Investigating Secure Resource Allocation Models for High Availability Cloud-Based Applications
Keywords:
High Availability, Cloud-Based Applications, Secure Resource Allocation, Cloud Providers, Performance Optimization, Resource Distribution, Scalability, Security, Cloud Architecture, Multi-Cloud, Uptime, Cloud Service Models, Latency, Compliance, Fault ToleranceAbstract
High availability (HA) is a critical requirement for cloud-based applications, particularly for large-scale enterprises that demand continuous service availability and low-latency performance. Secure resource allocation in cloud environments is fundamental to achieving high availability while ensuring data protection, privacy, and compliance with security regulations. This paper investigates various secure resource allocation models for high availability cloud-based applications, examining their effectiveness in minimizing downtime and optimizing resource distribution across multiple cloud providers. By focusing on performance, security, and scalability, this paper provides insights into the best practices and challenges faced by organizations deploying high availability applications in the cloud.
References
Marston, S., Li, Z., Bandyopadhyay, S., Zhang, J., & Ghalsasi, A. (2011). Cloud computing—The business perspective. Decision Support Systems, 51(1), 176-189.
Iyer, B., & Henderson, J.C. (2010). Preparing for the future: Understanding the seven capabilities of cloud computing. MIS Quarterly Executive, 9(2), 117-131.
Sheetal, J. (2024). Ensuring business continuity and high availability for SAP workloads on Microsoft Azure through cloud architecture disaster recovery and native service integration. IACSE – International Journal of Computer Technology (IACSE-IJCT), 5(1), 8–29. https://doi.org/10.5281/zenodo.17785339
Goscinski, A., & Brock, A. (2013). Technical challenges in multi-cloud infrastructures. Cloud Computing Research and Applications, 2(1), 45-59.
Tsai, W.T., & Feng, G. (2014). Cloud computing: A new era of distributed computing. Future Generation Computer Systems, 29(1), 54-65.
Bernstein, A., & Miller, R. (2012). High-performance multi-cloud infrastructures. Computing, 1(2), 42-59.
Nagamani, N. (2024). AI-Driven Risk Assessment Models for Health and Life Insurance Underwriting. IACSE – International Journal of Computer Science and Engineering (IACSE-IJCSE), 5(1), 8–25. https://doi.org/10.5281/zenodo.17852768
Moffat, J., & Green, D. (2012). The future of cloud computing: Challenges and trends. IEEE Cloud Computing, 5(1), 44-51.
Kowalski, S. (2014). Interoperability in multi-cloud environments. Journal of Cloud Computing, 9(3), 40-51.
Xu, X., & Zhang, Z. (2011). Optimizing resource allocation in cloud environments. Future Computing and Informatics Journal, 2(4), 67-79.
Nagamani, N. (2024). Multi-layer AI defense models against real-time phishing and deepfake financial fraud. ISCSITR–International Journal of Business Intelligence (ISCSITR-IJBI), 5(2), 7–21.
Sandhu, R., & Ray, M. (2012). Security considerations in multi-cloud environments. International Journal of Network Security, 13(4), 80-92.
Liu, Y., & Liao, L. (2015). Cost optimization strategies for cloud services. Journal of Computing, 22(2), 115-124.
Downloads
Published
Issue
Section
License
Copyright (c) -1 Mohamed Ali (Author)

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.



