Cloud-Centric Architectures for Social Media: A Review of Challenges and Evolutionary Trends
DOI:
https://doi.org/10.32628/CSEIT25113389Keywords:
Cloud Computing, Security Challenges, Social Media Platforms, Infrastructure, Artificial Intelligence, User Experience, BlockchainsAbstract
Due to the many benefits it offers including scalable resources, cost savings, and improved operational performance cloud computing has quickly become an integral component of contemporary IT design. In today's digital world, social media platforms are indispensable. Everyone uses and shares material on platforms for various reasons, whether it's just to stay in contact for everyday communication or to reach a wider audience and learn about their thoughts and perspectives. This article delves deep into the world of cloud-based social media platforms, exploring their designs, the difficulties they face, and the trends that are only starting to emerge. To enable these platforms to manage different features and enormous user loads, we investigate the crucial role of cloud services (IaaS, PaaS, SaaS) and architectural patterns such as microservices and serverless computing. We will go over some of the main obstacles, such as keeping prices down, establishing good content control, handling privacy and security issues, and understanding data analytics. It goes on to talk about how serverless computing, containerization, and micro services design are becoming more popular, all of which help make cloud environments more agile and efficient with their resources. The survey also looks at how cloud computing relates to other cutting-edge innovation like Blockchains, machine learning, and artificial intelligence (AI). Finally, this research presents the most recent advancements, obstacles, and potential future directions in cloud computing, providing a thorough evaluation of the present status of the subject.
Downloads
References
W. D. Tian and Y. D. Zhao, Optimized Cloud Resource Management and Scheduling: Theories and Practices, 1st edition. Waltham, MA: Morgan Kaufmann, 2014
Lu G, Zeng WH. Cloud computing survey. In Applied Me-chanics and Materials 2014 (Vol. 530, pp. 650-661). Trans Tech Publications Ltd.
Abhishek Kumar Yadav, Yusuf Perwej, Neha Sankhwar, Nikhat Akhtar, Jitendra, “Optimized Virtual Machine Migration in Cloud Environment”, Journal of Information and Computational Science (JOICS), Volume 12, Issue 7, Pages 203 - 212, 2022, DOI: 10.12733/JICS.2022/V12I07.535569.66027
Meenakshi Rani, Elturabi Osman Ahmed, Yusuf Perwej, S V Anil kumar, Dr.Venkatesan Hariram, “A Comprehensive Framework for IoT, AI, and Machine Learning in Healthcare Analytics”, Nanotechnology Perceptions, ISSN 1660-6795, E-ISSN:2235-2074, Collegium Basilea, Switzerland, SCOPUS, Volume 20, S 14, Pages 2118-2131, 2024, DOI: 10.62441/nano-ntp.vi.3072
Ward JS, Barker A. A cloud computing survey: Developments and future trends in infrastructure as a service computing. ArXiv preprint arXiv: 1306.1394. 2013
L. Coppolino, S. D‘Antonio, G. Mazzeo, and L. Romano, Cloud security: Emerging threats and current solutions,‖ Comput. Electr. Eng., vol. 59, pp. 126–140, Apr. 2017
Yusuf Perwej, “Performance Analysis for Cloud Based OLAP over Big Data”, IEEE International Conference on Innovative Computing, Intelligent Communication and Smart Electrical Systems (ICSES -2022), SCOPUS, IEEE Conference, St. Joseph’s Institute of Technology, IEEE Electronic ISBN:978-1-6654-7413-9, Chennai, India, 15th &16th July 2022, DOI: 10.1109/ICSES55317.2022.9914266
N. Akhtar, Bedine Kerim, Yusuf Perwej, Anurag Tiwari, Sheeba Praveen, “A Comprehensive Overview of Privacy and Data Security for Cloud Storage”, International Journal of Scientific Research in Science, Engineering and Technology (IJSRSET), Online ISSN : 2394-4099, Print ISSN : 2395-1990, Volume 08, Issue 5, Pages 113-152, 2021, DOI: 10.32628/IJSRSET21852
Y. Perwej, Syed Qamar Abbas, Jai Pratap Dixit, N. Akhtar, Anurag Kumar Jaiswal, “A Systematic Literature Review on the Cyber Security”, International Journal of Scientific Research and Management (IJSRM), Volume 9, Issue 12, Pages 669 - 710, 2021, DOI: 10.18535/ijsrm/v9i12.ec04
Kajal, Uttam Kumar Singh, Nikhat Akhtar, Satendra Kumar Vishwakarma, Niranjan Kumar, Y. Perwej, “A Potent Technique for Identifying Fake Accounts on Social Platforms”, International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), ISSN: 2456-3307, Volume 9, Issue 4, Pages 308 - 324, 2023, DOI: 10.32628/CSEIT2390425
Y. Mu’azu and N. D. Gapsiso, “Use of Social Media Platforms as Public Relations Strategies in Nigeria,” J. Media Pract. Res., vol. 7, no. 2, pp. 144–164, 2025.
Y. Chen and J. Li, “A Blockchain Platform of Crowdsensing for Cloud Reallocation,” J. Technol. Innov. Soc., vol. 1, no. 2, Dec. 2023.
KM Jyoti Giri, Yusuf Perwej, “A Novel Framework for Secure Authorized Data Deduplication Using Small Block Level Methods in Cloud Storage”, for published in the International Journal of Creative Research Thoughts (IJCRT), ISSN: 2320-2882, Volume 12, Issue 6, Pages 525 - 530, 2024
E. G. Weyl, L. Thorburn, E. de Keulenaar, J. Mchangama, D. Siddarth, and A. Tang, “Prosocial Media,” Mar. 2025.
Z. Qiu, H. Lyu, W. Xiong, and J. Luo, “Can LLMs Simulate Social Media Engagement? A Study on Action-Guided Response Generation,” Feb. 2025
Firoj Parwej, Nikhat Akhtar, Y. Perwej, “An Empirical Analysis of Web of Things (WoT)”, International Journal of Advanced Research in Computer Science (IJARCS), ISSN: 0976-5697, Volume 10, No. 3, Pages 32-40, May 2019, DOI: 10.26483/ijarcs.v10i3.6434
S. A. Bello et al., ―Cloud computing in construction industry: Use cases, benefits and challenges,‖ Autom. Constr., vol. 122, p. 103441, Feb. 2021
KM Jyoti Giri, Yusuf Perwej, “A Comprehensive Review of Secure Dynamic Ownership Techniquesfor Robust Data Deduplication in Cloud Environments”, International Journal of Innovative Research In Technology (IJIRT), ISSN: 2349-6002, Volume 11, Issue 1, Pages 1997 - 2005, 2024
P.-F. Hsu, S. Ray, and Y.-Y. Li-Hsieh, examining cloud computing adoption intention, pricing mechanism, and deployment model,‖ Int. J. Inf. Manag., vol. 34, no. 4, pp. 474–488, 2014
M. Taghipour, E. Mowloodi, M. Mahboobi, and J. Abdi, Application of Cloud Computing in System Management in Order to Control the Process,‖ vol. 3, pp. 34–55, May 2020
G. Zhang, “Cloud computing convergence: integrating computer applications and information management for enhanced efficiency,” Front. BigData ,vol.8,art.1508087, Feb.2025 .doi:10.3389/fdata.2025.1 508087.
K. von Grunberg,¨ “3 platform engineering predictions for 2025,” Platform Engineering Blog, Jan. 10, 2025. [Online]. Available:https://platformengineering.org/blog/platformengineering -predictions-for-2025
Thein, T.; Myo, M.M.; Parvin, S.; Gawanmeh, A. Reinforcement learning based methodology for energy-efficient resource allocation in cloud data centers. J. King Saud Univ. Comput. Inf. Sci. 2020, 32, 1127–1139.
Gazdar, A.; Hidri, L.; Ben Youssef, B.; Kefi, M. Minimizing the In-Cloud Bandwidth for On-Demand Reactive and Proactive Streaming Applica.s. Appl. Sci. 2021, 11, 11267.
Rojas, J.S.; Pekar, A.; Rendon, A.; Corrales, J.C. Smart User Consumption Profiling: Incremental Learning-Based OTT Service Degradation. IEEE Access 2020, 8, 207426–207442.
Mahmoud AbouGhaly, Y. Perwej, Mumdouh Mirghani Mohamed Hassan, Nikhat Akhtar, “Smart Sensors and Intelligent Systems: Applications in Engineering Monitoring” , for published in them International Journal of Intelligent Systems and Applications in Engineering, SCOPUS, ISSN: 2147- 6799, Volume 12, Issue 22s, Pages 720–727, 2024
Yang, C.-C. Instagram use, loneliness, and social comparison orientation: Interact and browse on social media, but don’t compare. Cyberpsychology Behav. Soc. Netw. 2016, 19, 703–708.
Lup, K.; Trub, L.; Rosenthal, L. Instagram# instasad?: Exploring associations among instagram use, depressive symptoms, negative social comparison, and strangers followed. Cyberpsychology Behav. Soc. Netw. 2015, 18, 247–252.
Thomas, L.; Briggs, P.; Hart, A.; Kerrigan, F. Understanding social media and identity work in young people transitioning to university. Comput. Hum. Behav. 2017, 76, 541–553
Utz, S.; Muscanell, N.L. Your co-author received 150 citations: Pride, but not envy, mediates the effect of system-generated achievement messages on motivation. Front. Psychol. 2018, 9, 628.
Yang, C.-c.; Holden, S.M.; Carter, M.D.; Webb, J.J. Social media social comparison and identity distress at the college transition: A dual-path model. J. Adolesc. 2018, 69, 92–102.
Kajal, Neha Singh, Nikhat Akhtar, Ms. Sana Rabbani, Y. Perwej, Susheel Kumar, “Using Emerging Deep Convolutional Neural Networks (DCNN) Learning Techniques for Detecting Phony News”, International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), ISSN: 2456-3307, Volume 10, Issue 1, Pages 122-137, 2024, DOI: 10.32628/CSEIT2410113
Kietzmann, J.H.; Hermkens, K.; McCarthy, I.P.; Silvestre, B.S. Social media? Get serious! Understanding the functional building blocks of social media. Bus. Horiz. 2011, 54, 241–251.
Sugimoto, C.R.; Work, S.; Larivière, V.; Haustein, S. Scholarly use of social media and altmetrics: A review of the literature. J. Assoc. Inf. Sci. Technol. 2017, 68, 2037–2062.]
Boyd, D.M.; Ellison, N.B. Social network sites: Definition, history, and scholarship. J. Comput. Mediat. Commun. 2007, 13, 210–230.
Jones, N.; Borgman, R.; Ulusoy, E. Impact of social media on small businesses. J. Small Enterp. Dev. 2015, 22, 611–632.
Huang, Q.; Xiao, Y. Geographic situational awareness: Mining tweets for disaster preparedness, emergency response, impact, and recovery. Int. J. Geo-Inf. 2015, 4, 1549–1568.
Jahanbin, K.; Rahmanian, V. Using twitter and web news mining to predict COVID-19 outbreak.Asian Pac. J. Trop. Med. 2020, 13, 4.
Stefanidis, A.; Vraga, E.; Lamprianidis, G.; Radzikowski, J.; Delamater, P.L.; Jacobsen, K.H.; Pfoser, D.; Croitoru, A.; Crooks, A. Zika in Twitter: Temporal variations of locations, actors, and concepts. JMIR Public Health Surveill. 2017, 3, e22.
Wang, C., Wang, Q., Ren, K., Cao, N., & Lou, W. ( 2011 ). Toward secure and dependable storage services in cloud computing. IEEE transactions on Services Computing, 5 ( 2 ), pp. 220–232
Odun-Ayo I, Ananya M, Agono F, Goddy-Worlu R. Cloud computing architecture: A critical analysis. In2018 18th inter-national conference on computational science and applications (ICCSA) 2018 Jul 2 (pp. 1-7). IEEE.
Alpita Narayan, Shreya Verma, Anu Chaudhary, Priyanshu Awasthi, Nikhat Akhtar, “Intelligent Iris Analysis Framework for Identity Recognition and Investigation”, International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), ISSN: 2456-3307, Vol. 11, Issue 3, PP. 378 - 389, May 2025, DOI: 10.32628/CSEIT25113102
Zhang, Q., Wang, G., & Liu, Q. ( 2019 ),“Enabling Cooperative Privacy-preserving Personalized search in cloud environments ”. Information Sciences, 480, pp. 1–13
Firoj Parwej, Nikhat Akhtar, Y. Perwej, “An Empirical Analysis of Web of Things (WoT)”, International Journal of Advanced Research in Computer Science (IJARCS), ISSN:0976-5697, Volume 10, No. 3, Pages 32-40, May 2019, DOI: 10.26483/ijarcs.v10i3.6434
Wang, Q., Wang, C., Ren, K., Lou, W., & Li, J. ( 2010 ),“Enabling Public Auditability and data Dynamics for storage security in Cloud Computing.” IEEE transactions on parallel and cloud systems, 22 ( 5 ), pp. 847–859
Y. Perwej, Syed Qamar Abbas, Jai Pratap Dixit, Nikhat Akhtar, Anurag Kumar Jaiswal, “A Systematic Literature Review on the Cyber Security”, International Journal of Scientific Research and Management (IJSRM), ISSN (e): 2321-3418, Volume 9, Issue 12, Pages 669 - 710, December 2021, DOI: 10.18535/ijsrm/v9i12.ec04
Ohlman, B., Eriksson, A., Rembarz, R. ( 2009 ) What Networking of Information Can Do for Cloud Computing. The 18th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises, Groningen, The Netherlands, 4 ( 5 ) 123 - 126
Apoorva Dwivedi, K. Manivannan, Sunny Kumar, Neha Anand, Dr. Yusuf Perwej, Rakhi Kamra, “A Real-Time Environmental Pollution Monitoring Framework Using IoT and Remote Sensing Technologies”, International Journal of Environmental Sciences (IJES), SCOPUS, ISSN: 2229-7359, Volume 11, Number 7s, Pages 1064 - 1075, June 2025
Mahmoud AbouGhaly, Nikhat Akhtar, Elturabi Osman Ahmed, Sunny Kumar, Yusuf Perwej, Ratna Kumari Tamma, “Internet of Things Based Devices Designed for Pediatric Therapy to Improve Mobility and Engagement in Children with Cerebral Palsy”, Journal of Neonatal Surgery (JNS), SCOPUS, ISSN: 2226-0439 (Online), Volume 14, Issue S9, Pages 443 - 451, March 2025, DOI: 10.52783/jns.v14.2695
C. Stergiou, K. E. Psannis, B. G. Kim, and B. Gupta, “Secure integration of IoT and Cloud Computing,” Futur. Gener. Comput. Syst., 2018
Q. Zhang, L. Cheng, R. Boutaba, “Cloud computing: State-of-the-art and research challenges,” J. Int. Serv. Appl., 2010
G. Zhang, “Cloud computing convergence: integrating computer applications and information management for enhanced efficiency,” Front .Big Data, vol.8, art.1508087, Feb.2025
M. Kleppmann, J. Graber, J. Johnson, P. Frazee, D. Holmgren, and B. Newbold, “Bluesky and the AT Protocol: Usable Decentralized Social Media,” in Proc. ACM CoNEXT 2024 Workshop Decentralization Internet (DIN), Los Angeles, CA, USA, Dec. 2024, pp. 8–14
Z. Qiu, H. Lyu, W. Xiong, and J. Luo, “Can LLMs Simulate Social Media Engagement? A Study on Action-Guided Response Generation,” Feb. 2025
Y. Perwej, N. Akhtar, Devendra Agarwal, “The emerging technologies of Artificial Intelligence of Things (AIoT) current scenario, challenges, and opportunities”, Book Title “Convergence of Artificial Intelligence and Internet of Things for Industrial Automation”, SCOPUS, ISBN: 978-1-032-42844-4, CRC Press, Taylor & Francis Group, 2024 Link:https://www.taylorfrancis.com/chapters/edit/10.1201/9781003509240-1/emerging-technologiesartificial- intelligence-things-aiot-current-scenario-challenges-opportunities-yusuf-perwej-nikhatakhtar-devendra-agarwal?context=ubx&refId=537f1a8f-6a94-4439-b337-3ad3d1ce8845, DOI: 10.1201/9781003509240-1
N. Akhtar, Nazia Tabassum, Asif Perwej, Y. Perwej, “ Data Analytics and Visualization Using Tableau Utilitarian for COVID-19 (Coronavirus)”, Global Journal of Engineering and Technology Advances (GJETA), ISSN : 2582-5003, Volume 3, Issue 2, Pages 28- 50, 2020, DOI: 10.30574/gjeta.2020.3.2.0029
M. Abualkibash and K. Elleithy, “Cloud computing: The future of IT industry,” Int. J. Distrib. and Parallel Syst., vol. 3, no. 4, pp. 1–10, 2012
A. Kumar, Yusuf Perwej, Ashutosh C Kakde, “Transforming Education Through IoT and AI Opportunities and Challenges”, Educational Administration: Theory and Practice, SCOPUS, Volume 30, No. 5, Pages 11610 –11622, 2024, DOI: 10.53555/kuey.v30i5.4982
Krol, M., Pawlowski, P. and Strzelecki, A. ( 2016 ). IoT data management architecture using cloud computing and big data. 19th International Conference on Information Fusion (FUSION) in 2016 (page 19 ) 258–265 ). IEEE
Y. Perwej, N. Akhtar, Neha kulshrestha, Pavan Mishra, “A Methodical Analysis of Medical Internet of Things (MIoT) Security and Privacy in Current and Future Trends”, Journal of Emerging Technologies and Innovative Research (JETIR), Volume 09, Issue 1, Pages 346 - 371, 2022, DOI: 10.6084/m9.figshare.JETIR2201346
Botta, A., De Donato, W., Persico, V. and Pcscapé, A. ( 2016 ). Integration of Cloud Computing and the Internet of Things: Overview. Next Gene. Com. Systems, 56, 684–700
B. Wang, and H. Xing, “The Application of Cloud Computing in E due at ion Informat izat ion,” IEEE, pp. 2673–2676, 2011
A. Ghazizadeh, “Cloud Computing Benefits and Architecture in E-Learning,” in Wireless, Mobile and Ubiquitous Technology in Education (WMUTE), 2012 I.E. Seventh International Conference, IEEE, 2012, pp. 199201
A. Tashkandi, and I. Al-Jabri, “Cloud computing adoption by higher education institutions in Saudi Arabia: an exploratory study,” Cluster Computing, vol. 18, no. 4, pp. 1527–1537, 2015
Y. Perwej, N. Akhtar, Firoj Parwej, “A Technological Perspective of Blockchain Security”, International Journal of Recent Scientific Research (IJRSR), ISSN: 0976-3031, Volume 9, Issue 11, (A), Pages 29472 – 29493, 2018., DOI: 10.24327/ijrsr.2018.0911.2869
aherkordi, A., Zahid, F., Verginadis, Y., & Horn, G. ( 2018 ). Future cloud systems design: challenges and research directions. IEEE Access, 6, 74120 – 74150
Goodarzy, S., Nazari, M., Han, R., Keller, E., & Rozner, E. ( 2020, December ). Resource management in cloud computing using machine learning: A survey. In 2020 19th IEEE International Conference on Machine Learning and Applications (ICMLA) (pp. 811 - 816 ). IEEE
Khan, T., Tian, W., Zhou, G., Ilager, S., Gong, M., & Buyya, R. (2022 ). Machine learning (ML)-centric resource management in cloud computing: A review and future directions. Journal of Network and Computer Applications, 204, 103405
Downloads
Published
Issue
Section
License
Copyright (c) 2025 International Journal of Scientific Research in Computer Science, Engineering and Information Technology

This work is licensed under a Creative Commons Attribution 4.0 International License.