Skip to main content
Loading...
Scholar9 logo True scholar network
  • Login/Sign up
  • Scholar9
    Publications ▼
    Article List Deposit Article
    Mentorship ▼
    Overview Sessions
    Q&A Institutions Scholars Journals
    Publications ▼
    Article List Deposit Article
    Mentorship ▼
    Overview Sessions
    Q&A Institutions Scholars Journals
  • Login/Sign up
  • Back to Top

    Transparent Peer Review By Scholar9

    Edge Computing's Effects on Security in Cloud Networks

    Abstract

    Cloud networks and edge computing are becoming more and more fraught with security problems. This study aims to examine these challenges and suggest the most effective solutions. The corpus of recent research has been thoroughly examined. The results draw attention to several edge computing-related issues, including worries about privacy, security flaws, higher expenses, lower productivity, and more. Therefore, in order to address these problems, it is essential to implement effective security measures. Modern technologies like as artificial intelligence, machine learning, encryption, real-time monitoring, etc. can help lower security concerns. They can also contribute to creating a secure and robust cloud computing future. It was determined that new technologies and methods can effectively address the security implications of edge computing.

    Reviewer Photo

    Hemant Singh Sengar Reviewer

    badge Review Request Accepted
    Reviewer Photo

    Hemant Singh Sengar Reviewer

    15 Oct 2024 02:04 PM

    badge Approved

    Relevance and Originality

    Methodology

    Validity & Reliability

    Clarity and Structure

    Results and Analysis

    Relevance and Originality

    The study addresses the increasingly critical security challenges faced by cloud networks and edge computing, making it highly relevant in today’s digital landscape. The focus on security measures related to modern technologies such as artificial intelligence and machine learning adds originality to the research. However, it would benefit from a clearer articulation of how this research differentiates itself from existing literature and whether it introduces novel solutions or perspectives that advance the current understanding of security in these domains.


    Methodology

    The methodology appears robust, with a thorough examination of recent research conducted to identify security challenges. However, the article lacks specific details on the methods used for analyzing the corpus of research. It would be helpful to include a more explicit description of the data sources, analytical frameworks, or criteria for selecting studies. Providing a structured methodology section would enhance the reader’s understanding of how the findings were derived and the validity of the proposed solutions.


    Validity & Reliability

    The study effectively highlights significant issues related to edge computing security, indicating a well-researched foundation. However, the article does not provide empirical data or case studies to substantiate its claims. Including quantitative or qualitative evidence would enhance the reliability of the findings and the proposed solutions. Additionally, discussing potential biases or limitations in the research could strengthen the article’s credibility and provide a more balanced view of the security challenges presented.


    Clarity and Structure

    The article is generally well-structured, presenting its main points in a logical order. The writing style is clear and concise, making it accessible to a broader audience. Nevertheless, some sections could benefit from better organization, particularly when transitioning between different security challenges and proposed solutions. Using headings or subheadings to delineate these sections more clearly would enhance readability and help the audience follow the flow of arguments more effectively.


    Result Analysis

    The results effectively highlight key issues in edge computing security, such as privacy concerns and productivity challenges. However, the analysis would benefit from a deeper exploration of the implications of these findings. It would be useful to discuss how the proposed solutions could be implemented in real-world scenarios and what impact they may have on the security landscape. Additionally, more detailed recommendations for practitioners could enhance the article's practical relevance, allowing readers to understand how to apply the findings effectively.

    Publisher Logo

    IJ Publication Publisher

    done sir

    Publisher

    IJ Publication

    IJ Publication

    Reviewer

    Hemant Singh

    Hemant Singh Sengar

    More Detail

    Category Icon

    Paper Category

    Computer Engineering

    Journal Icon

    Journal Name

    IJNTI - INTERNATIONAL JOURNAL OF NOVEL TRENDS AND INNOVATION External Link

    Info Icon

    p-ISSN

    Info Icon

    e-ISSN

    2984-908X

    Subscribe us to get updated

    logo logo

    Scholar9 is aiming to empower the research community around the world with the help of technology & innovation. Scholar9 provides the required platform to Scholar for visibility & credibility.

    QUICKLINKS

    • What is Scholar9?
    • About Us
    • Mission Vision
    • Contact Us
    • Privacy Policy
    • Terms of Use
    • Blogs
    • FAQ

    CONTACT US

    • +91 82003 85143
    • hello@scholar9.com
    • www.scholar9.com

    © 2026 Sequence Research & Development Pvt Ltd. All Rights Reserved.

    whatsapp