Cloud Computing and 5G Challenges and Open Issues
Cloud Computing and 5G Challenges and Open Issues
Cloud Computing and 5G Challenges and Open Issues
Arif Ullah1, Hanane Aznaoui2, Canan Batur Şahin3, Mahanz Sadie4, Ozlem Batur Dinler5,
Laassar Imane6
1
School of computing, Riphah International University, Faisalabad, Pakistan
2
Department of Computer Science, Cadi Ayyad University, Marrakech, Morocco
3
Department of Computer Engineering, Ramhormoz Branch, Islamic Azad University, Ramhormoz, Iran
4
Department of Computer Engineering, Siirt University, Siirt, Turkey
5
Department of Software Engineering, Faculty of Engineering and Natural Sciences, Malatya Turgut Ozal University, Malatya, Turkey
6
Department of Mathematics, Ibn Tofail University, Kénitra, Morocco
Corresponding Author:
Arif Ullah
School of computing, Riphah International University
Peshawar Rd, near Hajj Complex I-14, Islamabad, Islamabad Capital Territory 46000, Pakistan
Email: [email protected]
1. INTRODUCTION
Cloud computing (CC) is a general term for anything that involves delivering hosted services over
the internet. Cloud providers are competing with each other and they constantly expand their services in
order to differentiate themselves. CC is named as such because the information being accessed is found
remotely in the cloud or a virtual space. CC has succeeded in bringing change in different fields of life. CC is
a two-decade-old technology that works using the virtualizations rule. A virtual machine (VM) is one of the
main elements of virtualization in CC that represents a physical server in the VM [1]. The evolution of fifth-
generation (5G) networks is becoming available as a major driver of the growth of the internet of things (IoT)
and cloud application applications. The 5G networks are expected to massive expand today’s IoT and cloud
that can boost cellular operation. The development of 5G will be based on the groundwork created by fourth-
generation technology long-term evolution (4G LTE), which will provide user's voice, data, and the internet
[2]. The 5G will significantly increase the talent and speed to offer dependable and speedy connectivity to the
future cloud technology and IoT. 5G is the 5th development of cloud technology; the formal standard was
customary in 2017 by the third generation partnership project (3GPP) to define the prerequisite of the 5G
network, and the second phase of 5G, 3GPP release 16, is conventional to be released curtly [3].
2. CLOUD COMPUTING
In the past two decades, CC has progressed rapidly due to an increase in the user’s demand and to
ensure better services to the client. CC is considered a modern technology due to the equipment of elastics,
flexible and on-demand storage for use. High computing and storage services can get any user and
organization at a low cost without investing much in the infrastructure [4]. CC architecture comprises two
main parts which are the front end and back end where different components in terms of storage, runtime,
service, and security work in the back-end application and service work in the front end. Cloud architecture
not only defines the components but also the relationship between them. These components are connected
with the help of the internet [5].
According to Chang and Ramachandran, there are four types of CC that are used in different fields
of life with specific rules and respective specifications [6]. Public cloud, this type of CC is connected to the
data center and get resources from the data center and share these resources with different organization and
user. It is not secure as private and is less expensive than private. Different organizations control and share
the public cloud with a specific rule and management system [7]. A private cloud is designed for a single
organization and is also known as the internal cloud. It is established within the organization or connected
with a third party and it is more secure as compared to other types of computing. Private CC is established
for the requirement of a third party or the demand of a third party. It is more secure and reliable due to the
restriction and rules therefore it becomes more expensive than other types of CC [8]. Hybrid cloud it is the
combination of public and private clouds with their respective strength and weaknesses. Organizations
attempt to achieve the best from both types of the cloud and also known as the federation cloud. It is the
intermediate between private and public because sometimes the user who uses the public cloud shift to the
private cloud because they suddenly need more secure data. This process can be done with the help of the
hybrid cloud [9]. Community cloud is a cloud service model which provides service to a limited number of
individuals or organizations that are managed and secured by all participating organizations or a third-party
managed service provider. Community clouds are a hybrid form of private clouds built and operated
specifically for a targeted group. These communities have similar cloud requirements and their ultimate goal
is to work together to achieve their business objectives [10], [11].
Each type of CC consists of different characteristic and a details explanation of CC characteristics
are given in the next section. CC provides high availability and some benefits for every type of user in a
different field [12]. Availability is one of the main pillars of an information system where it refers to the
uptime of the system and network of systems where they collectively provide service during its usage. The
traditional systems are limited on local installations when they shift into CC where the entire organization
can use the available service of CC along with the end user [13]. When it is time for information and
technology (IT) infrastructure for establishment then an organization decides on the bases of availability
because it is the main key decision factor. Availability has been the major concern in distributed systems
because highly available services in CC are the main element for the satisfaction of cloud users [14].
Scalability is the attribute that presents the ability of the software, network, and process of an organization to
manage the increase in user demand. Normally scalability means frequent speed in CC in which the ability of
a system or product to continue working after its context changes like volume or size to meet the user need.
Scalability is a sign of stability and competitiveness which means the organization or network system is
ready to handle the influx of demand according to changing needs and updates of the system.
Due to the property of scalability in CC lots of companies are shifting to CC [15], [16]. Cloud
security is also known as CC security which consists of different policies, controls, procedures, and
technologies that work together to protect cloud-based systems, data, and infrastructure from unauthorized
access. Cloud security is a joint responsibility of the cloud provider and business owner or end-user. Security
addresses both physical and logical issues in different models and layers [17]. Cloud automation is a broad
term that refers to the processes tools and resources that are used by an organization to reduce manual efforts
and is associated with managing CC workloads. It can be applied to different types of CC. Cloud automation
is a fundamental building block for CC. It can be applied in a software layer where a complex system is used
to configure and roll out the system balances for the network system. The aim is to make all activities related
to computing as fast, efficient, and handoff as possible thought for the use of the various systems [18].
Virtualization is one of the main characteristics of CC which refers to as virtual rather than actual
something. The virtualization concept was started in 1960 and early 1970 when International Business
Machines Corporation (IBM) spent considerable time introducing more reliable and time-sharing technology.
The step used for making VM is virtualization where the system runs on the operating system at a time and
some resources are unutilized. For that reason, virtualization is used to make a multi-operating system with
single physical resources. Nowadays physical resources are also used in virtualization systems [19].
Application layer. It consists of a cloud application that is used in a different field. It is the highest level of
the hierarchy and works as an automatic scaling feature. The application layer defines the commands,
Int J Adv Appl Sci, Vol. 11, No. 3, September 2022: 187-193
Int J Adv Appl Sci ISSN: 2252-8814 189
responses, data types, and status reporting supported by the protocol. This layer is the only layer that directly
connected or interacts with the end user. It provides different applications for user such as simple mail
transfer protocol, file transfer, surfing the internet, chatting with friends, email clients, network data sharing,
and various forms of file and data operations [20].
Platform layer, this layer consists of an operating system and application framework and sits on top
of the infrastructure layer. The primary purpose of this layer is to minimize the burden of developing an
application or reduce the complicity of development rule work under VM. Different application
programming interface (API) and applications are used for storage data-based and logical web applications
[21].
The infrastructure layer, this layer creates a pool of resources for storage computing resources with
the help of a technology known as virtualization. It allows infrastructure as a service (IaaS) customer to
create and discard VM and networks as per their business requirements. They pay for the services they
consumed. IaaS removes the necessity for the consumer to invest in procuring and operating physical servers,
data storage systems, and other networking resources [22].
Hardware layer, this layer is responsible for the management of all physical resources of CC which
includes physical servicer, routers, switches, power, and cooling systems along with different resources. The
hardware layer is typically implemented in the cloud data center where it consists of thousands of different
physical resources and they are connected with different rules and regulations [23]. All layers are important
due to their different operation and connectivity with each other. Different layers play an important role in
CC.
However, this study only focuses on the platform layer because the development of CC requires the
optimization of the different services of a different virtualized system. Therefore, the different researchers
used load balancing techniques implemented in the platform layer of CC [24]. The platform layer is the
important layer of CC because it includes different operating systems and software development frameworks
that provide a resource to the end user [25]. In a few years, a CC has experienced remarkable growth in
economic models and development models. All activities happened due to the platform layer of CC.
Different virtualization systems are controlled and developed with the help of this layer because it deals with
software and virtualization systems and VM are one of the main elements of this layer [26].
3. FIFTH-GENERATION (5G)
The evolution of 5G networks is becoming more readily available as a major driver of the growth of
IoT and cloud application applications. The 5G networks are expected to massive expand today’s IoT and
cloud that can boost cellular operations. The development of 5G will be based on the groundwork created by
4G LTE, which will provide user voice, data, and the internet. The 5G will significantly increase the aptitude
and speed to offer dependable and speedy connectivity to the future cloud technology and the IoT 5G is the
5th invention of cloud technology; the formal standard was customary in December 2017 [27]. 3GPP to
define the requirement of the 5G network, and the second phase of 5G, 3GPP Release 16, is predictable to be
released shortly. The 5G network makes use of a high-band spectrum (referred to as millimeter-wave) for
very high speed and low latency [28]. Table 1 presents the comparison of technologies.
By increasing the number of connected devices to internet, a high communication and computation
capacity will be required to meet demands of future applications like, massive IoT and cloud applications
requiring data sharing and processing. 5G will need to be efficiently maintain a larger and diverse set of
devices. With the predictable rise of machine-to-machine communication, a single microcell may need to
support 10,000 or more low-rate devices along with its established high-rate mobile users. This will require
wholesale changes to the control plane and network management relative to 4G, whose overhead channels
and state machines are not designed for such a diverse and large subscriber base [30]. Figure 1 presents the
structure of 5G.
Int J Adv Appl Sci, Vol. 11, No. 3, September 2022: 187-193
Int J Adv Appl Sci ISSN: 2252-8814 191
6. CONCLUSION
In this paper, we provide review efforts in 5G-based cloud applications. The new studies touch on
several paradigms like 5G, based cloud application, IoT, and edge computing. The paper presents
information about 5G-based cloud applications and IoT-based applications where different standardization is
discussed. In the last section of the paper, we present the structure of cloud applications and their role in
upcoming applications along with future-based research.
REFERENCE
[1] K. A. V. Kumar and D. Arivudainambi, “Performance analysis of security framework for software defined network architectures,”
International Journal of Advances in Applied Sciences, vol. 8, no. 3, pp. 232–242, Sep. 2019, doi: 10.11591/ijaas.v8.i3.pp232-
242.
[2] S. Mukkamala, G. Janoski, and A. Sung, “Intrusion detection using neural networks and support vector machines,” in
Proceedings of the 2002 International Joint Conference on Neural Networks. IJCNN’02 (Cat. No.02CH37290), pp. 1702–1707.
doi: 10.1109/IJCNN.2002.1007774.
[3] M. K. Moridani, A. K. Moridani, and M. Gholipour, “Powerful processing to three-dimensional facial recognition using triple
information,” International Journal of Advances in Applied Sciences, vol. 9, no. 4, pp. 326–332, Dec. 2020, doi:
10.11591/ijaas.v9.i4.pp326-332.
[4] O. M. Olaniyi, E. Daniya, J. G. Kolo, J. A. Bala, and A. E. Olanrewaju, “A computer vision-based weed control system for low-
land rice precision farming,” International Journal of Advances in Applied Sciences, vol. 9, no. 1, pp. 51–61, Mar. 2020, doi:
10.11591/ijaas.v9.i1.pp51-61.
[5] K. P. Rani, L. Lakshmi, C. Sabitha, B. D. Lakshmi, and S. Sreeja, “Top-K search scheme on encrypted data in cloud,”
International Journal of Advances in Applied Sciences, vol. 9, no. 1, pp. 67–69, Mar. 2020, doi: 10.11591/ijaas.v9.i1.pp67-69.
[6] C.-P. Lee and J. P. Shim, “An exploratory study of radio frequency identification (RFID) adoption in the healthcare industry,”
European Journal of Information Systems, vol. 16, no. 6, pp. 712–724, Dec. 2007, doi: 10.1057/palgrave.ejis.3000716.
[7] L. Fang, C. Yin, L. Zhou, Y. Li, C. Su, and J. Xia, “A physiological and behavioral feature authentication scheme for medical
cloud based on fuzzy-rough core vector machine,” Information Sciences, vol. 507, pp. 143–160, Jan. 2020, doi:
10.1016/j.ins.2019.08.020.
[8] S. Nagavalli and G. Ramachandran, “A secure data transmission scheme using asymmetric semi-homomorphic encryption
scheme,” International Journal of Advances in Applied Sciences, vol. 7, no. 4, pp. 369–376, Dec. 2018, doi:
10.11591/ijaas.v7.i4.pp369-376.
[9] A. Ullah and N. M. Nawi, “An improved in tasks allocation system for virtual machines in cloud computing using HBAC
algorithm,” Journal of Ambient Intelligence and Humanized Computing, pp. 1–14, Oct. 2021, doi: 10.1007/s12652-021-03496-z.
[10] A. Ullah, N. M. Nawi, and S. Ouhame, “Recent advancement in VM task allocation system for cloud computing: Review from
2015 to 2021,” Artificial Intelligence Review, vol. 55, no. 3, pp. 2529–2573, Mar. 2022, doi: 10.1007/s10462-021-10071-7.
[11] A. Ullah, N. M. Nawi, J. Uddin, S. Baseer, and A. H. Rashed, “Artificial bee colony algorithm used for load balancing in cloud
computing: Review,” IAES International Journal of Artificial Intelligence, vol. 8, no. 2, pp. 156–167, Jun. 2019, doi:
10.11591/ijai.v8.i2.pp156-167.
[12] A. Ullah, N. M. Nawi, and M. H. Khan, “BAT algorithm used for load balancing purpose in cloud computing: An overview,”
International Journal of High Performance Computing and Networking, vol. 16, no. 1, pp. 43–54, 2020, doi:
10.1504/IJHPCN.2020.110258.
[13] H. Aznaoui, A. Ullah, S. Raghay, L. Aziz, and M. H. Khan, “New efficient GAF routing protocol using an optimized weighted
sum model in WSN,” Indonesian Journal of Electrical Engineering and Computer Science, vol. 22, no. 1, pp. 396–406, Apr.
2021, doi: 10.11591/ijeecs.v22.i1.pp396-406.
[14] G. A. Akpakwu, B. J. Silva, G. P. Hancke, and A. M. Abu-Mahfouz, “A survey on 5G networks for the internet of things:
Communication technologies and challenges,” IEEE Access, vol. 6, pp. 3619–3647, 2018, doi: 10.1109/ACCESS.2017.2779844.
[15] H. Ghazzai, E. Yaacoub, M.-S. Alouini, Z. Dawy, and A. Abu-Dayya, “Optimized LTE cell planning with varying spatial and
temporal user densities,” IEEE Transactions on Vehicular Technology, vol. 65, no. 3, pp. 1575–1589, Mar. 2016, doi:
Cloud computing and 5G challenges and open issues (Arif Ullah)
192 ISSN: 2252-8814
10.1109/TVT.2015.2411579.
[16] G. K. Kurt et al., “A vision and framework for the high altitude platform station (HAPS) networks of the future,” IEEE
Communications Surveys & Tutorials, vol. 23, no. 2, pp. 729–779, 2021, doi: 10.1109/COMST.2021.3066905.
[17] F. Fang and X. Wu, “A win–win mode: The complementary and coexistence of 5G networks and edge computing,” IEEE Internet
of Things Journal, vol. 8, no. 6, pp. 3983–4003, Mar. 2021, doi: 10.1109/JIOT.2020.3009821.
[18] K. Al-Shouiliy, “The impact of real big data on our future and risk identification,” Ph.D. dissertation, Dept. Elect. Eng. and
Comput. Sci., Univ. of Cincinnati, Cincinnati, United States 2020.
[19] F. Guo, F. R. Yu, H. Zhang, X. Li, H. Ji, and V. C. M. Leung, “Enabling massive IoT toward 6G: A comprehensive survey,”
IEEE Internet of Things Journal, vol. 8, no. 15, pp. 11891–11915, Aug. 2021, doi: 10.1109/JIOT.2021.3063686.
[20] S. Verma, Y. Kawamoto, Z. M. Fadlullah, H. Nishiyama, and N. Kato, “A survey on network methodologies for real-time
analytics of massive IoT data and open research issues,” IEEE Communications Surveys & Tutorials, vol. 19, no. 3, pp. 1457–
1477, 2017, doi: 10.1109/COMST.2017.2694469.
[21] R. Cong, Z. Zhao, G. Min, C. Feng, and Y. Jiang, “EdgeGO: A mobile resource-sharing framework for 6G Edge computing in
massive IoT systems,” IEEE Internet of Things Journal, pp. 1–1, 2021, doi: 10.1109/JIOT.2021.3065357.
[22] P. Porambage, J. Okwuibe, M. Liyanage, M. Ylianttila, and T. Taleb, “Survey on multi-access edge computing for internet of
things realization,” IEEE Communications Surveys & Tutorials, vol. 20, no. 4, pp. 2961–2991, 2018, doi:
10.1109/COMST.2018.2849509.
[23] I. Mistry, S. Tanwar, S. Tyagi, and N. Kumar, “Blockchain for 5G-enabled IoT for industrial automation: A systematic review,
solutions, and challenges,” Mechanical Systems and Signal Processing, vol. 135, p. 106382, Jan. 2020, doi:
10.1016/j.ymssp.2019.106382.
[24] K. Zhang, Y. Zhu, S. Maharjan, and Y. Zhang, “Edge intelligence and blockchain empowered 5G beyond for the industrial
internet of things,” IEEE Network, vol. 33, no. 5, pp. 12–19, Sep. 2019, doi: 10.1109/MNET.001.1800526.
[25] L. Chettri and R. Bera, “A comprehensive survey on internet of things (IoT) toward 5G wireless systems,” IEEE Internet of
Things Journal, vol. 7, no. 1, pp. 16–32, Jan. 2020, doi: 10.1109/JIOT.2019.2948888.
[26] A. Gupta and R. K. Jha, “A survey of 5G network: Architecture and emerging technologies,” IEEE Access, vol. 3, pp. 1206–1232,
2015, doi: 10.1109/ACCESS.2015.2461602.
[27] S. P. Singh, A. Nayyar, R. Kumar, and A. Sharma, “Fog computing: From architecture to edge computing and big data
processing,” The Journal of Supercomputing, vol. 75, no. 4, pp. 2070–2105, Apr. 2019, doi: 10.1007/s11227-018-2701-2.
[28] S. S. Gill et al., “Transformative effects of IoT, blockchain and artificial intelligence on cloud computing: Evolution, vision,
trends and open challenges,” Internet of Things, vol. 8, pp. 1–30, Dec. 2019, doi: 10.1016/j.iot.2019.100118.
[29] Y. Ai, M. Peng, and K. Zhang, “Edge computing technologies for internet of things: A primer,” Digital Communications and
Networks, vol. 4, no. 2, pp. 77–86, Apr. 2018, doi: 10.1016/j.dcan.2017.07.001.
[30] N. T. Le, M. A. Hossain, A. Islam, D. Kim, Y.-J. Choi, and Y. M. Jang, “Survey of promising technologies for 5G networks,”
Mobile Information Systems, pp. 1–25, 2016, doi: 10.1155/2016/2676589.
[31] D. C. Nguyen, P. N. Pathirana, M. Ding, and A. Seneviratne, “Blockchain for 5G and beyond networks: A state of the art survey,”
Journal of Network and Computer Applications, vol. 166, pp. 1–42, Sep. 2020, doi: 10.1016/j.jnca.2020.102693.
[32] S. K. Sharma and X. Wang, “Live data analytics with collaborative edge and cloud processing in wireless IoT networks,” IEEE
Access, vol. 5, pp. 4621–4635, 2017, doi: 10.1109/ACCESS.2017.2682640.
[33] D. Wubben et al., “Benefits and impact of cloud computing on 5G signal processing: Flexible centralization through cloud-RAN,”
IEEE Signal Processing Magazine, vol. 31, no. 6, pp. 35–44, Nov. 2014, doi: 10.1109/MSP.2014.2334952.
[34] E. K. Markakis et al., “Efficient next generation emergency communications over multi-access edge computing,” IEEE
Communications Magazine, vol. 55, no. 11, pp. 92–97, Nov. 2017, doi: 10.1109/MCOM.2017.1700345.
[35] I. Kakalou, K. E. Psannis, P. Krawiec, and R. Badea, “Cognitive radio network and network service chaining toward 5G:
Challenges and requirements,” IEEE Communications Magazine, vol. 55, no. 11, pp. 145–151, Nov. 2017, doi:
10.1109/MCOM.2017.1700086.
[36] Z. Zhou, X. Chen, E. Li, L. Zeng, K. Luo, and J. Zhang, “Edge intelligence: Paving the last mile of artificial intelligence with
edge computing,” Proceedings of the IEEE, vol. 107, no. 8, pp. 1738–1762, Aug. 2019, doi: 10.1109/JPROC.2019.2918951.
[37] H. Shariatmadari et al., “Machine-type communications: Current status and future perspectives toward 5G systems,” IEEE
Communications Magazine, vol. 53, no. 9, pp. 10–17, Sep. 2015, doi: 10.1109/MCOM.2015.7263367.
[38] M. Liyanage, P. Porambage, A. Y. Ding, and A. Kalla, “Driving forces for multi-access edge computing (MEC) IoT integration in
5G,” ICT Express, vol. 7, no. 2, pp. 127–137, Jun. 2021, doi: 10.1016/j.icte.2021.05.007.
BIOGRAPHIES OF AUTHORS
Int J Adv Appl Sci, Vol. 11, No. 3, September 2022: 187-193
Int J Adv Appl Sci ISSN: 2252-8814 193
Canan Batur Şahin receive her diploma and Phd degrees in Computer
Engineering from Yildiz Technical University. Her research interests include Software
Engineering, Artificial intelligence and Optimization. She can be contacted at email:
[email protected].