• Vision, mission and goals
  • Dean Speech
  • College Council
  •  To main site of Al-Anbar University 
  •  Add to Favorite 
  •  Add to Home 
  •  Really Simple Syndication 
  • Arabic

             Weekly lecture schedule for all scientific departments - First Semester - 2021/2022              Instructions for performing final attendance and electronic exams for the academic year 2020-2021 for our dear students              ** Congratulations on the occasion of Eid Al-Adha **              An electronic workshop in cooperation with the Al-Qaim College of Education              Student's guide to solving technical problems in electronic exams


Total Votes


Career Title


College & Department


College & Department

 News Details

Academic essay on cloud computing


Academic essay on cloud computing



                       Saif Al-din M. Najim     Shokhan M. Al-Barzinji 


The platform of Cloud computing is model based on Internet environment which enables an easy on-demand access and usage payment of each access and utilization of pool of networks that is shared among multiple users. This type of computing is considered as another innovation that fulfils users’ needs and requirements for resources of computing like stockpiling, systems, administrations and applications as well as servers. Securing the cloud’s stored Data is seen as one of the significant principles with many challenges and concerns in the research of cloud computing. This study has reviewed the research in a critical manner which focused on the types of cloud computing, industries, deployments and models of delivery. This constant issue is becoming more impactful because of the emerging challenges in cloud computing technology management. From the client’s point of view, the security in cloud computing is hazardous, typically in the matter of assurance affirmation problems and securing the data. These problems create shortcomings that hinder the adoption of cloud computing administrations. This paper inspects and illustrates the critical issues of cloud computing in relation to the privacy and protection on the Cloud. Lastly, this paper is concluded with a review to the literature stated as well suggesting on-going future studies. Keywords: Cloud computing, Data security, Data privacy, Cloud Cryptography, Security threats.



REFRENCES: [1] Mell P, Grance T. The NIST definition of cloud computing. 2011.

[2] Nemati H, Singhvi A, Kara N, El Barachi M, editors. Adaptive SLA-based elasticity management algorithms for a virtualized IP multimedia subsystem. Globecom Workshops (GC Wkshps), 2014; of Conference.

[3] Buyya R, Yeo CS, Venugopal S, Broberg J, Brandic I. Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility. Future Generation computer systems.25(6):599- 616,2009.

[4] Ahmed HAS, Ali MH, Kadhum LM, Zolkipli MF, Alsariera YA. A Review of Challenges and Security Risks of Cloud Computing. Journal of Telecommunication, Electronic and Computer Engineering (JTEC).9(1-2):87-91,2017.

[5] Li Q, Wang Z-y, Li W-h, Li J, Wang C, Du R-y. Applications integration in a hybrid cloud computing environment: Modelling and platform. Enterprise Information Systems.7(3):237-71,2013.

 [6] Abbas H, Maennel O, Assar S. Security and privacy issues in cloud computing. Springer,2017.

 [7] Grobauer B, Walloschek T, Stöcker E. Understanding cloud computing vulnerabilities. Security & privacy, IEEE.9(2):50-7,2011.

 [8] Khan N, Al-Yasiri A. Cloud security threats and techniques to strengthen cloud computing adoption framework. Cyber Security and Threats: Concepts, Methodologies, Tools, and Applications: IGI Global; 2018. p. 268-85.

[9] Subashini S, Kavitha V. A survey on security issues in service delivery models of cloud computing. Journal of network and computer applications.34(1):1-11,2011.

 [10] Al-Badi A, Tarhini A, Al-Kaaf W. Financial Incentives for Adopting Cloud Computing in Higher Educational Institutions. Asian Social Science.13(4):162,2017.

[11] Catteddu D. Cloud Computing: benefits, risks and recommendations for information security. Web Application Security: Springer; 2010. p. 17- .

 [12] Satyanarayanan M. The emergence of edge computing. Computer.50(1):30-9,2017.

 [13] Ghosh R, Longo F, Frattini F, Russo S, Trivedi KS. Scalable analytics for iaas cloud availability. Cloud Computing, IEEE Transactions on.2(1):57-70,2014.

[14] Guerrero-Contreras G, Garrido JL, BalderasDiaz S, Rodríguez-Domínguez C. A contextaware architecture supporting service availability in mobile cloud computing. IEEE Transactions on Services Computing.10(6):956- 68,2017.

[15] Ge J, Wu Y, Li T, Yuepeng E, Zhang C, editors. Experimenting adaptive services in sea-cloud innovation environment. Computer Communications Workshops (INFOCOM WKSHPS), 

 Facebook Comments

 News More

 Academic article on cryptocurrency

 The effect of Routing Protocols and topologies on IOT Based Systems

Share |