Volume no :
9 |Issue no :
02Article Type :
Scholarly ArticleAuthor :
Ms.Rakhi Zade, Pooja Tour, Dnyaneshwari khokale, Shardha khedkar ,Piyush BambalPublished Date :
June, 2025Publisher :
Journal of Artificial Intelligence and Cyber Security (JAICS)[1] P. Srivastava and R. Khan, “A Review Paper on Cloud Computing,” Int. J. Adv. Res. Comput. Sci.Softw. Eng., vol. 8, p. 17, Jun. 2018.
[2] A. Mazrekaj and I. Shabani, “Pricing Schemes in Cloud Computing : An Overview,” vol. 7, no. 2,pp. 80–86, 2016.
[3] A. Ibrahimi and P. D. Student, “Cloud Computing : Pricing Model,” vol. 8, no. 6, pp. 434– 441,2017
[4] P. Kumar and R. Kumar, “Issues and challenges of load balancing techniques in cloud computing: A survey,” ACM Computing Surveys (CSUR), vol. 51, no. 6, pp. 1-35, 2019. [5] D. A. Shafiq, N. Jhanjhi, and A. Abdullah, “Load balancing techniques in cloud computing environment: A review,” Journal of King Saud University-Computer and Information Sciences, 2021.
[6] M. Armbrust et al., “A view of cloud computing,” Communications of the ACM, vol. 53, no. 4, pp. 50-58, 2010.
[7] D. Chaudhary and B. Kumar, “Cost optimized Hybrid Genetic-Gravitational Search Algorithm forload scheduling in Cloud Computing,” Appl. Soft Comput. J., vol. 83, 2019.
[8] M. Yao, P. Zhang, Y. Li, J. Hu, C. Lin, and X.-Y. Li, “Cutting your cloud computing cost fordeadline- constrained batch jobs,” 2014, pp. 337–344.
[9] M. Klems, J. Nimis, and S. Tai, “Do clouds compute? A framework for estimating the value ofcloud computing,” vol. 22 LNBIP. Springer Verlag, Forschungszentrum Informatik (FZI), Haid und-Neu-Str. 10-14, Karlsruhe 76131, Germany, pp. 110–123, 2009.
[10] C. Zhang, A. Yin, Y. Wu, Y. Chen, and X. Wang, “Fast Time Series Discords Detection with Privacy Preserving,” 2018, pp. 1129–1139.
[11] T. C. Y. Chui, D. Siuta, G. West, H. Modzelewski, R. Schigas, and R. Stull, “On producing reliableand Affordable numerical weather forecasts on public cloud- computing infrastructure,” J. Atmos.Ocean. Technol., vol. 36, no. 3, pp. 491–509, 2019.
[12] X. Yang, S. Zhu, and X. Pan, “Improved verifiability scheme for data storage in cloud computing,”Wuhan Univ. J. Nat. Sci., vol. 16, no. 5, pp. 399–404, 2011.
[13] J. Ellman, N. Lee, and N. Jin, “Cloud computing deployment: a cost-modelling case study,”Wireless Networks. Springer New York LLC, Department of Computer and Information Sciences,Faculty of Engineering and Environment, Northumbria University,
[14] M. Sahinoglu, S. Ashokan, and P. Vasudev, “CLOUD computing: Cost-effective risk managementwith additional product deployment,” 2015, vol. 62, pp. 319– 325. [15] B. Rochwerger et al., “The Reservoir model and architecture for open federated cloud computing,”IBM J. Res. Dev., vol. 53, no. 4, 2009.