The IAES’s Nawala: Cloud Computing Developments

Greetings, fellow researchers!

This is the IAES’s Nawala of the Institute of Advanced Engineering and Science. Today we would like to share about the development of cloud computing. Recently, cloud technology has greatly affected human life, both in computerization, storage, and decision-making applications. Hassan et al in their research conducted a survey related to the development of cloud computing in collaboration with machine learning. The results are described in the following article:

Cloud computing survey on services, enhancements and challenges in the era of machine learning and data science

Wajid Hassan, Te-Shun Chou, Omar Tamer, John Pickard, Patrick Appiah-Kubi, Leslie Pagliari

Cloud computing has sweeping impact on the human productivity. Today it’s used for Computing, Storage, Predictions and Intelligent Decision Making, among others. Intelligent Decision Making using Machine Learning has pushed for the Cloud Services to be even more fast, robust and accurate. Security remains one of the major concerns which affect the cloud computing growth however there exist various research challenges in cloud computing adoption such as lack of well managed service level agreement (SLA), frequent disconnections, resource scarcity, interoperability, privacy, and reliability. Tremendous amount of work still needs to be done to explore the security challenges arising due to widespread usage of cloud deployment using Containers. We also discuss Impact of Cloud Computing and Cloud Standards. Hence in this research paper, a detailed survey of cloud computing, concepts, architectural principles, key services, and implementation, design and deployment challenges of cloud computing are discussed in detail and important future research directions in the era of Machine Learning and Data Science have been identified.

The development of cloud computing extends to internet of things (IoT) technology. Alam in his research combines cloud computing using a mobile ad-hoc network (MANET) to integrate with IoT. A more detailed description of this research can be seen on the following page:

Internet of things: review, architecture and applications

Tanweer Alam

Devices linked to the internet of things (IoT) may communicate with one another in several settings. Furthermore, rather of relying on an existing centralized system, users may develop their own network by using wireless capabilities. This kind of network is known as a wireless mobile ad hoc network. The mobile ad-hoc network (MANET) enables IoT devices to connect with one another in an unstructured networked environment. IoT devices may connect, establish linkages, and share data on a continuous basis. In this system, the cloud’s purpose is to store and analyze data acquired from IoT devices. One of the most significant challenges in cloud computing has been identified as information security, and its resolution will result in an even bigger increase in cloud computing usage and popularity in the future. Finally, the goal of this project is to create a framework for facilitating communication between IoT devices in a Cloud and MANET context. Our major contribution is a ground-breaking research initiative that combines cloud computing with the MANET and connects the internet of things. This research might be used to the IoT in the future.

Integration of cloud computing with IoT

Cloud computing that is integrated can improvise the function of IoT. But on the other hand, it is also necessary to pay attention to the security issues arising from the integration results. Ullah et al. conducted research that discusses the secure integration between cloud computing and IoT. The results of the research can be read on the following page:

Cloud and internet-of-things secure integration along with security concerns

Arif Ullah, Imane Laassar, Canan Batur Şahin, Ozlem Batur Dinle, Hanane Aznaoui

Cloud computing is a new technology which refers to an infrastructure where both software and hardware application are operate for the network with the help of internet. Cloud computing provide these services with the help of rule know as you pay as you go on. Internet of things (IoT) is a new technology which is growing rapidly in the field of telecommunications. The aim of IoT devices is to connect all things around us to the internet and thus provide us with smarter cities, intelligent homes and generally more comfortable lives. The combation of cloud computing and IoT devices make rapid development of both technologies. In this paper, we present information about IoT and cloud computing with a focus on the security issues of both technologies. Concluding we present the contribution of cloud computing to the IoT technology. Thus, it shows how the cloud computing technology improves the function of the IoT. Finally present the security challenges of both technologies IoT and cloud computing.

Speaking of cloud security, Khobragade et al. conducted research related to security mechanisms using fragmentation and replication mechanisms. A more detailed explanation of the security mechanism can be seen in the following article:

High security mechanism: fragmentation and replication in the cloud with auto update in the system

Shrutika Khobragade, Rohini Bhosale, Rahul Jiwane

Cloud Computing makes immense use of internet to store a huge amount of data. Cloud computing provides high quality service with low cost and scalability with less requirement of hardware and software management. Security plays a vital role in cloud as data is handled by third party hence security is the biggest concern to matter. This proposed mechanism focuses on the security issues on the cloud. As the file is stored at a particular location which might get affected due to attack and will lost the data. So, in this proposed work instead of storing a complete file at a particular location, the file is divided into fragments and each fragment is stored at various locations. Fragments are more secured by providing the hash key to each fragment. This mechanism will not reveal all the information regarding a particular file even after successful attack. Here, the replication of fragments is also generated with strong authentication process using key generation. The auto update of a fragment or any file is also done here. The concept of auto update of filles is done where a file or a fragment can be updated online. Instead of downloading the whole file, a fragment can be downloaded to update. More time is saved using this methodology.

Some of the articles above are a small part of the research on cloud computing development. To get more information please visit for FREE at the following link: and

1 Response
  1. […] Cloud computing is an advancement in information technology as a method of delivering various services over the internet and remotely in the “cloud” or virtual space. With this technology, the use of physical devices is reduced because all processes and data storage are carried out through virtual space so that it can be done anytime and anywhere as long as there is internet access. In this rapidly growing technology, data security is an interesting and important topic for researchers. […]