Results for ' Cloud computing'

975 found
Order:
  1. The Ethics of Cloud Computing.Boudewijn De Bruin & Luciano Floridi - 2017 - Science and Engineering Ethics 23 (1):21-39.
    Cloud computing is rapidly gaining traction in business. It offers businesses online services on demand (such as Gmail, iCloud and Salesforce) and allows them to cut costs on hardware and IT support. This is the first paper in business ethics dealing with this new technology. It analyzes the informational duties of hosting companies that own and operate cloud computing datacenters (e.g., Amazon). It considers the cloud services providers leasing ‘space in the cloud’ from hosting (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  2. Cloud computing and its ethical challenges.Matteo Turilli & Luciano Floridi - manuscript
    The paper analyses six ethical challenges posed by cloud computing, concerning ownership, safety, fairness, responsibility, accountability and privacy. The first part defines cloud computing on the basis of a resource-oriented approach, and outlines the main features that characterise such technology. Following these clarifications, the second part argues that cloud computing reshapes some classic problems often debated in information and computer ethics. To begin with, cloud computing makes possible a complete decoupling of ownership, (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  3.  36
    How Cloud Computing Revolutionizes Human Capital Management.Harish Kumar Reddy Kommera - 2019 - Turkish Journal of Computer and Mathematics Education (TURCOMAT) 10 (2):2018-2031.
    The advent of cloud computing has fundamentally transformed various business operations, with Human Capital Management (HCM) standing out as a significant beneficiary. Cloud-based HCM solutions offer unparalleled scalability, accessibility, and integration capabilities, enabling organizations to manage their workforce more efficiently and strategically. This paper explores the revolutionary impact of cloud computing on HCM, highlighting key advancements such as enhanced data analytics, improved employee engagement, cost-effectiveness, and support for remote and hybrid work models. Through a comprehensive (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  4.  31
    Sustainable Cloud Computing: Achieving NetZero Carbon Emissions in Data Centers.Deepak Ramchandani Taman Poojary - 2024 - International Journal of Multidisciplinary Research in Science, Engineering and Technology 8 (3):1720-1725.
    Cloud computing is revolutionizing modern computing infrastructure, but as the demand for cloud services grows, so does the energy consumption of the data centers that support them. Data centers, which house the servers that power cloud computing, are significant contributors to global carbon emissions. This paper explores strategies to achieve net-zero carbon emissions in data centers, focusing on energy efficiency, renewable energy integration, and carbon offsetting practices. The paper reviews current technologies, practices, and policies (...)
    Download  
     
    Export citation  
     
    Bookmark  
  5.  28
    Cloud Computing in the Circular Economy:Redefining Resource Efficiency and Waste Reduction for Sustainable Business Practices.Dwivedi Shashi - 2025 - International Journal of Advanced Research in Arts, Science, Engineering and Management (Ijarasem) 12 (1):348-352.
    The transition to a Circular Economy (CE) is a critical strategy in addressing global challenges related to resource depletion, waste generation, and environmental sustainability. Cloud computing, as a scalable and data-driven technology, has a significant role to play in enabling the circular economy by enhancing resource efficiency, waste reduction, and the optimization of product lifecycles. This paper explores how cloud computing facilitates circular economy practices by leveraging advanced technologies such as data analytics, Internet of Things (IoT), (...)
    Download  
     
    Export citation  
     
    Bookmark  
  6.  25
    Cloud Computing for Space Exploration: Enabling Data-Intensive Research and Remote Operations Beyond Earth.Hirulkar Sakshi R. - 2025 - International Journal of Multidisciplinary Research in Science, Engineering and Technology (Ijmrset) 8 (1):371-376.
    As space exploration advances, the need for innovative technologies to handle the ever-growing data and facilitate remote operations beyond Earth becomes critical. Cloud computing is emerging as a transformative force in space missions, enabling data-intensive research, remote collaboration, and the management of large datasets from space missions. This paper explores the role of cloud computing in space exploration, focusing on its potential to support the growing complexity of space missions, improve data storage and processing, and enable (...)
    Download  
     
    Export citation  
     
    Bookmark  
  7. Cloud Computing and Big Data for Oil and Gas Industry Application in China.Yang Zhifeng, Feng Xuehui, Han Fei, Yuan Qi, Cao Zhen & Zhang Yidan - 2019 - Journal of Computers 1.
    The oil and gas industry is a complex data-driven industry with compute-intensive, data-intensive and business-intensive features. Cloud computing and big data have a broad application prospect in the oil and gas industry. This research aims to highlight the cloud computing and big data issues and challenges from the informatization in oil and gas industry. In this paper, the distributed cloud storage architecture and its applications for seismic data of oil and gas industry are focused on (...)
    Download  
     
    Export citation  
     
    Bookmark  
  8.  64
    Reliability Engineering in Cloud Computing: Strategies, Metrics, and Performance Assessment.Anand Karanveer - 2023 - International Journal of Multidisciplinary Research in Science, Engineering and Technology 6 (12):3451-3464.
    Cloud computing has transformed the nature of computation, sharing of information resources, and storage capabilities, including the flexibility to scale these resources for corporate use. Nevertheless, maintaining high reliability in cloud environments is still an issue that has not been solved because of factors such as Hardware failures, network interruptions/slowdowns and software vulnerabilities. This paper discusses several methods that can be employed in the reliability engineering of cloud computing, including fault tolerance, redundancy, monitoring and predictive (...)
    Download  
     
    Export citation  
     
    Bookmark  
  9.  49
    The Evolution of Cloud Computing: Key Trends and Future Directions.Rama Bansode Suvarna More - 2021 - International Journal of Advanced Research in Education and Technology 8 (1):447-452.
    Cloud computing has revolutionized the way businesses and individuals access and utilize computing resources. With its rapid adoption over the last few decades, it has become the backbone of many IT services across industries. This paper explores the evolution of cloud computing, highlighting key trends and identifying future directions that will shape the landscape. It discusses the evolution from traditional on-premise systems to the cloud-first approach, current advancements such as multi-cloud and hybrid (...) environments, and the growing integration of artificial intelligence (AI) and machine learning (ML) into cloud services. Furthermore, the paper examines the challenges organizations face, including security concerns and regulatory compliance. Finally, the future directions of cloud computing are explored, focusing on edge computing, quantum cloud services, and the potential for deeper AI integration. (shrink)
    Download  
     
    Export citation  
     
    Bookmark  
  10. An Intelligent Tutoring System for Cloud Computing.Hasan Abdulla Abu Hasanein & Samy S. Abu Naser - 2017 - International Journal of Academic Research and Development 2 (1):76-80.
    Intelligent tutoring system (ITS) is a computer system which aims to provide immediate and customized or reactions to learners, usually without the intervention of human teacher's instructions. Secretariats professional to have the common goal of learning a meaningful and effective manner through the use of a variety of computing technologies enabled. There are many examples of professional Secretariats used in both formal education and in professional settings that have proven their capabilities. There is a close relationship between private lessons (...)
    Download  
     
    Export citation  
     
    Bookmark   13 citations  
  11. A Survey On Cloud Computing Security Issues.Dr V. Anuratha & M. Sasikala - 2016 - International Journal of Computer Science and Engineering Technology 2 (4).
    While cloud computing is picking up prevalence, assorted security and protection issues are rising that block the quick reception of this new computing worldview. Furthermore, the improvement of cautious arrangements is lingering behind. To guarantee a safe and reliable cloud environment it is fundamental to distinguish the impediments of existing arrangements and imagine headings for future research. In this paper, we have reviewed basic security and protection challenges in cloud computing, arranged different existing arrangements, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  12. A Shift from Cloud Computing Model to Fog Computing.C. Sailesh & S. Svermani - 2016 - Journal of Applied Computing 1 (1).
    Cloud computing has provided many opportunities to businesses and individuals. It enables global and on demand network access to a shared pool of resources with minimal management effort. However, this bliss has become a problem for latency-sensitive applications. To improve efficiency of cloud and to reduce the amount of data that needs to be transported to the cloud for data processing, analysis and storage, a new network architect technology 'Fog Computing' has been introduced. In fog (...)
    Download  
     
    Export citation  
     
    Bookmark  
  13.  59
    The Advancement of Cloud Computing: From Conventional IT Infrastructure to Serverless Computing (13th edition).Choudhary Anjali - 2024 - International Journal of Innovative Research in Computer and Communication Engineering 12 (1):119-126. Translated by Choudhary Anjali.
    At present, numerous innovations and technologies take place continuously. Serverless computing is a paradigm switch from conventional cloud computing. The term ‘serverless’ represents that the cloud developers do not interact with servers directly, whereas they use codes and logic to do so. This feature enhanced and extended the overall performance of the serverless platform. This paper presents a comparative study of both cloud environments from conventional to platform-independent or serverless computing. Apart from this, several (...)
    Download  
     
    Export citation  
     
    Bookmark  
  14. A STUDY ON CLOUD COMPUTING EFFICIENT JOB SCHEDULING ALGORITHMS.Shyam P. Sunder, S. V. Poranki Shekar & Marri Shiva - 2018 - International Journal of Research and Analytical Reviews 5 (2).
    cloud computing is a general term used to depict another class of system based computing that happens over the web. The essential advantage of moving to Clouds is application versatility. Cloud computing is extremely advantageous for the application which are sharing their resources on various hubs. Scheduling the errand is a significant testing in cloud condition. Typically undertakings are planned by client prerequisites. New scheduling techniques should be proposed to defeat the issues proposed by (...)
    Download  
     
    Export citation  
     
    Bookmark  
  15. Load Balancing Algorithms in Cloud Computing Analysis and Performance Evaluation.Mahnaz Hashemi & Amir Masoud - 2020 - IEEE 3 (4).
    Distributing the system workload and balancing all incoming requests among all processing nodes in cloud computing environments is one of the important challenges in today cloud computing world. Many load balancing algorithms and approaches have been proposed for distributed and cloud computing systems. In addition the broker policy for distributing the workload among different datacenters in a cloud environment is one of the important factors for improving the system performance. In this paper we (...)
    Download  
     
    Export citation  
     
    Bookmark  
  16. Use of Cloud Computing in University Libraries In view of the Technology Acceptance Model.Ahmewd L. Ferdi - 2017 - Iraqi Journal for Information 8 (12):98-131.
    Cloud computing is considered as a new type of technology, in fact, it is an extension of the information technology's developments which are based on the pooling of resources and infrastructure to provide services depend on using the cloud, in the sense that instead of these services and resources exist on local servers or personal devices, they are gathered in the cloud and be shared on the Internet. This technology has achieved an economic success no one (...)
    Download  
     
    Export citation  
     
    Bookmark  
  17. ITS for cloud computing.Hasan Abu Hasanen & Monnes Hanjory - 2017 - International Journal of Academic Research and Development 2 (1):76-80.
    Intelligent tutoring system (ITS) is a computer system which aims to provide immediate and customized or reactions to learners, usually without the intervention of human teacher's instructions. Secretariats professional to have the common goal of learning a meaningful and effective manner through the use of a variety of computing technologies enabled. There are many examples of professional Secretariats used in both formal education and in professional settings that have proven their capabilities. There is a close relationship between private lessons (...)
    Download  
     
    Export citation  
     
    Bookmark  
  18.  56
    The Evolution of Cloud Computing: From Virtualization to Edge Computing.Ingale Amruta - 2025 - International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering 14 (2):453-458.
    Cloud computing has evolved from a nascent technology to a foundational pillar of modern IT infrastructure, driving innovations across industries by providing scalable, on-demand resources and services. Its evolution, from the early stages of virtualization to the emergence of edge computing, has reshaped how data is stored, processed, and accessed. This paper explores the key milestones in the evolution of cloud computing, beginning with the advent of virtualization and moving through the development of various (...) models, culminating in the rise of edge computing. It also examines the implications of this evolution for businesses, consumers, and the future of technology. (shrink)
    Download  
     
    Export citation  
     
    Bookmark  
  19. OPTIMIZING DATA SCIENCE WORKFLOWS IN CLOUD COMPUTING.Tummalachervu Chaitanya Kanth - 2024 - Journal of Science Technology and Research (JSTAR) 4 (1):71-76.
    This paper explores the challenges and innovations in optimizing data science workflows within cloud computing environments. It begins by highlighting the critical role of data science in modern industries and the pivotal contribution of cloud computing in enabling scalable and efficient data processing. The primary focus lies in identifying and analyzing the key challenges encountered in current data science workflows deployed in cloud infrastructures. These challenges include scalability issues related to handling large volumes of data, (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  20. Load Balancing of Tasks on Cloud Computing Using Time Complexity of Proposed Algorithm.V. Smrithi & B. K. Tiwari - 2018 - International Journal of Scientific Research and Engineering Trends 4 (6).
    Cloud Computing is a developing field and lean toward by numerous one at current yet it's rage is part more rely upon its execution which thusly is excessively rely upon the powerful booking algorithm and load adjusting . In this paper we address this issue and propose an algorithm for private cloud which has high throughput and for open cloud which address the issue of condition awareness likewise with execution. To enhance the throughput in private (...) SJF is utilized for planning and to conquer shape the issue of starvation we utilize limited pausing. For stack adjusting we screen the heap and dispatch the activity to the minimum stacked VM. To acquire advantage and to have open door for future upgrade out in the open cloud condition cognizance is the key factor and for better execution and load adjusting likewise wanted. While stack adjusting enhances the execution, the earth awareness increment the benefit of cloud suppliers. (shrink)
    Download  
     
    Export citation  
     
    Bookmark  
  21. Offline privacy preserving proxy re-encryption in mobile cloud computing.Yaping Lin & Voundi Koe Arthur Sandor - 2019 - Pervasive and Mobile Computing 59.
    This paper addresses the always online behavior of the data owner in proxy re- encryption schemes for re-encryption keys issuing. We extend and adapt multi-authority ciphertext policy attribute based encryption techniques to type-based proxy re-encryption to build our solution. As a result, user authentication and user authorization are moved to the cloud server which does not require further interaction with the data owner, data owner and data users identities are hidden from the cloud server, and re-encryption keys are (...)
    Download  
     
    Export citation  
     
    Bookmark  
  22.  99
    Optimized Cloud Computing Solutions for Cardiovascular Disease Prediction Using Advanced Machine Learning.Kannan K. S. - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):465-480.
    The world's leading cause of morbidity and death is cardiovascular diseases (CVD), which makes early detection essential for successful treatments. This study investigates how optimization techniques can be used with machine learning (ML) algorithms to forecast cardiovascular illnesses more accurately. ML models can evaluate enormous datasets by utilizing data-driven techniques, finding trends and risk factors that conventional methods can miss. In order to increase prediction accuracy, this study focuses on adopting different machine learning algorithms, including Decision Trees, Random Forest, Support (...)
    Download  
     
    Export citation  
     
    Bookmark  
  23. Data Storage, Security And Techniques In Cloud Computing.R. Dinesh Arpitha & Shobha R. Sai - 2018 - International Journal of Research and Analytical Reviews 5 (4).
    Cloud computing is the computing technology which provides resources like software, hardware, services over the internet. Cloud computing provides computation, software, data access, and storage services that do not require end- user knowledge of the physical location and configuration of the system that delivers the services. Cloud computing enables the user and organizations to store their data remotely and enjoy good quality applications on the demand without having any burden associated with local hardware (...)
    Download  
     
    Export citation  
     
    Bookmark  
  24.  38
    Virtual Machine for Big _Data in Cloud Computing (13th edition).Banupriya I. Manivannan B., - 2024 - International Journal of Innovative Research in Science, Engineering and Technology 13 (11):18380-18386. Translated by Manivannan B.
    Cloud computing has revolutionized data management for businesses and individuals a like, ushering in an era of unprecedented accessibility and scalability. As demand for cloud services continues to surge, the imperative for efficient and secure systems becomes paramount. One approach to meeting this challenge is the consolidation of virtual machines onto fewer physical servers, optimizing resource utilization and yielding significant energy savings. Moreover, this consolidation strategy bolsters overall security by enabling more effective monitoring and control of virtual (...)
    Download  
     
    Export citation  
     
    Bookmark  
  25.  42
    A Review of the Scope_ of Cloud Computing In Education (7th edition).Prof Mahendra Kumar B. Hritik Raj, - 2024 - International Journal of Multidisciplinary Research in Science, Engineering and Technology 7 (7):13230-13234.
    With the capability of using virtualized resources as a service, over the Internet, and having dynamic scalability, cloud computing has started to gain momentum across many types of enterprises. It is probably going to have a big effect on the future of schooling. Cloud computing, hence, offers a great opportunity for learning institutions, especially the less privileged ones, to efficiently manage their information system without having to spend additional money purchasing more computers and networking equipment. The (...)
    Download  
     
    Export citation  
     
    Bookmark  
  26.  27
    A Survey Paper on Profit Maximization of Cloud Broker in Cloud Computing.Karan Zaveri Sanket Magar - 2020 - International Journal of Innovative Research in Computer and Communication Engineering 8 (2):26-31.
    Today’s world cloud computing becoming so popular because of an effective and efficient way to provide computing resources and services to customers on demand. Cloud computing being an information technology paradigm enables access to shared pools of configurable system resources and higher-level services often over the Internet. The objective of providers is to maximize profits by their price schemes, while the main purpose of clients is to have quality of services for a reasonable price. Thus (...)
    Download  
     
    Export citation  
     
    Bookmark  
  27. Deep Learning - Driven Data Leakage Detection for Secure Cloud Computing.Yoheswari S. - 2025 - International Journal of Engineering Innovations and Management Strategies 1 (1):1-4.
    Cloud computing has revolutionized the storage and management of data by offering scalable, cost-effective, and flexible solutions. However, it also introduces significant security concerns, particularly related to data leakage, where sensitive information is exposed to unauthorized entities. Data leakage can result in substantial financial losses, reputational damage, and legal complications. This paper proposes a deep learning-based framework for detecting data leakage in cloud environments. By leveraging advanced neural network architectures, such as Long Short-Term Memory (LSTM) and Convolutional (...)
    Download  
     
    Export citation  
     
    Bookmark  
  28. Artificial intelligent smart home automation with secured camera management-based GSM, cloud computing and arduino.Musaddak Abdul Zahra & Laith A. Abdul-Rahaim Musaddak M. Abdul Zahra, Marwa Jaleel Mohsin - 2020 - Periodicals of Engineering and Natural Sciences 8 (4):2160-2168.
    Home management and controlling have seen a great introduction to network that enabled digital technology, especially in recent decades. For the purpose of home automation, this technique offers an exciting capability to enhance the connectivity of equipment within the home. Also, with the rapid expansion of the Internet, there are potentials that added to the remote control and monitoring of such network-enabled devices. In this paper, we had been designed and implemented a fully manageable and secure smart home automation system (...)
    Download  
     
    Export citation  
     
    Bookmark  
  29.  41
    Cybersecurity Risk Management in the Era of Remote Work and Cloud Computing.Dhivya K. - 2025 - International Journal of Innovative Research in Science, Engineering and Technology 14 (2):1637-1641.
    The rise of remote work and the widespread adoption of cloud computing have transformed the digital landscape, providing organizations with flexibility and scalability. However, these advancements have also introduced new cybersecurity challenges. Traditional security frameworks, which focus on perimeter defenses, are increasingly inadequate in securing cloud-based environments and remote workforces. This paper explores the evolving landscape of cybersecurity risk management in the context of remote work and cloud computing. It investigates the unique risks associated with (...)
    Download  
     
    Export citation  
     
    Bookmark  
  30.  68
    Deep Learning - Driven Data Leakage Detection for Secure Cloud Computing.Yoheswari S. - 2024 - International Journal of Engineering Innovations and Management Strategies 5 (1):1-4.
    Cloud computing has revolutionized the storage and management of data by offering scalable, cost-effective, and flexible solutions. However, it also introduces significant security concerns, particularly related to data leakage, where sensitive information is exposed to unauthorized entities. Data leakage can result in substantial financial losses, reputational damage, and legal complications. This paper proposes a deep learning-based framework for detecting data leakage in cloud environments. By leveraging advanced neural network architectures, such as Long Short- Term Memory (LSTM) and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  31. Implementation of Data Mining on a Secure Cloud Computing over a Web API using Supervised Machine Learning Algorithm.Tosin Ige - 2022 - International Journal of Advanced Computer Science and Applications 13 (5):1 - 4.
    Ever since the era of internet had ushered in cloud computing, there had been increase in the demand for the unlimited data available through cloud computing for data analysis, pattern recognition and technology advancement. With this also bring the problem of scalability, efficiency and security threat. This research paper focuses on how data can be dynamically mine in real time for pattern detection in a secure cloud computing environment using combination of decision tree algorithm (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  32. A Review on Resource Provisioning Algorithms Optimization Techniques in Cloud Computing.M. R. Sumalatha & M. Anbarasi - 2019 - International Journal of Electrical and Computer Engineering 9 (1).
    Cloud computing is the provision of IT resources (IaaS) on-demand using a pay as you go model over the internet. It is a broad and deep platform that helps customers builds sophisticated, scalable applications. To get the full benefits, research on a wide range of topics is needed. While resource over provisioning can cost users more than necessary, resource under provisioning hurts the application performance. The cost effectiveness of cloud computing highly depends on how well the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  33. A Review on Biometric Encryption System in Cloud Computing.Xiufeng Liu, Sheraz Arshad, Nosheen Nazir, Mubeen Fatima & Mahreen Mahi - 2018 - International Journal of Computer Science and Network Solutions 6 (1).
    This Review paper is about the security of bio metric templates in cloud databases. Biometrics is proved to be the best authentication method. However, the main concern is the security of the biometric template, the process to extract and stored in the database within the same database along with many other. Many techniques and methods have already been proposed to secure templates, but everything comes with its pros and cons, this paper provides a critical overview of these issues and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  34.  33
    Survey on Block Design-Based Key Agreement for Group Data Sharing in Cloud Computing.Dr Uma Godase Megha Shah - 2019 - International Journal of Innovative Research in Computer and Communication Engineering 9 (7):7987-7991.
    Data shared in the cloud allows many numerous people exchange their data in a group that helps improve environmental work efficiency. It is a challenging task today how we can assure data security in a single group and also how to share the data with multiple group members, and for it we use a key agreement protocol to share our data in a safe group. In this article we demonstrate a new conceptual agreement protocol, which contributes to the participation (...)
    Download  
     
    Export citation  
     
    Bookmark  
  35. Optimized Attribute-Based Search and Secure Storage for Cloud Computing Environments.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):361-370.
    In the modern digital era, cloud storage has become an indispensable service due to its scalability, accessibility, and cost-effectiveness. However, with the vast amount of sensitive information stored on cloud platforms, ensuring data security and privacy remains a critical challenge. Traditional encryption techniques, while secure, often hinder efficient data retrieval, especially when using keyword searches. To address this, attribute-based keyword search (ABKS) offers a promising solution by allowing secure, fine-grained access control and efficient keyword searches over encrypted data.
    Download  
     
    Export citation  
     
    Bookmark  
  36. Robust Multiple Authority and Attribute Based Encryption for Access Control in Cloud Computing.P. S. Mona & M. Dhande ProfNutan - 2018 - International Journal on Recent and Innovation Trends in Computing and Communication 6 (3).
    Data access control is a challenging issue in public cloud storage systems. Ciphertext-Policy Attribute-Based Encryption (CP-ABE) has been adopted as a promising technique to provide flexible, fine-grained and secure data access control for cloud storage with honest-but- curious cloud servers. However, in the existing CP-ABE schemes, the single attribute authority must execute the time-consuming user legitimacy verification and secret key distribution, and hence it results in a single-point performance bottleneck when a CP-ABE scheme is adopted in a (...)
    Download  
     
    Export citation  
     
    Bookmark  
  37. CSsEv: Modelling QoS Metrics in Tree Soft Toward Cloud Services Evaluator based on Uncertainty Environment.Mona Gharib, Florentin Smarandache & Mona Mohamed - 2024 - International Journal of Neutrosophic Science 23 (2):32-41.
    Cloud computing (ClC) has become a more popular computer paradigm in the preceding few years. Quality of Service (QoS) is becoming a crucial issue in service alteration because of the rapid growth in the number of cloud services. When evaluating cloud service functioning using several performance measures, the issue becomes more complex and non-trivial. It is therefore quite difficult and crucial for consumers to choose the best cloud service. The user's choices are provided in a (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  38.  35
    The Future of Serverless Computing: Pushing the Boundaries of Cost Efficiency and Scalability in the Cloud.Satish Patkar Shraddha Sayali - 2025 - International Journal of Advanced Research in Arts, Science, Engineering and Management 12 (1):359-363.
    Serverless computing has become a pivotal model in cloud computing, offering the promise of reducing operational overhead, improving cost efficiency, and enabling scalable solutions without the need to manage infrastructure. This paradigm allows developers to focus purely on application logic while abstracting away the complexities of server management. As serverless computing evolves, it is pushing the boundaries of cloud architectures by enabling dynamic scaling and cost-effective resource utilization. This paper explores the future trajectory of serverless (...)
    Download  
     
    Export citation  
     
    Bookmark  
  39.  30
    Cloud-Native Quantum Computing: Unlocking the Potential of Quantum Algorithms on Cloud Infrastructure.Kanchan C. Gaikwad Sakshi R. Hirulkar - 2025 - International Journal of Multidisciplinary and Scientific Emerging Research (Ijmserh) 13 (1):261-264.
    Quantum computing has the potential to revolutionize problem-solving across various domains, from cryptography to materials science. However, the complexities of quantum hardware, including the need for highly specialized environments and significant computational resources, have made quantum computing difficult for most organizations to access. Cloud-native quantum computing, which leverages cloud infrastructure to provide scalable, ondemand access to quantum processors, offers a transformative solution to this challenge. This paper explores the rise of cloud-native quantum computing, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  40. EXPLORING SERVER-LESS COMPUTING FOR EFFICIENT RESOURCE MANAGEMENT IN CLOUD ARCHITECTURES.Tummalachervu Chaitanya Kanth - 2023 - Journal of Science Technology and Research (JSTAR) 4 (1):77-83.
    Server-less computing, also known as Function as a Service (FaaS), revolutionizes cloud architecture by allowing developers to focus on code and functionality without managing underlying infrastructure. This paradigm enhances resource management efficiency by dynamically allocating resources only when needed, thus optimizing cost and performance. Server-less models, epitomized by platforms like AWS Lambda, Google Cloud Functions, and Azure Functions, provide automatic scaling and fine-grained billing, making them ideal for applications with variable workloads. While challenges such as cold start (...)
    Download  
     
    Export citation  
     
    Bookmark   13 citations  
  41.  30
    Future-Proofing Cloud Infrastructures:Analysing the Impact of Azure's Quantum Computing on Enterprise Solutions.Ramteke Rashmi - 2025 - International Journal of Advanced Research in Education and Technology(Ijarety) 12 (1):234-238.
    The rapid advancements in cloud computing are transforming enterprise solutions across industries. Among the most promising innovations is quantum computing, which holds the potential to revolutionize how businesses process data, optimize systems, and solve complex problems. Microsoft Azure, a leader in cloud infrastructure, has integrated quantum computing through Azure Quantum to offer scalable quantum solutions. This paper explores the impact of Azure's quantum computing capabilities on enterprise solutions, focusing on scalability, problem-solving efficiency, and future-proofing (...)
    Download  
     
    Export citation  
     
    Bookmark  
  42. AI-POWERED THREAT INTELLIGENCE FOR PROACTIVE SECURITY MONITORING IN CLOUD INFRASTRUCTURES.Tummalachervu Chaitanya Kanth - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):76-83.
    Cloud computing has become an essential component of enterprises and organizations globally in the current era of digital technology. The cloud has a multitude of advantages, including scalability, flexibility, and cost-effectiveness, rendering it an appealing choice for data storage and processing. The increasing storage of sensitive information in cloud environments has raised significant concerns over the security of such systems. The frequency of cyber threats and attacks specifically aimed at cloud infrastructure has been increasing, presenting (...)
    Download  
     
    Export citation  
     
    Bookmark   13 citations  
  43. EFFICIENT STRATEGIES FOR SEAMLESS CLOUD MIGRATIONS USING ADVANCED DEPLOYMENT AUTOMATIONS.Tummalachervu Chaitanya Kanth - 2023 - Journal of Science Technology and Research (JSTAR) 4 (1):61-70.
    The increasing complexity and scale of modern computing needs have led to the development and adoption of cloud computing as a ubiquitous paradigm for data storage and processing. The hybrid cloud model, which combines both public and private cloud infrastructures, has been particularly appealing to organizations that require both the scalability offered by public clouds and the security features of private clouds. Various strategies for configuring and managing resources have been developed to optimize the hybrid (...)
    Download  
     
    Export citation  
     
    Bookmark   13 citations  
  44.  42
    An effective encryption algorithm for multi-keyword-based top-K retrieval on cloud data.R. Sugumar - 2016 - Indian Journal of Science and Technology 9 (48):1-5.
    Cloud Computing provides vast storage facility. The requirement of this system is to improve the security and transmission performance in the cloud storage environment. Methods: This system provides two level of security for the cloud data. The Client Data Security Contrivance (CDSC) and Cloud Service Provider (CSP) Data Security Contrivance are the two methods which transforms the original data to cipher text. The security algorithm used in CDSC is Linguistic Steganography. Blowfish algorithm is used in (...)
    Download  
     
    Export citation  
     
    Bookmark   59 citations  
  45.  56
    A Proficient Two Level Security Contrivances for Storing Data in Cloud.R. Sugumar K. Anbazhagan - 2016 - Indian Journal of Science and Technology 9 (48):1-5.
    Cloud Computing provides vast storage facility. The requirement of this system is to improve the security and transmission performance in the cloud storage environment. Methods: This system provides two level of security for the cloud data. The Client Data Security Contrivance (CDSC) and Cloud Service Provider (CSP) Data Security Contrivance are the two methods which transforms the original data to cipher text. The security algorithm used in CDSC is Linguistic Steganography. Blowfish algorithm is used in (...)
    Download  
     
    Export citation  
     
    Bookmark   51 citations  
  46. Survey of Enhancing Security of Cloud Using Fog Computing.Abhishek Singh Abhishek Singh - 2019 - International Journal for Research Trends and Innovation 4 (1).
    Nowadays Fog Computing has become a vast research area in the domain of cloud computing. Due to its ability of extending the cloud services towards the edge of the network, reduced service latency and improved Quality of Services, which provides better user experience. However, the qualities of Fog Computing emerge new security and protection challenges. The Current security and protection estimations for cloud computing cannot be straightforwardly applied to the fog computing because (...)
    Download  
     
    Export citation  
     
    Bookmark  
  47. ADVANCE DATA SECURITY IN CLOUD NETWORK SYSTEMS.Tummalachervu Chaitanya Kanth - 2023 - Journal of Science Technology and Research (JSTAR) 4 (1):29-36.
    This research presents a novel and efficient public key cryptosystem known as the Enhanced Schmidt Samoa (ESS) cryptosystem, proposed to safeguard the data of a single owner in cloud computing environments. Data storage is a one-time process in the cloud, while data retrieval is a frequent operation. Experimental results demonstrate that the ESS cryptosystem offers robust data confidentiality in the cloud, surpassing the security provided by traditional cryptosystems. The research also introduces a secure cloud framework (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  48. Cloud Based Bookmark Manager.A. Sulaiman Suit - 2021 - Journal of Science Technology and Research (JSTAR) 2 (1):128-138.
    Cloud computing is the web-based empowering agent for sharing of mechanical infrastructural assets, programming, and computerized content, permitting them Infrastructure, Platforms, Software) to be offered on a compensation-for-use premise, similar to any utility assistance. Dramatic development in Computer capacities, the extra-conventional pace of development in advanced substance utilization, trailed by unstable development of uses have brought forth the beginning of Cloud Computing. The bookmarks which are saved offline can be only accessed by the specific system. The (...)
    Download  
     
    Export citation  
     
    Bookmark  
  49.  27
    Cloud-based Document Collaboration System.Sayeda Raqeeba Banu Manjula K. - 2025 - International Journal of Innovative Research in Computer and Communication Engineering 13 (3):2071-2077.
    A Cloud-based Document Collaboration System (CDCS) enables multiple users to work together on documents in real time, leveraging the power of cloud computing to facilitate seamless and efficient collaboration. With increasing reliance on cloud technologies, such systems have revolutionized how teams, organizations, and individuals manage, edit, and share documents. This paper presents an overview of Cloud-based Document Collaboration Systems, focusing on the architecture, key features, benefits, challenges, and popular platforms. Additionally, we discuss the underlying technologies (...)
    Download  
     
    Export citation  
     
    Bookmark  
  50. Cloud Data Security Using Elliptic Curve Cryptography.Arockia Panimalars, N. Dharani, R. Aiswarya & Pavithra Shailesh - 2017 - International Research Journal of Engineering and Technology 9 (4).
    Data security is, protecting data from ill- conceived get to, utilize, introduction, intrusion, change, examination, recording or destruction. Cloud computing is a sort of Internet-based computing that grants conjoint PC handling resources and information to PCs what's more, different gadgets according to necessity. It is a model that empowers universal, on-request access to a mutual pool of configurable computing resources. At present, security has been viewed as one of the best issues in the improvement of (...) Computing. The key issue in effective execution of Cloud Computing is to adequately deal with the security in the cloud applications. This paper talks about the part of cryptography in cloud computing to improve the data security. The expectation here is to get bits of knowledge another security approach with the usage of cryptography to secure information at cloud data centers. (shrink)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
1 — 50 / 975