0% found this document useful (0 votes)
16 views7 pages

ResearchPpr

This paper discusses the transformative impact of cloud computing on IT infrastructure, detailing its architectural models (IaaS, PaaS, SaaS) and deployment types (public, private, hybrid). It emphasizes security challenges such as data breaches and insider threats, alongside strategies for performance optimization through resource allocation and automation. The research aims to provide insights into designing, securing, and optimizing cloud solutions for modern enterprises.

Uploaded by

panchal12pardeep
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
16 views7 pages

ResearchPpr

This paper discusses the transformative impact of cloud computing on IT infrastructure, detailing its architectural models (IaaS, PaaS, SaaS) and deployment types (public, private, hybrid). It emphasizes security challenges such as data breaches and insider threats, alongside strategies for performance optimization through resource allocation and automation. The research aims to provide insights into designing, securing, and optimizing cloud solutions for modern enterprises.

Uploaded by

panchal12pardeep
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 7

Cloud Computing: Architecture, Security, and

Performance Optimization
Dhruv Garg Chitkara University, Punjab
Department of Computer Science and Muzaffarnagar, Uttarpradesh, India
Engineering dhruv1688.be21@chitkara.edu.in

Abstract— Cloud computing has revolutionized the way The shift from traditional computing to cloud-based
organizations manage, store, and process data by offering infrastructure marks a pivotal development in the IT
scalable, on-demand computing resources over the internet. landscape. Conventional models required organizations to
This paper explores the core architectural models of cloud
invest heavily in localized hardware and manage dedicated
computing, including Infrastructure as a Service (IaaS),
Platform as a Service (PaaS), and Software as a Service (SaaS),
servers, which often proved inflexible, costly, and labor-
while highlighting their deployment models such as public, intensive. Cloud computing, by contrast, leverages
private, hybrid, and multi-cloud. A significant emphasis is virtualization and distributed systems to provide remotely
placed on the security challenges posed by the cloud hosted, scalable resources that minimize operational
environment, including data privacy, access control, and overhead. This evolution has been driven by key
compliance, alongside the strategies and technologies employed technological advancements in virtualization, networking,
to mitigate these risks, such as encryption, identity and distributed computing, offering unprecedented levels of
management, and zero-trust architecture. Furthermore, the flexibility, efficiency, and responsiveness.
paper investigates methods for performance optimization in
cloud systems, focusing on resource allocation, workload
balancing, and the use of automation and AI for adaptive Research Objectives and Scope
scaling. By examining these three critical dimensions— This research paper aims to investigate the current
architecture, security, and performance—this study provides a landscape and future trajectory of cloud computing, with
comprehensive understanding of how to design, secure, and particular focus on addressing critical challenges such as
optimize cloud-based solutions for modern enterprises. security, resource allocation, and performance optimization.
The primary objectives of this study are:
Keywords—1. Artificial Intelligence 2. Big Data Analytics 3.
Cloud Security 4. Edge Computing 5. Resource Allocation 6. 1. To analyze the impact of cloud computing on
Virtualization
modern IT infrastructure.
2. To examine the benefits and limitations of adopting
cloud-based solutions across various industries.
I. INTRODUCTION 3. To propose innovative strategies for enhancing the
security and efficiency of cloud environments.
Definition and Key Characteristics of Cloud Computing 4. To explore emerging trends, including serverless
Cloud computing represents a transformative paradigm in computing, edge computing, and hybrid cloud
information technology, enabling users to access shared models.
computing resources—such as servers, storage, and
applications—via the internet on a pay-as-you-go basis. Its The scope of this research extends to understanding how
defining characteristics include: cloud computing enables digital transformation and drives
innovation across key sectors such as healthcare, education,
 On-Demand Access: Resources can be provisioned and e-commerce.
or de-provisioned automatically based on user
needs, without requiring direct human oversight.
 Scalability: The capability to seamlessly scale
resources up or down to accommodate fluctuating II. LAYERED ARCHITECTURE OF CLOUD
workloads. COMPUTING
 Multi-Tenancy: Multiple users or organizations
share the same physical infrastructure, maximizing Cloud computing operates through a layered architecture
resource utilization while ensuring data isolation that delineates its functionality across distinct yet
and security. interconnected levels. This modular approach enhances
 Cost Efficiency: By eliminating the need for flexibility, scalability, and manageability, with each layer
significant upfront investments in hardware, users performing specific roles to collectively deliver seamless
are billed only for the resources they consume. cloud services. The architecture begins with the physical
 Global Accessibility: Services can be accessed infrastructure and ascends through virtualization and
from anywhere with an internet connection, infrastructure management to the application delivery layer..
promoting mobility, collaboration, and remote
operations.

Evolution from Traditional Computing to Cloud-Based


Infrastructure 1) Service Models in Cloud Computing

XXX-X-XXXX-XXXX-X/XX/$XX.00 ©20XX IEEE


Cloud computing services are typically delivered through D. Edge and Fog Computing
three core models: Infrastructure as a Service (IaaS),
Platform as a Service (PaaS), and Software as a Service
(SaaS). Each model provides a different level of abstraction, Edge and fog computing extend traditional cloud
management, and user control, offering tailored solutions for capabilities to the network's edge, processing data closer to
varied business needs. its source.

 Key Characteristics:
2) Deployment Models o Edge computing handles data processing
near the origin (e.g., IoT devices)
Cloud deployment models define how cloud resources are o Fog computing provides a middle layer
provisioned, accessed, and managed based on specific between edge and central cloud services
organizational requirements. These models differ in terms of o Minimizes latency and bandwidth usage
ownership, accessibility, and control, offering businesses a  Examples: Cisco Edge Computing, AWS IoT
range of choices suited to their needs. Greengrass
 Ideal For: Real-time applications such as
A. Public Cloud autonomous vehicles, smart grids, and industrial
automation.
The public cloud is operated by third-party providers and
delivers shared infrastructure to multiple customers over the
internet.
III. CHALLENGES AND LIMITATIONS
 Key Characteristics:
o Multi-tenant environment
o Scalable and cost-effective While cloud computing delivers enhanced flexibility,
o Accessible globally scalability, and efficiency, it also introduces a wide range of
 Examples: Amazon Web Services (AWS), security threats that organizations must proactively manage.
Microsoft Azure, Google Cloud Platform The dynamic and multi-tenant nature of cloud environments
 Ideal For: Startups and businesses seeking makes them particularly vulnerable to both external and
flexibility and cost efficiency without investing in internal risks. Key security threats include:
physical infrastructure.
1) 1. Data Breaches
B. Private Cloud
 Description: Unauthorized access to sensitive data
The private cloud is dedicated to a single organization, due to inadequate access controls or security
offering greater control, customization, and security. vulnerabilities.
 Impact: Financial loss, exposure of confidential
 Key Characteristics: information, legal consequences, and reputational
o Single-tenant environment damage.
o Enhanced data privacy and compliance  Example: A cloud storage service breach resulting
in the leakage of customer personal data.
o Tailored infrastructure
 Examples: OpenStack, VMware vCloud
 Ideal For: Enterprises with stringent data protection 2) 2. Insider Threats
regulations or specialized operational requirements.
 Description: Malicious or inadvertent actions by
employees, contractors, or trusted partners that
C. Hybrid Cloud compromise cloud infrastructure.
 Impact: Data leaks, sabotage, unauthorized system
Hybrid cloud integrates public and private cloud changes, and operational disruptions.
environments, allowing data and applications to move  Example: A privileged employee deliberately
between them seamlessly. sharing sensitive customer records.

 Key Characteristics: 3) 3. Insecure APIs and Interfaces


o Combines on-premises, private, and public
cloud services  Description: Vulnerabilities in cloud service APIs
o Enhances workload flexibility or user interfaces that can be exploited by attackers.
o Maintains security while enabling  Impact: Unauthorized access to services, data
scalability breaches, and system manipulation.
 Examples: AWS Outposts, Microsoft Azure Arc,  Example: Exploiting weak API authentication to
Google Anthos control cloud-hosted applications.
 Ideal For: Organizations needing a balance of
control, compliance, and scalability.
4) 4. Misconfigurations
B. 3.2 Security Mechanisms in
 Description: Incorrect configuration of cloud Cloud Environments
resources, such as publicly accessible storage
buckets or misassigned permissions.
 Impact: Exposure of confidential data, non- To mitigate the risks associated with cloud computing,
compliance with regulations, and system robust security mechanisms must be implemented to
compromise. safeguard data and ensure system integrity. These
 Example: A database instance configured without mechanisms align with the foundational principles of
authentication left open to the internet. confidentiality, integrity, and availability (CIA).

5) 5. Denial of Service (DoS) Attacks 1) 1. Data Encryption

 Description: Overwhelming cloud services with  Function: Secures data in transit and at rest using
excessive requests to render them inaccessible. encryption algorithms such as AES (Advanced
 Impact: Service disruption, downtime, customer Encryption Standard) and RSA.
dissatisfaction, and revenue loss.  Benefit: Prevents unauthorized access and ensures
 Example: A botnet attack targeting a cloud-hosted data confidentiality across the cloud lifecycle.
website, causing prolonged outages.
2) 2. Identity and Access Management
6) 6. Malware Injection (IAM)

 Description: Insertion of malicious code or scripts  Function: Enforces user authentication,


into cloud services or virtual machines. authorization, and role-based access control
 Impact: Data corruption, loss of control, and (RBAC), often supplemented by multifactor
exploitation of cloud infrastructure. authentication (MFA).
 Example: Embedding malware in a VM image used  Benefit: Limits access to authorized individuals and
by multiple tenants. minimizes insider threats.

7) 7. Account Hijacking 3) 3. Firewalls and Intrusion Detection


Systems (IDS)
 Description: Unauthorized access to user accounts
through credential theft, phishing, or brute-force  Function: Monitor and filter network traffic,
attacks. detecting and blocking unauthorized or malicious
 Impact: Unauthorized transactions, data activity.
exfiltration, and misuse of cloud services.  Benefit: Protects cloud perimeters and internal
 Example: Attackers using stolen login credentials resources from external and internal attacks.
to access and manipulate cloud-based assets.
4) 4. Data Backup and Disaster
8) 8. Non-Compliance with Regulations Recovery

 Description: Failure to meet legal and regulatory  Function: Establishes regular data backups and
requirements for data protection, privacy, and failover mechanisms to ensure service continuity.
governance.  Benefit: Minimizes data loss and downtime during
 Impact: Legal penalties, sanctions, and erosion of cyber incidents or system failures.
customer trust.
 Example: Infringement of GDPR or HIPAA 5) 5. Security Information and Event
standards due to poor data handling practices. Management (SIEM)
Understanding and addressing these threats is essential to  Function: Aggregates and analyzes security event
ensuring the secure and trustworthy adoption of cloud logs to detect anomalies and respond to threats in
technologies. real time.
 Benefit: Enhances threat visibility, enables forensic
analysis, and supports regulatory compliance.

6) 6. Zero Trust Architecture (ZTA)


 Function: Operates on the principle of "never trust,
always verify," applying continuous authentication
and strict access policies based on context.
 Benefit: Mitigates lateral movement and  Description: Focuses on minimizing energy
unauthorized access within cloud environments. consumption in cloud operations, contributing to
environmental sustainability.
 Approaches:
o Green Cloud Computing: Implements
techniques like VM consolidation to
reduce energy waste.
IV. PERFORMANCE OPTIMIZATION IN CLOUD o Renewable Energy-Powered Data Centers:
COMPUTING Utilizes solar, wind, or hydroelectric
energy for data center operations.
Performance optimization in cloud computing involves the  Example: Google’s commitment
strategic use of tools and techniques to enhance resource to fully renewable-powered data
utilization, reduce latency, and improve overall cost- centers.
efficiency. Effective optimization ensures responsive,
scalable, and reliable cloud services, which are critical to
D. Benefits of Resource Allocation Strategies
meeting user expectations and maintaining operational
efficiency.
 Cost-Efficiency: Minimizes over-provisioning and
operational expenses.
 Performance Optimization: Enhances
1) 4.1 Resource Allocation Strategies responsiveness and system throughput.
 Energy Conservation: Promotes sustainable cloud
practices by reducing power consumption.
Efficient resource allocation is fundamental to cloud
performance. It enables optimal use of computing resources
while minimizing operational costs. Key strategies include:
2) 4.2 Network Optimization in Cloud
A. 1. Dynamic Resource Provisioning
Network optimization ensures fast, reliable, and efficient
 Description: Automatically allocates or deallocates data communication in cloud environments. Key techniques
cloud resources in real time based on workload include:
fluctuations, supporting scalability and cost control.
 Techniques:
A. 1. Software-Defined Networking (SDN)
o Auto-Scaling: Adjusts the number of
virtual machine instances dynamically to
match workload demand.  Description: Centralizes network control by
 Example: Amazon EC2 Auto decoupling the control plane from the data plane,
Scaling. enabling programmable and adaptive network
o Kubernetes Horizontal Pod Autoscaler configurations.
(HPA): Scales pods within a Kubernetes  Benefits:
cluster based on CPU/memory usage or o Simplified network management.
custom-defined metrics. o Enhanced scalability and flexibility.
 Example: OpenFlow protocol for SDN-based
control in cloud environments.
B. 2. Load Balancing Techniques
B. 2.
Cloud-based Content Delivery
 Description: Distributes incoming network traffic
or computational workloads across multiple servers Networks (CDNs)
to avoid overloading any single resource.
 Common Algorithms:  Description: Enhances content delivery by
o Round-Robin: Distributes requests in a distributing data across globally dispersed edge
cyclic manner, ideal for homogenous servers.
server setups.  Techniques:
o Least Connections: Directs new requests o Edge Caching: Stores frequently accessed
to the server with the fewest active content closer to end-users.
sessions. o Traffic Shaping: Prioritizes network traffic
o Weighted Load Balancing: Allocates to optimize bandwidth usage.
traffic based on server capacity, assigning  Examples: AWS CloudFront, Akamai CDN.
higher loads to more powerful servers.
C. 3. Latency Reduction Techniques
C. 3. Energy-Efficient Computing
 Description: Focuses on minimizing delays in data  Tools: Apache JMeter, LoadRunner for stress and
transmission, crucial for real-time applications. load testing.
 Techniques:
o Edge Computing: Processes data at or near
D. 4. Comparative Analysis
the data source to reduce round-trip times.
o Content Prefetching: Predicts and preloads
likely user requests to enhance  Purpose: Evaluates and compares the performance
responsiveness. of different cloud service providers (e.g., AWS,
 Applications: Real-time IoT systems, online Microsoft Azure, Google Cloud) based on
gaming, and video streaming platforms. standardized benchmarks.

D. Benefits of Network Optimization E. Benefits of Performance Benchmarking

 Improved Performance: Ensures fast and reliable  Optimization: Identifies performance bottlenecks
application responses. and areas for improvement.
 Cost-Effectiveness: Optimizes bandwidth and  Cost Reduction: Enhances resource efficiency,
infrastructure use. reducing cloud expenses.
 Scalability: Seamlessly accommodates growing  Scalability Planning: Assesses how systems handle
data and user traffic. increasing loads.
 Energy Efficiency: Reduces energy usage in data  Vendor Evaluation: Supports evidence-based
transport and networking. decisions when selecting cloud providers.

V. SECURITY AND PRIVACY CONSIDERATIONS


3) 4.3 Performance Benchmarking
Security and privacy remain paramount concerns in cloud
Performance benchmarking evaluates the effectiveness and computing due to the shared, distributed, and often opaque
efficiency of cloud services by using standard metrics and nature of cloud infrastructures. As data and applications are
tools. It helps organizations identify system bottlenecks and hosted remotely on third-party platforms, organizations must
make informed optimization decisions. trust service providers to maintain confidentiality, integrity,
and availability of their digital assets. This section explores
the key challenges, threat vectors, and mitigation strategies
A. 1. Simulation Tools
associated with cloud security and privacy.

 Purpose: Mimic real-world cloud operations in a A. Security Challenges in the Cloud


virtual setting to test and analyze performance.
 Examples: Cloud environments are exposed to a variety of threats,
o CloudSim: Models cloud environments to including data breaches, insider attacks, account hijacking,
simulate resource provisioning and and denial-of-service (DoS) attacks. Multi-tenancy and
workload execution. virtualization add layers of complexity, increasing the risk
o iFogSim: Extends CloudSim to support of data leakage and unauthorized access. Additionally, the
fog and edge computing scenarios. lack of visibility and control over the underlying
infrastructure can limit a user’s ability to enforce security
policies effectively.
B. 2. Performance Metrics
B. Privacy Concerns
 Throughput: Volume of data processed per unit
time, indicating system capacity. Privacy issues stem largely from the geographic dispersion
 Latency: Time delay between request and response, of cloud data centers, where differing international laws and
reflecting system responsiveness. regulations, such as the General Data Protection Regulation
 Availability: Proportion of time a service is (GDPR), come into play. Users often lack clarity on where
operational, indicating reliability. their data is stored, processed, or backed up, raising
 Cost-Efficiency: Relationship between service concerns about surveillance, data ownership, and
performance and operational cost. compliance.

C. 3. Real-world Testing C. Security Mechanisms and Best Practices

To safeguard cloud environments, providers and users alike


 Description: Deploys applications in live cloud employ a combination of technical and administrative
environments to assess performance under actual controls:
load conditions.
 Encryption: Data-at-rest and data-in-transit are Spark and Hadoop: Deployed on cloud platforms for
secured using strong encryption algorithms to distributed data processing. o Use Cases: Retail analytics,
prevent unauthorized access. healthcare data analysis, and financial forecasting. 4. 5G &
 Identity and Access Management (IAM): Role- Cloud Integration • Description: o Combines the speed and
based access control (RBAC), multi-factor low latency of 5G networks with cloud computing
authentication (MFA), and identity federation capabilities to enhance mobile and edge applications. •
enhance user authentication and authorization. Examples: o Edge computing enables faster data processing
 Zero-Trust Security Model: Adopting a zero-trust for 5G applications. o Applications include real-time
approach assumes no implicit trust in any entity, AR/VR, remote surgery, and autonomous drones
continuously verifying access requests regardless
of origin.
 Security Information and Event Management
(SIEM): Real-time monitoring and logging help VII. FUTURE TRENDS IN SERVERLESS
detect and respond to anomalous behaviors and COMPUTING
security incidents.
 Data Masking and Anonymization: Techniques like Cloud computing is continuously evolving to meet the
tokenization and differential privacy are used to demands of modern technologies and industries. Here are
protect sensitive information during processing and the most prominent future trends shaping its growth: 1.
analytics. Quantum Cloud Computing • Description: o Leverages
quantum computing to solve complex problems far faster
D. Compliance and Regulatory Standards than classical systems. 14 • Examples: o IBM Q and Google
Sycamore are early quantum cloud platforms. •
Cloud providers must align with various standards and Applications: o Drug discovery, financial modeling, and
frameworks, such as ISO/IEC 27001, SOC 2, HIPAA, and large-scale data analysis. 2. Serverless Computing •
FedRAMP, to assure clients of their security posture. Description: o Enables developers to run applications
Regular audits and third-party assessments further without managing server infrastructure. • Advantages: o
strengthen trust and transparency between providers and Automatic scaling, cost-efficiency, and reduced operational
consumers. overhead. • Examples: o Function-as-a-Service (FaaS)
platforms like AWS Lambda and Google Cloud Functions.
E. Emerging Trends 3. Zero Trust Architecture (ZTA) • Description: o A next-
generation security model that eliminates implicit trust in
As cloud adoption grows, so do advancements in cloud any network component. • Features: o Continuous
security. Homomorphic encryption, confidential computing, authentication and strict access controls. • Applications: o
and AI-driven threat detection are reshaping how cloud Cybersecurity for remote work environments and hybrid
systems are protected. Additionally, privacy-preserving cloud setups. 4. Green Cloud Computing • Description: o
machine learning models are gaining traction, allowing Focuses on reducing the environmental impact of cloud
analytics without direct access to sensitive data. operations through energy-efficient practices. • Techniques:
o AI-driven energy optimization and renewable energy-
powered data centers. • Benefits: o Lowers carbon footprint
and operational costs. 5. Multi-cloud and Hybrid Cloud
Adoption • Description: o Companies increasingly use
multiple cloud providers or hybrid models to avoid vendor
VI. USE CASES AND APPLICATIONS lock-in and improve flexibility. • Benefits: o Enhanced
redundancy, scalability, and tailored solutions. 6. Edge
Cloud computing has revolutionized numerous industries by Computing Expansion • Description: o Brings computing
providing scalable, cost-effective, and reliable solutions. resources closer to the data source to reduce latency and
Here are some key applications across various domains: 1. improve real-time processing. 15 • Applications: o Smart
Internet of Things (IoT) & Smart Cities • Description: o cities, autonomous vehicles, and IoT applications. 7. AI and
Facilitates real-time data collection, processing, and analysis Cloud Integration • Description: o AI enhances cloud
for IoT devices. o Supports smart city applications like operations through intelligent automation and predictive
traffic management, energy optimization, and public safety. analytics. • Examples: o AI-powered resource allocation,
• Example: o Fog computing enables real-time analytics for security monitoring, and system diagnostics. Impact of
IoT systems. o Applications include smart grids and Future Trends • Enhanced Efficiency: Faster data processing
intelligent transportation systems. 2. Artificial Intelligence and smarter resource utilization. • Greater Accessibility:
(AI) & Machine Learning (ML) • Description: o Cloud Improved reach to remote and underserved regions. •
platforms provide on-demand access to high-performance Innovation Enablement: Facilitates emerging technologies
computing resources for AI/ML training and inference. • like AI, IoT, and 5G. • Sustainability: Reduces
Examples: o TensorFlow on Cloud: Scalable ML model environmental impact through green practices.
training using GPUs or TPUs. o AI Applications: Natural
language processing, image recognition, and autonomous
vehicles. 3. Big Data Analytics • Description: o Processes VIII. CONCLUSION
and analyzes massive datasets to uncover insights and
trends. o Cloud platforms provide the infrastructure to Cloud computing has emerged as a transformative
handle complex data operations. • Examples: o Apache technology, reshaping industries and driving innovation
across various domains. This research highlights the key CloudSim toolkit: Challenges and opportunities. Proceedings of
the 7th High Performance Computing and Simulation
aspects, challenges, and advancements within the field, Conference (HPCS 2009).
providing a comprehensive understanding of its potential. ➤ https://doi.org/10.1109/CLOUD.2009.72
Summary of Key Findings • Cloud computing's layered [2] Mao, M., Li, J., & Humphrey, M. (2010). Cloud auto-scaling
architecture and service models offer flexibility, scalability, with deadline and budget constraints. 11th IEEE/ACM
International Conference on Grid Computing.
and cost-efficiency, making it a preferred solution for ➤ https://doi.org/10.1109/GRID.2010.5697942
modern applications. • Deployment models like public, [3] Kreutz, D., Ramos, F. M. V., Verissimo, P. E., Rothenberg, C.
private, hybrid, and edge computing address diverse use E., Azodolmolky, S., & Uhlig, S. (2015). Software-Defined
cases, from IoT to large-scale enterprise systems. • Security Networking: A Comprehensive Survey. Proceedings of the IEEE,
103(1), 14–76.
challenges, including data breaches and access control, ➤ https://doi.org/10.1109/JPROC.2014.2371999
necessitate robust mechanisms such as encryption, firewalls, [4] Pathan, A. K., & Buyya, R. (2008). A taxonomy and survey of
and Zero Trust Architecture. • Performance optimization content delivery networks. Technical Report, University of
through resource allocation, network optimization, and Melbourne, Australia.
➤ https://www.buyya.com/papers/CDN-Taxonomy.pdf
benchmarking ensures efficient and reliable cloud [5] Beloglazov, A., Buyya, R., Lee, Y. C., & Zomaya, A. Y. (2011).
operations. • Applications in IoT, AI, big data analytics, and A taxonomy and survey of energy-efficient data centers and
healthcare demonstrate the transformative power of cloud cloud computing systems. Advances in Computers, 82, 47–111.
computing across industries. Open Research Challenges ➤ https://doi.org/10.1016/B978-0-12-385512-1.00003-7
[6] Google. (2022). Sustainability in data centers.
Despite its advancements, cloud computing faces unresolved ➤ https://sustainability.google/commitments/data-centers/
challenges, including: • Enhancing data privacy and [7] Calheiros, R. N., Ranjan, R., Beloglazov, A., De Rose, C. A. F.,
compliance with global regulations. • Reducing latency for & Buyya, R. (2011). CloudSim: A toolkit for modeling and
real-time applications in edge and hybrid environments. • simulation of cloud computing environments and evaluation of
resource provisioning algorithms. Software: Practice and
Addressing energy consumption in large-scale data centers. Experience, 41(1), 23–50.
➤ https://doi.org/10.1002/spe.995
[8] Gupta, H., Dastjerdi, A. V., Ghosh, S. K., & Buyya, R. (2017).
iFogSim: A toolkit for modeling and simulation of resource
REFERENCES management techniques in the Internet of Things, Edge and Fog
computing environments. Software: Practice and Experience,
47(9), 1275–1296.
[1] Buyya, R., Ranjan, R., & Calheiros, R. N. (2010). Modeling and ➤ https://doi.org/10.1002/spe.2509
simulation of scalable Cloud computing environments and the

You might also like