cloud computing such as "Cloud Storage Misconfiguration", "Insecure APIs" and "Theft of Intellectual Property" while implementing Cloud Computing services for any organization. 2.1 Cloud Computing Security threats.

  3. PDF Towards Enhancing Security in Cloud Storage Environments

    cability in cloud computing. Current research in cloud data protection primarily falls into three main categories: 1) Authentication & Access Control, 2) Encryption, and 3) Intrusion Detection. This thesis examines the various mechanisms that currently exist to protect data being stored in a public cloud computing environment. It also looks at ...

  4. Security and privacy protection in cloud computing: Discussions and

    7.1. Challenges. Via analysis and contrast, we observe that cloud computing security protection work has achieved satisfactory research results. However, many problems remain, which prompt the consideration of a variety of security factors and continuous improvements in defense technology and security strategies. 1.

  5. PDF Security and Privacy in Cloud Computing: Technical Review

    Cloud security is dependent primarily on SaaS layers and web applications because they mainly offer cloud services. Therefore, the availability and security of the overall cloud services are dependent on the overall safety of the APIs, software applications, and web browsers [17]. Table 8. Common security attacks.

  6. PDF Hybrid Cloud Infrastructure Security

    the security architecture, which can be operated across two or more clouds with different security approaches. This thesis researched security approaches to architecting hybrid cloud security, by evaluating security implementations and coming up with recommendations on se-curity posturing.

  7. Enhancing Cloud Computing Security and Privacy

    Cloud computing paradigms are gaining widespread acceptance due to the various benefits they offer. These include cost-effectiveness, time savings and efficient

  8. Security in Cloud Computing (Exploring the Evolution and Future of

    Masters Thesis Security in Cloud Computing (Exploring the Evolution and Future of Cloud Cryptography) Cloud computing has grown in importance over the years. It is projected to grow with many organizations expected to digitally transform their business and shift to cloud platforms due to the technology's scalability and multiple other benefits ...

  9. Enhancing cloud security: A study on ensemble learning‐based intrusion

    One counter technique is the use of intrusion detection systems (IDSs), which detect attacks within the cloud environment by monitoring traffic activity. However, since the computing environment varies from the environments of most traditional systems, it is difficult for IDSs to identify attacks and continual changes in attack patterns.

  10. PDF ABSTRACT Security Analysis and Framework of Cloud Computing with By Ali

    Security Analysis and Framework of Cloud Computing with Parity-Based Partially Distributed File System By Ali Asghary Karahroudy July, 2011 Director of Thesis or Dissertation: Dr. M.H.N. Tabrizi Major Department: Department of Computer Science Abstract - Cloud computing offers massive scalability, immediate availability, and low cost

  11. "Security and Privacy in Cloud Computing" by Ramakrishnan Krishnan

    Cloud computing (CC) gained a widespread acceptance as a paradigm of computing. The main aim of CC is to reduce the need for customers' investment in new hardware or software by offering flexible cloud services, with a user reaping the benefits of the pay per use approach. CC demands addressing many security and privacy issues: both problems (vulnerabilities, threats, and attacks) and ...

  12. A Systematic Literature Review on Cloud Computing Security: Threats and

    Cloud computing has become a widely exploited research area in academia and industry. Cloud computing benefits both cloud services providers (CSPs) and consumers. The security challenges associated with cloud computing have been widely studied in the literature. This systematic literature review (SLR) is aimed to review the existing research studies on cloud computing security, threats, and ...

  13. A survey on security challenges in cloud computing: issues, threats

    Cloud computing has gained huge attention over the past decades because of continuously increasing demands. There are several advantages to organizations moving toward cloud-based data storage solutions. These include simplified IT infrastructure and management, remote access from effectively anywhere in the world with a stable Internet connection and the cost efficiencies that cloud computing ...

  14. (PDF) Cloud Computing Security Threats and Attacks with Their

    N. Amara, Huang Zhiqui, Awais Ali [1] conducted a survey of Cloud Computing Security Threats and Attacks with their Mitigation Techniques. This paper discussed the architectural principles of ...

  15. PDF SECURITY TECHNIQUES FOR PROTECTING DATA IN CLOUD COMPUTING

    In this research the SLR is undertaken to discover published papers related to the security challenges and mitigation techniques in Cloud Computing associated with security attacks. To achieve the research objectives we selected the papers published between 2001 and 2010.

  16. Cybersecurity management in cloud computing: semantic ...

    Cloud Computing is an emerging paradigm that is based on the concept of distributed computing. Its definition is related to the use of computer resources which are offered as a service. As with any novel technology, Cloud Computing is subject to security threats, vulnerabilities, and attacks. Recently, the studies on security impact include the interaction of software, people and services on ...

  17. DataSpace: Detection and Mitigation of Security Threats in Cloud Computing

    This dissertation proposes a new architectural framework, CloudMonatt, to detect and mitigate potential security threats targeting customers' VMs in cloud computing. CloudMonatt monitors the security health of VMs and attests to customers if they are getting their desired security. It takes actions to mitigate the potential threats that can ...

  18. A Study on the Security Models and Strategies of Cloud Computing

    Abstract: Cloud computing, with all of the numerous benefits it offers, has in recent years brought about a lot of major change in the ways in which people work and live. However, issues over security continue to be a key worry for a large number of individuals who are considering using cloud computing; this presents a significant barrier to the widespread adoption of this technology.

  19. Securing Cloud Computing Using Access Control Systems: A ...

    Nowadays the world is facing a new model of computing, on-demand computing, which is cloud computing, where everything that a computer system can provide is provided as a service in a cloud model when connected to a network [].Cloud computing is a technology that provides services to users that enable them to access computing resources and store data and applications through the Internet [].

  20. PDF MASTER'S THESIS

    This Magister thesis aims to identify the security issues of virtualization in the cloud computing environments and also reviewing the mitigation techniques in order to improve the security of cloud systems. Systematic literature review or systematic review is performed in this study for finding ... 2.2-Security issues of cloud computing ...

  21. Security attacks in cloud computing

    This thesis discusses the major types of cybersecurity attacks. In particular, it discusses the essential process, needs, and a secure protocol that can be easily understood by beginners or those who are interested in using cloud computing as their daily services to counter potential network threats. The thesis deliberates the concept of ...

  22. PDF A Study on Cloud Computing Security Challenges

    Objectives: This thesis aims to identify security challenges for adapt- ... For this the objective is to identify exist-ing cloud computing security challenges and their solutions. Identify the challenges that have no mitigation strategies and gather solution-s/guidelines/practices from practitioners, for a challenge with more ...

  23. (PDF) Thesis for MS (Computer Science) DEFINING AN EFFECTIVE SECURITY

    1.5 Thesis Organization Chapter 1: Introduction; contains introduction about cloud computing and problems need to be addresses. The chapter also discusses the objective and structure of the thesis. Chapter 2: Cloud Computing and Security; Contains detail discussion about cloud computing, cloud security, and security policy.

  24. Cloud Computing: Security Issues and Research Challenges

    This survey paper aims to analyze the various unresolved security threats in cloud computing which are affecting the various stake-holders linked to it and describes the pros and cons of the existing security strategy and introduces the existing issues in cloud Computing such as data integrity, data segregation, and security and so on.

  25. (PDF) Security Issues in Cloud Computing Technology ...

    Security Issues in Cloud Computing Technology, Attributes and concerns towards it. September 2012; Thesis for: Masters; Authors: Kiran Kumar. De Montfort University; Download full-text PDF Read ...

  26. Towards Sustainable Cloud Computing: Load Balancing with Nature ...

    Cloud computing is considered suitable for organizations thanks to its flexibility and the provision of digital services via the Internet. The cloud provides nearly limitless computing resources on demand without any upfront costs or long-term contracts, enabling organizations to meet their computing needs more economically. Furthermore, cloud computing provides higher security, scalability ...

  27. How to secure Azure Functions with Entra ID

    Securing Azure Functions is paramount to protecting sensitive data and maintaining the application's security and resilience. Organizations can mitigate potential risks by implementing security measures, such as role-based access control (), encryption and regular security assessments.Logging and monitoring mechanisms can provide valuable insights into any security incidents or possible ...

  28. Where Will Amazon Stock Be in 5 Years?

    Amazon's cloud computing division, Amazon Web Services (AWS), will be the key to its future growth. Like with e-commerce, management has targeted significant layoffs here.

  29. Cloud networking sustainability strategies yield benefits

    Cloud networking sustainability strategies minimize energy consumption and help reduce a company's overall carbon footprint -- especially compared with a typical on-premises infrastructure.. What is network sustainability? IT systems, and networking in particular, consume vast amounts of energy.The internet, for example, relies on hundreds of data centers worldwide, in addition to myriad ...

  30. PDF Cloud Security: Private Cloud Solution with End-to-end Encryption

    cloud server enhances data security and privacy in cloud computing. The thesis is carried out in order to prove that building a private cloud server with end-to-end encryption not only enhances data security but also allows users to take the leading in securing their own con-fidential data.