Advances, Systems and Applications

Journal of Cloud Computing Cover Image

  • Search by keyword
  • Search by citation

Page 1 of 15

Optimizing energy efficiency in MEC networks: a deep learning approach with Cybertwin-driven resource allocation

Cybertwin (CT) is an innovative network structure that digitally simulates humans and items in a virtual environment, significantly influencing Cybertwin instances more than regular VMs. Cybertwin-driven netwo...

  • View Full Text

Attack detection model for BCoT based on contrastive variational autoencoder and metric learning

With development of blockchain technology, clouding computing and Internet of Things (IoT), blockchain and cloud of things (BCoT) has become development tendency. But the security has become the most developme...

MDB-KCP: persistence framework of in-memory database with CRIU-based container checkpoint in Kubernetes

As the demand for container technology and platforms increases due to the efficiency of IT resources, various workloads are being containerized. Although there are efforts to integrate various workloads into K...

Enhancing intrusion detection: a hybrid machine and deep learning approach

The volume of data transferred across communication infrastructures has recently increased due to technological advancements in cloud computing, the Internet of Things (IoT), and automobile networks. The netwo...

An intelligent decision system for virtual machine migration based on specific Q-learning

Due to the convenience of virtualization, the live migration of virtual machines is widely used to fulfill optimization objectives in cloud/edge computing. However, live migration may lead to side effects and ...

Real-time scheduling of power grid digital twin tasks in cloud via deep reinforcement learning

As energy demand continues to grow, it is crucial to integrate advanced technologies into power grids for better reliability and efficiency. Digital Twin (DT) technology plays a key role in this by using data ...

ASOD: an adaptive stream outlier detection method using online strategy

In the current era of information technology, blockchain is widely used in various fields, and the monitoring of the security and status of the blockchain system is of great concern. Online anomaly detection f...

Computational intelligence-based classification system for the diagnosis of memory impairment in psychoactive substance users

Computational intelligence techniques have emerged as a promising approach for diagnosing various medical conditions, including memory impairment. Increased abuse of psychoactive drugs poses a global public he...

Adaptive scheduling-based fine-grained greybox fuzzing for cloud-native applications

Coverage-guided fuzzing is one of the most popular approaches to detect bugs in programs. Existing work has shown that coverage metrics are a crucial factor in guiding fuzzing exploration of targets. A fine-gr...

Non-orthogonal multiple access-based MEC for energy-efficient task offloading in e-commerce systems

Mobile edge computing (MEC) reduces the latency for end users to access applications deployed at the edge by offloading tasks to the edge. With the popularity of e-commerce and the expansion of business scale,...

Multiple time servers timed-release encryption based on Shamir secret sharing for EHR cloud system

Electronic health record (EHR) cloud system, as a primary tool driving the informatization of medical data, have positively impacted both doctors and patients by providing accurate and complete patient informa...

Efficiently localizing system anomalies for cloud infrastructures: a novel Dynamic Graph Transformer based Parallel Framework

Cloud environment is a virtual, online, and distributed computing environment that provides users with large-scale services. And cloud monitoring plays an integral role in protecting infrastructures in the clo...

From data to insights: the application and challenges of knowledge graphs in intelligent audit

In recent years, knowledge graph technology has been widely applied in various fields such as intelligent auditing, urban transportation planning, legal research, and financial analysis. In traditional auditin...

HybOff: a Hybrid Offloading approach to improve load balancing in fog environments

Load balancing is crucial in distributed systems like fog computing, where efficiency is paramount. Offloading with different approaches is the key to balancing the load in distributed environments. Static off...

Hierarchical Identity-Based Authenticated Encryption with Keyword Search over encrypted cloud data

With the rapid development of cloud computing technology, cloud storage services are becoming more and more mature. However, the storage of sensitive data on remote servers poses privacy risks and is presently...

Correction to: Enhancing lung cancer diagnosis with data fusion and mobile edge computing using DenseNet and CNN

The original article was published in Journal of Cloud Computing 2024 13 :91

ABWOA: adaptive boundary whale optimization algorithm for large-scale digital twin network construction

Digital twin network (DTN) as an emerging network paradigm, have garnered growing attention. For large-scale networks, a crucial problem is how to effectively map physical networks onto the infrastructure plat...

Distance optimization and directional overcurrent relay coordination using edge-powered biogeography-genetic algorithms

The effective functioning and regulation of power systems crucially rely on the coordination of distance and directional overcurrent relays. Accurate fault detection and successful clearing sequences require s...

Towards optimized scheduling and allocation of heterogeneous resource via graph-enhanced EPSO algorithm

Efficient allocation of tasks and resources is crucial for the performance of heterogeneous cloud computing platforms. To achieve harmony between task completion time, device power consumption, and load balanc...

Topic and knowledge-enhanced modeling for edge-enabled IoT user identity linkage across social networks

The Internet of Things (IoT) devices spawn growing diverse social platforms and online data at the network edge, propelling the development of cross-platform applications. To integrate cross-platform data, use...

Privacy-preserving sports data fusion and prediction with smart devices in distributed environment

With the rapid advancement of sports analytics and fan engagement technologies, the volume and diversity of physique data generated by smart devices across various distributed sports platforms have grown signi...

Quantum support vector machine for forecasting house energy consumption: a comparative study with deep learning models

The Smart Grid operates autonomously, facilitating the smooth integration of diverse power generation sources into the grid, thereby ensuring a continuous, reliable, and high-quality supply of electricity to e...

Enhancing multimedia management: cloud-based movie type recognition with hybrid deep learning architecture

Film and movie genres play a pivotal role in captivating relevant audiences across interactive multimedia platforms. With a focus on entertainment, streaming providers are increasingly prioritizing the automat...

MTG_CD: Multi-scale learnable transformation graph for fault classification and diagnosis in microservices

The rapid advancement of microservice architecture in the cloud has led to the necessity of effectively detecting, classifying, and diagnosing run failures in microservice applications. Due to the high dynamic...

Recognizing online video genres using ensemble deep convolutional learning for digital media service management

It's evident that streaming services increasingly seek to automate the generation of film genres, a factor profoundly shaping a film's structure and target audience. Integrating a hybrid convolutional network ...

A bizarre synthesized cascaded optimized predictor (BizSCOP) model for enhancing security in cloud systems

Due to growing network data dissemination in cloud, the elasticity, pay as you go options, globally accessible facilities, and security of networks have become increasingly important in today's world. Cloud se...

STAM-LSGRU: a spatiotemporal radar echo extrapolation algorithm with edge computing for short-term forecasting

With the advent of Mobile Edge Computing (MEC), shifting data processing from cloud centers to the network edge presents an advanced computational paradigm for addressing latency-sensitive applications. Specif...

Constrained optimal grouping of cloud application components

Cloud applications are built from a set of components often deployed as containers, which can be deployed individually on separate Virtual Machines (VMs) or grouped on a smaller set of VMs. Additionally, the a...

Students health physique information sharing in publicly collaborative services over edge-cloud networks

Data privacy is playing a vital role while facing the digital life aspects. Today, the world is being extensively inter-connected through the internet of things (IoT) technologies. This huge interconnectivity ...

Efficient and secure privacy protection scheme and consensus mechanism in MEC enabled e-commerce consortium blockchain

The application of blockchain technology to the field of e-commerce has solved many dilemmas, such as low transparency of transactions, hidden risks of data security and high payment costs. Mobile edge computi...

A mobile edge computing-focused transferable sensitive data identification method based on product quantization

Sensitive data identification represents the initial and crucial step in safeguarding sensitive information. With the ongoing evolution of the industrial internet, including its interconnectivity across variou...

Blockchain-based 6G task offloading and cooperative computing resource allocation study

In the upcoming era of 6G, the accelerated development of the Internet of Everything and high-speed communication is poised to provide people with an efficient and intelligent life experience. However, the exp...

Deep Reinforcement Learning techniques for dynamic task offloading in the 5G edge-cloud continuum

The integration of new Internet of Things (IoT) applications and services heavily relies on task offloading to external devices due to the constrained computing and battery resources of IoT devices. Up to now,...

Enhancing patient healthcare with mobile edge computing and 5G: challenges and solutions for secure online health tools

Patient-focused healthcare applications are important to patients because they offer a range of advantages that add value and improve the overall healthcare experience. The 5G networks, along with Mobile Edge ...

Online dynamic multi-user computation offloading and resource allocation for HAP-assisted MEC: an energy efficient approach

Nowadays, the paradigm of mobile computing is evolving from a centralized cloud model towards Mobile Edge Computing (MEC). In regions without ground communication infrastructure, incorporating aerial edge comp...

Enhancing lung cancer diagnosis with data fusion and mobile edge computing using DenseNet and CNN

The recent advancements in automated lung cancer diagnosis through the application of Convolutional Neural Networks (CNN) on Computed Tomography (CT) scans have marked a significant leap in medical imaging and...

The Correction to this article has been published in Journal of Cloud Computing 2024 13 :111

Cross-chain asset trading scheme for notaries based on edge cloud storage

Blockchain has penetrated in various fields, such as finance, healthcare, supply chain, and intelligent transportation, but the value exchange between different blockchains limits their expansion. Cross-chain ...

An overview of QoS-aware load balancing techniques in SDN-based IoT networks

Increasing and heterogeneous service demands have led to traffic increase, and load imbalance challenges among network entities in the Internet of Things (IoT) environments. It can affect Quality of Service (Q...

MSCO: Mobility-aware Secure Computation Offloading in blockchain-enabled Fog computing environments

Fog computing has evolved as a promising computing paradigm to support the execution of latency-sensitive Internet of Things (IoT) applications. The mobile devices connected to the fog environment are resource...

Correction to: Edge intelligence‑assisted animation design with large models: a survey

The original article was published in Journal of Cloud Computing 2024 13 :48

Provably secure data selective sharing scheme with cloud-based decentralized trust management systems

The smart collection and sharing of data is an important part of cloud-based systems, since huge amounts of data are being created all the time. This feature allows users to distribute data to particular recip...

Stacked-CNN-BiLSTM-COVID: an effective stacked ensemble deep learning framework for sentiment analysis of Arabic COVID-19 tweets

Social networks are popular for advertising, idea sharing, and opinion formation. Due to COVID-19, coronavirus information disseminated on social media affects people’s lives directly. Individuals sometimes ma...

Traffic prediction for diverse edge IoT data using graph network

More researchers are proposing artificial intelligence algorithms for Internet of Things (IoT) devices and applying them to themes such as smart cities and smart transportation. In recent years, relevant resea...

Predicting UPDRS in Parkinson’s disease using ensembles of self-organizing map and neuro-fuzzy

Parkinson's Disease (PD) is a complex, degenerative disease that affects nerve cells that are responsible for body movement. Artificial Intelligence (AI) algorithms are widely used to diagnose and track the pr...

A cloud-edge computing architecture for monitoring protective equipment

The proper use of protective equipment is very important to avoid fatalities. One sector in which this has a great impact is that of construction sites, where a large number of workers die each year. In this s...

A cloud-edge collaborative task scheduling method based on model segmentation

With the continuous development and combined application of cloud computing and artificial intelligence, some new methods have emerged to reduce task execution time for training neural network models in a clou...

Analysis and prediction of virtual machine boot time on virtualized computing environments

Starting a virtual machine (VM) is a common operation in cloud computing platforms. In order to achieve better management of resource provisioning, a cloud platform needs to accurately estimate the VM boot tim...

IoT workload offloading efficient intelligent transport system in federated ACNN integrated cooperated edge-cloud networks

Intelligent transport systems (ITS) provide various cooperative edge cloud services for roadside vehicular applications. These applications offer additional diversity, including ticket validation across transp...

Intelligent code search aids edge software development

The growth of multimedia applications poses new challenges to software facilities in edge computing. Developers must effectively develop edge computing software to accommodate the rapid expansion of multimedia...

Correction to: Advanced series decomposition with a gated recurrent unit and graph convolutional neural network for non‑stationary data patterns

The original article was published in Journal of Cloud Computing 2024 13 :20

  • Editorial Board
  • Sign up for article alerts and news from this journal

Annual Journal Metrics

Citation Impact 2023 Journal Impact Factor: 3.7 5-year Journal Impact Factor: 3.8 Source Normalized Impact per Paper (SNIP): 1.406 SCImago Journal Rank (SJR): 0.995

Speed 2023 Submission to first editorial decision (median days): 12 Submission to acceptance (median days): 116

Usage 2023 Downloads: 733,672 Altmetric mentions: 49

  • More about our metrics
  • ISSN: 2192-113X (electronic)

Benefit from our free funding service

New Content Item

We offer a free open access support service to make it easier for you to discover and apply for article-processing charge (APC) funding. 

Learn more here

Thank you for visiting nature.com. You are using a browser version with limited support for CSS. To obtain the best experience, we recommend you use a more up to date browser (or turn off compatibility mode in Internet Explorer). In the meantime, to ensure continued support, we are displaying the site without styles and JavaScript.

  • View all journals
  • Explore content
  • About the journal
  • Publish with us
  • Sign up for alerts
  • Open access
  • Published: 26 February 2024

A Framework for the Interoperability of Cloud Platforms: Towards FAIR Data in SAFE Environments

  • Robert L. Grossman   ORCID: orcid.org/0000-0003-3741-5739 1 ,
  • Rebecca R. Boyles 2 ,
  • Brandi N. Davis-Dusenbery 3 ,
  • Amanda Haddock 4 ,
  • Allison P. Heath 5 ,
  • Brian D. O’Connor 6 ,
  • Adam C. Resnick 5 ,
  • Deanne M. Taylor   ORCID: orcid.org/0000-0002-3302-4610 5 , 7 &
  • Stan Ahalt   ORCID: orcid.org/0000-0002-8395-1279 8  

Scientific Data volume  11 , Article number:  241 ( 2024 ) Cite this article

1395 Accesses

1 Altmetric

Metrics details

  • Computational platforms and environments

As the number of cloud platforms supporting scientific research grows, there is an increasing need to support interoperability between two or more cloud platforms. A well accepted core concept is to make data in cloud platforms Findable, Accessible, Interoperable and Reusable (FAIR). We introduce a companion concept that applies to cloud-based computing environments that we call a S ecure and A uthorized F AIR E nvironment (SAFE). SAFE environments require data and platform governance structures and are designed to support the interoperability of sensitive or controlled access data, such as biomedical data. A SAFE environment is a cloud platform that has been approved through a defined data and platform governance process as authorized to hold data from another cloud platform and exposes appropriate APIs for the two platforms to interoperate.

As the number of cloud platforms supporting scientific research grows 1 , there is an increasing need to support cross-platform interoperability. By a cloud platform, we mean a software platform in a public or private cloud 2 for managing and analyzing data and other authorized functions. With interoperability between cloud platforms, data does not have to be replicated in multiple cloud platforms but can be managed by one cloud platform and analyzed by researchers in another cloud platform. A common use case is to use specialized tools in another cloud platform that are unavailable in the cloud platform hosting the data. Interoperability also enables cross-platform functionality, allowing researchers analyzing data in one cloud platform to obtain the necessary amount of data required to power a statistical analysis, to validate an analysis using data from another cloud platform, or to bring together multiple data types for an integrated analysis when the data is distributed across two or more cloud platforms. In this paper, we are especially concerned with frameworks that are designed to support the interoperability of sensitive or controlled access data, such as biomedical data or qualitative research data.

There have been several attempts to provide frameworks for the interoperating cloud platforms for biomedical data, including those by the GA4GH organization 3 and by the European Open Science Cloud (EOSC) Interoperability Task Force of the FAIR Working Group 4 . A key idea in these frameworks is to make data in cloud platforms findable, accessible, interoperable and reusable (FAIR) 5 .

The authors have developed several cloud platforms operated by different organizations and were part of a working group, one of whose goals was to increase the interoperability between these cloud platforms. The challenge is that even when a dataset is FAIR and in a cloud platform (referred to here as Cloud Platform A), in general the governance structure put in place by the organization sponsoring Cloud Platform A (called the Project Sponsor below) requires that sensitive data remain in the platform and only be accessed by users within the platform. Therefore, even if a user was authorized to analyze the data, there was no simple way for the user to analyze the data in any cloud platform (referred to here as Cloud Platform B), except for the single cloud platform operated by the organization (Cloud Platform A).

There are several reasons for this lack of interoperability between cloud platforms hosting sensitive data: First, as just mentioned, for many cloud platforms, it is against policy to remove data from the cloud platform; instead, data must be analyzed within the cloud platform.

Second, in some cases, to manage the security and compliance of the data, often there is only a single cloud platform that has the right to distribute controlled access data; other cloud platforms may contain a copy of the data, but by policy cannot distribute it.

Third, a typical clause in a data access agreement requires that if the user elects not to use Cloud Platform A, the user’s organization is responsible for assessing and attesting to the security and compliance of Cloud Platform B. This can be difficult and time consuming unless there is a pre-existing relationship.

Fourth, once a Sponsor has approved a single cloud platform as authorized to host data and to analyze the hosted data, there may be a perception of increased risk to the Sponsor in allowing other third party platforms to be used to host or to analyze the data. Because of this increased risk, there has been limited interoperability of cloud platforms for controlled access data.

The consensus from the working group was that interoperability of data and an acceleration of research outcomes could be achieved if standard interoperating principals and interfaces could describe which platforms had the right to distribute a dataset and which cloud platforms could be used to analyze data.

In this note, we introduce a companion concept to FAIR that applies to cloud-based computing environments that we call a S ecure and A uthorized F AIR E nvironment (SAFE). The goal of the SAFE framework is to address the four issues described above that today limit the interoperability between cloud platforms. The cloud-based framework consisting of FAIR data in SAFE environments is intended to apply to research data that has restrictions on its access or its distribution or both its access and distribution. Some examples are: biomedical data 3 , 6 , including EHR data, clinical/phenotype data, genomics data, imaging data; social science data 7 and administrative data 8 . We emphasize that the environment itself is not FAIR in the sense of 5 , but rather that a SAFE environment contains FAIR data and is designed to be part of a framework to support the interoperability of FAIR data between two or more data platforms.

Also, SAFE cloud platforms are designed to support platform governance decisions about whether data in one cloud platform may be linked or transferred to another cloud platform, either for direct use by researchers or to redistribution. As we will argue below, SAFE is designed to support decisions between two or more cloud platforms to interoperate in the sense that data may be moved between them, but is not designed nor intended to be a security or compliance level describing a single cloud platform.

The proposed SAFE framework provides a way for a Sponsor to “extend its boundary” to selected third party platforms that can be used to analyze the data by authorized users. In this way, researchers can use the platform and tools that they are most comfortable with.

In order to discuss the complexities of an interoperability framework across cloud based resources, in the next section, we first define some important concepts from data and platform governance.

Distinguishing Data and Platform Governance

We assume that data is generated by research projects and that there is an organization that is responsible for the project. We call this organization the Project Sponsor . This can be any type of organization, including a government agency, an academic research center, a not-for-profit organization, or a commercial organization.

In the framework that we are proposing here, the Project Sponsor sets up and operates frameworks for (1) data governance and (2) platform governance. The Project Sponsor is ultimately responsible for the security and compliance of the data and of the cloud platform. Data governance includes: approving datasets to be distributed by cloud platforms, authorizing users to access data, and related activities. Platform governance includes: approving cloud platforms as having the right to distribute datasets to other platforms and to users and approving cloud platforms as authorized environments so that the cloud platforms can be used by users to access, analyze, and explore datasets.

By controlled access data , we mean data that is considered sensitive enough that agreements for the acceptable use of the data must be signed. One between the organization providing the data (the Data Contributor ) and the Project Sponsor and another between researchers (which we call Users in the framework) accessing the data and the Project Sponsor. Controlled access data arises, for example, when research participants contribute data for research purposes through a consent process, and a researcher signs an agreement to follow all the terms and conditions required by the consent agreements of the research participants or by an Institutional Review Board (IRB) that approves an exemption so that consents are not required.

Commonly used terms that are needed to describe SAFE are contained in Table  1 . Table  2 describes the roles and responsibilities of the Project Sponsor, Platform Operator, and User.

As is usual, we use the term authorized user , as someone who has applied for and been approved for access to controlled-access data. See Table  1 for a summary of definitions used in this paper.

One of the distinguishing features of our interoperability framework is that we formalize the concept of an authorized environment. An authorized environment is a cloud platform workspace or computing / analysis environment that is approved for the use or analysis of controlled access data.

Using the concepts of authorized user and authorized environment, we provide a framework enabling the interoperability between two or more cloud platforms.

SAFE Environments

Below we describe some suggested processes for authorizing environments, including having their security and compliance reviewed by the appropriate official or committee determined by the platform governance process. We also argue that the environments should have APIs so that they are findable, accessible and interoperable, enabling other cloud platforms to interoperate with it. As mentioned above, we use the acronym SAFE for S ecure and A uthorized F AIR E nvironments to describe these types of environments. In other words, a SAFE environment is a cloud platform that has been approved through a platform governance process as an authorized environment and exposes an API enabling other cloud platforms to interact with it (Fig.  1 ).

figure 1

An overview of supporting FAIR data in SAFE environments.

In this paper, we make the case that SAFE environments are a natural complement to FAIR data and establishing a trust relationship between a cloud platform with FAIR data and a cloud platform that is a SAFE environment for analyzing data is a good basis for interoperability . Examples of the functionality to be exposed by the API and proposed identifiers are discussed below. Importantly, our focus is to provide a framework for attestation and approvals to support interoperability. Definition of the exact requirements for approvals is based on the needs of a particular project sponsor and out of scope of this manuscript.

Of course, a cloud platform can include both FAIR data and a SAFE environment for analyzing data. The issue of interoperability between cloud platforms arises when a researcher using a cloud platform that is a SAFE environment for analyzing data needs to access data from another cloud platform that contains data of interest.

We emphasize that the framework applies to all types of controlled-access data, (e.g., clinical, genomic, imaging, environmental, etc.) and that decisions about authorized users and authorized platforms depend upon the sensitivity of the data, with more conditions for data access and uses as the sensitivity of the data increases.

The SAFE framework that we are implementing uses the following identifiers:

SAFE assumes that cloud platforms have a globally unique identifier (GUID) identifying them, which we call an authorized platform identifier (APID) .

SAFE assumes that cloud platforms form networks consisting of 2 or more cloud platforms, which we call authorized platform network (APN) . Authorized platform networks have a globally unique identifier, which we call an authorized platform network identifier (APNI) . As an example, cloud platforms in an authorized platform network can sign a common set of agreements or otherwise agree to interoperate. A particular cloud platform can interoperate with all or selected cloud platforms in an authorized platform network.

SAFE assumes that geographic regions are identified by a globally unique identifier, which we call an Authorized Region ID (ARID). For example, the entire world may be an authorized region, or a single country may be the only authorized region. SAFE assumes that datasets that limit their distribution and analysis to specified regions identify these regions in their metadata.

To implement SAFE, we propose that a cloud environment support an API that exposes metadata with the following information:

Authorized Platform Identifier (APID)

A list of the Authorized Platform Network Identifiers (APNIs) that it belongs to.

A particular authorized platform network must also agree to a protocol for securely exchanging the APID and list of APNIs that it belongs to, such as transport layer security (TLS) protocol.

In addition, cloud platforms that host data that can be accessed and analyzed in other cloud platforms, should associated with each dataset metadata that specifies: a) whether the data can be removed from the platform (i.e. does the platform have the right to distribute data); b) a list of authorize platform networks that have been approved as authorized environments to access and analyze the data; and, c) an optional list of authorized region IDs (ARIDs) describing any regional restrictions on where the data may be accessed and analyzed.

Platform Governance

Examples of platform governance frameworks.

An example of a process for authorization of an environment is provided by the process used by the NIH Data Access Committees (DACs) through the dbGaP system 9 for sharing genomics data 10 . Currently, if a NIH DAC approves a user’s access to data, and if the user specifies in the data access request (DAR) application that a cloud platform will be used for analysis, then the user’s designated IT Director takes the responsibility for a cloud platform as an authorized environment for the user’s analysis of controlled access data, and a designated official at the user’s institution (the Signing Official) takes the overarching responsibility on behalf of the researcher’s institution.

As another example, the platform governance process may follow the “NIST 800-53 Security and Privacy Controls for Information Systems and Organizations” framework developed by the US National Institute for Standards and Technology (NIST) 11 . This framework has policies, procedures, and controls at three Levels - Low, Moderate and High, and each organization designates a person that can approve an environment by issuing what is called an Authority to Operate (ATO). More specifically, in this example, the platform governance process may require the following to approve a cloud platform as an authorized environment for hosting controlled access data: (1) a potential cloud platform implement the policies, procedures and controls specified by NIST SP 800-53 at the Moderate level; (2) a potential cloud platform have an independent assessment by a third party to ensure that the policies, controls and procedures are appropriately implemented and documented; (3) an appropriate official or committee evaluate the assessment, and if acceptable, approves the environment as an authorized environment by issuing an Authority to Operate (ATO) or following another agreed to process; (4) yearly penetration tests by an independent third party, which are reviewed by the appropriate committee or official.

Many US government agencies follow NIST SP 800-53, and a designated government official issues an Authority to Operate (ATO) when appropriate after the evaluation of a system 11 . In the example above, we are using the term “authority to operate” to refer to a more general process in which any organization decides to evaluate a cloud platform using any security and compliance framework and has completed all the steps necessary so that the cloud platform can be used. In the example, an organization, which may or may not be a government organization, uses the NIST SP 800-53 security and compliance framework and designates an individual within the organization with the role and responsibility to check that (1), (2) and (4) have been accomplished and issues an ATO when this is the case.

The right to distribute controlled access data

In general, when a user or a cloud platform is granted access to controlled access data, the user or platform does not have the right to redistribute the data to other users, even if the other user has signed the appropriate Data Access Agreements. Instead, to ensure there is the necessary security and compliance in place, any user accessing data as an authorized user must access the data from a platform approved for this purpose. We refer to platforms with the ability to share controlled access data in this way as having the right to distribute the authorized data.

One of the core ideas of SAFE is that data which has been approved for hosting in a cloud platform can be accessed and transferred to another cloud platform in the case that: the first cloud platform has the right to distribute the data and the second cloud platform is recognized as an authorized environment for the data following an approved process, such as described in the next section. There remains the possibility that the cloud platform requesting access to the data is in fact an imposter and not the authorized environment it appears to be. For this reason, as part of SAFE, we recommend that the cloud platform with the right to distribute data should verify through a chain of trust that it is indeed the intended authorized environment.

Basis for approving authorized environments

The guiding principle of SAFE is that research outcomes are accelerated by supporting interoperability of data across authorized environments. While the specific requirements may vary by project and project sponsor, in order to align with this principle, it is critical that Project Sponsors define requirements transparently and support interoperability when the requirements are met.

Above we provided examples of approaches and requirements project sponsors may use in approving an Authorized Environment. As mentioned above, NIST SP 800-53 provides a basis for authorizing an environment, but there are many frameworks for evaluating the security and compliance of a system that may be used. As an example, the organization evaluating the cloud platform may choose to use a framework such as NIST SP 800-171 12 , or may choose another process for approving a cloud platform as an authorized environment rather than issuing an ATO.

For example, both the Genomic Data Commons 6 and the AnVIL system 13 follow NIST SP 800-53 at the Moderate Level and the four steps described above. The authorizing official for the Genomic Data Commons is a government official at the US National Cancer Institute, while the authorizing official for AnVIL is an organizational official associated with the Platform Operator.

Two or more cloud platforms can interoperate when both the Sponsors and Operators each agree to: (1) use the same framework and process for evaluating cloud platforms as authorized environments; (2) each authorize one or more cloud platforms as authorized environments for particular datasets; (3) each agree to a common protocol or process for determining when a given cloud platform is following (1) and (2). Sometimes, this situation is described as the platforms having a trust relationship between them.

Basis for approving the right to distribute datasets

For each dataset, a data governance responsibility is to determine the right of a cloud based data repository to distribute data to an authorized user in an authorized environment. To reduce risk of privacy and confidentiality breach, the data governance process may choose to limit the number of data repositories that can distribute a particular controlled access dataset and to impose additional security and compliance requirements on those cloud based data repositories that have the right to distribute particular sensitive controlled-access datasets. These risks of course must be balanced with the imperative to accelerate research and improve patient outcomes which underlies the motivations of many study participants.

Interoperability

SAFE is focused on the specific aspect of interoperability of whether data hosted in one cloud platform can be analyzed in another cloud platform.

With the concepts of an authorized user, an authorized environment, and the right to distribute, interoperability is achieved when two or more cloud platforms have the right to distribute data to an authorized user in a cloud based authorized environment.

This suggests a general principle for interoperability: the data governance process for a dataset should authorize users, the platform governance process for a dataset should authorize cloud platform environments, and two or more cloud platforms can interoperate by trusting these authorizations .

Figure  2 summarizes some of the key decisions enabling two cloud platforms to interoperate using the SAFE framework.

figure 2

Some of the key decisions for interoperating two cloud platforms using the SAFE framework.

Towards Fair Data in SAFE Environments

Today there are a growing number of cloud platforms that hold biomedical data of interest to the research community, a growing number of cloud-based analysis tools for analyzing biomedical data, and a growing challenge for researchers to access the data they need, since often the analysis of data takes place in a different cloud platform than the cloud platform that hosts the data of interest.

We have presented the concept of cloud-based authorized environments that are called SAFE environments, which are secure and authorized environments that are appropriate for the analysis of sensitive biomedical data. The role of platform governance is to identify the properties required for a cloud platform to be an authorized environment for a particular dataset and to approve a cloud based platform that holds controlled access data to distribute the data to specific authorized platforms.

By standardizing the properties to be a SAFE environment and agreeing to the principle that the data governance process for a dataset should authorize users and the platform governance process should authorize cloud platform environments, then all that is required for two or more cloud platforms to interoperate is for the cloud platforms to trust these authorizations. We can shorten this principle to: “authorize the users, authorize the cloud platforms, and trust the authorizations.” This is the core basis for interoperability in the SAFE framework. See Table  3 for a summary.

This principle came out of the NIH NCPI Community and Governance Working Group and is the basis for the interoperability of the data platforms in this group. We are currently implementing APID, APNI and AIRD identifiers as described above, as well as the dataset metadata describing whether a dataset can be redistributed or transferred to other data platforms for analysis.

Navale, V. & Bourne, P. E. Cloud computing applications for biomedical science: A perspective. PLOS Comput. Biol. 14 (no. 6), e1006144, https://doi.org/10.1371/journal.pcbi.1006144 (2018). Jun.

Article   ADS   PubMed   PubMed Central   CAS   Google Scholar  

Mell, P. M. & Grance, T. The NIST definition of cloud computing, National Institute of Standards and Technology, Gaithersburg, MD, NIST SP 800–145, https://doi.org/10.6028/NIST.SP.800-145 (2011).

Rehm, H. L. et al ., GA4GH: International policies and standards for data sharing across genomic research and healthcare, Cell Genomics , vol. 1, no. 2, p. 100029, https://doi.org/10.1016/j.xgen.2021.100029 (Nov. 2021).

Achieving interoperability in EOSC: The Interoperability Framework | EOSCSecretariat. [Online]. Available: https://www.eoscsecretariat.eu/news-opinion/achieving-interoperability-eosc-interoperability-framework (Accessed: Jul. 30, 2021).

Wilkinson, M. D. et al ., The FAIR Guiding Principles for scientific data management and stewardship, Sci. Data , vol. 3, no. 1, p. 160018, https://doi.org/10.1038/sdata.2016.18 (Dec. 2016).

Heath, A. P. et al . The NCI Genomic Data Commons, Nat. Genet ., pp. 1–6, https://doi.org/10.1038/s41588-021-00791-5 (Feb. 2021).

ICPSR Data Excellence Research Impact. [Online]. Available: https://www.icpsr.umich.edu/web/pages/ (Accessed: Nov. 20, 2023).

Lane, J. Building an Infrastructure to Support the Use of Government Administrative Data for Program Performance and Social Science Research. Ann. Am. Acad. Pol. Soc. Sci. 675 (no. 1), 240–252, https://doi.org/10.1177/0002716217746652 (2018). Jan.

Article   Google Scholar  

Mailman, M. D. et al . The NCBI dbGaP database of genotypes and phenotypes,. Nat. Genet. 39 (no. 10), 1181–1186 (2007).

Article   PubMed   PubMed Central   CAS   Google Scholar  

Paltoo, D. N. et al . Data use under the NIH GWAS Data Sharing Policy and future directions, Nat. Genet ., vol. 46, no. 9, pp. 934–938, https://doi.org/10.1038/ng.3062 (Sep. 2014).

Dempsey, K., Witte, G. & Rike, D. Summary of NIST SP 800-53 Revision 4, Security and Privacy Controls for Federal Information Systems and Organizations, National Institute of Standards and Technology, Gaithersburg, MD, NIST CSWP 02192014, https://doi.org/10.6028/NIST.CSWP.02192014 (Feb. 2014).

Ross, R., Pillitteri, V., Dempsey, K., Riddle, M. & Guissanie, G. Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations, National Institute of Standards and Technology, NIST Special Publication (SP) 800-171 Rev. 2 , https://doi.org/10.6028/NIST.SP.800-171r2 (Feb. 2020).

Schatz, M. C. et al . Inverting the model of genomics data sharing with the NHGRI Genomic Data Science Analysis, Visualization, and Informatics Lab-space (AnVIL), https://doi.org/10.1101/2021.04.22.436044 (Apr. 2021).

Download references

Acknowledgements

This document captures discussions of the NIH Cloud-Based Platform Interoperability (NCPI) Community/Governance Working Group that have occurred over the past 24 months, and we want to acknowledge the contributions of this working group. This working group included personnel from federal agencies, health systems, industry, universities, and patient advocacy groups. However, this document does not represent any official decisions or endorsement of potential policy changes and is not an official work product of the NCPI Working Group. Rather, it is a summary of some of the working group discussions and is an opinion of the authors. Research reported in this publication was supported in part by the following grants and contracts: the NIH Common Fund under Award Number U2CHL138346, which is administered by the National Heart, Lung, and Blood Institute of the National Institutes of Health; the National Heart, Lung, and Blood Institute, National Institutes of Health, Department of Health and Human Services under the Agreement No. OT3 HL142478-01 and OT3 HL147154-01S1; National Cancer Institute, National Institutes of Health, Department of Health and Human Services under Contract No. HHSN261201400008C; and ID/IQ Agreement No. 17X146 under Contract No. HHSN261201500003I. The content is solely the responsibility of the authors and does not necessarily represent the official views of the National Institutes of Health.

Author information

Authors and affiliations.

Center for Translational Data Science, University of Chicago, Chicago, IL, USA

Robert L. Grossman

RTI International, Research Triangle Park, Triangle Park, NC, USA

Rebecca R. Boyles

Velsera, Charlestown, MA, USA

Brandi N. Davis-Dusenbery

Dragon Master Initiative, Kechi, KS, USA

Amanda Haddock

Children’s Hospital of Philadelphia, Philadelphia, PA, USA

Allison P. Heath, Adam C. Resnick & Deanne M. Taylor

Nimbus Informatics, Carrboro, NC, USA

Brian D. O’Connor

University of Pennsylvania Perelman School of Medicine, Philadelphia, PA, USA

Deanne M. Taylor

University of North Carolina, Chapel Hill, Chapel Hill, NC, USA

You can also search for this author in PubMed   Google Scholar

Contributions

All the authors contributed to the drafting and review of the manuscript.

Corresponding author

Correspondence to Robert L. Grossman .

Ethics declarations

Competing interests.

One of the authors (BND-D) is an employee of a for-profit company (Velsera).

Additional information

Publisher’s note Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Supplementary information

Manuscript with marked changes, rights and permissions.

Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article’s Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article’s Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/ .

Reprints and permissions

About this article

Cite this article.

Grossman, R.L., Boyles, R.R., Davis-Dusenbery, B.N. et al. A Framework for the Interoperability of Cloud Platforms: Towards FAIR Data in SAFE Environments. Sci Data 11 , 241 (2024). https://doi.org/10.1038/s41597-024-03041-5

Download citation

Received : 10 August 2023

Accepted : 03 February 2024

Published : 26 February 2024

DOI : https://doi.org/10.1038/s41597-024-03041-5

Share this article

Anyone you share the following link with will be able to read this content:

Sorry, a shareable link is not currently available for this article.

Provided by the Springer Nature SharedIt content-sharing initiative

Quick links

  • Explore articles by subject
  • Guide to authors
  • Editorial policies

Sign up for the Nature Briefing: AI and Robotics newsletter — what matters in AI and robotics research, free to your inbox weekly.

cloud computing projects research paper

Subscribe to the PwC Newsletter

Join the community, add a new evaluation result row, cloud computing.

86 papers with code • 0 benchmarks • 0 datasets

Benchmarks Add a Result

Most implemented papers, awq: activation-aware weight quantization for llm compression and acceleration.

cloud computing projects research paper

We propose Activation-aware Weight Quantization (AWQ), a hardware-friendly approach for LLM low-bit weight-only quantization.

Agnostic Federated Learning

litian96/fair_flearn • 1 Feb 2019

A key learning scenario in large-scale applications is that of federated learning, where a centralized model is trained based on data originating from a large number of clients.

A deep learning based steganography integration framework for ad-hoc cloud computing data security augmentation using the V-BOINC system

The goal of this study is to come up with a way to improve steganography in ad hoc cloud systems by using deep learning.

SEN12MS -- A Curated Dataset of Georeferenced Multi-Spectral Sentinel-1/2 Imagery for Deep Learning and Data Fusion

The availability of curated large-scale training data is a crucial factor for the development of well-generalizing deep learning methods for the extraction of geoinformation from multi-sensor remote sensing imagery.

Optimizing Deep Learning Recommender Systems' Training On CPU Cluster Architectures

During the last two years, the goal of many researchers has been to squeeze the last bit of performance out of HPC system for AI tasks.

Acting in Delayed Environments with Non-Stationary Markov Policies

We introduce a framework for learning and planning in MDPs where the decision-maker commits actions that are executed with a delay of $m$ steps.

HUNTER: AI based Holistic Resource Management for Sustainable Cloud Computing

imperial-qore/COSCO • 11 Oct 2021

The worldwide adoption of cloud data centers (CDCs) has given rise to the ubiquitous demand for hosting application services on the cloud.

VMAgent: Scheduling Simulator for Reinforcement Learning

A novel simulator called VMAgent is introduced to help RL researchers better explore new methods, especially for virtual machine scheduling.

Forecasting Workload in Cloud Computing: Towards Uncertainty-Aware Predictions and Transfer Learning

Results show that modelling the uncertainty of predictions has a positive impact on performance, especially on service level metrics, because uncertainty quantification can be tailored to desired target service levels that are critical in cloud applications.

Large-scale Artificial Neural Network: MapReduce-based Deep Learning

sunkairan/MapReduce-Based-Deep-Learning • 9 Oct 2015

Faced with continuously increasing scale of data, original back-propagation neural network based machine learning algorithm presents two non-trivial challenges: huge amount of data makes it difficult to maintain both efficiency and accuracy; redundant data aggravates the system workload.

IEEE Account

  • Change Username/Password
  • Update Address

Purchase Details

  • Payment Options
  • Order History
  • View Purchased Documents

Profile Information

  • Communications Preferences
  • Profession and Education
  • Technical Interests
  • US & Canada: +1 800 678 4333
  • Worldwide: +1 732 981 0060
  • Contact & Support
  • About IEEE Xplore
  • Accessibility
  • Terms of Use
  • Nondiscrimination Policy
  • Privacy & Opting Out of Cookies

A not-for-profit organization, IEEE is the world's largest technical professional organization dedicated to advancing technology for the benefit of humanity. © Copyright 2024 IEEE - All rights reserved. Use of this web site signifies your agreement to the terms and conditions.

  • Original Papers
  • Open access
  • Published: 20 April 2010

Cloud computing: state-of-the-art and research challenges

  • Qi Zhang 1 ,
  • Lu Cheng 1 &
  • Raouf Boutaba 1  

Journal of Internet Services and Applications volume  1 ,  pages 7–18 ( 2010 ) Cite this article

92k Accesses

2078 Citations

28 Altmetric

Metrics details

Cloud computing has recently emerged as a new paradigm for hosting and delivering services over the Internet. Cloud computing is attractive to business owners as it eliminates the requirement for users to plan ahead for provisioning, and allows enterprises to start from the small and increase resources only when there is a rise in service demand. However, despite the fact that cloud computing offers huge opportunities to the IT industry, the development of cloud computing technology is currently at its infancy, with many issues still to be addressed. In this paper, we present a survey of cloud computing, highlighting its key concepts, architectural principles, state-of-the-art implementation as well as research challenges. The aim of this paper is to provide a better understanding of the design challenges of cloud computing and identify important research directions in this increasingly important area.

Al-Fares M et al (2008) A scalable, commodity data center network architecture. In: Proc SIGCOMM

Amazon Elastic Computing Cloud, aws.amazon.com/ec2

Amazon Web Services, aws.amazon.com

Ananthanarayanan R, Gupta K et al (2009) Cloud analytics: do we really need to reinvent the storage stack? In: Proc of HotCloud

Armbrust M et al (2009) Above the clouds: a Berkeley view of cloud computing. UC Berkeley Technical Report

Berners-Lee T, Fielding R, Masinter L (2005) RFC 3986: uniform resource identifier (URI): generic syntax, January 2005

Bodik P et al (2009) Statistical machine learning makes automatic control practical for Internet datacenters. In: Proc HotCloud

Brooks D et al (2000) Power-aware microarchitecture: design and modeling challenges for the next-generation microprocessors, IEEE Micro

Chandra A et al (2009) Nebulas: using distributed voluntary resources to build clouds. In: Proc of HotCloud

Chang F, Dean J et al (2006) Bigtable: a distributed storage system for structured data. In: Proc of OSDI

Chekuri C, Khanna S (2004) On multi-dimensional packing problems. SIAM J Comput 33(4):837–851

Article   MATH   MathSciNet   Google Scholar  

Church K et al (2008) On delivering embarrassingly distributed cloud services. In: Proc of HotNets

Clark C, Fraser K, Hand S, Hansen JG, Jul E, Limpach C, Pratt I, Warfield A (2005) Live migration of virtual machines. In: Proc of NSDI

Cloud Computing on Wikipedia, en.wikipedia.org/wiki/Cloudcomputing , 20 Dec 2009

Cloud Hosting, CLoud Computing and Hybrid Infrastructure from GoGrid, http://www.gogrid.com

Dean J, Ghemawat S (2004) MapReduce: simplified data processing on large clusters. In: Proc of OSDI

Dedicated Server, Managed Hosting, Web Hosting by Rackspace Hosting, http://www.rackspace.com

FlexiScale Cloud Comp and Hosting, www.flexiscale.com

Ghemawat S, Gobioff H, Leung S-T (2003) The Google file system. In: Proc of SOSP, October 2003

Google App Engine, URL http://code.google.com/appengine

Greenberg A, Jain N et al (2009) VL2: a scalable and flexible data center network. In: Proc SIGCOMM

Guo C et al (2008) DCell: a scalable and fault-tolerant network structure for data centers. In: Proc SIGCOMM

Guo C, Lu G, Li D et al (2009) BCube: a high performance, server-centric network architecture for modular data centers. In: Proc SIGCOMM

Hadoop Distributed File System, hadoop.apache.org/hdfs

Hadoop MapReduce, hadoop.apache.org/mapreduce

Hamilton J (2009) Cooperative expendable micro-slice servers (CEMS): low cost, low power servers for Internet-scale services In: Proc of CIDR

IEEE P802.3az Energy Efficient Ethernet Task Force, www.ieee802.org/3/az

Kalyvianaki E et al (2009) Self-adaptive and self-configured CPU resource provisioning for virtualized servers using Kalman filters. In: Proc of international conference on autonomic computing

Kambatla K et al (2009) Towards optimizing Hadoop provisioning in the cloud. In: Proc of HotCloud

Kernal Based Virtual Machine, www.linux-kvm.org/page/MainPage

Krautheim FJ (2009) Private virtual infrastructure for cloud computing. In: Proc of HotCloud

Kumar S et al (2009) vManage: loosely coupled platform and virtualization management in data centers. In: Proc of international conference on cloud computing

Li B et al (2009) EnaCloud: an energy-saving application live placement approach for cloud computing environments. In: Proc of international conf on cloud computing

Meng X et al (2010) Improving the scalability of data center networks with traffic-aware virtual machine placement. In: Proc INFOCOM

Mysore R et al (2009) PortLand: a scalable fault-tolerant layer 2 data center network fabric. In: Proc SIGCOMM

NIST Definition of Cloud Computing v15, csrc.nist.gov/groups/SNS/cloud-computing/cloud-def-v15.doc

Osman S, Subhraveti D et al (2002) The design and implementation of zap: a system for migrating computing environments. In: Proc of OSDI

Padala P, Hou K-Y et al (2009) Automated control of multiple virtualized resources. In: Proc of EuroSys

Parkhill D (1966) The challenge of the computer utility. Addison-Wesley, Reading

Google Scholar  

Patil S et al (2009) In search of an API for scalable file systems: under the table or above it? HotCloud

Salesforce CRM, http://www.salesforce.com/platform

Sandholm T, Lai K (2009) MapReduce optimization using regulated dynamic prioritization. In: Proc of SIGMETRICS/Performance

Santos N, Gummadi K, Rodrigues R (2009) Towards trusted cloud computing. In: Proc of HotCloud

SAP Business ByDesign, www.sap.com/sme/solutions/businessmanagement/businessbydesign/index.epx

Sonnek J et al (2009) Virtual putty: reshaping the physical footprint of virtual machines. In: Proc of HotCloud

Srikantaiah S et al (2008) Energy aware consolidation for cloud computing. In: Proc of HotPower

Urgaonkar B et al (2005) Dynamic provisioning of multi-tier Internet applications. In: Proc of ICAC

Valancius V, Laoutaris N et al (2009) Greening the Internet with nano data centers. In: Proc of CoNext

Vaquero L, Rodero-Merino L, Caceres J, Lindner M (2009) A break in the clouds: towards a cloud definition. ACM SIGCOMM computer communications review

Vasic N et al (2009) Making cluster applications energy-aware. In: Proc of automated ctrl for datacenters and clouds

Virtualization Resource Chargeback, www.vkernel.com/products/EnterpriseChargebackVirtualAppliance

VMWare ESX Server, www.vmware.com/products/esx

Windows Azure, www.microsoft.com/azure

Wood T et al (2007) Black-box and gray-box strategies for virtual machine migration. In: Proc of NSDI

XenSource Inc, Xen, www.xensource.com

Zaharia M et al (2009) Improving MapReduce performance in heterogeneous environments. In: Proc of HotCloud

Zhang Q et al (2007) A regression-based analytic model for dynamic resource provisioning of multi-tier applications. In: Proc ICAC

Download references

Author information

Authors and affiliations.

University of Waterloo, Waterloo, Ontario, Canada, N2L 3G1

Qi Zhang, Lu Cheng & Raouf Boutaba

You can also search for this author in PubMed   Google Scholar

Corresponding author

Correspondence to Raouf Boutaba .

Rights and permissions

Open Access This article is distributed under the terms of the Creative Commons Attribution 2.0 International License ( https://creativecommons.org/licenses/by/2.0 ), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Reprints and permissions

About this article

Cite this article.

Zhang, Q., Cheng, L. & Boutaba, R. Cloud computing: state-of-the-art and research challenges. J Internet Serv Appl 1 , 7–18 (2010). https://doi.org/10.1007/s13174-010-0007-6

Download citation

Received : 08 January 2010

Accepted : 25 February 2010

Published : 20 April 2010

Issue Date : May 2010

DOI : https://doi.org/10.1007/s13174-010-0007-6

Share this article

Anyone you share the following link with will be able to read this content:

Sorry, a shareable link is not currently available for this article.

Provided by the Springer Nature SharedIt content-sharing initiative

  • Cloud computing
  • Data centers
  • Virtualization

cloud computing projects research paper

DataFlair

  • Cloud Computing Tutorials

12 Latest Cloud Computing Research Topics

Free AWS Course for AWS Certified Cloud Practitioner (CLF-C01) Start Now!!

Cloud Computing is gaining so much popularity an demand in the market. It is getting implemented in many organizations very fast.

One of the major barriers for the cloud is real and perceived lack of security. There are many Cloud Computing Research Topics ,  which can be further taken to get the fruitful output.

In this tutorial, we are going to discuss 12 latest Cloud Computing Research Topics. These Cloud computing topics will help in your researches, projects and assignments.

So, let’s start the Cloud Computing Research Topics.

12 Latest Cloud Computing Research Topics

List of Cloud Computing Research Topics

These Cloud Computing researches topics, help you to can eliminate many issues and provide a better environment. We can assoicate these issues with:

  • Virtualizations infrastructure
  • Software platform
  • Identity management
  • Access control

There is some important research direction in Cloud Security in areas such as trusted computing, privacy-preserving models, and information-centric security. These are the following Trending Cloud Computing Research Topics .

  • Green Cloud Computing
  • Edge Computing
  • Cloud Cryptography
  • Load Balancing
  • Cloud Analytics
  • Cloud Scalability
  • Service Model
  • Cloud Computing Platforms
  • Mobile Cloud Computing
  • Cloud Deployment Model
  • Cloud Security

i. Green Cloud Computing

Green Cloud Computing is a broad topic, that makes virtualized data centres and servers to save energy. The IT services are utilizing so many resources and this leads to the shortage of resources.

Green Cloud Computing provides many solutions, which makes IT resources more energy efficient and reduces the operational cost. It can also take care of power management, virtualization , sustainability, and recycling the environment.

ii. Edge Computing

Although edge computing has several benefits, it is frequently combined with cloud computing to form a hybrid strategy. In this hybrid architecture, certain data processing and analytics take place at the edge, while more intense and extensive long-term data storage and analysis happen in the central cloud infrastructure. The edge-to-cloud continuum refers to this fusion of edge and cloud computing.

iii. Cloud Cryptography

Cloud cryptography is the practise of securing data and communications in cloud computing environments using cryptographic methods and protocols. Sensitive data is secured against unauthorised access and possible security breaches by encrypting it both in transit and at rest.

By allowing consumers to keep control of their data while entrusting it to cloud service providers, cloud cryptography protects the confidentiality, integrity, and authenticity of that data. Cloud cryptography improves the security posture of cloud-based apps and services, promoting trust and compliance with data privacy rules by using encryption methods and key management procedures.

iv. Load Balancing

Load Balancing is the distribution of the load over the servers so that the work can be easily done. Due to this, the workload demands can be distributed and managed. There are several advantages of load balancing and they are-

  • Fewer chances of the server crash.
  • Advanced security.
  • Improvement in overall performance.

The load balancing techniques are easy to implement and less expensive. Moreover, the problem of sudden outages is diminished.

v. Cloud Analytics

Cloud analytics can become an interesting topic for researchers, as it has evolved from the diffusion of data analytics and cloud computing technologies . The Cloud analytics is beneficial for small as well as large organizations.

It has been observed that there is tremendous growth in the cloud analytics market. Moreover, it can be delivered through various models such as

  • Community model

Analysis has a wide scope, as there are many segments to perform research. Some of the segments are  business intelligence tools , enterprise information management, analytics solutions, governance, risk and compliance, enterprise performance management, and complex event processing

vi. Scalability

Scalability can reach much advancement if proper research is done on it. Many limits can be reached and tasks such as workload in infrastructure can be maintained. It also has the ability to expand the existing infrastructure.

There are two types of scalability:

The applications have rooms to scale up and down, which eliminates the lack of resources that hamper the performance.

vii. Cloud Computing Platforms

Cloud Computing platforms include different applications run by organizations. It is a very vast platform and we can do many types of research within it. We can do research in two ways: individually or in an existing platform, some are-

  • Amazon’s Elastic Compute Cloud
  • IBM Computing
  • Microsoft’s Azure
  • Google’s AppEngine
  • Salesforce.com

viii. Cloud Service Model

There are 3 cloud service models. They are:

  • Platform as a Service (PaaS)
  • Software as a Service (SaaS)
  • Infrastructure as a Service (IaaS)

These are the vast topics for research and development as IaaS provides resources such as storage , virtual machines, and network to the users. The user further deploys and run software and applications. In software as a service , the software services are delivered to the customer.

The customer can provide various software services and can do research on it. PaaS also provides the services over the internet such as infrastructure and the customers can deploy over the existing infrastructure.

ix. Mobile Cloud Computing

In mobile cloud computing , the mobile is the console and storage and processing of the data takes outside of it. It is one of the leading Cloud Computing research topics.

The main advantage of Mobile Cloud Computing is that there is no costly hardware and it comes with extended battery life. The only disadvantage is that has low bandwidth and heterogeneity.

x. Big Data

Big data is the technology denotes the tremendous amount of data. This data is classified in 2 forms that are structured (organized data) and unstructured (unorganized).

Big data is characterized by three Vs which are:

  • Volume – It refers to the amount of data which handled by technologies such as Hadoop.
  • Variety –  It refers to the present format of data.
  • Velocity – It means the speed of data (generation and transmission).

This can be used for research purpose and companies can use it to detect failures, costs, and issues. Big data along with Hadoop is one of the major topics for research.

xi. Cloud Deployment Model

Deployment model is one of the major Cloud Computing research topics, which includes models such as:

Public Cloud –  It is under the control of the third party. It has a benefit of pay-as-you-go.

Private Cloud – It is under a single organization and so it has few restrictions. We can use it for only single or a particular group of the organization.

Hybrid Cloud – The hybrid cloud comprises of two or more different models. Its architecture is complex to deploy.

Community Cloud

x. Cloud Security

Cloud Security is one of the most significant shifts in information technology. Its development brings revolution to the current business model. There is an open Gate when cloud computing as cloud security is becoming a new hot topic.

To build a strong secure cloud storage model and Tekken issues faced by the cloud one can postulate that cloud groups can find the issues, create a context-specific access model which limits data and preserve privacy.

In security research, there are three specific areas such as trusted computing, information-centric security, and privacy-preserving models.

Cloud Security protects the data from leakage, theft, disaster, and deletion. With the help of tokenization, VPNs, and firewalls, we can secure our data. Cloud Security is a vast topic and we can use it for more researches.

The number of organizations using cloud services is increasing. There are some security measures, which will help to implement the cloud security-

  • Accessibility
  • Confidentiality

So, this was all about Cloud Computing Research Topics. Hope you liked our explanation.

Hence, we can use Cloud Computing for remote processing of the application, outsourcing, and data giving quick momentum. The above Cloud Computing research topics can help a lot to provide various benefits to the customer and to make the cloud better.

With these cloud computing research, we can make this security more advanced. There are many high-level steps towards security assessment framework. This will provide many benefits in the future to cloud computing. Furthermore, if you have any query, feel free to ask in the comment section.

Did you like this article? If Yes, please give DataFlair 5 Stars on Google

courses

Tags: big data Cloud Analytics Cloud Computing Platforms cloud computing research Cloud Computing Research Topics Cloud Computing Topics Cloud Cryptography Cloud Deployment Model Cloud Scalability Cloud Security Cloud Service Model Edge Computing Green Cloud Computing Load Balancing Mobile Cloud Computing Research Topics on Cloud Computing

15 Responses

  • Comments 15
  • Pingbacks 0

cloud computing projects research paper

Dear, I wants to write a research paper on the cloud computing security, will also discuss the comparison of the present security shecks vs improvement suggested, I am thankful to you, as your paper helps me…

cloud computing projects research paper

hay thanks for this valueable information dear i am just going to start my research in cloud computing from scratch i dnt now more about this field but i have to now work hard for this so plz give me idea how i start with effiecient manner

cloud computing projects research paper

Hey Yaseen, Research is a great way to explore the entire topic. But it is recommended you master Cloud computing first, then start your research. Refer to our Free Cloud Computing Tutorial Series You can research on topics like Cloud Security, Optimization of resources, and Cloud cryptography.

cloud computing projects research paper

Hi, Thank you for your article. I’m working on Cloud Computing Platforms research paper. Would you recommend any sources where I can get a real data or DB with numbers on cloud computing platforms. So, I can analyze it, create graphs, and draw a conclusion. Thank you

….or any sources with data on Cloud Service Models. Thank you

cloud computing projects research paper

Can you please provide your contact details as I am also starting to research on Cloud Computing, Am a 11 years exp Consultant in an MNC working in Large Infrastructure. My email is partha.059@gmail .com so that we can communicate accordingly.

cloud computing projects research paper

Can you please put some references you used, so that we can refer for more information? Thanks.

cloud computing projects research paper

Hi, Very much pleased to know the latest topic for research. very informative, thanks for this i am interested in optimizing the resource here when i say resource it becomes too vast in terms of cloud computing components according to the definition of cloud computing. bit confused to hit the link.. could you plz.

cloud computing projects research paper

hello iam searching for research gap in cloud computing I cant identify the problem please suggest me research topic on cloud computing

cloud computing projects research paper

hello I am searching for research gap in cloud computing I cant identify the problem please suggest me research topic on cloud computing

cloud computing projects research paper

we discuss optimization of resources, the gaps available

cloud computing projects research paper

I want to do research in cloud databases,may i know the latest challenges in cloud databases?

cloud computing projects research paper

I am a student of MS(computer science) and i am currently finding research topics in the area of cloud computing, Please let me know the topic of cloud computing and as well research gap so i will continue the research ahead with research gap.

cloud computing projects research paper

Hi I am a student of MS(computer science) and i am currently finding research topics in the area of cloud computing, Please let me know the topic of cloud computing and as well research gap so I will continue the research.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

  • Cloud – Introduction
  • Cloud – Features
  • Cloud – Pros & Cons
  • Cloud – Working
  • Cloud – Applications
  • Cloud – Architecture
  • Cloud – List of Certifications
  • Cloud – SaaS
  • Cloud – PaaS
  • Cloud – IaaS
  • Cloud – NaaS
  • Cloud – IDaaS
  • Cloud – Public Cloud
  • Cloud – Private Cloud
  • Cloud – Hybrid Cloud
  • Cloud – Community Cloud
  • Cloud – Virtualization
  • Cloud – Hardware Virtualization
  • Cloud – Software Virtualization
  • Cloud – Server Virtualization
  • Cloud – Linux Virtualization
  • Cloud – Storage Virtualization
  • Cloud – OS Virtualization
  • Cloud – Operations
  • Cloud – Challenges
  • Cloud – Storage
  • Cloud – Management
  • Cloud – Technologies
  • Cloud – Service Providers
  • Cloud – Cube Model
  • Cloud – Security
  • Cloud – Books
  • Cloud – Research Topics
  • Google Cloud Platform
  • Cloud – Mobile Cloud Computing
  • Grid Computing Vs Cloud Computing
  • Big Data Vs Cloud Computing
  • Big Data & Cloud Computing for Business
  • Future of Cloud Computing
  • What’s Next After Cloud Computing
  • Interview Questions Part-1
  • Cloud Computing Quiz Part-1
  • Cloud Computing Quiz Part-2
  • Cloud Computing Quiz Part-3
  • Cloud Computing Quiz Part-4

job-ready courses

  • Trending Now
  • Foundational Courses
  • Data Science
  • Practice Problem
  • Machine Learning
  • System Design
  • DevOps Tutorial

Top 15 Cloud Computing Research Topics in 2024

Cloud computing has suddenly seen a spike in employment opportunities around the globe with tech giants like Amazon , Google , and Microsoft hiring people for their cloud infrastructure . Before the onset of cloud computing , companies and businesses had to set up their own data centers , and allocate resources and other IT professionals thereby increasing the cost. The rapid development of the cloud has led to more flexibility , cost-cutting , and scalability .

Top-10-Cloud-Computing-Research-Topics-in-2020

The Cloud Computing market is at an all-time high with the current market size at USD 371.4 billion and is expected to grow up to USD 832.1 billion by 2025 ! It’s quickly evolving and gradually realizing its business value along with attracting more and more researchers , scholars , computer scientists , and practitioners. Cloud computing is not a single topic but a composition of various techniques which together constitute the cloud . Below are 10 of the most demanded research topics in the field of cloud computing .

What is Cloud Computing?

Cloud computing is the practice of storing and accessing data and applications on remote servers hosted over the internet, as opposed to local servers or the computer’s hard drive. Cloud computing, often known as Internet-based computing, is a technique in which the user receives a resource as a service via the Internet. Files, photos, documents, and other storable documents can all be considered types of data that are stored.

Let us look at the latest in cloud computing research for 2024! We’ve compiled 15 important cloud computing research topics that are changing how cloud computing is used.

1. Big Data

Big data refers to the large amounts of data produced by various programs in a very short duration of time. It is quite cumbersome to store such huge and voluminous amounts of data in company-run data centers . Also, gaining insights from this data becomes a tedious task and takes a lot of time to run and provide results, therefore cloud is the best option. All the data can be pushed onto the cloud without the need for physical storage devices that are to be managed and secured. Also, some popular public clouds provide comprehensive big data platforms to turn data into actionable insights.

DevOps is an amalgamation of two terms, Development and Operations . It has led to Continuous Delivery , Integration, and Deployment therefore reducing boundaries between the development team and the operations team . Heavy applications and software need elaborate and complex tech stacks that demand extensive labor to develop and configure which can easily be eliminated by cloud computing . It offers a wide range of tools and technologies to build , test , and deploy applications within a few minutes and a single click. They can be customized as per the client’s requirements and can be discarded when not in use hence making the process seamless and cost-efficient for development teams .

3. Cloud Cryptography

Data in the cloud needs to be protected and secured from foreign attacks and breaches . To accomplish this, cryptography in the cloud is a widely used technique to secure data present in the cloud . It allows users and clients to easily and reliably access the shared cloud services since all the data is secured using either encryption techniques or by using the concept of the private key . It can make the plain text unreadable and limit the view of the data being transferred. Best cloud cryptographic security techniques are the ones that do not compromise the speed of data transfer and provide security without delaying the exchange of sensitive data.

4. Cloud Load Balancing

It refers to splitting and distributing the incoming load to the server from various sources. It permits companies and organizations to govern and supervise workload demands or application demands by redistributing, reallocating, and administering resources between different computers, networks, or servers. Cloud load balancing encompasses holding the circulation of traffic and demands that exist over the Internet. This reduces the problem of sudden outages, results in an improvement in overall performance, has rare chances of server crashes and also provides an advanced level of security. Cloud-based server farms can accomplish more precise scalability and accessibility using the server load balancing mechanism . Due to this, the workload demands can be easily distributed and controlled.

5. Mobile Cloud Computing

It is a mixture of cloud computing , mobile computing , and wireless network to provide services such as seamless and abundant computational resources to mobile users, network operators, and cloud computing professionals. The handheld device is the console and all the processing and data storage takes place outside the physical mobile device. Some advantages of using mobile cloud computing are that there is no need for costly hardware, battery life is longer, extended data storage capacity and processing power, improved synchronization of data, and high availability due to “store in one place, accessible from anywhere”. The integration and security aspects are taken care of by the backend that enables support to an abundance of access methods.

6. Green Cloud Computing

The major challenge in the cloud is the utilization of energy-efficient and hence develop economically friendly cloud computing solutions. Data centers that include servers , cables , air conditioners , networks , etc. in large numbers consume a lot of power and release enormous quantities of Carbon Dioxide in the atmosphere. Green Cloud Computing focuses on making virtual data centers and servers to be more environmentally friendly and energy-efficient. Cloud resources often consume so much power and energy leading to a shortage of energy and affecting the global climate. Green cloud computing provides solutions to make such resources more energy efficient and to reduce operational costs. This pivots on power management , virtualization of servers and data centers, recycling vast e-waste , and environmental sustainability .

7. Edge Computing

It is the advancement and a much more efficient form of Cloud computing with the idea that the data is processed nearer to the source. Edge Computing states that all of the computation will be carried out at the edge of the network itself rather than on a centrally managed platform or data warehouse. Edge computing distributes various data processing techniques and mechanisms across different positions. This makes the data deliverable to the nearest node and the processing at the edge . This also increases the security of the data since it is closer to the source and eliminates late response time and latency without affecting productivity

8. Containerization

Containerization in cloud computing is a procedure to obtain operating system virtualization . The user can work with a program and its dependencies utilizing remote resource procedures . The container in cloud computing is used to construct blocks, which aid in producing operational effectiveness , version control , developer productivity , and environmental stability . The infrastructure is upgraded since it provides additional control over the granular activities of the resources. The usage of containers in online services assists storage with cloud computing data security, elasticity, and availability. Containers provide certain advantages such as a steady runtime environment , the ability to run virtually anywhere, and the low overhead compared to virtual machines .

9. Cloud Deployment Model

There are four main cloud deployment models namely public cloud , private cloud , hybrid cloud , and community cloud . Each deployment model is defined as per the location of the infrastructure. The public cloud allows systems and services to be easily accessible to the general public . The public cloud could also be less reliable since it is open to everyone e.g. Email. A private cloud allows systems and services to be accessible inside an organization with no access to outsiders. It offers better security due to its access restrictions. A hybrid cloud is a mixture of private and public clouds with critical activities being performed using the private cloud and non-critical activities being performed using the public cloud. Community cloud allows systems and services to be accessible by a group of organizations.

10. Cloud Security

Since the number of companies and organizations using cloud computing is increasing at a rapid rate, the security of the cloud is a major concern. Cloud computing security detects and addresses every physical and logical security issue that comes across all the varied service models of code, platform, and infrastructure. It collectively addresses these services, however, these services are delivered in units, that is, the public, private, or hybrid delivery model. Security in the cloud protects the data from any leakage or outflow, theft, calamity, and removal. With the help of tokenization, Virtual Private Networks , and firewalls , data can be secured.

11. Serverless Computing

Serverless computing is a way of running computer programs without having to manage the underlying infrastructure. Instead of worrying about servers, networking, and scaling, you can focus solely on writing code to solve your problem. In serverless computing, you write small pieces of code called functions. These functions are designed to do specific tasks, like processing data, handling user requests, or performing calculations. When something triggers your function, like a user making a request to your website or a timer reaching a certain time, the cloud provider automatically runs your function for you. You don’t have to worry about setting up servers or managing resources.

12. Cloud-Native Applications

Modern applications built for the cloud , also known as cloud-native applications , are made so to take full advantage of cloud computing environments . Instead of bulky programs like monolithic systems , they’re built to prioritize flexibility , easy scaling , reliability , and constant updates . This modular approach allows them to adapt to changing needs by growing or shrinking on demand, making them perfect for the ever-shifting world of cloud environments. Deployed in various cloud environments like public, private, or hybrid clouds, they’re optimized to make the most of cloud-native technologies and methodologies . Instead of one big chunk, they’re made up of lots of smaller pieces called microservices .

13. Multi-Cloud Management

Multi-cloud management means handling and controlling your stuff (like software, data, and services) when they’re spread out across different cloud companies, like Amazon, Google, or Microsoft. It’s like having a central command center for your cloud resources spread out across different cloud services. Multi-cloud gives you the freedom to use the strengths of different cloud providers. You can choose the best service for each specific workload, based on factors like cost, performance, or features. This flexibility allows you to easily scale your applications up or down as required by you. Managing a complex environment with resources spread across multiple cloud providers can be a challenge. Multi-cloud management tools simplify this process by providing a unified view and standardized management interface.

14. Blockchain in Cloud Computing

Cloud computing provides flexible storage and processing power that can grow or shrink as needed. Blockchain keeps data secure by spreading it across many computers. When we use them together, blockchain apps can use the cloud’s power for big tasks while keeping data safe and transparent. This combo boosts cloud data security and makes it easy to track data. It also lets people manage their identities without a central authority. However, there are challenges like making sure different blockchain and cloud systems work well together and can handle large amounts of data.

15. Cloud-Based Internet of Things (IoT)

Cloud-based Internet of Things (IoT) refers to the integration of cloud computing with IoT devices and systems. This integration allows IoT devices to leverage the computational power, storage, and analytics capabilities of cloud platforms to manage, process, and analyze the vast amounts of data they generate. The cloud serves as a central hub for connecting and managing multiple IoT devices, regardless of their geographical location. This connectivity is crucial for monitoring and controlling devices remotely.

Also Read Cloud computing Research challenges 7 Privacy Challenges in Cloud Computing Difference Between Cloud Computing and Fog Computing

Cloud computing has helped businesses grow by offering greater scalability , flexibility , and saving money by charging less money for the same job. As cloud computing is having a great growth period right now, it has created lots of employment opportunities and research work is done is different areas which is changing the future of this technology. We have discussed about the top 15 cloud computing research topics . You can try to explore and research in these areas to contribute to the growth of cloud computing technology .

author

Please Login to comment...

Similar reads.

  • Cloud-Computing

Improve your Coding Skills with Practice

 alt=

What kind of Experience do you want to share?

15+ Cloud Computing Projects With Source Code

Introduction, importance of cloud computing projects, cloud computing projects ideas, cloud computing projects for beginners, 1. attendance system, 2. bus ticketing and payment system, 3. host a dynamic website, 4. host a static website using aws or other clouds, 5. website without a server, intermediate cloud computing projects with source code, 6. system for online blood banking that is hosted in the cloud, 7. cloud-based conversational interface, 8. bookstore on the cloud, 9. smart traffic management system that is cloud-based, 10. cloud-based e-learning, advanced cloud computing projects with source code, 11. iot remote monitoring and control, 12. project for bug tracking in cloud computing, 13. file storage system using hybrid cryptography cloud computing project, 14. create a personal cloud, 15. repair techniques for transportable storage devices, 16. project to automate the university’s online services, 17. cloud computing for rural banking., 18. data leaks detection project, q1: how do i create a project in cloud computing, q2: what are examples of cloud computing, q3: does cloud computing require coding, additional resources.

One of the most significant ways to acquire a skill is to apply it, and what better way to accomplish this than to work on projects? So in this article, we’re providing the best cloud computing projects that you can draw inspiration from to work on your own projects. We encourage finishing numerous projects to master the various capabilities and functionalities of Django. We have provided projects of various skill levels so you may select according to your competence. Let’s get started.

In this article, we have discussed Cloud Computing Projects with their source code. Read on to know further.

Cloud computing applications are becoming more widespread across various fields, technologies, sizes, and applications. In addition to providing you with adequate exposure and experience on cloud technologies, cloud computing-based mini projects or real-time cloud computing projects will also provide you with other skills, including data analytics, business intelligence, network management, and analytical abilities, among others. It is feasible, for example, to work on cloud computing research projects or deploy cloud computing for large data projects, among other things. With the tremendous rise of both users of cloud computing technologies, there is a significant demand for projects including both technologies. Cloud computing offers a variety of applications that may be implemented using various computer languages and frameworks. One may create cloud computing projects in various computer languages, including Java, Android, PHP, and any other widely-used programming language available.

Confused about your next job?

You may use cloud computing projects for learners in various ways throughout their academic careers. For final-year engineering students, cloud computing projects for MTech students may be built utilizing cloud delivery and deployment methods and other cloud computing technologies. These cloud project ideas might be your go-to resource for inspiration and guidance when it comes to final-year projects. Programs based on cloud computing have applications in various industries and commercial areas, including entertainment, education, healthcare, retail, finance, and marketing, among others.

When it comes to cloud computing projects, both example projects and project names may be quite beneficial for students around the world alike. You may engage in these new projects to grow and enhance your knowledge and abilities in the subject of cloud computing, as well as other technologies if you so want.

Data security in cloud computing, for example, is a critical field, and working on data security cloud projects will allow you to acquire abilities in cloud computing, risk management, data security, and privacy, among other things.

We have a list of 15 types of cloud computing project ideas, along with the source code link.

Cloud computing is among the most well-known and most sought-after new technologies of our day. It offers end-users with computer system resources like computational power and data storage, among other things. Microsoft, Google, and Amazon Web Services (AWS) are all giants in their fields. Amazon was the first to introduce it, and they have been at the forefront of the industry since its debut. This article on “cloud computing projects” might assist if you are designing projects.

Cloud computing is based on three main Service models: PaaS (Platform as a Service), SaaS (Software as a Service), and IaaS (Infrastructure as a Service). In this section, we’ll take a deep dive into the techniques and high-demand Cloud computing projects that you may utilize to assist you in getting a decent job by generating a concept to create the greatest cloud computing projects available today.

The attendance system records an employee’s or student’s attendance and keeps the information in the cloud. When it scans the card, it enters information such as the in-time, the ID number, and the out-time. This will assist an administrator in removing or adding users and tracking the number of hours an employee or student has spent on the premises.

Source Code Link

Passengers will be able to purchase a bus pass on the internet as part of this trial. Bus booking, scheduling, and payment options are all available via the site, and passengers may purchase a bus pass by logging into the portal with their login credentials.

When a web page is dynamic, users can engage in interactive user interactions. You will greatly aid the aims of businesses by using a dynamic website. In this project, you will host a dynamic website on Amazon Web Services (AWS), and you will use client and server-side languages such as CSS, PHP, HTML, ASP, and JavaScript in the website building process to accomplish this.

In this cloud services project, you will make use of Amazon S3, a straightforward web-based cloud repository provided by Amazon to store static web pages. (documentation pages, blog pages, and so forth) When developing this project, you will use front-end technologies such as HTML and CSS to aid in the development process.

Using serverless cloud computing architecture will allow you to deploy products more quickly and efficiently. In addition, serverless websites provide several benefits, including scalability, the ability to charge users depending on their use of serverless environments such as DynamoDB, API, S3, and consumption.

In this assignment, you will design a blood bank system that includes blood type, donor information, storage space, and blood deposit locations. The information about the blood bank is saved on the cloud. The technology will assist users in identifying blood donors by comparing the information recorded in the database with the information entered into the system.

A chatbot is a piece of artificial intelligence software. Most businesses have used chatbots on their websites to improve customer support while also increasing efficiency. You will develop the chatbot in this project in Python, and it will speak with users, answer their questions, and gather the information you will save in a cloud database.

For this project, you will first create a book shop management system that will organize books into discrete categories and sections that will be easily accessible to end-users. The user searches for a certain book by entering the author’s name or the book’s title. The information and data are saved in a cloud-based environment.

Depending on their movement, this initiative will reduce the amount of time that motor vehicles are stuck in traffic during peak hours. A wireless communication system and sensors will be installed to increase efficiency. It also uses data extraction methods to get information that you may utilize in decision-making.

E-learning is a method of learning that allows a person to study from anywhere in the world. You will store the instructional materials, books, videos, and control information for this project on the project’s website, which will be organized by category. The information from the website is then kept in the cloud.

The Internet of Things links various devices to the internet, and the data collected is stored in the cloud until you can evaluate it.

Utilizing Arduino and electric eyes (sensors), you will gather data for this project, which you will then send to a Raspberry using a serial connection. The information gathered is stored in the cloud and can only be accessed by utilizing the MySQL database, which is not included.

This project will allow an administrator to investigate a problem and then interact with a customer using an application created specifically for this purpose. To make it simpler to identify new defects and solve them in a short amount of time, the system will automatically produce tags and labels for them.

This project is developing a cloud-based file storage system that uses hybrid cryptography. You will develop a system to safeguard documents stored in a database by encrypting them for use in this project. Blowfish is employed in encrypting data with a high output while using the least amount of time. When the papers are hosted on a distant server, they are encrypted using three different encryption techniques to provide greater security.

The Raspberry Pi board will be used to develop this project, which will result in a private cloud. To complete the created method, you will want a hard drive, a micro SD card, and a Raspberry Pi. After you’ve connected the components, you’ll be able to access your files from any location.

This project will repair and recreate information/data bits that have been lost due to failures of the repository nodes. The data is to be kept in the cloud so that you may retrieve it more quickly in the event of a disaster. After that, you will examine the rectification techniques and demonstrate productivity improvements.

During this project, your system will gather information about staff members, professors, student data, and visitor data from various sources. The information is gathered and structured so that you may reuse it later. In the next step, the information obtained is saved in the cloud.

This cloud computing project is intended to assist in hosting a banking system over the internet, allowing users to access their accounts without having to visit a financial institution physically. This will contribute to the improvement of economic activity.

This cloud computing initiative will aid in the prevention and management of data breaches as a result of SQL injection attacks. It will encrypt data and then store it in AESX encryption form, safeguarding it against Injection leakage and other threats. When you pay with a credit card, our initiative will guarantee that your information is secure.

Using cloud computing projects has a tremendous potential to modify the technical environment to improve the present company circumstances. As a result, if we can expand and improve technology, it will have a significant influence on enterprises and society as a whole. However, as the breadth of innovation continues to expand, the execution of such initiatives is a challenge that needs careful consideration and a willingness to take risks.

However, cloud technology is such a remarkable thing that the techies have already established various projects, and there are many more that are yet to be constructed in the current cutting edge technology and research and development, which continues to work for a better tomorrow for every one of us in the future. If you are familiar with the cloud computing area and technology, you may be able to participate in this cutting-edge technology. If this is the case, it is never too late to upgrade your skills. Learn cloud computing from some of the most knowledgeable people in the field, all with the help of a dedicated mentor.

Ans. The following are some cloud computing projects for beginners that you may construct to get more knowledge about the technology while also having fun:

  • Cloud Computing is being used to automate campus operations.
  • Injection Prevention and Detection of Data Leaks (SQL Injection Prevention).
  • Cloud-based student data chatbot with a human interface.
  • Bus Ticketing System that operates in the cloud.
  • Using the Cloud for Android Offloading.

Ans. Examples of Cloud Computing

  • Salesforce is a software-as-a-service (Saas) company.
  • DigitalOcean offers Infrastructure-as-a-Service (IaaS).
  • AWS offers Platform-as-a-Service (Saas).
  • Dropbox is a file-sharing and data-storage service.
  • Civic Analytics is a company that specializes in big data analysis.
  • Carbonite is the company in charge of data governance.
  • Forcepoint is a cyber-security firm.

Ans. Take cloud computing classes and begin utilizing a public or private cloud computing service to get a feel for the technology before investing your time and money in it. It is not necessary to be a programmer.

  • Cloud Computing MCQ
  • Cloud Computing Interview Questions
  • Characteristics of Cloud Computing
  • Cloud Engineer Salary
  • What is a Cloud Engineer?
  • Virtualization in Cloud Computing
  • Types of Cloud Computing
  • Cloud Computing
  • Cloud Computing Projects

Previous Post

10 react projects to build (with source code), machine learning engineer salary in india – for freshers & experienced.

cloud computing projects research paper

Academia.edu no longer supports Internet Explorer.

To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to  upgrade your browser .

  •  We're Hiring!
  •  Help Center

Cloud Computing

  • Most Cited Papers
  • Most Downloaded Papers
  • Newest Papers
  • Last »
  • Access Control Follow Following
  • VoIP/SIP/IMS Follow Following
  • Distributed Information Systems Follow Following
  • Cyber Physical Systems Follow Following
  • Semantic Computing Follow Following
  • P2P/Overlay Networks Follow Following
  • Smart spaces Follow Following
  • Complex Event Processing Follow Following
  • Cyber Security Follow Following
  • Data Mining Follow Following

Enter the email address you signed up with and we'll email you a reset link.

  • Academia.edu Journals
  •   We're Hiring!
  •   Help Center
  • Find new research papers in:
  • Health Sciences
  • Earth Sciences
  • Cognitive Science
  • Mathematics
  • Computer Science
  • Academia ©2024

banner-in1

  • Cloud Computing

Top 22 Cloud Computing Project Ideas in 2024 [Source Code]

Home Blog Cloud Computing Top 22 Cloud Computing Project Ideas in 2024 [Source Code]

Play icon

The simplest and most effective way to gain proficiency in a domain is to focus on getting hands-on experience. When you work on live projects, you face real issues, gain familiarity with the actual scenarios, and gain expert-level understanding. So, when you plan and start your career in the cloud industry, you should work on a cloud computing project. It will help you understand the industry better. Moreover, you learn about the future scope of cloud computing. Based on this experience, you can choose the certifications that can boost your career and help you fetch excellent job opportunities. The idea behind working on cloud computing projects is to understand the field and plan the professional journey to get fruitful results.  

In this article, we will discuss what is a cloud computing project, list of cloud computing project ideas based on skills, and a few examples for better understanding.  

List of Cloud Computing Projects Ideas in 2024

Here is a list of curated cloud computing projects for all level skills, one should know in 2024:

  • Cloud-enabled attendance system
  • Online blood bank system
  • Online cloud-enabled bookstore system
  • Data redundancy removal system
  • Detecting data leaks using SQL injection
  • Cloud-based bus pass system
  • Making a chatbot
  • Secure text transfer
  • Bug tracking functionality
Attendance trackingOnline blood bank systemBug tracking
Bus ticketingInformation ChatbotFile storage system using hybrid cryptography
Automation of university or college dataOnline bookstoreRural banking
Personal cloudE-learningData leaks
Android Offloading

Top Cloud Computing Projects [Based on Levels]

Learning cloud computing starts with getting hands-on experience. Check out the and get started with the cloud: 

1. Cloud-enabled attendance system

We can use a cloud-enabled automatic attendance system to scan details. Also, all the scanned information can be directly synchronized and stored on the cloud in real-time. Detailed information like check-in time, check-out time, date, and total working hours, to name a few, can be stored and saved. Administrators must register new students/employees on the system and provide some personal information. 

Cloud-enabled attendance system

Source Code:  Cloud-Enabled Attendance System

Advantages  Of a Cloud-Enabled Attendance System: 

  • Data and Analytics: You can easily generate reports 
  • Flexibility: You can track attendance in a variety of ways 
  • Remote management: Cloud-based attendance systems make use of software that can be accessed from anywhere on any device that has Internet access. 

Disadvantages  Of a Cloud-Enabled Attendance System: 

  • Not effective in monitoring buddy punching: This software is ineffective at detecting buddy punching. There is a greater possibility of malpractice occurring here. However, if it is equipped with biometric technology, it can be properly monitored. 
  • Difficult to maintain and repair:nMaintaining and repairing software is difficult. Though it may be uncommon, once damaged, there will be costs associated with repairing it. 
  • Ineffective when there is no power supply: Without a power supply, the software is of no use. The entire system is powered by electricity. This is not the case with the traditional method of taking attendance. 

2. Online blood bank system

Using cloud computing, we can create a central repository for numerous blood deposits, including blood details and depositor information. The blood details would include blood type, storage area, and storage date to help maintain and monitor the blood depositors. This cloud-based system would allow for greater transparency in determining the availability of the desired blood depositor. This system will also contain patient and contact information. 

Cloud Computing Project Ideas

Source Code : Online Blood Bank System

Advantages of Online Blood Bank System 

  • Error probability is reduced to a minimum. 
  • Easy and effective information retrieval. 
  • The system shows the blood nearing expiry and those that have expired. Hence the unhealthy blood can easily be discarded. 

3. Online cloud-enabled bookstore system

This system can function as an internet bookstore by utilizing SQL and C#. The books would be divided into sections to help users find their desired book without becoming overwhelmed by a database. Additionally, the bookstore records additional information such as a brief synopsis of the books. A notification system is added to help users stay up to date on their eagerly anticipated books and their availability. 

Source Code: Online Cloud-Enabled Bookstore System

Advantages  of Online Cloud-Enabled Book Store System 

  • Lower costs as users are not required to purchase a powerful computer or server to support the system's operation. 
  • Lower barriers to use. uses the service through the user's browser, the overall interface will be clearer and clearer, and the display effect of each functional module will be more intuitive and adapt to the user’s device 
  • Higher security as maintenance of the server is the responsibility of the system supplier. 

4. Data redundancy removal system

This project is focused on accurately removing unnecessary and redundant data in a short amount of time. It accomplishes this by classifying the test data as redundant or false positive. Also, the cloud-enabled system validates the newly-added data to keep the database free from duplicity. If the data is not found in the database, new data gets appended.

Source Code:  Data redundancy removal system

Advantages  of Data Redundancy Removal System 

  • Alternative data backup method 
  • Better data security 
  • Faster data access and updates 
  • Improved reliability 

5. Detecting data leaks using SQL injection

This cloud-enabled data leak detection system operates over the Internet and does not require any particular system configuration. The system aims to enhance security and provide measures against SQL injection hacking. By storing users’ information in AES 256 encryption form, it meets all the security needs. It injects SQL through a capability code and establishes a connection between the cloud server and the application itself; this system doubles the security against it.

Source Code:  Data Leakage Detection

Advantages  of This Project 

  • Get 100% database security and detect data leakers effortlessly. 
  • Distributors can easily identify counterfeit agents leaking their confidential data and take strict action against them. 

6. Cloud-based bus pass system

It is a cloud-based adaptation of purchasing tickets over the Internet. This solves many common problems, such as misplaced, stolen, or incorrectly priced tickets. In addition, if the load on a typical bus booking website is too high, the website chokes and stops working. However, an additional load can be handled by provisioning new servers in the computing. 

Source Code:  Cloud-based Bus Pass System

Advantages of Cloud-based Bus Pass System 

  • Allows customers to check the availability of bus tickets before purchasing them 
  • Secure. Passengers must first register with the system to verify their identity. After they have been verified, the system allows them to book passes for any route online. 
  • Users can recharge using their credit/debit cards. 

7. Making a chatbot

A chatbot is an AI-enabled software designed to interact with users when they visit a website. These bots are assigned to websites to streamline user interaction when they land on the website for the first time. The goal is to provide real-time and immediate responses to customer inquiries. To work on the chatbot application, you can use retrieval-based or generative-based models. If you want to use the chatbot on a commercial website, you should pre-define the input patterns.

Source Code:  Chatbot

Advantages  of Chatbots 

  • Seamless live communication 
  • Reduced people-to-people interactions 
  • Makes customer service available 24/7

8. Secure text transfer 

Encryption is essential to protect confidential data safe against unauthorized access or misuse. This encryption safeguards confidential information in a key-password combination. This combination employs Diffie-Hellman key exchange, which applies to private and public encryption concepts.

This project can be used to exchange text messages while maintaining maximum security and speed. This system can be modified and repurposed to work for image exchange. SQL databases to store all information for exchange strengthen the entire system.

Source Code:  Secure Text Transfer

Advantages of Secure Text Transfer System 

  • Content is encrypted to prevent access by hackers and unauthorized people. 
  • .NET framework simplifies the development process. 

9. Bug tracking functionality

Using cloud computing, developers could identify the type and origin of bugs by simply logging into the application. The project will be divided into three parts: customer, administrator, and staff. 

By entering a username and password, the customer will create an account. They can log in to the bug tracking application with their credentials and send a bug report with screenshots of the bugs they encountered. Staff can log in using their respective accounts to view bugs and determine whether they need to be fixed. And administrators can contact the user directly about the bugs they sent and quickly resolve them. Depending on the load of the reports, this can vary significantly. 

cloud computing projects research paper

Source Code:  Bug Tracking System

Advantages  of Bug Tracking System 

  • Deliver a high-quality product. 
  • Better communication and connectivity. 
  • Better customer service. 

Enroll in KnowledgeHut training and courses to start your journey today. We provide study materials, cloud computing projects pdf, and the best resources to help you reach your cloud computing goals. Reach out to us to know our Cloud Computing course duration and fee in detail . 

Cloud Computing Projects for Beginners

Are you new to the cloud and looking to explore your knowledge in cloud computing? There is no better way than trying some hands-on experience with a few basic projects. Here is a list of cloud computing projects for beginners that you must certainly give it a try. 

1. Attendance tracking 

This allows schools, colleges, institutions, and even offices to keep track of students' and employees' absences. Students and employees can mark their attendance by logging in, which is saved in the database and can later be checked by the institute's office. 

Source Code: Attendance Tracking

2. Bus ticketing 

Allow passengers to book bus tickets remotely. There will be no more hassles or concerns if the ticket is misplaced. Distributing tickets and passes to passengers can be done quickly and seamlessly. Also, passengers can use the bus ticketing app to check updates such as seat availability, schedules and timings, discounts, and much more. 

Source Code: Bus Ticketing

3. Automation of university or college data 

This project will assist you in creating a portal for a university or college. This portal allows them to register students, track their placements in various companies, and view their final results. 

While it provides separate login portals for teachers and students, it also serves as a liaison between staff, students, and companies to deliver necessary information, collect feedback, declares results, etc. 

Source Code: Automation of University

4. Personal cloud 

You can create a personal cloud server with this project. Raspberry Pi and a Micro SD card will be required to build a private cloud. The hard drive will be the primary cloud storage in this project, and it will help you understand how a cloud server works. 

Source Code: Personal Cloud

5. Android Offloading 

Installing and offloading the processing requirements of an application is strenuous and time-consuming. The android offloading project aims to solve the problem by making it easy for applications to overload the compute parts explicitly. Using static analysis, this framework enhances an app's functionality. Users can choose a process and files to be encrypted and stored in the cloud. Visit AWS Cloud Practitioner Essentials Certification Training and learn AWS from scratch.

Source Code: Android Offloading

Intermediate Cloud Computing Projects with Source Code

Suppose you have a basic understanding of the cloud basics and you are comfortable working with computing, storage, and security. In that case, you must try a step forward than the entry-level projects. Here is the list of intermediate cloud computing projects from GitHub with source code. Let us check each in detail: 

1. Online blood bank system 

This cloud-based application serves as a central information database for the various blood deposits, including the donor's name and blood type information. The cloud can also store information such as blood type, storage data, blood type availability in a given area, etc. This facilitates quick access to blood in an emergency. 

GitHub Source Code: Online Blood Bank System  

2. Information Chatbot 

Most companies have implemented chatbots on their websites to improve customer service and increase efficiency. In this project, you will create a chatbot in Python that will interact with users, answer their questions, and collect data that you will save in a cloud database. 

GitHub Source Code: Information Chatbot  

3. Online bookstore 

This application can keep a catalog of books with the title, author, price, and even the ability to read them online. For the convenience of the customers, the books can be classified according to several criteria, such as author, genre, year of publication, and so on. 

GitHub Source Code: Online Bookstore  

4. E-learning 

Online education platforms are nothing new to today's generation. These platforms have their advantages, resources, and time and cost flexibility and thus rank among the most popular learning mediums. Converting the project to a cloud project can drastically reduce costs. A learning space where study materials and relevant videos are kept for the learner's benefit. They are available for students to access and use as needed. 

GitHub Source Code: E-learning  

Looking to boost your career? Enroll in our ITIL certification course online ! Gain valuable skills and knowledge to excel in the ever-evolving IT industry. Don't miss out, sign up today!

Advanced Cloud Computing Project Ideas with Source Code

If you are a professional and have a sound understanding of cloud technologies, then you must opt for advanced cloud computing projects to elevate your skills to the next level. Here are a few hard-to-crack cloud computing projects with source code: 

1. Bug tracking 

Bug tracking is a project aimed at detecting and tracking the type and location of a bug on a website or app. Some common real-world applications designed using this concept include Backlog and Zoho bug tracker. 

GitHub Source Code: Bug tracking  

2. File storage system using hybrid cryptography

The project's goal is to secure the files using hybrid cryptography. Such applications are used in banking applications and systems to protect information and data sets. 

You can encrypt the files with Blowfish because it is accurate and fast. Use symmetric algorithms for decryption. Even in remote servers, the hybrid technique can provide exceptional cloud security. With this project, you can add data security to your skill set, which is in high demand due to the increased frequency of security risks and attacks. Cryptography will be used to convert the data sets into unreadable forms. 

GitHub Source Code: File storage system

3. Rural banking 

This cloud project aims to create a cloud-based banking system for rural areas where banking facilities and amenities are inadequate to provide people with banking convenience.

GitHub Source Code: Rural banking

4. Data leaks 

SQL injection refers to data leakage in the database as a common business problem. It is an excellent portal for anyone working or planning to work as an e-commerce platform. The primary aim of SQL injectors is to safeguard data and secure the privacy of the information from scammers. Developers employ standard encryption technology to create this SQL injection system

GitHub Source Code: Data leaks

Best Platforms to Work on Cloud Computing Project   

Cloud offers different platforms on which you can run your projects. These platforms provide specific features based on which you can handle projects where you need to manage those particular aspects. Some of the cloud computing project platforms are:  

  • Microsoft Azure:  Azure provides a wide range of services, making it the most accessible platform in the cloud environment. Any organization with any requirements can opt for Microsoft Azure as it will cater to all of them. It would be fair to say that Microsoft Azure is a dependable option for enterprises.  
  • Google Cloud:  This platform provides new-age companies with a trustworthy, user-friendly, and protective cloud environment to the organizations. You get enough services in Google Cloud to cater to all the IaaS or PaaS requirements.  
  • IBM Cloud:  The three models that IBM Cloud primarily focuses on are IaaS (infrastructure as a service), SaaS (software as a service), and PaaS (platform as a service). It is a cost-effective platform where you can make an adjustment to reduce the overall expense.  

Importance of Cloud Computing Projects

Whether you a professional getting started with cloud computing or an experienced folk with experience in the cloud, these projects will help you streamline your learning process in many ways. Check out the importance of cloud computing projects and why it is a must for you: 

  • Cloud computing applications cover many domains, technologies, scales, and applications. Cloud computing mini projects or real-time cloud computing projects will provide adequate exposure and experience with cloud technologies. 
  • With the massive expansion of both technologies, virtualization and cloud computing projects are in high demand. Cloud computing has several applications in terms of programming languages and frameworks. Java cloud computing projects, Android cloud computing projects, PHP cloud computing projects, and other popular programming languages can be developed. 
  • Cloud computing projects for students have many applications in their academic careers. Cloud delivery and deployment models can be used to develop cloud computing projects for final-year engineering or cloud computing projects for MTech. Cloud computing projects are used in entertainment, education, healthcare, retail, banking, marketing, and other industrial and business domains. 

Factors Affecting Cloud Computing

Cloud computing based on the pay-as-you-go model is affected by a number of factors. Let us discuss each in brief: 

  • Cost:  The developers must keep in mind that it must be cost-effective and allow the company to achieve cost-saving benefits. Most businesses choose Cloud Computing because it is less expensive. 
  • Application in the future:  Its potential applications should be designed so that they not only benefit the company in terms of current needs but are also adaptable enough to benefit the organization in the future as changes occur. 
  • Mobility:  It is essential to design a Cloud Computing project to be easily moved between private and public clouds to check and access resources or data. 
  • Security:  Security is the top priority when considering the entire aspect of data and resources. As a result, data security should be prioritized while a project is being developed. 
  • Increased bandwidth:  When working in the cloud, it is important to consider increased bandwidth. Increased bandwidth significantly reduces transfer times, especially when handling big chunks of data.

I hope, we have covered the top cloud computing projects along with source code. Cloud is a high-demand domain with an increasing number of opportunities. Companies are switching to cloud environments because of the accessibility and data safety features. So, it would be fruitful to consider planning a career in this domain. If you can gain proficiency and prove your worth in the market, you can enjoy a monetarily sound and secure professional career. Start by getting all the information about this industry and find projects that can give you the right kind of experience. You can also join Cloud Computing certification courses that can train you in the right tools and techniques to help you establish a promising professional career in the cloud. If you plan everything strategically, your dream job is not far-fetched.

Frequently Asked Questions (FAQs)

These are the projects one must do to know how the notions of cloud computing can be applied in the real world. 

Here are some cloud computing projects for beginners that you can build to learn more about the technology while also having fun: 

 A human-interfaced cloud-based student data chatbot. 

Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS).

The father of cloud computing is American computer scientist J.C.R. Licklider.

The cost considerations in a cloud computing project include predicting the cost of cloud service. Furthermore, the cost of tools and the expense of individual resources also get included in cost consideration. 

The security considerations in a cloud computing project include network security risks. Furthermore, the cloud relies on shared resources, so you should consider separation and segmentation. 

The common challenges in implementing a cloud computing project include data security and privacy issues, multi-cloud environments, and high network dependencies. 

Profile

Kingson Jebaraj

Kingson Jebaraj is a highly respected technology professional, recognized as both a Microsoft Most Valuable Professional (MVP) and an Alibaba Most Valuable Professional. With a wealth of experience in cloud computing, Kingson has collaborated with renowned companies like Microsoft, Reliance Telco, Novartis, Pacific Controls UAE, Alibaba Cloud, and G42 UAE. He specializes in architecting innovative solutions using emerging technologies, including cloud and edge computing, digital transformation, IoT, and programming languages like C, C++, Python, and NLP. 

Avail your free 1:1 mentorship session.

Something went wrong

Upcoming Cloud Computing Batches & Dates

NameDateFeeKnow more

Course advisor icon

cloud computing projects research paper

Cloud Computing Project Topics With Abstracts and Base Papers 2024

Embark on a journey through innovative research as we unveil M.Tech projects pushing the boundaries of technology. From revolutionizing pavement crack image segmentation with deep learning to addressing healthcare challenges in Mobile Cloud Computing (MCC) through the Modular Encryption Standard (MES), our projects reflect cutting-edge solutions. Explore the future of Big Data (BD) operations with our Big Cloud framework. Each project represents a commitment to advancing knowledge and overcoming challenges in the dynamic field of computer engineering. Welcome to a showcase where technology meets groundbreaking research!

M.Tech Projects Topics List In Cloud Computing

Base PaperAbstract
1.Enhancing Security of Health Information Using Modular Encryption Standard in Mobile Cloud Computing.
2.Security by Design for Big Data Frameworks Over Cloud Computing. 
3.Cloud Computing-Based Framework for Breast Cancer Diagnosis Using Extreme Learning Machine.
4.HEPGA: A new effective hybrid algorithm for scientific workflow scheduling in cloud computing environment.
5.Performance Analysis of Scheduling Algorithms for Virtual Machines and Tasks in Cloud Computing
6.Genetic Algorithm-Based Task Scheduling in Cloud Computing Using MapReduce Framework.
7.DCHG-TS: a deadline-constrained and cost-effective hybrid genetic algorithm for scientific workflow scheduling in cloud computing.
8.Applications of Virtual Machine Using Multi-Objective Optimization Scheduling Algorithm for Improving CPU Utilization and Energy Efficiency in Cloud Computing. 
9.A novel hybrid antlion optimization algorithm for multi-objective task scheduling problems in cloud computing environments.
10.A multi-objective Monarch Butterfly Algorithm for virtual machine placement in cloud computing.

' data-src=

Himanshu Garg

Experienced Engineering Mentor and Educator | Empowering Students to Excel. With a passion for guiding and empowering engineering students, I am dedicated to supporting their academic journey and fostering their success. With a strong background in Process Control (instrumentation), I completed my Mtech in 2020. Passionate about helping students excel, aims to introduce new modules addressing mental stress problems and other crucial areas in Engineer's Planet. Connect with me to explore opportunities for collaboration and support in engineering education.

Artificial Intelligence Project Topics With Abstracts and Base Papers 2024

Machine learning project topics with abstracts and base papers 2024, you may also like, computer science | c | c++ projects free..., computer science php projects free downloads, computer science projects | machine learning | deep..., data architecture: the evolution of next generation, application of ai in cybersecurity: benefits, uses, and..., go beyond basic chatbot: explore advanced nlp techniques, major projects on cyber security final year, tensorflow based projects for final year, machine learning final year projects 2024 | ai, cse,..., intensity analysis (build your own model using nlp..., leave a reply cancel reply.

This site uses Akismet to reduce spam. Learn how your comment data is processed .

  • Mentorship Sessions
  • M.Tech Projects R&D
  • Ph.D Projects R&D
  • B.Tech Projects R&D
  • 1. Internship
  • 2. Workshops
  • 3. Bootcamp

IMPORTANT LINKS

  • Announcements New
  • Project Downloads
  • Career / Internship
  • Privacy Policy
  • Terms & Conditions
  • MTech Projects Hot
  • PhD Projects New
  • BTech Projects
  • AMIE Projects
  • DBMS Projects Hot
  • ECE & EEE Projects
  • Research Paper
  • Thesis Report

Fabrum Planet Solutions Pvt. Ltd.

© 2024 All Rights Reserved Engineer’s Planet

Digital Media Partner #magdigit 

  • Terms & Conditions

This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. OK Read More

U.S. flag

An official website of the United States government

Here’s how you know

Official websites use .gov A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS A lock ( Lock A locked padlock ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

https://www.nist.gov/publications/nist-cloud-computing-forensic-reference-architecture

NIST Cloud Computing Forensic Reference Architecture

Download paper, additional citation formats.

  • Google Scholar

If you have any questions about this publication or are having problems accessing it, please contact [email protected] .

Grab your spot at the free arXiv Accessibility Forum

Help | Advanced Search

Computer Science > Distributed, Parallel, and Cluster Computing

Title: litmus: fair pricing for serverless computing.

Abstract: Serverless computing has emerged as a market-dominant paradigm in modern cloud computing, benefiting both cloud providers and tenants. While service providers can optimize their machine utilization, tenants only need to pay for the resources they use. To maximize resource utilization, these serverless systems co-run numerous short-lived functions, bearing frequent system condition shifts. When the system gets overcrowded, a tenant's function may suffer from disturbing slowdowns. Ironically, tenants also incur higher costs during these slowdowns, as commercial serverless platforms determine costs proportional to their execution times. This paper argues that cloud providers should compensate tenants for losses incurred when the server is over-provisioned. However, estimating tenants' losses is challenging without pre-profiled information about their functions. Prior studies have indicated that assessing tenant losses leads to heavy overheads. As a solution, this paper introduces a new pricing model that offers discounts based on the machine's state while presuming the tenant's loss under that state. To monitor the machine state accurately, Litmus pricing frequently conducts Litmus tests, an effective and lightweight solution for measuring system congestion. Our experiments show that Litmus pricing can accurately gauge the impact of system congestion and offer nearly ideal prices, with only a 0.2% price difference on average, in a heavily congested system.
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC)
Cite as: [cs.DC]
  (or [cs.DC] for this version)
  Focus to learn more arXiv-issued DOI via DataCite
: Focus to learn more DOI(s) linking to related resources

Submission history

Access paper:.

  • HTML (experimental)
  • Other Formats

license icon

References & Citations

  • Google Scholar
  • Semantic Scholar

BibTeX formatted citation

BibSonomy logo

Bibliographic and Citation Tools

Code, data and media associated with this article, recommenders and search tools.

  • Institution

arXivLabs: experimental projects with community collaborators

arXivLabs is a framework that allows collaborators to develop and share new arXiv features directly on our website.

Both individuals and organizations that work with arXivLabs have embraced and accepted our values of openness, community, excellence, and user data privacy. arXiv is committed to these values and only works with partners that adhere to them.

Have an idea for a project that will add value for arXiv's community? Learn more about arXivLabs .

Research on Cloud Computing Based on Industrial Internet Platform for Human Motion Recognition Algorithms

New citation alert added.

This alert has been successfully added and will be sent to:

You will be notified whenever a record that you have chosen has been cited.

To manage your alert preferences, click on the button below.

New Citation Alert!

Please log in to your account

Information & Contributors

Bibliometrics & citations, index terms.

Computing methodologies

Artificial intelligence

Distributed artificial intelligence

Intelligent agents

Recommendations

A conceptual platform of sla in cloud computing.

Cloud computing is a promising technology, where the infrastructure, developing platform, software and storage are delivered as a service. With the development of cloud computing, more and more cloud service providers emerge. However, there are no ...

Analysis and Research of Cloud Computing System Instance

As a kind of emerging business computational model, Cloud Computing distribute computation task on the resource pool which consists of massive computers, accordingly ,the application systems can gain the computation strength, the storage space and ...

Research on Cloud Computing Security Platform

As a kind of new technology, cloud computing has become a study highlight in both industrial field and academic field. As the users have to save their data in the cloud to use cloud computing, the security of cloud could affect users' trust in cloud ...

Information

Published in.

cover image ACM Other conferences

Association for Computing Machinery

New York, NY, United States

Publication History

Permissions, check for updates.

  • Research-article
  • Refereed limited

Contributors

Other metrics, bibliometrics, article metrics.

  • 0 Total Citations
  • 0 Total Downloads
  • Downloads (Last 12 months) 0
  • Downloads (Last 6 weeks) 0

View Options

Login options.

Check if you have access through your login credentials or your institution to get full access on this article.

Full Access

View options.

View or Download as a PDF file.

View online with eReader .

Share this Publication link

Copying failed.

Share on social media

Affiliations, export citations.

  • Please download or close your previous search result export first before starting a new bulk export. Preview is not available. By clicking download, a status dialog will open to start the export process. The process may take a few minutes but once it finishes a file will be downloadable from your browser. You may continue to browse the DL while the export process is in progress. Download
  • Download citation
  • Copy citation

We are preparing your search results for download ...

We will inform you here when the file is ready.

Your file of search results citations is now ready.

Your search export query has expired. Please try again.

New Distributed Cloud- And Network Architecture for True 3D Holography

  • Conference paper
  • First Online: 01 July 2024
  • Cite this conference paper

cloud computing projects research paper

  • Ingo Friese 5  

Part of the book series: Studies in Computational Intelligence ((SCI,volume 1138))

Included in the following conference series:

  • International Symposium on Intelligent and Distributed Computing

112 Accesses

The current 6G NeXt research project [ 1 ] is exploring the feasibility of using true 3D holography as a case study, establishing criteria for both communication and computing infrastructure. In a future holographic communication service, clients are dispersed throughout the network and engage in collaborative interactions.

You have full access to this open access chapter,  Download conference paper PDF

The current 6G NeXt research project [ 1 ] is exploring the feasibility of using true 3D holography as a case study, establishing criteria for both communication and computing infrastructure. In a future holographic communication service, clients are dispersed throughout the network and engage in collaborative interactions. Holographic communication demands significant processing power, necessitating the inevitability of a high-speed distributed backbone computing infrastructure that embodies the concept of split computing. Moreover, seamless integration between processing facilities and wireless networks is imperative to deliver an immersive user experience [ 2 ].

This presentation is going to delineate the realm of true 3D holographic communication and its prerequisites. It introduces concepts of distributing computing tasks in a new way across conventional computing infrastructure and outlines a suitable solution approach, presenting innovative technological strategies based on a proposed comprehensive communication and computing architecture. True holography, as an exceptionally demanding example of future XR applications, highlights the necessity and challenges for telecommunication providers in designing new networks in conjunction with cloud infrastructure. Future generations of networks will bring us closer to the true convergence of connectivity and computing [ 3 ].

6gnext project homepage. https://6gnext.de/

Future network requirements for extended reality applications. Ericcson, Technical report 4 (2023). https://www.ericsson.com/en/reports-and-papers/ericsson-technology-review/articles/future-network-requirements-for-xr-apps

The next hyperconnected experience for all. Samsung Research, Technical report (2022). https://cdn.codeground.org/nsr/downloads/researchareas/6G

Download references

Author information

Authors and affiliations.

Group Technology/T-Labs, Deutsche Telekom AG, 10781, Berlin, Germany

Ingo Friese

You can also search for this author in PubMed   Google Scholar

Corresponding author

Correspondence to Ingo Friese .

Editor information

Editors and affiliations.

Department Informatik, Hochschule für Angewandte Wissenschaften Hamburg, Berliner Tor, Hamburg, Germany

Michael Köhler-Bußmeier

Fakultät Technik und Informatik, Hochschule für Angewandte Wissenschafte, Berliner Tor, Hamburg, Germany

Wolfgang Renz

Department Informatik, Hochschule für Angewandte Wissenschafte, Hamburg, Germany

Jan Sudeikat

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Cite this paper.

Friese, I. (2024). New Distributed Cloud- And Network Architecture for True 3D Holography. In: Köhler-Bußmeier, M., Renz, W., Sudeikat, J. (eds) Intelligent Distributed Computing XVI. IDC 2023. Studies in Computational Intelligence, vol 1138. Springer, Cham. https://doi.org/10.1007/978-3-031-60023-4_1

Download citation

DOI : https://doi.org/10.1007/978-3-031-60023-4_1

Published : 01 July 2024

Publisher Name : Springer, Cham

Print ISBN : 978-3-031-60022-7

Online ISBN : 978-3-031-60023-4

eBook Packages : Intelligent Technologies and Robotics Intelligent Technologies and Robotics (R0)

Share this paper

Anyone you share the following link with will be able to read this content:

Sorry, a shareable link is not currently available for this article.

Provided by the Springer Nature SharedIt content-sharing initiative

  • Publish with us

Policies and ethics

  • Find a journal
  • Track your research

cloud computing projects research paper

Is your infrastructure AI-ready?

Ai-powered assistant.

  • How will Azure AI help my business?
  • How can I try Azure?

Discover what’s happening on Azure

cloud computing projects research paper

Optimize your data for AI innovation

cloud computing projects research paper

Migrate your VMware workloads to save

cloud computing projects research paper

Bring AI to your SAP workloads

cloud computing projects research paper

Find solutions for putting your ideas into action

A screenshot of a computer screen

Migrate to innovate

cloud computing projects research paper

SAP on Azure

cloud computing projects research paper

Windows Server on Azure

cloud computing projects research paper

SQL Server on Azure

cloud computing projects research paper

SAP on the Microsoft Cloud

A person in a factory controls robotic arms using a tablet, highlighting advanced automation technology.

Oracle on Azure

Four women collaborating over documents on a table in a brightly lit office.

Linux on Azure

A focused man wearing glasses uses a laptop in a casual office setting with another person in the background.

High-performance computing

A female software developer working at a multi-monitor setup in an office, coding and debugging software.

Cloud-scale analytics

Diverse group of professionals working on computers in an office environment, focusing on screens with various code and data visible.

Azure managed databases

A woman sitting in an office chair, coding on a computer with multiple screen displays showing programming code.

Application and data modernization

Man reviewing data on a laptop in a busy office setting with colleagues surrounding him.

Business intelligence

A professional woman presents financial data on a screen to her audience in a modern office setting.

Build and modernize intelligent apps

cloud computing projects research paper

Modern application development

A woman in a denim jacket is using a tablet in a clothing store

Integration services

Three friends laughing and looking at a smartphone together in a modern café.

Azure AI infrastructure

Two people walking by a row of industrial containers with tall chimneys at a facility, under an overcast sky.

Explore tools for bringing your vision to life

cloud computing projects research paper

Azure Database for PostgreSQL

cloud computing projects research paper

Azure Virtual Machines

cloud computing projects research paper

Azure VMware Solution

cloud computing projects research paper

Azure Migrate

cloud computing projects research paper

Azure OpenAI Service

cloud computing projects research paper

Microsoft Copilot in Azure

cloud computing projects research paper

Azure AI Studio

cloud computing projects research paper

Azure AI Search

cloud computing projects research paper

Azure AI Content Safety

cloud computing projects research paper

Azure Machine Learning

cloud computing projects research paper

Azure AI Vision

cloud computing projects research paper

Azure AI Language

cloud computing projects research paper

Azure Kubernetes Service (AKS)

Linux virtual machines in azure, sql server on azure virtual machines, windows virtual machines, azure functions, azure app service.

cloud computing projects research paper

Azure Kubernetes Fleet Manager  PREVIEW

Azure container instances, azure red hat openshift, azure spring apps.

cloud computing projects research paper

Azure Stack

Microsoft sentinel, microsoft defender for cloud, azure expressroute, azure devops.

cloud computing projects research paper

Azure IoT Hub

Azure iot central, azure iot edge, microsoft defender for iot, azure digital twins, azure sphere, azure time series insights.

Gartner Image

See why Gartner named Microsoft a Leader

Transform the way you work.

cloud computing projects research paper

Optimize your infrastructure with popular Azure solutions and services.

A person and another person looking at a computer screen

Create today’s solutions and tomorrow’s breakthroughs.

A joyful woman sitting at a desk with a computer, displaying code on the screen, in a modern office setting.

Get more value from your data with an end-to-end cloud analytics solution.

Two person's looking at a computer

Get guidance and insights on AI innovation, intelligent data, cloud infrastructure, and optimization.

A middle-aged asian man in a blue shirt smiling confidently, arms crossed, standing in an office corridor.

Future-proof your startup with AI services, expert guidance, and essential technology.

Three colleagues, one woman and two men, collaborating over a document in a well-lit office setting.

Learn about programming, cloud technologies, and developer tools.

A group of people looking at a computer

Azure global infrastructure

See how customers are innovating with azure.

LEGO House logo

Take the next step

Start building on azure free, connect with a sales specialist, new to azure learn at your own pace.

Get the Azure mobile app

  • Skip to main content
  • Skip to search
  • Skip to footer

Products and Services

cloud computing projects research paper

Multicloud security

Multicloud security: architecture and ultimate guide.

Understand multicloud network security architecture for AWS, Azure, GCP, and OCI. Read more to learn the details. 

What is multicloud security?

Multicloud security is a cloud security solution that allows comprehensive data protection across multiple cloud platforms, including both private clouds and public clouds like AWS, Azure, Google Cloud Platform (GCP), and Oracle Cloud Infrastructure (OCI). Organizations can use multicloud security to protect all cloud platforms and their varying functions.

Cisco Multicloud Defense

Simplify security and gain multidirectional protection across public or private clouds to block inbound attacks, lateral movement, and data exfiltration.

Why is multicloud security important? 

Multicloud adoption is no longer a choice—it's an essential element in the fast-paced, modern organization where agility and flexibility impact business success. While multicloud environments offer tremendous benefits to organizations, they also create greater complexity that can lead to security gaps and inefficiencies, making it difficult for organizations to achieve the full benefit of cloud economics.

To harness the full benefit of cloud economics, organizations need a strategy for multicloud security. This article reviews multicloud security architecture, requirements, challenges, and best practices to help organizations optimize their multicloud strategy regardless of where they are in their journey.

Multicloud is ubiquitous, security is not

Multicloud adoption has accelerated in recent years. In the 2022 Hybrid Cloud Trends report commissioned by Cisco, 82% of IT leaders reported they have adopted hybrid cloud and 58% of organizations use between two and three infrastructure-as-a-service (IaaS) clouds 1 . Gartner reported that, by 2023, 40% of all enterprise workloads would be deployed in cloud infrastructure and platform services, up from 20% in 2020 2 . Undoubtedly, organizations have embraced all the benefits multicloud environments have to offer. While the majority have already invested significantly into more than one cloud to support digital transformation and other initiatives, many plan additional investments to further enable their digital business. 

Multicloud success, however, remains elusive for many organizations. Among midsize organizations, for example, only 50% report that multicloud has helped achieve business goals, according to a 2021 survey by HashiCorp 3 . 

In conversations with customers, many have called out cost management, governance, and visibility as common barriers to adoption and deployment of multicloud environments, but one factor that consistently lingers at the top is security. In a 2023 Valtix survey, 51% of IT leaders agreed or strongly agreed that their company doesn't want to expand to additional clouds because of the security complexities. 

One driver behind the challenges is the expectation that you can simply extend your data center or on-premise-security framework into the cloud. However, to solve the security complexities associated with multicloud environments, your strategy needs to adapt to the dynamic environment with a cloud-first approach. 

This article recommends a security model that can help you advance on your multicloud journey at the speed of the cloud—and your business.

cloud computing projects research paper

Figure 1. Tools used for achieving security requirements across cloud service providers

Challenges of multicloud security

Multicloud environments add additional layers of risk to organizations. Risk can stem from a multitude of challenges, including:

Cloud threats

Just as there are threats to on-premises environments, there are threats that affect multicloud environments too. Considering the diversity of threats that can affect an organization's cloud environment, it's no surprise that 73% of organizations are very or extremely concerned about cloud security. Some of these threats include:

  • Zero-day exploits
  • Cryptomining
  • Malicious insiders
  • Ransomware and lateral movement of threats

Data loss and breaches

The risk of breaches and data loss command the most attention. In the 2023 IBM Cost of a Data Breach Report 4 , the average cost for a data breach across the boards was US$4.45 million. Additional datapoints included cloud environments, noting 82% of breaches involved data stored in the cloud and 39% of breaches spanned across multiple environments. Breaches spanning across multiple environments also incurred a higher-than-average cost of US$4.75 million, making data loss prevention and protection against lateral movement a necessary focal point in any multicloud strategy.

While navigating the cloud threat landscape, organizations must grapple with numerous multicloud security challenges, including: 

  • The complexities—and the gray areas and vagaries—of the shared responsibility model 
  • Risks that are unique to the cloud, such as reduced visibility and control 
  • The inherent open model of the cloud, which requires additional considerations 
  • The inconsistent architecture and infrastructure of the various cloud environments 
  • Additional issues such as talent shortage and compliance 

Many of these aspects require granular expertise—not only in cloud networking and security but also in each cloud provider's product offerings and services, architecture, automation, and security tools—compounding the challenges. 

The shared responsibility model: Complex, vague, and rigid 

The shared security responsibility model of the public cloud keeps security teams on their toes. Providers typically offer guidelines, but in practice, you can't rely on them completely—and the lines sometimes appear fuzzy. This became especially evident considering recent exploits we've seen within cloud-provider services, which required the end users to mitigate while waiting for a fix. 

In a traditional service outsourcing model, your provider would work with your team to clearly define the boundaries. That's not the case in the cloud. 

Things get even more challenging in the constant parade of updates and new services from providers. They introduce dozens of services, hundreds of new features every year, and numerous updates. Developers eagerly consume the services because they solve specific problems or add new capabilities. The rapid pace of change makes their job easier—and the security team's job harder.

This throws security teams into a perpetual cycle of catch-up, trying to figure out the implications of each change. Multiply this challenge by the number of clouds you've deployed, and the problem is quickly exacerbated. 

cloud computing projects research paper

Figure 2. Shared responsibility model

Other challenges 

Unique cloud security risks .

Reduced visibility and control are common problems, with 53% of surveyed cybersecurity professionals identifying a lack of visibility and 46% calling out inadequate control as their top barrier to adoption3. Other risks include insecure APIs and lack of a centralized view across multicloud. 

The talent gap

The cybersecurity industry has grappled with a talent shortage for years, with the latest data showing a gap of 3.1 million security workers globally in 20205. Provider-specific security requires deep expertise with each cloud's configurations, intensifying the talent issue.

Policy enforcement 

The variations in controls in individual clouds and app architectures result in inconsistent policy enforcement across your environment, leading to gaps in protection and reduced security posture.

Building layered defenses in the cloud 

Although your cloud architecture and security approach are different from on-premises, the tenet of multilayered security still applies. There's no one-size-fits-all solution that covers all the threat vectors and types of attacks. When building out your security layers, consider capabilities such as: 

  • Visibility into all your assets (apps, APIs, workloads, etc.) across all your clouds, as well as into your security monitoring and whether it's working as expected 
  • Cloud network security, such as firewall, data loss protection (DLP), segmentation, and intrusion detection/intrusion prevention systems (cloud IDS/IPS) 
  • Protection against web threats through web application firewall (cloud WAF) and malicious IP blocking  
  • Context-aware security across app lifecycle (dev, test, prod) and type of apps (general, sensitive, compliance) 
  • Extending these security layers from the data center or bolting them on top of your architecture is ineffective and introduces new problems, such as orchestrating and automating the tools across multicloud. 

In contrast, a solution that delivers both networking and security in a cloud-native way has many benefits, it: 

  • Offers advantages such as agility, scalability, and elasticity 
  • Works seamlessly with your cloud apps 
  • Enables continuous discovery of new apps and infrastructure and automatic policy based on app context

Implement active defense 

Cloud vulnerabilities are one of the biggest challenges for security teams. Consequently, these teams devote much of their time to patching. But managing vulnerabilities alone will not protect you against zero-day threats. By the time a vendor knows about a new threat and creates a patch, it may be too late. 

Just like on-premises, the multicloud needs both proactive and reactive defenses. Active defense enables you to block attacks, restrict unauthorized access to assets, and defend against new and emerging threats. The goal should be to break the attack kill chain in multiple places and not rely on a single point of failure in your defenses. For example, to stop an attacker on a breached server, a malicious insider, or a ransomware attack, an effective last stop is to restrict all outbound traffic to known categories of sites, domains, and URLs. 

Requirements for a multicloud security solution 

Although multicloud security solutions have different functionalities based on their category, they share a set of common criteria, such as simplicity of deployment and management. When evaluating a vendor's multicloud security solution, consider the following aspects: 

Continuous visibility 

To detect malicious activities such as data exfiltration, you need to combine your cloud asset information and threat intelligence with complete visibility into all traffic flows, including inbound from and outbound to the internet, east-west, and to platform-as-a-service (PaaS) services. 

Comprehensiveness 

A solution with a thorough and robust feature set will reduce or eliminate the need for multiple point products and enable you to consolidate your cloud security. Look for critical capabilities such as dynamic policy enforcement, segmentation, network protection (cloud firewall), and web protection. 

Active defense capabilities 

If your security only allows you to react to threats rather than proactively stop them, your team will always remain at least one step behind the adversary. In the past, active defense required an agent-based solution. Now, organizations can achieve active defense with an agentless approach, reducing deployment and maintenance challenges. 

Cloud scalability 

Business requirements and environments continuously change, and security needs to be able to quickly scale in and out to adapt to those changes. The multicloud security solution should automatically scale security to meet demand, discover new assets as they are implemented in the production environment, and apply context-based policy—so your team doesn't have to constantly worry about operating the tool across multiple clouds, regions, and accounts. The multicloud security solution should automatically scale security to meet demand, discover new assets as they are implemented in the production environment, and apply context-based policy—all without manual intervention, so your team doesn't have to constantly worry about operating the tool across multiple clouds, regions, and accounts. 

Ease and speed of deployment

Your cloud security solution shouldn't amplify the complexities of an already complex multicloud environment, yet many vendors' products are difficult and time-consuming to deploy across public cloud infrastructure. Look for a turnkey solution that simply achieves outcomes, is fast to implement, and works natively in your environment. This will eliminate the need for admins to manually adapt the environment—instead, the solution "learns" the environment through the APIs in that cloud. 

Single policy framework 

A centralized control plane across disparate clouds enables you to enforce security policies consistently from one controller, simplifying multicloud management and alleviating complexity. To achieve this, the security solution should provide an abstraction layer that decouples the control plane and data plane. 

cloud computing projects research paper

Figure 3. Cisco Multicloud Defense's comprehensive approach to multicloud network security

Adopt unified, simplified, multicloud network security with Cisco Multicloud Defense 

Cisco Multicloud Defense solves the complexities of deploying and managing security in multicloud environments. Delivered as a service, it unifies security controls across AWS, Azure, GCP, and OCI through a single control plane, bringing simplicity to complex multicloud environments. 

Cisco Multicloud Defense delivers: 

  • Layered, proactive defense through advanced security controls (including firewall, WAF, DLP, and IDS/IPS) 
  • Deployments in as little as 5 minutes without additional infrastructure 
  • Continuous, dynamic, real-time visibility into all your cloud apps and infrastructure 
  • A single, dynamic policy framework for consistent, automatic policy enforcement across the multicloud 
  • A flexible, open platform that integrates threat intelligence feeds and third-party solutions such as security information and event management (SIEM) and security orchestration and automation response (SOAR) 

Today's IT and DevOps teams move fast to support digital transformations and other initiatives that keep your business competitive. Cisco Multicloud Defense helps your teams to achieve the full benefit of cloud economics with the skilled resources you already have and without compromising on security. 

Embrace the multicloud world with the control you need 

Multicloud adoption is no longer a choice—it's an essential element in the fast-paced, modern business environment where agility impacts the success of your business. Without understanding the full spectrum of challenges and requirements of the multicloud, it would be difficult to account for the obstacles and risk you may face on your cloud journey. You can overcome the hurdles by shifting to a cloud-first mentality— implementing security solutions that minimize complexity and risk by design, helping your organization securely stay in control in an ever-changing multicloud world. 

Do you have questions? Do you want to see Cisco Multicloud Defense in action? Take our product tour , request a demo , or try it for yourself with our free trial . 

References 

  • 2022 Global Hybrid Cloud Trends Report. 451 Research and Cisco Systems, 2022
  • Gartner Hype Cycle™ for Workload and Network Security, 2022
  • HashiCorp State of Cloud Strategy Survey, 2021 
  • IBM Cost of a Data Breach Report, 2023 
  • ISC2 Cybersecurity Workforce Study, 2020 

Personalized demo

See Cisco Multicloud Defense in action

Get a personalized demo to see how Cisco Multicloud Defense protects your cloud environments from one software-as-a-service (SaaS) controller, providing consistent, automated protection at cloud speed and scale.

IMAGES

  1. Cloud computing research paper outline

    cloud computing projects research paper

  2. (PDF) Cloud Computing in Healthcare

    cloud computing projects research paper

  3. Top 50 Research Papers in Micro Cloud Computing

    cloud computing projects research paper

  4. (PDF) Research in Cloud Computing-An Overview

    cloud computing projects research paper

  5. (PDF) A Review Paper on Cloud Computing

    cloud computing projects research paper

  6. Research Proposal on Cloud Computing Essay Example

    cloud computing projects research paper

VIDEO

  1. AWS Cloud Projects For Beginners

  2. IoT And Cloud Computing

  3. Cloud computing based Final year Best CSE Project using JAVA

  4. CLOUD COMPUTING-TECHNOLOGIES FOR NETWORK BASED SYSTEMS UNIT-1 VIDEO-4

  5. Cloud Computing Projects

  6. cloud computing scheduling algorithms Clodsim Projects

COMMENTS

  1. Top 10 Cloud Computing Research Topics of 2024

    Big data in cloud computing research papers are having huge visibility in the industry. The paper "Targeted Influence Maximization based on Cloud Computing over Big Data in Social Networks" proposes a targeted influence maximization algorithm to identify the most influential users in a social network. ... PMP is a registered mark of the Project ...

  2. Cloud computing research: A review of research themes, frameworks

    This paper presents a meta-analysis of cloud computing research in information systems with the aim of taking stock of literature and their associated research frameworks, research methodology, geographical distribution, level of analysis as well as trends of these studies over the period of 7 years. ... Cloud computing research started to gain ...

  3. Home page

    The Journal of Cloud Computing: Advances, Systems and Applications (JoCCASA) will publish research articles on all aspects of Cloud Computing. Principally, articles will address topics that are core to Cloud Computing, focusing on the Cloud applications, the Cloud systems, and the advances that will lead to the Clouds of the future.

  4. Articles

    Cloud environment is a virtual, online, and distributed computing environment that provides users with large-scale services. And cloud monitoring plays an integral role in protecting infrastructures in the clo... Hongxia He, Xi Li, Peng Chen, Juan Chen, Ming Liu and Lei Wu. Journal of Cloud Computing 2024 13 :115.

  5. Adoption of cloud computing as innovation in the organization

    We also explore the cybersecurity elements associated with cloud computing, focusing on intrusion detection and prevention and understanding how that can be applied in the cloud. Finally, we investigate the future research directions for cloud computing and expand this paper into further articles with experiments and results.

  6. Cloud Computing: A Systematic Literature Review and Future Agenda

    review is thought to inspire enterprises and managers that would like to use cloud computing in. terms of the scope, solution methods, factors, dimensions, and the results achieved in a holistic ...

  7. A Framework for the Interoperability of Cloud Platforms ...

    As the number of cloud platforms supporting scientific research grows, there is an increasing need to support interoperability between two or more cloud platforms. A well accepted core concept is ...

  8. Cloud Computing

    This paper is concerned with developing a software tool, called IMPaCT, for the parallelized verification and controller synthesis of large-scale stochastic systems using interval Markov chains (IMCs) and interval Markov decision processes (IMDPs), respectively. 10. 07 Jan 2024. Paper. Code.

  9. Cloud Computing Continuum Research Topics and Challenges. A Multi

    This paper presents a multi-source based analysis for the identification of cloud computing research challenges as part of the road mapping methodology followed in the HUB4CLOUD project. The analysis consists of an in-depth study of several sources including analysis of the international context, analysis of academic venues, interviews with ...

  10. Next generation cloud computing: New trends and research directions

    Next generation cloud computing systems are aimed at becoming more ambient, pervasive and ubiquitous given the emerging trends of distributed, heterogeneous and ad hoc cloud infrastructure and associated computing architectures. This will impact at least the following four areas considered in this paper.

  11. Cloud Computing

    Faced with continuously increasing scale of data, original back-propagation neural network based machine learning algorithm presents two non-trivial challenges: huge amount of data makes it difficult to maintain both efficiency and accuracy; redundant data aggravates the system workload. 1. Paper. Code.

  12. Cloud Computing: Architecture, Vision, Challenges, Opportunities, and

    Cloud computing stands at the forefront of a technological revolution, fundamentally altering the provisioning, utilization, and administration of computing resources. This paper conducts a comprehensive examination of the visionary aspects, obstacles, and possibilities inherent in cloud computing. It delves deep into the foundational principles and distinguishing features of this technology ...

  13. Cloud computing: state-of-the-art and research challenges

    In this paper, we present a survey of cloud computing, highlighting its key concepts, architectural principles, state-of-the-art implementation as well as research challenges. The aim of this paper is to provide a better understanding of the design challenges of cloud computing and identify important research directions in this increasingly ...

  14. 12 Latest Cloud Computing Research Topics

    Virtualizations infrastructure. Software platform. Identity management. Access control. There is some important research direction in Cloud Security in areas such as trusted computing, privacy-preserving models, and information-centric security. These are the following Trending Cloud Computing Research Topics.

  15. [2307.12479] Cloud Cost Optimization: A Comprehensive Review of

    Cloud computing has revolutionized the way organizations manage their IT infrastructure, but it has also introduced new challenges, such as managing cloud costs. This paper explores various techniques for cloud cost optimization, including cloud pricing, analysis, and strategies for resource allocation. Real-world case studies of these techniques are presented, along with a discussion of their ...

  16. (PDF) Cloud-Based E-Learning: Using Cloud Computing ...

    This paper focuses on the research on the application of cloud computing in e-learning. The aim of this paper is to give an overview of the current state and the impact of the use of cloud ...

  17. Top 15 Cloud Computing Research Topics in 2024

    We've compiled 15 important cloud computing research topics that are changing how cloud computing is used. 1. Big Data. Big data refers to the large amounts of data produced by various programs in a very short duration of time. It is quite cumbersome to store such huge and voluminous amounts of data in company-run data centers.

  18. (PDF) Research Paper on Cloud Computing

    Student. , M.Sc. I.T., I.C.S. College, Khed, Ratnagri. Abstract: Cloud Computing has come of age later Amazons introduce the first of its kind of cloud services in2006. It is. particularly ...

  19. 15+ Cloud Computing Projects With Source Code

    Intermediate Cloud Computing Projects with Source Code. 6. System for Online Blood Banking that is hosted in the cloud. 7. Cloud-based conversational Interface. 8. Bookstore on the cloud. 9. Smart Traffic Management System that is cloud-based.

  20. Cloud Computing Research Papers

    Resource Management in a Hybrid Cloud Infrastructure. In this paper, a resource management technique is proposed to handle the request of Virtual Machines (VM's) as per the need of users, consisting of resources (mips, vm image size, network bandwidth, number of cpu's) containing cloudlets... more. Download.

  21. Top 22 Cloud Computing Project Ideas in 2024 [Source Code]

    Here is a list of curated cloud computing projects for all level skills, one should know in 2024: Cloud-enabled attendance system. Online blood bank system. Online cloud-enabled bookstore system. Data redundancy removal system. Detecting data leaks using SQL injection.

  22. Cloud Computing Project Topics With Abstracts and Base Papers 2024

    360. Embark on a journey through innovative research as we unveil M.Tech projects pushing the boundaries of technology. From revolutionizing pavement crack image segmentation with deep learning to addressing healthcare challenges in Mobile Cloud Computing (MCC) through the Modular Encryption Standard (MES), our projects reflect cutting-edge solutions.

  23. NIST Cloud Computing Forensic Reference Architecture

    Abstract This document summarizes the research performed by the NIST Cloud Computing Forensic Science Working Group and presents the NIST Cloud Computing Forensic Reference Architecture (CC FRA or FRA), whose goal is to provide support for a cloud system's forensic readiness.

  24. Towards a Novel Privacy-Preserving Distributed Multiparty Data

    The intersection of cloud computing, blockchain technology, and the impending era of quantum computing presents a critical juncture for data security. This research addresses the escalating vulnerabilities by proposing a comprehensive framework that integrates Quantum Key Distribution (QKD), CRYSTALS Kyber, and Zero-Knowledge Proofs (ZKPs) for securing data in cloud-based blockchain systems ...

  25. [2408.00731] Litmus: Fair Pricing for Serverless Computing

    Serverless computing has emerged as a market-dominant paradigm in modern cloud computing, benefiting both cloud providers and tenants. While service providers can optimize their machine utilization, tenants only need to pay for the resources they use. To maximize resource utilization, these serverless systems co-run numerous short-lived functions, bearing frequent system condition shifts. When ...

  26. Research on Cloud Computing Based on Industrial Internet Platform for

    Analysis and Research of Cloud Computing System Instance ICFN '10: Proceedings of the 2010 Second International Conference on Future Networks As a kind of emerging business computational model, Cloud Computing distribute computation task on the resource pool which consists of massive computers, accordingly ,the application systems can gain the ...

  27. New Distributed Cloud- And Network Architecture for True 3D ...

    The current 6G NeXt research project [] is exploring the feasibility of using true 3D holography as a case study, establishing criteria for both communication and computing infrastructure.In a future holographic communication service, clients are dispersed throughout the network and engage in collaborative interactions.

  28. Cloud Computing Services

    Invent with purpose, realize cost savings, and make your organization more efficient with Microsoft Azure's open and flexible cloud computing platform.

  29. What is Multicloud Security: architecture and ultimate guide

    Multicloud is ubiquitous, security is not. Multicloud adoption has accelerated in recent years. In the 2022 Hybrid Cloud Trends report commissioned by Cisco, 82% of IT leaders reported they have adopted hybrid cloud and 58% of organizations use between two and three infrastructure-as-a-service (IaaS) clouds 1.Gartner reported that, by 2023, 40% of all enterprise workloads would be deployed in ...