Cloud Computing Research Project Ideas
Cloud is not real; it is a virtual entity of servers connected within a vast network to operate as a single system. You can learn more on this technology and network when you resume reading this paper.
- Define Cloud
The cloud is full of servers each having a unique set of functions connected to a global network. The cloud mentioned here does not mean a physical object; this is a global network with numerous remote servers connected with each other in order to function as a single system.
- What is Cloud?
In simple words, cloud is a combination of servers which operates the infrastructure and software which can be operated through internet.
- Where Cloud is used?
Cloud is used in maximum of the industries of every size and type for different uses such as email, data backup, software testing and development, disaster recovery, web-applications, big data analytics and virtual desktop.
- Why Cloud Technology is proposed? Previous Technology Issues
This technology came into existence, to overcome the drawbacks and challenges faced by previous technology of software deployment models and IT infrastructure. The Cloud technology was proposed mainly to focus on scalability, accessibility and cost efficiency.
The issues faced by previous technology which were overcome by Cloud technology are: Ineffective use of resources, limited accessibility, less scalability, more capital cost, complexity, slow deployment, recovery challenges and loss of data.
- Algorithms / Protocols
After knowing about the technology, uses of it and the issues faced by them in the earlier stage, now we are going to learn about the algorithms used for this technology. The algorithms provided for Cloud to overcome the previous issues faced by it like detecting malware in cloud devices are: Anomaly-Based Detection, Signature-Based Detection, Machine Learning and AI-Based Detection, Heuristic-Based Detection and Behavior-Based Detection.
- Comparative study / Analysis
Here in this section we are going to compare different approaches, tools and techniques related to this study in order to find the best one foe detecting malware threats in the Cloud network. They are tested using different methodologies to analyze its performance. For analyzing them some of the metrics are required, they are: scalability, execution time, recall, precision, false positive and false negative rates, resource consumption, F1-score and data rates.
- Simulation results / Parameters
The approaches which were proposed to overcome the issues faced by Cloud in the above section are to be simulated to perform more effectively and realistic. The different parameters used for it in this study are: Cloud Environment, Data Generation, Evaluation Metrics, Malware Characteristics, Malware Detection Mechanisms, Simulation Tools and Scenarios.
- Dataset LINKS / Important URL
Here are some of the links provided for you below to gain more knowledge about Cloud which can be useful for you:
- https://arxiv.org/pdf/2105.09268.pdf
- https://www.sciencedirect.com/science/article/abs/pii/S1389128621003728
- https://www.mdpi.com/2076-3417/12/15/7679
- Cloud Applications
The application of Cloud in various fields is now growing faster in the improving technology. Some of the areas in which it is applicable are: Healthcare, Education, Media, gaming, Entertainment, finance and e-commerce.
- Topology
Topology is the architecture of a network, how the components of it are organized and arranged within the network. Here in this study based on Cloud, topology defines the flow of data, connection of resources and communication between applications. The common topologies followed by it are: Distributed Cloud Topology, Hybrid Cloud Topology, Interconnected Cloud Topology, Multi-Cloud Topology, Serverless Topology, Private Cloud Topology and Public Cloud Topology.
- Environment
The environment in which the Cloud is operating should have some components and key considerations to function in a better way. They are: Disaster Recovery, Cost Management, Backup, Compute Resources, Cloud Service Provider (CSP), Compliance, Expertise, Management Tools, Monitoring, Networking, Training, Security and Storage.
- Simulation Tools
Here we provide some simulation software for Cloud, which is established with the usage of tools like CloudSim along with Java of version 1.8, to simulate its performance.
- Results
When you have finish reading this research paper completely which is based on the Cloud technology you would have now gained a clear idea about it. You would have now also understood about the applications of it, topologies followed by them, algorithms used and also about some of its limitations.
Cloud Computing Research Project Topics
- Building a Layer-2 Hybrid Cloud
- Hybrid Cloud Energy Management for Edge Computing
- Efficient Secured Cloud Storage System using Dynamic Multiple Clouds Cryptographic Algorithm
- Design and Implementation of a Cloud-Network Resource Management System Based on Digital Twin
- Initiatives in the Cloud for Government Company Comparing Cloud Providers
- Obtaining Cloud Base Height and Phase from Thermal Infrared Radiometry Using a Deep Learning Algorithm
- Challenges and Solutions of Public Cloud Carrying 5GC Network
- Object as a Service (OaaS): Enabling Object Abstraction in Serverless Clouds
- Cloud Instance Resources Prediction Based on Hidden Markov Model
- EN-Beats: A Novel Ensemble Learning-Based Method for Multiple Resource Predictions in Cloud
- towards a Holistic Cloud System with End-to-End Performance Guarantees
- Classification of Cloud Phase Using Combined Ground-Based Polarization Lidar and Millimeter Cloud Radar Observations over the Tibetan Plateau
- Trust-Based Secure Multi-Cloud Collaboration Framework in Cloud-Fog-Assisted IoT
- Cloud Workload Turning Points Prediction via Cloud Feature-Enhanced Deep Learning
- Novel Weight-Improved Particle Swarm Optimization to Enhance Data Security in Cloud
- An Advanced Multi-Model Cloud Services using Load Balancing Algorithms
- Data Security in Cloud Computation
- MockFog 2.0: Automated Execution of Fog Application Experiments in the Cloud
- Design-Time Analysis of Time-Critical and Fault-Tolerance Constraints in Cloud Services
- Surveillance Drone Cloud and Intelligence Service
- Optimized Load Balancing for Green Cloud Computing
- Integration and Validation of a Robust Process for Cloud Applications
- Security Management Approaches over the Cloud
- An Advanced Cloud Security and Load Balancing in Health Care Systems
- towards Confidential Computing: A Secure Cloud Architecture for Big Data Analytics and AI
- Design of Cloud Service Customer Experience Management System Enhanced by AI
- Ingestion of Google Cloud Platform Data using Dataflow
- A Multi-Stage Cloud Security for Cloud Data using Amalgamate Data Security
- Analysis of Resource Usage Management Plan for Federated Learning in Hybrid Cloud
- Composability of Cloud Accelerators in Virtual World Simulations
- Secure Lattice-Based Ciphertext-Policy Attribute-Based Encryption from Module-LWE for Cloud Storage
- Evaluation Model and Performance Analysis of NIC Aggregations in Containerized Private Clouds
- The Use of Cloud Computing and its Security Risks in a Philippine Education System: A Literature Review
- Deep Learning Approach for Cost and Storage Optimization of Video Streaming in Cloud Environments
- An Efficient User Protected Encryption Storage Algorithm Used in Encrypted Cloud Data
- Research on Cloud Side Collaboration Architecture and Lightweight Model of Distribution Network
- Secure Cloud Storage using a Digest Algorithm
- The next generation of cloud security through hypervisor-based virtual machine introspection
- A Research on Various Security Aware Mechanisms in Multi-Cloud Environment for Improving Data Security
- MRRA-GAN: Multi-Resolution Relation-Aware GAN for Point Cloud Completion
- A Global Perception Attention-based Network for Point Cloud Completion
- Point Cloud Completion Cascade Optimization Network Based on Feature Fusion
- A Framework for Characterizing Very Large Cloud Workload Traces with Unsupervised Learning
- Privacy Regulations-Aware Storage Service Selection in Multi-Cloud
- Data Security in AWS S3 Cloud Storage
- Securing Data storage in Cloud after Migration using Immutable Data Dispersion
- Enabling Efficient Multidimensional Encrypted Data Aggregation for Fog-Cloud-Based Smart Grid
- Enabling Scalability in the Cloud for Scientific Workflows: An Earth Science Use Case
- A Systematic Approach towards Security Concerns in Cloud
- Deep Dive on Various Security Challenges, Threats and Attacks over the Cloud Security