Cloud Computing Architectures for Scalable and Secure Information System Management

Authors

  • Sofia Hernandez College of Computing and Informatics, Drexel University
  • Liam O'Connor Department of Computer Science and Engineering, University of South Florida

Abstract

The proliferation of cloud-native environments has fundamentally transformed the operational landscape of modern information systems, shifting the focus from localized hardware management to the orchestration of highly distributed, virtualized infrastructures. This paper presents a comprehensive interdisciplinary analysis of cloud computing architectures, specifically focusing on the dual requirements of massive scalability and robust security within socio-technical frameworks. As organizations transition away from monolithic legacy systems, the move toward microservices, containerization, and serverless paradigms introduces significant structural trade-offs involving latency, data consistency, and systemic complexity. We examine these trade-offs by synthesizing perspectives from systems engineering, organizational theory, and public policy. The research explores the integration of Zero-Trust Architecture (ZTA) within elastic scaling frameworks, identifying the inherent tensions between rapid resource provisioning and the maintenance of a rigorous security posture. Furthermore, the discussion extends to the sustainability of cloud operations, the ethical implications of automated resource allocation, and the geopolitical challenges of data sovereignty in a globalized computing environment. By analyzing deployment strategies and infrastructure governance, this paper provides a robust framework for managing large-scale information systems that are resilient to both technical failures and adversarial threats. The findings emphasize that future cloud management must move toward proactive, identity-centric governance models that harmonize technological agility with societal and environmental responsibility.

References

1.Abadi, M., Barham, P., Chen, J., Chen, Z., Davis, A., Dean, J., ... & Kudlur, M. (2016). TensorFlow: A system for large-scale machine learning. 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI 16), 265-283.

2.Armbrust, M., Stoica, I., Zaharia, M., Fox, A., Griffith, R., Joseph, A. D., ... & Rabkin, A. (2010). A view of cloud computing. Communications of the ACM, 53(4), 50-58.

3.Barroso, L. A., Clidaras, J., & Hölzle, U. (2013). The datacenter as a computer: An introduction to the design of warehouse-scale machines. Synthesis Lectures on Computer Architecture, 8(3), 1-154.

4.Beloglazov, A., & Buyya, R. (2012). Optimal online deterministic algorithms and adaptive heuristics for energy and performance efficient dynamic consolidation of virtual machines in cloud data centers. Concurrency and Computation: Practice and Experience, 24(13), 1397-1420.

5.Burns, B., Grant, B., Oppenheimer, D., Brewer, E., & Wilkes, J. (2016). Borg, Omega, and Kubernetes. Communications of the ACM, 59(5), 50-57.

6.Buyya, R., Yeo, C. S., Venugopal, S., Broberg, J., & Brandic, I. (2009). Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility. Future Generation Computer Systems, 25(6), 599-616.

7.Chen, Y., Paxson, V., & Katz, R. H. (2010). What’s new about cloud computing security. University of California, Berkeley, Tech. Rep. EECS-2010-5.

8.Dean, J., & Ghemawat, S. (2008). MapReduce: Simplified data processing on large clusters. Communications of the ACM, 51(1), 107-113.

9.Dragoni, N., Giallorenzo, S., Lafuente, A. L., Mazzara, M., Montesi, F., Mustafin, R., & Safina, L. (2017). Microservices: yesterday, today, and tomorrow. Present and Ulterior Software Engineering, 195-216.

10.Floridi, L., & Taddeo, M. (2016). What is data ethics? Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences, 374(2083).

11.Foster, I., Zhao, Y., Raicu, I., & Lu, S. (2008). Cloud computing and grid computing 360-degree compared. 2008 Grid Computing Environments Workshop, 1-10.

12.Gantz, J., & Reinsel, D. (2012). The digital universe in 2020: Big data, bigger digital shadows, and biggest growth in the far east. IDC iView: IDC Analyze the Future, 2007(2012), 1-16.

13.Goodfellow, I., Bengio, Y., & Courville, A. (2016). Deep Learning. MIT Press.

14.Humble, J., & Farley, D. (2010). Continuous Delivery: Reliable Software Releases through Build, Test, and Deployment Automation. Pearson Education.

15.Jordan, M. I., & Mitchell, T. M. (2015). Machine learning: Trends, perspectives, and prospects. Science, 349(6245), 255-260.

16.Katz, R. H., & Patterson, D. A. (2010). The Case for Berkeley View of Cloud Computing. University of California at Berkeley.

17.Kleppmann, M. (2017). Designing Data-Intensive Applications: The Big Ideas Behind Reliable, Scalable, and Maintainable Systems. O'Reilly Media.

18.Mell, P., & Grance, T. (2011). The NIST Definition of Cloud Computing. National Institute of Standards and Technology.

19.Newman, S. (2015). Building Microservices: Designing Fine-Grained Systems. O'Reilly Media.

20.NIST. (2020). Zero Trust Architecture (SP 800-207). National Institute of Standards and Technology.

21.Pasquale, F. (2015). The Black Box Society: The Secret Algorithms That Control Money and Information. Harvard University Press.

22.Rosado, D. G., Gómez, R., Mellado, D., & Fernández-Medina, E. (2012). Security analysis in the migration to cloud environments. Future Internet, 4(2), 469-487.

23.Satyanarayanan, M. (2017). The emergence of edge computing. Computer, 50(1), 30-39.

24.Shostack, A. (2014). Threat Modeling: Designing for Security. Wiley.

25.Stoica, I., Song, D., Popa, R. A., Patterson, D., Mahoney, M. W., Katz, R., ... & Abbeel, P. (2017). A Berkeley view of systems challenges for AI. arXiv preprint arXiv:1712.05855.

26.Tanenbaum, A. S., & Van Steen, M. (2017). Distributed Systems. Distributed-Systems.net.

27.Trustworthy Accountability Group. (2022). Principles of Ethical Data Management.

28.Verhelst, M., & Moons, B. (2018). Embedded deep learning: A hardware-software co-design perspective. AI Magazine, 39(3), 26-36.

29.Ward, J. S., & Barker, A. (2013). Undefined by data: a survey of big data definitions. arXiv preprint arXiv:1309.5821.

30.Zaharia, M., Xin, R. S., Wendell, P., Das, T., Armbrust, M., Dave, A., ... & Stoica, I. (2016). Apache Spark: A unified engine for big data processing. Communications of the ACM, 59(11), 56-65.

31.Zuboff, S. (2019). The Age of Surveillance Capitalism: The Fight for a Human Future at the New Frontier of Power. PublicAffairs.

Downloads

Published

2026-03-11

How to Cite

Sofia Hernandez, & Liam O'Connor. (2026). Cloud Computing Architectures for Scalable and Secure Information System Management. International Journal of Computer Science and Information Systems, 1(1). Retrieved from https://isipress.org/index.php/IJCSIS/article/view/75