Challenges and Benefits of Cloud Computing: Comparison Study


  • Nisreen Luqman Abdulnabi Technical Collage of Administration, Duhok Polytechnic University, KRG - Iraq
  • Renas Rajab Asaad Department of Computer Science, Nawroz University, Kurdistan Region – Iraq



Cloud computing technology is the most widely used current application. Due to the strength of the infrastructure, the ease of providing services, and its speed, it is scalable and expandable, and it has many characteristics. Despite all that has been mentioned about cloud computing, it faces many problems. Like flexibility and security which is it makes an individual distrust computing when using it, and increases the concerns of individuals or companies over their data. In addition to cloud problems. However, there are significant challenges to solving cloud problems, the most important which is the challenge of flexibility, security, cost…etc. All the problems and challenges faced by cloud computing, have many benefits. Such as scalability, collaboration, speed, automatic update...etc. This paper discusses the most important problems and challenges that you face when using cloud computing. This paper also reviews the most important advantages of cloud computing.


Download data is not yet available.


Qian, L., Luo, Z., Du, Y., & Guo, L. (2009, December). Cloud computing: An overview. In IEEE international conference on cloud computing (pp. 626-631). Springer, Berlin, Heidelberg.

Amron, M. T., Ibrahim, R., & Chuprat, S. (2017). A review on cloud computing acceptance factors. Procedia Computer Science, 124, 639-646.

Mahmood, Z. (2011, August). Cloud computing: Characteristics and deploymapproachches. In 2011 IEEE 11th International Conference on Computer and Information Technology (pp. 121-126). IEEE

( Youssef, A. E. (2012). Exploring cloud computing services and applications. Journal of Emerging Trends in Computing and Information Sciences, 3(6), 838-847.)

( Gong, C., Liu, J., Zhang, Q., Chen, H., & Gong, Z. (2010, September). The characteristics of cloud computing. In 2010 39th International Conference on Parallel Processing Workshops (pp. 275-279). IEEE.

Gunawi, H. S., Hao, M., Suminto, R. O., Laksono, A., Satria, A. D., Adityatama, J., & Eliazar, K. J. (2016, October). Why does the cloud stop computing? lessons from hundreds of service outages. In Proceedings of the Seventh ACM Symposium on Cloud Computing (pp. 1-16).

Dillon, T., Wu, C., & Chang, E. (2010, April). Cloud computing: issues and challenges. In 2010 24th IEEE international conference on advanced information networking and applications (pp. 27-33). Ieee.

Sajid, M., & Raza, Z. (2013, December). Cloud computing: Issues & challenges. In International Conference on Cloud, Big Data and Trust (Vol. 20, No. 13, pp. 13-15).

Kadhim, Q. K., Yusof, R., Mahdi, H. S., Al-Shami, S. S. A., & Selamat, S. R. (2018, May). A review study on cloud computing issues. In Journal of Physics: Conference Series (Vol. 1018, No. 1, p. 012006). IOP Publishing.

Kandukuri, B. R., & Rakshit, A. (2009, September). Cloud security issues. In 2009 IEEE International Conference on Services Computing (pp. 517-520). IEEE.

Barona, R., & Anita, E. M. (2017, April). A survey on data breach challenges in cloud computing security: Issues and threats. In 2017 International conference on circuit, power and computing technologies (ICCPCT) (pp. 1-8). IEEE.

Mozumder, D. P., Mahi, J. N., Whaiduzzaman, M., & Mahi, M. J. N. (2017). Cloud computing security breaches and threats analysis. International Journal of Scientific & Engineering Research, 8(1), 1287-1297.

Choo, K. K. R. (2010). Cloud computing: Challenges and future directions. Trends and Issues in Crime and Criminal justice, (400), 1-6.

Takabi, H., Joshi, J. B., & Ahn, G. J. (2010). Security and privacy challenges in cloud computing environments. IEEE Security & Privacy, 8(6), 24-31.

Mollah, M. B., Azad, M. A. K., & Vasilakos, A. (2017). Security and privacy challenges in mobile cloud computing: Survey and way ahead. Journal of Network and Computer Applications, 84, 38-54.

Ardagna, D. (2015, May). Cloud and multi-cloud computing: current challenges and future applications. In 2015 IEEE/ACM 7th International Workshop on Principles of Engineering Service-Oriented and Cloud Systems (pp. 1-2). IEEE.

Khanghahi, N., & Ravanmehr, R. (2013). Cloud computing performance evaluation: issues and challenges. Comput, 5(1), 29-41.

Rotsos, C., Mortier, R., Madhavapeddy, A., Singh, B., & Moore, A. W. (2012, June). Cost, performance & flexibility in openflow: Pick three. In 2012 IEEE International Conference on Communications (ICC) (pp. 6601-6605). IEEE.

Cooney, M. (2012). The 7 most common challenges to cloud computing. Network World, 11.

Catteddu, D. (2009, December). Cloud Computing: benefits, risks and recommendations for information security. In Iberic Web Application Security Conference (pp. 17-17). Springer, Berlin, Heidelberg.

Sether, A. (2016). Cloud computing benefits. Available at SSRN 2781593.

Bello, S. A., Oyedele, L. O., Akinade, O. O., Bilal, M., Delgado, J. M. D., Akanbi, L. A., ... & Owolabi, H. A. (2021). Cloud computing in construction industry: Use cases, benefits and challenges. Automation in Construction, 122, 103441.

Shayan, J., Azarnik, A., Chuprat, S., Karamizadeh, S., & Alizadeh, M. (2014). Identifying Benefits and risks associated with utilizing cloud computing. arXiv preprint arXiv:1401.5155.

Avram, M. G. (2014). Advantages and challenges of adopting cloud computing from an enterprise perspective. Procedia Technology, 12, 529-534.

Asaad, Renas Rajab. (2014). An Investigation of the Neuronal Dynamics Under Noisy Rate Functions. Thesis (M.S.), Eastern Mediterranean University, Institute of Graduate Studies and Research, Dept. of Computer Engineering, Famagusta: North Cyprus.

Asaad, R. R., Abdurahman, S. M., & Hani, A. A. (2017). Partial Image Encryption using RC4 Stream Cipher Approach and Embedded in an Image. Academic Journal of Nawroz University, 6(3), 40–45.

Rajab Asaad, R., & Masoud Abdulhakim, R. (2021). The Concept of Data Mining and Knowledge Extraction Techniques. Qubahan Academic Journal, 1(2), 17–20.

Asaad, R. R., Ahmad, H. B., & Ali, R. I. (2020). A Review: Big Data Technologies with Hadoop Distributed Filesystem and Implementing M/R. Academic Journal of Nawroz University, 9(1), 25–33.

Asaad, R. R. (2019). Güler and Linaro et al Model in an Investigation of the Neuronal Dynamics using noise Comparative Study. Academic Journal of Nawroz University, 8(3), 10–16.

Asaad, R. R. (2021). Penetration Testing: Wireless Network Attacks Method on Kali Linux OS. Academic Journal of Nawroz University, 10(1), 7–12.

Almufti, S., Marqas, R., & Asaad, R. (2019). Comparative study between elephant herding optimization (EHO) and U-turning ant colony optimization (U-TACO) in solving symmetric traveling salesman problem (STSP). Journal Of Advanced Computer Science & Technology, 8(2), 32.

Asaad, R. R., & Abdulnabi, N. L. (2018). Using Local Searches Algorithms with Ant Colony Optimization for the Solution of TSP Problems. Academic Journal of Nawroz University, 7(3), 1–6.

Almufti, S., Asaad, R., & Salim, B. (2018). Review on elephant herding optimization algorithm performance in solving optimization problems. International Journal of Engineering & Technology, 7, 6109-6114.

Asaad, R. R., & Ali, R. I. (2019). Back Propagation Neural Network(BPNN) and Sigmoid Activation Function in Multi-Layer Networks. Academic Journal of Nawroz University, 8(4), 216–221.

Rajab Asaad, R. (2021). Review on Deep Learning and Neural Network Implementation for Emotions Recognition . Qubahan Academic Journal, 1(1), 1–4.

Asaad, R. R., Abdulrahman, S. M., & Hani, A. A. (2017). Advanced Encryption Standard Enhancement with Output Feedback Block Mode Operation. Academic Journal of Nawroz University, 6(3), 1–10.

Abdulfattah, G. M., Ahmad, M. N., & Asaad, R. R. (2018). A reliable binarization method for offline signature system based on unique signer’s profile. INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 14(2), 573-586.

Almufti, S. M., Ahmad, H. B., Marqas, R. B., & Asaad, R. R. (2021). Grey wolf optimizer: Overview, modifications and applications. International Research Journal of Science, Technology, Education,and Management, 1(1),1-1.

Asaad, R. R., Sulaiman, Z. A., & Abdulmajeed, S. S. (2019). Proposed System for Education Augmented Reality Self English Learning. Academic Journal of Nawroz University, 8(3), 27–32.

Asaad, R. R. (2020). Implementation of a Virus with Treatment and Protection Methods. ICONTECH INTERNATIONAL JOURNAL, 4(2), 28-34.

Boya Marqas, R., M. Almufti, S., & Rajab Asaad, R. (2022). FIREBASE EFFICIENCY IN CSV DATA EXCHANGE THROUGH PHP-BASED WEBSITES. Academic Journal of Nawroz University, 11(3), 410–414.

Ihsan, R. R., Almufti, S. M., Ormani, B. M., Asaad, R. R., & Marqas, R. B. (2021). A survey on Cat Swarm Optimization algorithm. Asian J. Res. Comput. Sci, 10, 22-32.

Rajab Asaad, R., & Luqman Abdulnabi, N. (2022). A Review on Big Data Analytics between Security and Privacy Issue. Academic Journal of Nawroz University, 11(3), 178–184.



How to Cite

Luqman Abdulnabi, N., & Rajab Asaad, R. (2022). Challenges and Benefits of Cloud Computing: Comparison Study . Academic Journal of Nawroz University, 11(4), 345–350.




Most read articles by the same author(s)