International Journal of Innovative Research in Engineering and Management
Year: 2025, Volume: 12, Issue: 2
First page : ( 158) Last page : ( 162)
Online ISSN : 2350-0557
DOI: 10.55524/ijirem.2025.12.2.25 |
DOI URL: https://doi.org/10.55524/ijirem.2025.12.2.25
This is an Open Access article distributed under the terms of the Creative Commons Attribution License (CC BY 4.0) (http://creativecommons.org/licenses/by/4.0)
Article Tools: Print the Abstract | Indexing metadata | How to cite item | Email this article | Post a Comment
Ashima Narang , Nisha Charaya
Cloud computing has transformed how data is stored, processed, and accessed. This paper provides an in-depth review of various cloud environments- public, private, hybrid, and multi-cloud. It compares them across parameters such as cost, scalability, security, and flexibility. Additionally, the paper interprets graphical and tabular comparisons in narrative form to aid understanding without requiring visual figures. The goal is to provide a clear and detailed understanding of the operational dynamics, benefits, and limitations of each cloud model.
[1] P. Mell and T. Grance, “The NIST Definition of Cloud Computing,” NIST Special Publication 800-145, Sep. 2011. Available from: https://csrc.nist.gov/pubs/sp/800/145/final
[2] R. Buyya et al., “Cloud computing and emerging IT platforms: Vision, hype, and reality,” Future Generation Computer Systems, vol. 25, no. 6, pp. 599–616, 2009. Available from: https://doi.org/10.1016/j.future.2008.12.001
[3] M. Armbrust et al., “A View of Cloud Computing,” Commun. ACM, vol. 53, no. 4, pp. 50–58, Apr. 2010. Available from: https://doi.org/10.1145/1721654.1721672
[4] L. Vaquero et al., “A Break in the Clouds: Towards a Cloud Definition,” ACM SIGCOMM Comput. Commun. Rev., vol. 39, no. 1, pp. 50–55, 2009. Available from: https://doi.org/10.1145/1496091.1496100
[5] B. Grobauer et al., “Understanding Cloud Computing Vulnerabilities,” IEEE Security Privacy, vol. 9, no. 2, pp. 50–57, 2011. Available from: https://doi.org/10.1109/MSP.2010.115
[6] A. Marinos and G. Briscoe, “Community Cloud Computing,” CloudCom 2009, pp. 472–484, 2009. Available from: https://doi.org/10.1007/978-3-642-10665-1_43
[7] F. Gens, “IT Cloud Services User Survey, pt. 2: Top Benefits & Challenges,” IDC Exchange, 2008.
[8] S. Subashini and V. Kavitha, “A survey on security issues in service delivery models of cloud computing,” J. Netw. Comput. Appl., vol. 34, no. 1, pp. 1–11, 2011. Available from: https://doi.org/10.1016/j.jnca.2010.07.006
[9] D. Petcu, “Multi-cloud: Expectations and current approaches,” Proc. 2013 Int. Workshop on Multi-cloud Applications and Federated Clouds, pp. 1–6, 2013. Available from: https://doi.org/10.1145/2462326.2462328
[10] Narang A., Gupta D., Kaur A., “Biometrics-Based Un-Locker to Enhance Cloud Security Systems”, International Journal of Cloud Applications and Computing, 10 (4), pp. 1 -12,2020. Available from: https://doi.org/10.4018/IJCAC.2020100101
Assistant Professor, Computer Science and Engineering, Amity University, Gurugram, Haryana, India
No. of Downloads: 20 | No. of Views: 708
Jagappa, Ashish Khadela Maheshbhai, Srihari J, M Jessica, Mitinam Paloh, Ramesha K.
February 2026 - Vol 13, Issue 1
Prasad S R, Ramya, Sahana, Sharadhi VP, Nisarga NS5.
December 2025 - Vol 12, Issue 6
Suman Yadav, Ekta Soni.
December 2025 - Vol 12, Issue 6
