Downloads: 1
India | Computer Science and Information Technology | Volume 14 Issue 12, December 2025 | Pages: 949 - 955
Cloud Deployment Effectiveness and Data Security
Abstract: Software service providers are increasingly taking over the cloud computing paradigm to provide on-demand access to near-unlimited resource pools. Services, memory sensitivity Cloud data and rationalization. Two of the central issues that concern the industry: (i) how to achieve outsourced calculations in an efficient and manageable way through agile and optimized deployments, and (ii) Especially with sensitive data. How sensitive data is not protected public cloud, but still maintains business functionality practically. To optimize deployment, cloud providers have improved their computing infrastructure. By introducing container orchestration, we introduce the framework with improved software proposal automation and agility. Additionally, software service providers have migrated computationally intensive software systems such as high layers and technical workflows to achieve efficiency. To maintain the benefits of cloud-protected data, researchers have proposed many encryption techniques for searching and computation of encrypted data. However, software practitioners face several challenges. First, elastic scaling of arithmetic resources such as containers leads to non-negative delays. This is called cold start and prohibits the agile and rapid delivery of software services. This concern is often the case that server less computing and generally automated scaling systems (deadline-based service level goals (SLOs) for deadline-based applications. There are many techniques for resource instantiation. The problem is that cloud resources can be reduced to minutes. The contribution is based on several applications in the fields of aviation, finance and healthcare. The results were verified and evaluated. This paper shows how to effectively tackle the above challenges. Finally, the paper outlines future directions beyond the limits of success presented.
Keywords: HPC clusters, EWIS, MDO, MAPE-K loop
How to Cite?: Dr. Md Dilshad Ghani, "Cloud Deployment Effectiveness and Data Security", Volume 14 Issue 12, December 2025, International Journal of Science and Research (IJSR), Pages: 949-955, https://www.ijsr.net/getabstract.php?paperid=SR251118220713, DOI: https://dx.doi.org/10.21275/SR251118220713