Skip to main content
Loading...
Scholar9 logo True scholar network
  • Login/Sign up
  • Scholar9
    Publications ▼
    Article List Deposit Article
    Mentorship ▼
    Overview Sessions
    Q&A Institutions Scholars Journals
    Publications ▼
    Article List Deposit Article
    Mentorship ▼
    Overview Sessions
    Q&A Institutions Scholars Journals
  • Login/Sign up
  • Back to Top

    Transparent Peer Review By Scholar9

    Edge Computing's Effects on Security in Cloud Networks

    Abstract

    Cloud networks and edge computing are becoming more and more fraught with security problems. This study aims to examine these challenges and suggest the most effective solutions. The corpus of recent research has been thoroughly examined. The results draw attention to several edge computing-related issues, including worries about privacy, security flaws, higher expenses, lower productivity, and more. Therefore, in order to address these problems, it is essential to implement effective security measures. Modern technologies like as artificial intelligence, machine learning, encryption, real-time monitoring, etc. can help lower security concerns. They can also contribute to creating a secure and robust cloud computing future. It was determined that new technologies and methods can effectively address the security implications of edge computing.

    Reviewer Photo

    Priyank Mohan Reviewer

    badge Review Request Accepted
    Reviewer Photo

    Priyank Mohan Reviewer

    15 Oct 2024 12:39 PM

    badge Not Approved

    Relevance and Originality

    Methodology

    Validity & Reliability

    Clarity and Structure

    Results and Analysis

    Relevance and Originality

    The research article addresses a highly relevant and timely issue concerning the security challenges faced by cloud networks and edge computing. As organizations increasingly adopt these technologies, understanding the associated security vulnerabilities is critical. The originality of this study lies in its comprehensive examination of contemporary challenges, including privacy concerns, security flaws, and operational inefficiencies. By exploring effective security measures and modern technologies such as artificial intelligence and machine learning, the study provides valuable insights that contribute to the ongoing discourse in cybersecurity within cloud computing and edge environments.


    Methodology

    The methodology employed in the study, which includes a thorough examination of recent research, establishes a solid foundation for the findings. By reviewing a broad corpus of literature, the study effectively synthesizes various perspectives on security challenges in cloud networks and edge computing. However, the article would benefit from a more detailed description of the selection criteria for the reviewed literature, as well as the specific analytical methods used to assess and interpret the findings. Additionally, the inclusion of case studies or empirical evidence would enhance the methodological rigor and provide practical context to the proposed solutions.


    Validity & Reliability

    The validity of the findings is supported by the comprehensive review of existing literature, which highlights several key security challenges in edge computing and cloud networks. The identification of privacy issues, security flaws, and cost-related concerns is well-documented and resonates with contemporary industry experiences. However, the reliability of the conclusions drawn could be strengthened through the inclusion of quantitative data or statistical analysis to support the claims made regarding the effectiveness of the suggested security measures. Discussing potential biases in the literature reviewed or limitations of the sources would also improve the reliability of the research.


    Clarity and Structure

    The article is generally well-structured, presenting a logical progression from identifying security challenges to proposing solutions. The clarity of language is adequate for the target audience, but some sections could be made more accessible through the use of clearer definitions and explanations of technical terms. For instance, providing more context about specific technologies like artificial intelligence and machine learning in the context of security could enhance reader comprehension. Including headings and subheadings to clearly delineate sections discussing different challenges and corresponding solutions would also improve overall clarity.


    Result Analysis

    The result analysis effectively highlights key challenges in cloud networks and edge computing, along with potential solutions leveraging modern technologies. However, the article would benefit from a deeper analysis of how the proposed solutions can be implemented in practice, as well as the anticipated outcomes or improvements resulting from their adoption. Including case studies or examples of successful implementations of these security measures would provide practical insights for practitioners. Furthermore, discussing the potential limitations or drawbacks of the proposed solutions would offer a more balanced view of the security landscape, enabling readers to critically evaluate the efficacy of the suggested approaches. Overall, the conclusions drawn point to a promising direction for enhancing security in cloud computing and edge environments.

    Publisher Logo

    IJ Publication Publisher

    thankyou sir

    Publisher

    IJ Publication

    IJ Publication

    Reviewer

    Priyank

    Priyank Mohan

    More Detail

    Category Icon

    Paper Category

    Computer Engineering

    Journal Icon

    Journal Name

    IJNTI - INTERNATIONAL JOURNAL OF NOVEL TRENDS AND INNOVATION External Link

    Info Icon

    p-ISSN

    Info Icon

    e-ISSN

    2984-908X

    Subscribe us to get updated

    logo logo

    Scholar9 is aiming to empower the research community around the world with the help of technology & innovation. Scholar9 provides the required platform to Scholar for visibility & credibility.

    QUICKLINKS

    • What is Scholar9?
    • About Us
    • Mission Vision
    • Contact Us
    • Privacy Policy
    • Terms of Use
    • Blogs
    • FAQ

    CONTACT US

    • +91 82003 85143
    • hello@scholar9.com
    • www.scholar9.com

    © 2026 Sequence Research & Development Pvt Ltd. All Rights Reserved.

    whatsapp