To see the other types of publications on this topic, follow the link: Hybrid cloud computing.

Journal articles on the topic 'Hybrid cloud computing'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Hybrid cloud computing.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Murali Kadiyala. "Hybrid Cloud Deployment: Best Practices for Application Engineers." Kuwait Journal of Computer Science 1, no. 1 (2023): 17–25. https://doi.org/10.52783/kjcs.281.

Full text
Abstract:
This paper highlights the discussion of hybrid cloud deployment and its best practices for application engineers. Hybrid cloud deployment methods have become the new standard for organizations. Hybrid cloud deployment is important for application engineers since it may be utilized to expand on-premises sources within an organization. These days, the hybrid cloud deployment model, or HCDM model, is thought to be the most effective cloud computing paradigm due to its open-source features. Application engineers can maintain computing power based on consumption and fluctuations thanks to hybrid cloud computing. The author also explains how hybrid clouds offer the best resources, security, and scale and cost advantages. Cloud architectures are being improved as the cloud ecosystem develops and innovates further. Application engineers can use hybrid cloud deployment to evaluate workloads and make the switch to a hybrid cloud based on user needs.
APA, Harvard, Vancouver, ISO, and other styles
2

Hitesh Premshankar Rai, Pavan Ogeti, Narendra Sharad Fadnavis, Gireesh Bhaulal Patil, and Uday Krishna Padyana. "Integrating Public and Private Clouds: The Future of Hybrid Cloud Solutions." Universal Research Reports 8, no. 2 (2024): 143–53. http://dx.doi.org/10.36676/urr.v9.i4.1320.

Full text
Abstract:
A hybrid cloud system basically mixes on-premises and cloud computing resources to provide workload distribution, security, and mobility. A hybrid cloud might contain two or more personal clouds, or it could have one public cloud and one private cloud, depending on what is needed. Typically, third-party providers like Microsoft, Google, and Amazon offer cloud services to the public. The primary goal of cloud computing, which is an innovative approach, is to provide net computation and safe, rapid, and easy data storage. Security concerns are crucial even if cloud computing significantly lowers the cost and upkeep of the IT sector. Security concerns are crucial even if cloud computing significantly lowers the cost and upkeep of the IT sector. Cloud-based services including private, public, and hybrid cloud computing are being used by an increasing number of IT firms. However, they are also worried about security-related issues. Private, public, and hybrid cloud computing challenges are covered in great detail in this article. As more businesses use cloud services and architectures in the modern business world, additional dangers and concerns surfaces.
APA, Harvard, Vancouver, ISO, and other styles
3

Abirami Dasu Jegadeesh and Gaurav Samdani. "Hybrid Cloud Boom." World Journal of Advanced Engineering Technology and Sciences 15, no. 1 (2025): 098–105. https://doi.org/10.30574/wjaets.2025.15.1.0180.

Full text
Abstract:
Finding the Sweet Spot Between Flexibility, Security, and Performance Hybrid cloud use has sparked a big change in how companies use cloud computing. They want to strike the right balance between flexibility, security, and performance. Hybrid cloud solutions mix public and private cloud setups. This lets businesses get the best of both worlds. They enjoy the easy scaling and cost savings of public clouds. At the same time, they keep tight control and protect data with private clouds. This approach allows companies to shape their cloud plans to fit their exact business needs and follow the rules they must obey. Companies of all sizes are now opting for hybrid cloud setups to handle different workloads and meet changing business needs. Spreading workloads across multiple cloud platforms gives businesses more flexibility and reduces the risk of being stuck with one vendor. Hybrid clouds also support things like backup plans, data analysis, and edge computing making them a key part of modern IT plans (Gartner, 2024). More and more companies are using hybrid clouds because of better cloud management tools and tech. These new tools make it easier to run complex setups with multiple clouds. They help companies use resources better, control costs, and follow industry rules. This means hybrid cloud solutions are helping companies in all industries go digital (IDC, 2024). This report will look at why hybrid clouds are becoming so popular, what's good and bad about them, and how businesses are using hybrid cloud plans to stay ahead in our digital world.
APA, Harvard, Vancouver, ISO, and other styles
4

T.Venkat, Narayana Rao, Naveena Kamsali, David Reena, and Sathya Narayana M. "A New Computing Environment Using Hybrid Cloud." Journal of Information Sciences and Computing Technologies 3, no. 1 (2015): 180–85. https://doi.org/10.5281/zenodo.3969202.

Full text
Abstract:
ract Cloud computing is commonly used for the delivery of software, infrastructure and storage services over the internet. The delivery of services can be done in the private cloud or public cloud. Private cloud resources will be within our data center and it is a secure environment where only specified client can operate. Public cloud resources are provided in a virtualized environment, which provides a pool of shared resources. Hybrid cloud is integration of private, public and in some cases community cloud to perform unique functions within the same organization. Small and medium scale organizations cannot effort to setup IT infrastructure so hybrid cloud is one prominent solution for them. This paper deals with the hybrid cloud computing and architecture of the hybrid cloud computing. The paper also depicts advantages, disadvantages, challenges and differences in hybrid cloud computing implementations.
APA, Harvard, Vancouver, ISO, and other styles
5

Barhate, Shweta. "An Implementation of Divide and Conquer Clustering Technique for Improving the Interoperability in Hybrid Cloud Environment." International Journal on Recent and Innovation Trends in Computing and Communication 10, no. 1s (2022): 182–89. http://dx.doi.org/10.17762/ijritcc.v10i1s.5822.

Full text
Abstract:
Cloud computing provides users with pool of resources ubiquitously on demand. While the resources are provided to the users, interoperability needs to be considered. Interoperability is the ability of the cloud environment to transfer the data internally or between the data centers seamlessly. Interoperability is the least studied issue in the field of cloud computing. This paper implements hybrid cloud as a solution to interoperability. Hybrid cloud is chosen for its powerful combination of high configured and secured private clouds and fast accessible and scalable public clouds. The interoperability is then proposed to be enhanced by implementing divide and conquer algorithm of clustering in hybrid cloud.
APA, Harvard, Vancouver, ISO, and other styles
6

Miss., Vinaya Tayade, and M. R. Khan Professor. "A STUDY ON CLASSIFICATIONS OF CLOUD." International Journal of Engineering Technologies and Management Research 6, no. 12 (2020): 68–72. https://doi.org/10.5281/zenodo.3604615.

Full text
Abstract:
“The interesting thing about cloud computing is that we’ve redefined cloud computing to include everything that we already do.” - Larry Ellison Cloud computing is an emerging field that is expected to change the entire information technology processes and IT market in the future. It is changing how we develop, deploy, and use the information technology and the infrastructure that it runs on. Cloud Computing can be defined as Internet-based computing in which virtually shared servers that are data centers provide software, platform, infrastructure, policies and many resources. Clouds can be classified in various types: Public, Private, Hybrid and Virtual Private. In this paper we will understand the Different Classifications of Clouds – IaaS, PaaS, SaaS – Public, Private, Community, Hybrid and also match Cloud Providers to Our Needs – Amazon, Google, Microsoft.
APA, Harvard, Vancouver, ISO, and other styles
7

Pasham, Sai Dikshit. "Hybrid Cloud Computing Models: A Framework for High-Performance Applications." Research and Analysis Journal 5, no. 2 (2022): 01–24. https://doi.org/10.18535/raj.v5i2.274.

Full text
Abstract:
One of the most important models that have become significant for organizations with their IT service requirements is the hybrid cloud computing model. Hybrid models are defined as cloud computing combining smooth-running on-premises resources with public and private clouds, which can provide a solid flexible foundation to host various high-performance applications, including artificial intelligence, big data analysis, and essential business functions. This paper aims to identify the key decision criteria, advantages, and issues of using hybrid cloud computing with a focus on its places inefficient resource management, low latency, and compliance considerations. The discussion combines the reflective analysis of case studies and presentations of industry practices to show how organizations can unlock operational value and innovation with hybrid cloud models. Furthermore, the paper examines future trends such as edge computing and artificial intelligence’s impact. It highlights that the hybrid cloud frameworks’ advancement remains central to the future generations of digital transformation enablers.
APA, Harvard, Vancouver, ISO, and other styles
8

Beckham, Olly, Gord Oldman, Julie Karrie, and Dorth Craig. "Techniques used to formulate confidential data by means of fragmentation and hybrid encryption." International research journal of management, IT and social sciences 6, no. 6 (2019): 68–86. http://dx.doi.org/10.21744/irjmis.v6n6.766.

Full text
Abstract:
Cloud computing is a concept shifting in the approach how computing resources are deployed and purchased. Even though the cloud has a capable, elastic, and consistent design, several security concerns restrain customers to completely accept this novel technology and move from traditional computing to cloud computing. In the article, we aspire to present a form of a novel architectural model for offering protection to numerous cloud service providers with the intention to devise and extend security means for cloud computing. In this work, we presented a two-tier architecture for security in multi-clouds; one at the client side, and other at the server side. The article presented a security domination outline for multi-clouds and supports security needs like Confidentiality, Integrity, Availability, Authorization, and Non-repudiation for cloud storage. Through this document we have anticipated, HBDaSeC, a secure-computation protocol to ease the challenges of enforcing the protection of data for information security in the cloud.
APA, Harvard, Vancouver, ISO, and other styles
9

Tayade, Vinaya, and M. R. Khan. "A STUDY ON CLASSIFICATIONS OF CLOUD." International Journal of Engineering Technologies and Management Research 6, no. 12 (2020): 68–72. http://dx.doi.org/10.29121/ijetmr.v6.i12.2019.556.

Full text
Abstract:
“The interesting thing about cloud computing is that we’ve redefined cloud computing toinclude everything that we already do.” - Larry EllisonCloud computing is an emerging field that is expected to change the entire informationtechnology processes and IT market in the future. It is changing how we develop, deploy, anduse the information technology and the infrastructure that it runs on. Cloud Computing canbe defined as Internet-based computing in which virtually shared servers that are data centersprovide software, platform, infrastructure, policies and many resources.Clouds can be classified in various types: Public, Private, Hybrid and Virtual Private. In thispaper we will understand the Different Classifications of Clouds – IaaS, PaaS, SaaS – Public,Private, Community, Hybrid and also match Cloud Providers to Our Needs – Amazon, Google,Microsoft.
APA, Harvard, Vancouver, ISO, and other styles
10

Kelechi, Douglas Allswell, Ituma Chinagolum, Ukabuiro Ikenna Kelechi, Chidi Ukamaka Betrand, and Mercy Eberechi Benson-Emenike. "Securing Cloud Environment Using Hybrid (Adaptive Public Key) Model." European Journal of Theoretical and Applied Sciences 2, no. 1 (2024): 585–94. http://dx.doi.org/10.59324/ejtas.2024.2(1).51.

Full text
Abstract:
Although data security has always been important, it is now even more so given the significance of cloud computing and the enormous amounts of complex data it holds. In cloud computing, having data accessible at all times is vital, as is collecting and preserving data without loss or corruption. The use of appropriate algorithms is one of the most important aspects of security. These protocols protect data by limiting unauthorized access. In order to ensure the security of your data, you need to conduct research on the security risks associated with public clouds. The purpose of this document is to provide an in-depth review of public clouds and the security issues associated with them. In order to review the literature review that provides an in-depth understanding of cloud storage and security issues, it is necessary to overcome several obstacles. As a result, based on an analysis of cloud architecture, we provide the data security model that can be applied to cloud computing. Our cloud computing data security model is now better. Lastly, the work can be done in a direction that benefits from faster encryption times and increased data secrecy by utilising machine learning and authentication technologies for safe cloud storage.
APA, Harvard, Vancouver, ISO, and other styles
11

Douglas, Allswell Kelechi, Chinagolum Ituma, Ikenna Kelechi Ukabuiro, Ukamaka Betrand Chidi, and Eberechi Benson-Emenike Mercy. "Securing Cloud Environment Using Hybrid (Adaptive Public Key) Model." European Journal of Theoretical and Applied Sciences 2, no. 1 (2024): 585–94. https://doi.org/10.59324/ejtas.2024.2(1).51.

Full text
Abstract:
Although data security has always been important, it is now even more so given the significance of cloud computing and the enormous amounts of complex data it holds. In cloud computing, having data accessible at all times is vital, as is collecting and preserving data without loss or corruption. The use of appropriate algorithms is one of the most important aspects of security. These protocols protect data by limiting unauthorized access. In order to ensure the security of your data, you need to conduct research on the security risks associated with public clouds. The purpose of this document is to provide an in-depth review of public clouds and the security issues associated with them. In order to review the literature review that provides an in-depth understanding of cloud storage and security issues, it is necessary to overcome several obstacles. As a result, based on an analysis of cloud architecture, we provide the data security model that can be applied to cloud computing. Our cloud computing data security model is now better. Lastly, the work can be done in a direction that benefits from faster encryption times and increased data secrecy by utilising machine learning and authentication technologies for safe cloud storage. 
APA, Harvard, Vancouver, ISO, and other styles
12

Abirami Dasu Jegadeesh and Gaurav Samdani. "Cloud computing: Exploring options and choosing the best fit for your business." World Journal of Advanced Engineering Technology and Sciences 7, no. 2 (2022): 349–59. https://doi.org/10.30574/wjaets.2022.7.2.0120.

Full text
Abstract:
Cloud computing has caused a revolution in how companies do business giving them flexibility, scalability, and cost-efficiency like never before. It lets organizations use computing resources through the internet instead of relying on the usual in-house setup making cloud computing a key part of today's IT plans. From new startups to big global companies, businesses are using cloud solutions more and more to boost their ability to adapt cut down on running costs, and come up with new ideas. The cloud ecosystem is big and varied, with different deployment models and service types to suit various business needs. Public, private, and hybrid clouds are the three main deployment models each with its own pros and cons. public clouds, like those from Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform, offer affordable scalability and global reach. Private clouds, on the other hand, are for organizations that have strict security or compliance needs giving them dedicated environments. Hybrid clouds mix the best parts of both letting businesses find a balance between security and scalability by combining private and public cloud resources
APA, Harvard, Vancouver, ISO, and other styles
13

Jain, Tarun, and Jishnu Hazra. "Hybrid Cloud Computing Investment Strategies." Production and Operations Management 28, no. 5 (2019): 1272–84. http://dx.doi.org/10.1111/poms.12991.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Park, Joonseok, Ungsoo Kim, Donggyu Yun, and Keunhyuk Yeom. "Approach for Selecting and Integrating Cloud Services to Construct Hybrid Cloud." Journal of Grid Computing 18, no. 3 (2020): 441–69. http://dx.doi.org/10.1007/s10723-020-09519-x.

Full text
Abstract:
Abstract With the popularization of cloud computing, various cloud services have emerged, and hybrid clouds that can take advantage of combining public and private clouds are attracting attention. However, because of their variety, determining a combination of cloud services suited to the user’s current environment and requirements is expensive when deploying a hybrid cloud. Even if the required services are available, there is a lack of tools to connect them, manage them in batches, and utilize the integrated environment. To solve these problems, this paper proposes a cloud selection and integration process (C-SIP), which selects and integrates a combination of cloud services through a hybrid cloud service broker (hybrid CSB), which is an automation solution supporting hybrid cloud deployment. Moreover, the proposed method is realized using a script including the application programming interface of each cloud service. The proposed C-SIP will be used as a core approach toward the hybrid CSB, which is expected to facilitate the introduction of hybrid clouds and the acquisition of cloud strategies.
APA, Harvard, Vancouver, ISO, and other styles
15

Brahmam Ainala, Veera, Yaswanth Arikatla, Varma Seru, Sahil Dasu, and B. Bikram. "Quantum computing’s paradigm shift : Implications and Opportunities for Cloud Computing." Buana Information Technology and Computer Sciences (BIT and CS) 5, no. 2 (2024): 99–108. https://doi.org/10.36805/bit-cs.v5i2.6649.

Full text
Abstract:
The field of computing is about to undergo a revolution thanks to quantum computing, a ground-breaking innovation based on the ideas of quantum physics. The enormous implications and potential that quantum computing has for cloud computing are explored in this publication. We examine the difficulties faced by current cryptography systems as well as prospective improvements in fields like machine learning, simulations, and data security as we delve into the basic alterations in computing paradigms. Additionally, we go over the revolutionary possibilities for cloud computing, such as the creation of quantum-safe cloud security solutions, hybrid computing models, and quantum cloud services.
APA, Harvard, Vancouver, ISO, and other styles
16

He, Wu, and Feng-Kwei Wang. "A Hybrid Cloud Model for Cloud Adoption by Multinational Enterprises." Journal of Global Information Management 23, no. 1 (2015): 1–23. http://dx.doi.org/10.4018/jgim.2015010101.

Full text
Abstract:
As a new IT paradigm for users, cloud computing has the potential to transform the way that IT resources are utilized and consumed. Many multinational enterprises (MNEs) are interested in cloud computing but do not know how to adopt and implement cloud computing in their enterprise settings. In an effort to help MNEs understand cloud computing and develop successful enterprise adoption strategies for cloud computing, the authors propose a hybrid cloud model for MNEs and illustrate the utility of this model by using two case studies. Insights for adopting and implementing this model in international settings are provided as well.
APA, Harvard, Vancouver, ISO, and other styles
17

Neeraj, Arora, and Kumar Banyal Rohitash. "Hybrid scheduling algorithms in cloud computing: a review." International Journal of Electrical and Computer Engineering (IJECE) 12, no. 1 (2022): 880–95. https://doi.org/10.11591/ijece.v12i1.pp880-895.

Full text
Abstract:
Cloud computing is one of the emerging fields in computer science due to its several advancements like on-demand processing, resource sharing, and pay per use. There are several cloud computing issues like security, quality of service (QoS) management, data center energy consumption, and scaling. Scheduling is one of the several challenging problems in cloud computing, where several tasks need to be assigned to resources to optimize the quality of service parameters. Scheduling is a well-known NP-hard problem in cloud computing. This will require a suitable scheduling algorithm. Several heuristics and meta-heuristics algorithms were proposed for scheduling the user's task to the resources available in cloud computing in an optimal way. Hybrid scheduling algorithms have become popular in cloud computing. In this paper, we reviewed the hybrid algorithms, which are the combinations of two or more algorithms, used for scheduling in cloud computing. The basic idea behind the hybridization of the algorithm is to take useful features of the used algorithms. This article also classifies the hybrid algorithms and analyzes their objectives, QoS parameters, and future directions for hybrid scheduling algorithms.
APA, Harvard, Vancouver, ISO, and other styles
18

Fairosebanu, Abdul Azis, and Antony Cruz Nisha Jebaseeli. "Data security in cloud environment using cryptographic mechanism." Bulletin of Electrical Engineering and Informatics 12, no. 1 (2023): 462–71. http://dx.doi.org/10.11591/eei.v12i1.4590.

Full text
Abstract:
Virtual computing resources are provided via a cloud system that is both clever and intelligent. Based on the user's request, computing resources are made available. A hybrid cloud is the best option for storing and accessing user data for cloud deployments. Maintaining security in a hybrid cloud environment is time-consuming. This study provides a novel strategy for securing data in the hybrid cloud by ensuring the user's data is protected. Users' data in a hybrid cloud is protected using cryptographic approaches provided in this approach. Using this strategy, users' data may be protected in public and private clouds using various encryption methods. The suggested data security paradigm offers various advantages to both consumers and providers in terms of data security. Three symmetric encryption methods are offered as a service in the cloud. The concept is implemented as a cloud-based application hosted in the cloud, and the effectiveness of three strategies is assessed. They are evaluated in terms of performance and security. Using the recommended encryption methods in a hybrid cloud environment is more efficient than using other methods. The proposed technique can be used for relational data. It can be modified and enhanced to process multimedia data.
APA, Harvard, Vancouver, ISO, and other styles
19

Al-Museelem, Waleed, and Chun Lin Li. "Data Security and Data Privacy in Cloud Computing." Advanced Materials Research 905 (April 2014): 687–92. http://dx.doi.org/10.4028/www.scientific.net/amr.905.687.

Full text
Abstract:
Cloud computing has led to the development of IT to more sophisticated levels by improving the capacity and flexibility of data storage and by providing a scalable computation and processing power which matches the dynamic data requirements. Cloud computing has many benefits which has led to the transfer of many enterprise applications and data to public and hybrid clouds. However, many organizations refer to the protection of privacy and the security of data as the major issues which prevent them from adopting cloud computing. The only way successful implementation of clouds can be achieved is through effective enhancement and management of data security and privacy in clouds. This research paper analyzes the privacy and protection of data in cloud computing through all data lifecycle stages providing an overall perspective of cloud computing while highlighting key security issues and concerns which should be addressed. It also discusses several current solutions and further proposes more solutions which can enhance the privacy and security of data in clouds. Finally, the research paper describes future research work on the protection of data privacy and security in clouds.
APA, Harvard, Vancouver, ISO, and other styles
20

Arora, Neeraj, and Rohitash Kumar Banyal. "Hybrid scheduling algorithms in cloud computing: a review." International Journal of Electrical and Computer Engineering (IJECE) 12, no. 1 (2022): 880. http://dx.doi.org/10.11591/ijece.v12i1.pp880-895.

Full text
Abstract:
<p><span>Cloud computing is one of the emerging fields in computer science due to its several advancements like on-demand processing, resource sharing, and pay per use. There are several cloud computing issues like security, quality of service (QoS) management, data center energy consumption, and scaling. Scheduling is one of the several challenging problems in cloud computing, where several tasks need to be assigned to resources to optimize the quality of service parameters. Scheduling is a well-known NP-hard problem in cloud computing. This will require a suitable scheduling algorithm. Several heuristics and meta-heuristics algorithms were proposed for scheduling the user's task to the resources available in cloud computing in an optimal way. Hybrid scheduling algorithms have become popular in cloud computing. In this paper, we reviewed the hybrid algorithms, which are the combinations of two or more algorithms, used for scheduling in cloud computing. The basic idea behind the hybridization of the algorithm is to take useful features of the used algorithms. This article also classifies the hybrid algorithms and analyzes their objectives, quality of service (QoS) parameters, and future directions for hybrid scheduling algorithms.</span></p>
APA, Harvard, Vancouver, ISO, and other styles
21

Oleksyuk, Vasyl P. "ПРОЕКТУВАННЯ МОДЕЛІ ХМАРНОЇ ІНФРАСТРУКТУРИ ВНЗ НА ОСНОВІ ПЛАТФОРМИ APACHE CLOUDSTACK". Information Technologies and Learning Tools 54, № 4 (2016): 153. http://dx.doi.org/10.33407/itlt.v54i4.1453.

Full text
Abstract:
This paper describes the problems of using cloud computing in education. In the article it has been investigated the concept of cloud infrastructure in higher educational institutions. The model of cloudy infrastructure is offered. The hybrid model is most recent for higher educational institution. Conceptual provisions (technical and methodical) of designing of cloud are formulated. Described experience of deployment corporate clouds on the basis of the Apache CloudStack platform. The diagram of the organization of physical components of cloudy infrastructure (a hypervisor, physical and virtual area networks, routers, the domain controller, the VPN server) is provided.
APA, Harvard, Vancouver, ISO, and other styles
22

Hussein, Karim Qassim. "Multimedia Information Time Balance Management in Mobile Cloud Environment Supported By Case Study." International Journal of Interactive Mobile Technologies (iJIM) 16, no. 19 (2022): 118–32. http://dx.doi.org/10.3991/ijim.v16i19.33615.

Full text
Abstract:
Mobile cloud computing is used to define and determine computing services with a structure model. The data and resource of any service will be retrieved from cloud computing through internet service, some tools, and user interface (web-based or application). Mobile Cloud Computing (MCC) is a hybrid of cloud computing and mobile computing. Multimedia Information is the core of Mobile Cloud information because of the sizable information of multimedia particularly video streaming. Mobile Cloud mostly handles and processes that information. MCC is one of the business expressions with the real environment in the IT world. The concept of the MCC is still in the beginner stage of advancement. So, the handle of the innovation in a careful way especially in the bearing of future research should be provide. In this paper, an algorithm is throttled load balancing for mobile clouds has been presented within an example of Multimedia information. The results has shown that the load balancing of cloud computing environment. In this scenario, load balancing techniques in mobile cloud computing can be employed and can successfully manage time through the cloud.
APA, Harvard, Vancouver, ISO, and other styles
23

Andriulo, Francesco Cosimo, Marco Fiore, Marina Mongiello, Emanuele Traversa, and Vera Zizzo. "Edge Computing and Cloud Computing for Internet of Things: A Review." Informatics 11, no. 4 (2024): 71. http://dx.doi.org/10.3390/informatics11040071.

Full text
Abstract:
The rapid expansion of the Internet of Things ecosystem has created an urgent need for efficient data processing and analysis technologies. This review aims to systematically examine and compare edge computing, cloud computing, and hybrid architectures, focusing on their applications within IoT environments. The methodology involved a comprehensive search and analysis of peer-reviewed journals, conference proceedings, and industry reports, highlighting recent advancements in computing technologies for IoT. Key findings reveal that edge computing excels in reducing latency and enhancing data privacy through localized processing, while cloud computing offers superior scalability and flexibility. Hybrid approaches, such as fog and mist computing, present a promising solution by combining the strengths of both edge and cloud systems. These hybrid models optimize bandwidth use and support low-latency, privacy-sensitive applications in IoT ecosystems. Hybrid architectures are identified as particularly effective for scenarios requiring efficient bandwidth management and low-latency processing. These models represent a significant step forward in addressing the limitations of both edge and cloud computing for IoT, offering a balanced approach to data analysis and resource management.
APA, Harvard, Vancouver, ISO, and other styles
24

Imashev, A. "THE FUTURE OF CLOUD COMPUTING, LIKE TRENDS IN HYBRID AND MULTI-CLOUD STRATEGIES." Znanstvena misel journal, no. 101 (April 28, 2025): 78–80. https://doi.org/10.5281/zenodo.15294190.

Full text
Abstract:
As digital transformation accelerates across industries, cloud computing continues to evolve, shaping the future of IT infrastructure and service delivery. This article explores emerging trends in hybrid and multi-cloud strategies, which are becoming increasingly essential for businesses seeking flexibility, scalability, and resilience. Hybrid cloud integrates on-premises systems with public and private clouds, while multi-cloud leverages services from multiple cloud providers to avoid vendor lock-in and optimize performance. The study highlights key drivers behind these strategies, including data sovereignty, regulatory compliance, and the need for customized architectures. It also examines challenges such as integration complexity, cost management, and security. By analyzing current use cases and industry forecasts, the article provides insights into how hybrid and multi-cloud approaches are redefining enterprise IT and paving the way for a more agile and interoperable cloud ecosystem.
APA, Harvard, Vancouver, ISO, and other styles
25

Gaur, Riddhi, and Uma Kumari. "Hybrid Intrusion Detection System for Private Cloud & Public Cloud." Oriental journal of computer science and technology 10, no. 2 (2017): 438–45. http://dx.doi.org/10.13005/ojcst/10.02.26.

Full text
Abstract:
Internet based applications and data storage services can be easily acquired by the end users by the permission of Cloud computing. Providing security to the cloud computing environment has become important issue with the increased demand of cloud computing. Other than the traditional security methods, additional methods like control access, confidentiality, firewalls and user authentication are required in order to provide security to the cloud computing environment. One of the needful components in terms of cloud security is Intrusion Detection System (IDS). To detect various attacks on cloud, Intrusion Detection System (IDS) is the most commonly used mechanism. This paper discusses about the intrusion detection and different intrusion detection techniques namely anomaly based techniques and signature based techniques.
APA, Harvard, Vancouver, ISO, and other styles
26

Alonso-Monsalve, Saúl, Félix García-Carballeira, and Alejandro Calderón. "A heterogeneous mobile cloud computing model for hybrid clouds." Future Generation Computer Systems 87 (October 2018): 651–66. http://dx.doi.org/10.1016/j.future.2018.04.005.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

THORAT, RAJAN AJABRAO, and Mr S. B. Waghole. "Exploring the Applications and Challenges of Cloud Computing: A Study at Clevator Infotech Pvt. Ltd.." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 12 (2024): 1–7. https://doi.org/10.55041/ijsrem39655.

Full text
Abstract:
This study explores the functions, services, and strategies of Clevator Infotech Pvt. Ltd., a leader in cloud computing solutions. The research focuses on the company's efforts to provide innovative technology solutions, addressing both the applications and challenges of cloud computing. Key areas include cloud migration, security concerns, hybrid cloud solutions, and cost management. The findings highlight the benefits of scalability, accessibility, and flexibility, while addressing challenges like vendor lock-in, limited control, and data security. Keywords: Cloud Computing, Cloud Migration, SaaS, Cloud Infrastructure, Cost Efficiency, Security Challenges, Hybrid Cloud, Cloud Collaboration
APA, Harvard, Vancouver, ISO, and other styles
28

Abdul, Azis Fairosebanu, and Cruz Nisha Jebaseeli Antony. "Data security in cloud environment using cryptographic mechanism." Bulletin of Electrical Engineering and Informatics 12, no. 1 (2022): 462–71. https://doi.org/10.11591/eei.v12i1.4590.

Full text
Abstract:
Virtual computing resources are provided via a cloud system that is both clever and intelligent. Based on the user's request, computing resources are made available. A hybrid cloud is the best option for storing and accessing user data for cloud deployments. Maintaining security in a hybrid cloud environment is time-consuming. This study provides a novel strategy for securing data in the hybrid cloud by ensuring the user's data is protected. Users' data in a hybrid cloud is protected using cryptographic approaches provided in this approach. Using this strategy, users' data may be protected in public and private clouds using various encryption methods. The suggested data security paradigm offers various advantages to both consumers and providers in terms of data security. Three symmetric encryption methods are offered as a service in the cloud. The concept is implemented as a cloud-based application hosted in the cloud, and the effectiveness of three strategies is assessed. They are evaluated in terms of performance and security. Using the recommended encryption methods in a hybrid cloud environment is more efficient than using other methods. The proposed technique can be used for relational data. It can be modified and enhanced to process multimedia data.
APA, Harvard, Vancouver, ISO, and other styles
29

Liu, Weiguo, and Qinghua Zeng. "Hybrid Cloud Computing: An In-Depth Analysis of Integration Strategies, Characteristics, and Prospective Future Applications." Innovation in Science and Technology 3, no. 1 (2024): 10–13. http://dx.doi.org/10.56397/ist.2024.01.02.

Full text
Abstract:
Hybrid cloud computing plays an important role of developing landscape of IT infrastructure. It integrates the control and security inherent in private clouds with the scalability and resource availability characteristic of public clouds. This paper provides a thorough exploration of the characteristics involved in combining these cloud models and highlights essential aspects such as flexibility, scalability, cost savings, and security. Based on a thorough literature review along with case studies, the study explores how current technological advancements, including containerization, and artificial intelligence, are influencing the development of hybrid cloud infrastructures. The discussions show that effective integration strategies not only increase operational efficiency but also introduce substantial benefits to diverse fields including finance, healthcare, and education. This article provides a comprehensive understanding of hybrid cloud and builds up a foundation and direction for future studies focused on optimizing cloud integration and application.
APA, Harvard, Vancouver, ISO, and other styles
30

Gupta, Sandeep. "HYBRID CLOUD INTEGRATION AND MULTICLOUD DEPLOYMENTS A COMPREHENSIVE REVIEW OF STRATEGIES, CHALLENGES, AND BEST PRACTICES." international journal of advanced research in computer science 16, no. 2 (2025): 59–64. https://doi.org/10.26483/ijarcs.v16i2.7233.

Full text
Abstract:
Hybrid cloud integration and multi-cloud deployments have emerged as key strategies for organizations aiming to achieve flexibility, scalability, cost efficiency, and business continuity in cloud computing. The hybrid cloud solution, which connects private with public cloud infrastructure, allows businesses to achieve security goals alongside accessibility needs while using multi-cloud systems with many cloud providers, ensuring decentralized dependence and strong performance. Seasoned users encounter multiple implementation difficulties when adopting these cloud initiatives such as data management and interoperability issues along with security needs and compliance requirements along with cost management requirements. The paper investigates detailed facets regarding hybrid cloud unification methods alongside multi-cloud system deployment approaches by evaluating their functional benefits and technical implementation aspects. The paper investigates primary organizational obstacles during the transition to these architectures alongside showcasing successful management practices within industry standards. This article takes a look at some of the latest developments in cloud computing, such as AI-driven cloud management, serverless computing, edge computing, and quantum security measures. The document seeks to help businesses and IT professionals understand hybrid and multi-cloud environments through a complete analysis that drives improved cloud strategy effectiveness alongside operational excellence and resilience building.
APA, Harvard, Vancouver, ISO, and other styles
31

Srivastava, Aryan, and Pawan Singh. "Security Issues in Cloud Computing." Journal of Management and Service Science (JMSS) 2, no. 1 (2022): 1–11. http://dx.doi.org/10.54060/jmss/002.01.003.

Full text
Abstract:
Cloud computing has aided the evolution of IT by improving the ability and flexibility of data storage, as well as providing scalable computation and processing capabilities that match the dynamic data sets. Many corporate application programs have been transferred to public and hybrid clouds due to the multiple benefits of cloud computing. On the other hand, many businesses identify privacy and data security as major concerns that prevent them from adopting cloud computing. The only way to achieve successful cloud implementation is to improve and manage data security and privacy in the cloud. This research paper looks at data privacy and security in cloud computing at all stages of the data lifecycle, providing a general overview of the technology while highlighting important security difficulties and concerns that must be addressed. It also examines a number of existing solutions and gives recommendations for new ones that can improve data privacy and security in the cloud. Finally, future research on data privacy and security in cloud systems is discussed in the study report.
APA, Harvard, Vancouver, ISO, and other styles
32

Aditya Sharma. "Cloud computing and enterprise cloud foundations: A technical overview." World Journal of Advanced Engineering Technology and Sciences 15, no. 3 (2025): 897–906. https://doi.org/10.30574/wjaets.2025.15.3.1006.

Full text
Abstract:
Cloud computing has fundamentally transformed how organizations architect, deploy, and manage their IT infrastructure, marking a paradigm shift from traditional on-premises solutions to dynamic, internet-based delivery models. This transformation encompasses various deployment models including public, private, and hybrid clouds, each offering distinct advantages in terms of scalability, security, and cost optimization. The evolution of cloud computing has led to the development of sophisticated enterprise cloud foundations that incorporate comprehensive governance frameworks, robust security architectures, and advanced automation capabilities. Organizations have realized significant benefits through improved resource utilization, enhanced operational efficiency, and accelerated innovation cycles. The integration of emerging technologies such as artificial intelligence, machine learning, and edge computing has further expanded the capabilities of cloud platforms. As businesses continue to adapt to changing market demands, cloud computing remains central to digital transformation strategies, enabling organizations to maintain competitive advantages while addressing evolving security requirements and sustainability considerations.
APA, Harvard, Vancouver, ISO, and other styles
33

Vahdat-Nejad, Hamed, Shaghayegh Ostadi Eilaki, and Shaghayegh Izadpanah. "Towards a Better Understanding of Ubiquitous Cloud Computing." International Journal of Cloud Applications and Computing 8, no. 1 (2018): 1–20. http://dx.doi.org/10.4018/ijcac.2018010101.

Full text
Abstract:
Ubiquitous Cloud Computing has been recently proposed as a new hybrid computing model. This paradigm has two aspects: (a) Making use of cloud services to realize context-awareness (especially for mobile phones) and (b) Introducing a new and hybrid computing model. Likewise, this paper mainly involves two subjects: To deeply investigate previous cloud services that have been utilized to design context-aware systems, and to propose an open architecture for the “Ubiquitous Cloud Computing” paradigm. The aim of this article is to technically discuss mutual trends of ubiquitous and cloud computing, to foster the dissemination of state-of-the-art research in this area, and to present future research directions.
APA, Harvard, Vancouver, ISO, and other styles
34

Guo, Ping, Liping Su, Lijiang Ning, and Guangxiang Dan. "Hybrid Encryption Algorithms in Cloud Computing." Information Technology Journal 12, no. 14 (2013): 3015–19. http://dx.doi.org/10.3923/itj.2013.3015.3019.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Aktas, Mehmet S. "Hybrid cloud computing monitoring software architecture." Concurrency and Computation: Practice and Experience 30, no. 21 (2018): e4694. http://dx.doi.org/10.1002/cpe.4694.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Mahaswarup, B., and Bhuvana J. "A Research on Hybrid Cloud Computing." International Journal of Innovative Research in Computer and Communication Engineering 12, no. 05 (2024): 6253–58. http://dx.doi.org/10.15680/ijircce.2024.1205185.

Full text
Abstract:
Dual distributed computing has arisen as a significant answer for present day ventures trying to use the benefits of both public and confidential cloud foundations. This theoretical digs into the pith of crossover distributed computing, inspecting its design, advantages, challenges, and arising patterns molding its reception. Cross breed cloud engineering consistently incorporates public and confidential cloud conditions, permitting associations to improve responsibility position in view of elements like security, consistence, execution, and cost-proficiency. By mixing the versatility and adaptability of public mists with the control and customization of private mists, dual models engage endeavors to draftsman modern IT environments custom-made to their extraordinary necessities. The advantages of mixed distributed computing are complex. Associations can powerfully scale assets, moving responsibilities between conditions to successfully oblige vacillations sought after. Furthermore, mixture mists work with information sway, empowering endeavors to hold delicate information on-premises while utilizing the dexterity of public mists for less basic responsibilities. This flexibility encourages development and speeds up computerized change drives, enabling organizations to remain deft and serious in a quickly developing scene. In any case, hybrid cloud reception likewise presents difficulties. Overseeing different cloud conditions presents intricacy, requiring powerful administration structures, robotization devices, and gifted faculty to guarantee consistent organization and security across the mixture framework. Interoperability issues, information coordination concerns, and potential seller secure in additional highlight the significance of fastidious preparation and vital dynamic in crossover cloud arrangements. Looking forward, a few patterns are reshaping the hybrid cloud scene. Edge registering is acquiring conspicuousness, driving the decentralization of information handling and stockpiling to the organization edge, subsequently enlarging mixed models with edge capacities. Besides, progressions in containerization advances, like Kubernetes, are working with compactness and responsibility portability across mixed conditions, upgrading spryness and asset use. All in all, dual distributed computing addresses a change in outlook in IT framework the executives, offering a strong mix of adaptability, versatility, and control. While reception involves difficulties, the essential reconciliation of public and confidential mists can open unmatched open doors for advancement and effectiveness in the computerized time. Embracing mixed cloud structures enables undertakings to explore intricacy, mitigate risk, and benefit from arising advancements to drive feasible development and upper hand.
APA, Harvard, Vancouver, ISO, and other styles
37

Aljehani, Shahad, and Norah Farooqi. "A Systematic Literature Review on Security Challenges In A Hybrid Cloud Database." International Journal of Engineering & Technology 11, no. 1 (2022): 10–13. http://dx.doi.org/10.14419/ijet.v11i1.31911.

Full text
Abstract:
Cloud computing paved the way to many technical facilities for companies to develop their business needs in more effective and efficient manner. Combining private and public cloud into so called Hybrid cloud has made a positive leap in business by allowing applications and data to be shared among enterprises. However, many challenges and issues have arisen when adopting the hybrid cloud to manage, store and process data. The most critical one of these challenges is the security of the adopted Hybrid cloud. This research presented a comprehensive study about the security challenges in the Hybrid cloud computing as well as the suggested solutions. The study used a Systematic Literature Review (SLR) process to collect, review and summarize published articles from IEEE and Springer Nature databases and between 2020 and 2021. As a result, there were 7 eligible articles selected according to the search criteria and fully reviewed. The findings have revealed that there are four main challenges which are Data Security, Access Control, Privacy, Data Leakage and Cy- ber Attacks. Future studies should be conducted using different databases to have further investigation regarding the security in Hybrid clouds.
APA, Harvard, Vancouver, ISO, and other styles
38

Kumar, M. Santhosh, K. Ganesh Reddy, and Rakesh Kumar Donthi. "SSKHOA: Hybrid Metaheuristic Algorithm for Resource Aware Task Scheduling in Cloud-fog Computing." International Journal of Information Technology and Computer Science 16, no. 1 (2024): 1–12. http://dx.doi.org/10.5815/ijitcs.2024.01.01.

Full text
Abstract:
Cloud fog computing is a new paradigm that combines cloud computing and fog computing to boost resource efficiency and distributed system performance. Task scheduling is crucial in cloud fog computing because it decides the way computer resources are divided up across tasks. Our study suggests that the Shark Search Krill Herd Optimization (SSKHOA) method be incorporated into cloud fog computing's task scheduling. To enhance both the global and local search capabilities of the optimization process, the SSKHOA algorithm combines the shark search algorithm and the krill herd algorithm. It quickly explores the solution space and finds near-optimal work schedules by modelling the swarm intelligence of krill herds and the predator-prey behavior of sharks. In order to test the efficacy of the SSKHOA algorithm, we created a synthetic cloud fog environment and performed some tests. Traditional task scheduling techniques like LTRA, DRL, and DAPSO were used to evaluate the findings. The experimental results demonstrate that the SSKHOA outperformed the baseline algorithms in terms of task success rate increased 34%, reduced the execution time by 36%, and reduced makespan time by 54% respectively.
APA, Harvard, Vancouver, ISO, and other styles
39

Abdalkafor, Ahmed Subhi, and Khattab M. Ali Alheeti. "A hybrid approach for scheduling applications in cloud computing environment." International Journal of Electrical and Computer Engineering (IJECE) 10, no. 2 (2020): 1387. http://dx.doi.org/10.11591/ijece.v10i2.pp1387-1397.

Full text
Abstract:
Cloud computing plays an important role in our daily life. It has direct and positive impact on share and update data, knowledge, storage and scientific resources between various regions. Cloud computing performance heavily based on job scheduling algorithms that are utilized for queue waiting in modern scientific applications. The researchers are considered cloud computing a popular platform for new enforcements. These scheduling algorithms help in design efficient queue lists in cloud as well as they play vital role in reducing waiting for processing time in cloud computing. A novel job scheduling is proposed in this paper to enhance performance of cloud computing and reduce delay time in queue waiting for jobs. The proposed algorithm tries to avoid some significant challenges that throttle from developing applications of cloud computing. However, a smart scheduling technique is proposed in our paper to improve performance processing in cloud applications. Our experimental result of the proposed job scheduling algorithm shows that the proposed schemes possess outstanding enhancing rates with a reduction in waiting time for jobs in queue list.
APA, Harvard, Vancouver, ISO, and other styles
40

Ahmed, Subhi Abdalkafor, and M. Ali Alheeti Khattab. "A hybrid approach for scheduling applications in cloud computing environment." International Journal of Electrical and Computer Engineering (IJECE) 10, no. 2 (2020): 1387–97. https://doi.org/10.11591/ijece.v10i2.pp1387-1397.

Full text
Abstract:
Cloud computing plays an important role in our daily life. It has direct and positive impact on share and update data, knowledge, storage and scientific resources between various regions. Cloud computing performance heavily based on job scheduling algorithms that are utilized for queue waiting in modern scientific applications. The researchers are considered cloud computing a popular platform for new enforcements. These scheduling algorithms help in design efficient queue lists in cloud as well as they play vital role in reducing waiting for processing time in cloud computing. A novel job scheduling is proposed in this paper to enhance performance of cloud computing and reduce delay time in queue waiting for jobs. The proposed algorithm tries to avoid some significant challenges that throttle from developing applications of cloud computing. However, a smart scheduling technique is proposed in our paper to improve performance processing in cloud applications. Our experimental result of the proposed job scheduling algorithm shows that the proposed schemes possess outstanding enhancing rates with a reduction in waiting time for jobs in queue list
APA, Harvard, Vancouver, ISO, and other styles
41

D'Agostino, Daniele, Andrea Clematis, Alfonso Quarati, et al. "Cloud Infrastructures forIn SilicoDrug Discovery: Economic and Practical Aspects." BioMed Research International 2013 (2013): 1–19. http://dx.doi.org/10.1155/2013/138012.

Full text
Abstract:
Cloud computing opens new perspectives for small-medium biotechnology laboratories that need to perform bioinformatics analysis in a flexible and effective way. This seems particularly true for hybrid clouds that couple the scalability offered by general-purpose public clouds with the greater control and ad hoc customizations supplied by the private ones. A hybrid cloud broker, acting as an intermediary between users and public providers, can support customers in the selection of the most suitable offers, optionally adding the provisioning of dedicated services with higher levels of quality. This paper analyses some economic and practical aspects of exploiting cloud computing in a real research scenario for thein silicodrug discovery in terms of requirements, costs, and computational load based on the number of expected users. In particular, our work is aimed at supporting both the researchers and the cloud broker delivering an IaaS cloud infrastructure for biotechnology laboratories exposing different levels of nonfunctional requirements.
APA, Harvard, Vancouver, ISO, and other styles
42

Walker, Emily R. "Hybrid Cloud Architectures for Scalable and Secure Data Storage." International Journal of Innovative Computer Science and IT Research 1, no. 02 (2025): 1–12. https://doi.org/10.63665/ijicsitr.v1i02.02.

Full text
Abstract:
As far as the requirements of scalable and secure data storage solutions in the past few years are concerned, their requirements have always remained a top concern for businesses with an increasing amount of data to deal with. Hybrid cloud architectures, providing private and public cloud infrastructure, possess a promising solution towards scalability, flexibility, and increased security. This paper is an examination of the building blocks of hybrid cloud systems with regard to their ability to support scalable data storage as well as deal with the issue of security. We examine the different elements of hybrid cloud storage, such as the combination of public and private clouds, and how this can improve performance and security. We also address the security features of hybrid clouds, such as data encryption, compliance, and access control, and cite industry-specific examples. The paper also touches on the challenges organizations will encounter in deploying hybrid cloud solutions and emerging trends such as AI and edge computing that will shape the future of hybrid cloud data storage. Finally, the paper seeks to offer insights regarding how hybrid cloud infrastructures may transform data storage solutions for enterprises in a manner that will efficiently manage increasing data while maintaining adequate security.
APA, Harvard, Vancouver, ISO, and other styles
43

Tanuj, Tiwari, Tiwari Tanya, Tiwari Sanjay, and Tiwari Shikha. "Future Challenges of Cloud Computing." European Journal of Advances in Engineering and Technology 5, no. 4 (2018): 263–73. https://doi.org/10.5281/zenodo.10708535.

Full text
Abstract:
<strong>ABSTRACT </strong> Almost everything in the digital world is connected to the cloud in some way or another &mdash; unless it&rsquo;s specifically kept in local storage for security reasons. As tech giants and start-ups find new ways to organize process and present data cloud computing will become a more and more integral part of our lives. Over the next 10-15 years we can expect cloud computing to quickly evolve, and become so ubiquitous, that the concepts we label as &lsquo;cloud&rsquo; will simply be known as &lsquo;computing.&nbsp; Cloud computing leading feature is the availability of all required software on the web. The five cloud attributes and the three service delivery models are highlighted in this paper. The four basic deployment models public cloud, private cloud, hybrid cloud and community cloud are also discussed. The future of cloud computing will most likely represent a combination of cloud based software products and on premises compute to create a hybrid IT solution that balances the scalability and flexibility associated with cloud and the security and control of a private data centre. The real future of cloud will be easy access and consumption of any data and services in the cloud. This paper will address the strengths and weaknesses of cloud computing and addresses its future challenges.
APA, Harvard, Vancouver, ISO, and other styles
44

Mateescu, Gabriel, Wolfgang Gentzsch, and Calvin J. Ribbens. "Hybrid Computing—Where HPC meets grid and Cloud Computing." Future Generation Computer Systems 27, no. 5 (2011): 440–53. http://dx.doi.org/10.1016/j.future.2010.11.003.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Kalpinagarajarao, Gopikrishna. "The Negative Impacts of Cloud Migration and Redesign of Hybrid Clouds: The mitigation techniques." International Scientific Journal of Engineering and Management 03, no. 12 (2024): 1–6. https://doi.org/10.55041/isjem01336.

Full text
Abstract:
Cloud computing has revolutionized the IT landscape by offering scalable, efficient, and cost-effective solutions. However, migrating to the cloud and redesigning hybrid cloud architectures can come with significant challenges. While the benefits of cloud adoption are well-documented, the negative impacts and issues must also be considered to ensure a smooth transition and sustainable operation. Keywords: SOA, Cloud computing, Mitigation techniques, Cloud adoption
APA, Harvard, Vancouver, ISO, and other styles
46

Aryotejo, Guruh, Daniel Y. Kristiyanto, and Mufadhol. "Hybrid cloud: bridging of private and public cloud computing." Journal of Physics: Conference Series 1025 (May 2018): 012091. http://dx.doi.org/10.1088/1742-6596/1025/1/012091.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Nikhil, Bhagat. "Optimizing Performance, Cost-Efficiency, and Flexibility through Hybrid Multi-Cloud Architectures." Journal of Scientific and Engineering Research 11, no. 4 (2024): 372–79. https://doi.org/10.5281/zenodo.14273093.

Full text
Abstract:
Cloud Computing is the foundation of every modern company that is scalable, adaptable and economical. Hybrid multi-cloud environments, which combine private clouds, public clouds, and multiple cloud providers, represent the next generation for scaling cloud infrastructures. Hybrid cloud architecture lets organizations reap the security and control benefits of a private cloud while also taking advantage of the scalability and cost efficiency of a public cloud. Meanwhile, multi-cloud models avoid vendor lock-in, provide risk mitigation, and enable organizations to choose the best options from multiple providers. Hybrid and multi-cloud solutions together offer an integrated cloud architecture that maximizes usage, performance, and resilience. The paper delves into the advantages of hybrid and multi-cloud environments, including agility, cost efficiency and increased security. The paper also touches on organizational design considerations such as workload assignment, interoperability, security, and vendor selection. The paper provides guidelines for implementing hybrid multi-cloud environments where orchestration tools and automation play a vital role to facilitate the operations. Even though Hybrid multi-cloud architectures provide greater flexibility, they must be strategically designed, implemented and managed. By modernizing these environments, businesses can enhance performance, profitability, and agility, better preparing them to thrive in today&rsquo;s competitive market.
APA, Harvard, Vancouver, ISO, and other styles
48

Ren, Zhimin. "Data Processing Platform of Cloud Computing and Its Performance Analysis Based on Photoelectric Hybrid Interconnection Architecture." Journal of Nanoelectronics and Optoelectronics 15, no. 6 (2020): 743–52. http://dx.doi.org/10.1166/jno.2020.2805.

Full text
Abstract:
Data processing platform is the core support platform of cloud computing. The use of electric interconnection architecture will increase the complexity of network topology, while optical interconnection architecture is ideal, so cloud computing platform based on optical interconnection has become a research hotspot. The distributed optical interconnection architecture of cloud computing data processing platform is focused on. Combining the hybrid mechanism of optical circuit switching and electric packet switching, it can meet a variety of traffic requirements. Meanwhile, it improves the switching mechanism, communication strategy, and router structure. Moreover, considering that the hybrid optoelectronic interconnection architecture can improve the network delay and throughput, but there is still a problem of network consumption. Combined with the network characteristics of the data processing platform (wireless mesh structure) of cloud computing, the network topology algorithm is studied, and the relationship between the topology and the maximum number of allocable channels is analyzed. Furthermore, the equation of topological reliability calculation is defined, and the optimization model of topological design is proposed, according to which the data processing platform of cloud computing is further optimized under the photoelectric hybrid interconnection architecture. During the experiment, before topology optimization, by changing the message length, it is found that adding optical circuit switching can help achieving large capacity and new type of transmission, and can effectively reduce the time delay. After topology optimization structure is adopted, the photoelectric hybrid-data processing platform of cloud computing without topology optimization is compared. It is found that under different reliability constraints, the throughput and end-to-end delay of the network are significantly improved, which proves that the data processing platform of cloud computing based on the photoelectric hybrid interconnection architecture is a feasible cloud computing platform.
APA, Harvard, Vancouver, ISO, and other styles
49

Purushoththaman, Dr M. E., and B. Bhavani. "Analysis on Cloud Computing Architectures." YMER Digital 21, no. 01 (2022): 561–76. http://dx.doi.org/10.37896/ymer21.01/52.

Full text
Abstract:
Cloud computing is an evolving technique and emerged the entire IT industry in recent years. It transformed the IT landscape and brought the world in the hands of public. One can access the resources available on cloud on pay-as-you-use basis, like applications and infrastructure provided by cloud providers in the form of applications already deployed by cloud providers for use by the cloud users. These services are developed, tested and deployed before they brought into use. Another feature of cloud computing is its massive storage infrastructure made available for database and data supplied by the user. The cloud has several unique architectures and many more are still evolving. The services like SaaS, PaaS and the IaaS are deployed on private, public, community and hybrid clouds. In this paper we discuss the present developments in the cloud computing architecture and also try to present feasible guidance for further processing. Papers published in journals, conferences, white papers are analyzed. We attempt to identify, examine and explain the current trends and development in cloud computing architecture. However, only 13% of the papers examined discussed Others-as-a-Service, while only 26% of the papers reviewed considered issues relating to the major actors involved in cloud computing. This will beneficial to cloud providers, users, and researchers alike
APA, Harvard, Vancouver, ISO, and other styles
50

Khaleel, Turkan A. "Analysis and Implementation of Kerberos Protocol in Hybrid Cloud Computing Environments." Engineering and Technology Journal 39, no. 1B (2021): 41–52. http://dx.doi.org/10.30684/etj.v39i1b.1675.

Full text
Abstract:
The concept of cloud computing has recently changed how hardware, software, and information are handled. However, security challenges and credibility requirements have never changed and may have increased. Protecting cloud computing and providing security for its resources and users is one of the critical challenges. As a result, most users are afraid to use their resources, because many security problems must be met. For example, authentication and reliability are major security constraints and must be provided in a cloud computing environment. There is a wide range of authentication protocols in use, but the researcher has recommended the Kerberos protocol to represent and test it in a complex environment such as a mixed cloud environment. A model has been developed to implement Kerberos authentication in a hybrid cloud computing environment to securely access the cloud computing services provided. This model is represented using the OPNET Modeler 14.5 simulation system. The network efficiency was measured before and after the hacker. Findings presented in this research are supporting the ability of the Kerberos protocol to prevent illegal access to cloud computing services, whether from within the private cloud or the public cloud. While maintaining the efficient performance of the network.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!