skip to main content
research-article

An overview Scientific Cloud computing Web-based cloud services issues and challenges

Published: 13 May 2024 Publication History

Abstract

This research investigates the crucial role of cloud computing services in web development for creating scalable applications. Our study explores the benefits, challenges, and best practices associated with leveraging these services. Real-world case studies will be examined to showcase their significance. Additionally, we examine the integration of blockchain technologies in cloud-based web development and their potential impact on scalability. This paper presents a comprehensive analysis of the indispensability of cloud computing services in building scalable applications for the web. This research project delves into the transformative impact of cloud computing services on the field of web development. By providing scalable and flexible infrastructure, these services have revolutionized the way applications are built. Through an in-depth analysis of benefits, challenges, and best practices, along with real- world case studies, the project highlights the indispensable nature of cloud computing in creating scalable web applications. Furthermore, the exploration of blockchain integration within cloud-based web development offers insights into potential advancements in scalability and opens new avenues for innovation in the field. Additionally, the integration of blockchain technologies in cloud-based web development is investigated, providing insights into its potential impact on scalability and fostering innovation in the field. The research presents a comprehensive analysis of the indispensability of cloud computing services in creating scalable web applications and highlights their transformative impact on the development process.

References

[1]
Saban, M., Bekkour, M., Amdaouch, I., El Gueri, J., Ait Ahmed, B., Chaari, M. Z., ... & Aghzout, O. (2023). A Smart Agricultural System Based on PLC and a Cloud Computing Web Application Using LoRa and LoRaWan. Sensors, 23(5), 2725.
[2]
Gill, S. S., Fuller, S., Cabral, A., Chen, Y., & Uhlig, S. (2023). Curriculum Redesign for Cloud Computing to Enhance Social Justice and Intercultural Development in Higher Education. In Handbook of Research on Fostering Social Justice Through Intercultural and Multilingual Communication (pp. 62-80). IGI Global.
[3]
Srivastava, P. K., Kumar, S., Tiwari, A., Goyal, D., & Mamodiya, U. (2023, June). Internet of thing uses in materialistic ameliorate farming through AI. In AIP Conference Proceedings (Vol. 2782, No. 1). AIP Publishing.
[4]
Katal, A., Dahiya, S., & Choudhury, T. (2023). Energy efficiency in cloud computing data centers: a survey on software technologies. Cluster Computing, 26(3), 1845-1875.
[5]
Dora Pravina, C. T., Buradkar, M. U., Jamal, M. K., Tiwari, A., Mamodiya, U., & Goyal, D. (2022, December). A Sustainable and Secure Cloud resource provisioning system in Industrial Internet of Things (IIoT) based on Image Encryption. In Proceedings of the 4th International Conference on Information Management & Machine Intelligence (pp. 1-5).
[6]
Upadhyay, R. K. (2023). Reasearch in Cloud Computing Security. IRJMETS, 5, 2582-5208.
[7]
Rohinidevi, V. V., Srivastava, P. K., Dubey, N., Tiwari, S., & Tiwari, A. (2022, December). A Taxonomy towards fog computing Resource Allocation. In 2022 2nd International Conference on Innovative Sustainable Computational Technologies (CISCT) (pp. 1-5). IEEE.
[8]
Singh, N. K., Jain, A., Arya, S., Gonzales, W. E. G., Flores, J. E. A., & Tiwari, A. (2022, December). Attack Detection Taxonomy System in cloud services. In 2022 2nd International Conference on Innovative Sustainable Computational Technologies (CISCT) (pp. 1-5). IEEE.
[9]
Chouhan, A., Tiwari, A., Diwaker, C., & Sharma, A. (2022, February). Efficient Opportunities and Boundaries towards Internet of Things (IoT) Cost Adaptive Model. In 2022 IEEE Delhi Section Conference (DELCON) (pp. 1-5). IEEE.
[10]
Rathore, H., Sahay, S. K., Nikam, P., & Sewak, M. (2021). Robust android malware detection system against adversarial attacks using q-learning. Information Systems Frontiers, 23, 867-882.
[11]
Saxe, J., & Berlin, K. (2015, October). Deep neural network based malware detection using two dimensional binary program features. In 2015 10th international conference on malicious and unwanted software (MALWARE) (pp. 11-20). IEEE.
[12]
Tiwari, Ashish, and Ritu Garg. "ACCOS: A Hybrid Anomaly-Aware Cloud Computing Formulation-Based Ontology Services in Clouds." In ISIC, pp. 341-346. 2021.
[13]
Kumar, M. (2023). Scalable malware detection system using distributed deep learning. Cybernetics and Systems, 54(5), 619-647.
[14]
Tiwari, A., Mahrishi, M., & Fatehpuria, S. (2014). A Broking Structure Originated on Service accommodative Using MROSP Algorithm.
[15]
Hemalatha, J., Roseline, S. A., Geetha, S., Kadry, S., & Damaševičius, R. (2021). An efficient densenet-based deep learning model for malware detection. Entropy, 23(3), 344.
[16]
Tiwari, A. Dr. A. Nagaraju and Mehul Mahrishi, An Optimized Scheduling Algorithm for Cloud Broker Using Cost Adaptive Modeling. In 3rd IEEE (International Advanced Computing Conference-2013).
[17]
Fatima, A., Kumar, S., & Dutta, M. K. (2021). Host-server-based malware detection system for android platforms using machine learning. In Advances in Computational Intelligence and Communication Technology: Proceedings of CICT 2019 (pp. 195-205). Springer Singapore.
[18]
Kumar Sharma, A., Tiwari, A., Bohra, B., & Khan, S. (2018). A Vision towards Optimization of Ontological Datacenters Computing World. International Journal of Information Systems & Management Science, 1(2).
[19]
Tiwari, A. & Sharma, R. M. (2021). Realm Towards Service Optimization in Fog Computing. In I. Management Association (Ed.), Research Anthology on Architectures, Frameworks, and Integration Strategies for Distributed and Cloud Computing (pp. 1530-1563).
[20]
Dudeja, D., Sabharwal, S. M., Ganganwar, Y., Singhal, M., Goyal, N., & Tiwari, A. (2023). Sales-Based Models for Resource Management and Scheduling in Artificial Intelligence Systems. Engineering Proceedings, 59(1), 43.
[21]
Mail, M. A. E., Ab Razak, M. F., & Ab Rahman, M. (2022). Malware detection system using cloud sandbox, machine learning. International Journal of Software Engineering and Computer Systems, 8(2), 25-32.
[22]
Rangaiah, Y. V., Sharma, A. K., Bhargavi, T., Chopra, M., Mahapatra, C., & Tiwari, A. (2022, December). A Taxonomy towards Blockchain based Multimedia content Security. In 2022 2nd International Conference on Innovative Sustainable Computational Technologies (CISCT) (pp. 1-4). IEEE.

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
ICIMMI '23: Proceedings of the 5th International Conference on Information Management & Machine Intelligence
November 2023
1215 pages
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 13 May 2024

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Conference

ICIMMI 2023

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 19
    Total Downloads
  • Downloads (Last 12 months)19
  • Downloads (Last 6 weeks)10
Reflects downloads up to 24 Oct 2024

Other Metrics

Citations

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format.

HTML Format

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media