NIT6130 Introduction to Research - Assignment 2 Literature Review
Verified
Added on 2024/04/25
|19
|3929
|165
AI Summary
This literature review explores the topic of Cloud Computing, analyzing vulnerabilities and forensic investigation approaches. It covers broad and focused scans, theory application, and cost optimization in Cloud Computing.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
NIT6130 INTRODUCTION TO RESEARCH ASSIGNMENT 2 – LITERATURE REVIEW
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Table of Contents Table of Contents...............................................................................................................................ii List of Figures...................................................................................................................................iii List of Tables....................................................................................................................................iv 1.1Broad Scan...............................................................................................................................1 1.1.1 Research Journal................................................................................................................1 1.1.2 Filing System.....................................................................................................................3 1.1.3 Bibliographic file from broad scan....................................................................................4 1.2Focused Review.......................................................................................................................6 1.2.1 Updated filing system........................................................................................................6 1.2.2 Updated bibliographic file from focused review................................................................7 1.3Cloud Computing.....................................................................................................................8 1.3.1 Background.......................................................................................................................9 1.3.2 Framework and Method.....................................................................................................9 1.3.3 Overview of the Proposed System.....................................................................................9 1.3.4 Discussion.......................................................................................................................10 1.4Theory based on inventory applied to cost optimization in Cloud Computing.......................11 1.4.1 What is theory related to inventory and should be applied in organisation to Cost Optimization in Cloud Computing?..........................................................................................11 1.4.2 Functioning of Inventory Theory Model.........................................................................11 1.4.3 Value Deliverables..........................................................................................................12 1.4.4 Outcome..........................................................................................................................12 1.4.5 Conclusion.......................................................................................................................13 1.5Final Outline of the Literature review Chapter.......................................................................13 1.6Introduction............................................................................................................................14 List of References............................................................................................................................15 ii
List of Figures Figure 1: Global Spending Forecast....................................................................................10 iii
List of Tables Table 1: Research Journal Tasks...........................................................................................1 Table 2: Table of Filling System.............................................................................................3 Table 3: Updated Filling System............................................................................................7 iv
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
CHAPTER 1 LITERATURE REVIEW In the present assignment, literature review is to be written on the topic “Cloud Computing”. I am analysing and investigating the two papers which depends on cloud computing.Iamselectingtwodiversifiedpapers,firstoneisdemonstratingthe vulnerabilitieswhich are related to Cloud Computing. In the second paper, I am evaluating the efficient approach which is related to the forensic investigation in Cloud Computing by adopting VM snapshots and this is more reliable. This literature review is starting from the beginning and it includes some steps which they have to follow: Segment 1.1 is identified with expansive sweep and in this, I talk about my exploration papers, a gathering of research articles and in addition a list of sources of all papers. Area 1.2 is relying upon the engaged output and in this, I channel my exploration and discover more papers which are significant with the subject. At that point, after this, I again refreshed the book index. Area 1.3 and 1.4 depend on writing Review where I chose and broke down the two papers. Area 1.5 gives the layout of the section which is identified with Literature Review. Last, Section 1.6 is the Introduction of my point. 1.1Broad Scan In Broad Scan I have chosen my theme by doing research on the Internet by utilizing enhanced catchphrases. I sought point on the distinctive stage, for example, VU library, IEEE and also Google Scholar. I discovered such a large number of papers and select twenty-five from them for the following level. 1.1.1Research Journal Table1: Research Journal Tasks DateTaskActionComment 15/01/2018Topic searchChoose appropriateSelected one topic 1
topic 16/01/2018Identifypaperson thedifferent sourceswhich includeIEEE,VU Library and etc. Readthosepapers andsavesomeof them. Make a folder and savethework which is related to that topic. 18/01/2018Literature ReviewAfter collection of paper, read them. Found best topic to do research. 20/01/2018Literature ReviewReadanothertwo more papers Notproperly relevanttothe research.Discard them. 23/01/20184finaldocuments should select Allpapersshould readinaproper manner. Selecttwo for the final examination. 24/01/2018Start AssignmentStartedcitations related to topic Insert the citations. 25/01/2018Startassignment from reviewing first paper. Read all the papers.Put some comments in LR section. 27/01/2018Reading of paperPreparenotes related to the topic. Putthemintoour own words. 28/01/2018Analyseand examine of second paper Read all the papers.Pickedsome important work and analyse them. 1/02/2018Analysingand written down some articles Somedatawritten down from the two articles. Fillallfieldsand prepare assignment. 2
1.1.2Filing System Table2: Table of Filling System SourceKeyword useNo.ofreturned Literature No.ofCollected Literature ScholarCloud Computing UseofCloud Computing 1000 2000 5 6 VU LibraryCloud Computing Appropriate strategiesand theories 6000 500 4 5 IEEETheoriesbasedon inventoryandthat shouldbeapplied on cost optimization inthecloud computing 30005 1.1.3Bibliographic file from broad scan Jiang, Q., Feng, W., Peng, J., Han, F., Li, Q., Zhang, W and Su, H. (2012). Inventory - Based Resource Management in Cloud Computing.IEEE Xplore. Gupta, K., Beri, R and Behal, V. (2016). Cloud Computing: A survey on Cloud SimulationTools.InternationalJournalforInnovativeResearchinScienceand Technology. Vol. 2, Issue 11. 3
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Rani, D. R., Geethakumari, G. (2015). An Efficient Approach to Forensic investigation in Cloud using VM Snapshots. International Conference on Pervasive Computing. Subramanian, S and Munuswamy, D. (2015). Features.ISACA Journal. Volume 3. Nodari, A., Nurminen, J.K and Fruhwirth, C. (2016). Inventory Theory Applied to Cost optimization in Cloud Computing.IEEE Xplore. Dustdar, S. (2016). Cloud Computing.IEEE. Sanaei, Z., Abolfazli, S., Gani, A. and Buyya, R. (2014). Heterogeneity in mobile cloud computing:taxonomyandopenchallenges.IEEECommunicationsSurveys& Tutorials,16(1), pp.369-392. Botta, A., De Donato, W., Persico, V. and Pescapé, A. (2016). Integration of cloud computing and internet of things: a survey.Future Generation Computer Systems,56, pp.684-700. Oliveira, T., Thomas, M. and Espadanal, M. (2014). Assessing the determinants of cloud computing adoption: An analysis of the manufacturing and services sectors.Information & Management,51(5), pp.497-510. Garrison, G., Wakefield, R.L. and Kim, S. (2015). The effects of IT capabilities and delivery model on cloud computing success and firm performance for cloud supported processesandoperations.InternationalJournalofInformationManagement,35(4), pp.377-393. Ratten, V. (2016). Continuance use intention of cloud computing: innovativeness and creativity perspectives.Journal of Business Research,69(5), pp.1737-1740. Zhang, H., Jiang, H., Li, B., Liu, F., Vasilakos, A.V. and Liu, J., (2016). A framework for truthful online auctions in cloud computing with heterogeneous user demands.IEEE Transactions on Computers,65(3), pp.805-818. 4
Zhan, Z.H., Liu, X.F., Gong, Y.J., Zhang, J., Chung, H.S.H. and Li, Y. (2015). Cloud computingresource schedulinganda surveyof itsevolutionaryapproaches.ACM Computing Surveys (CSUR),47(4), p.63. Li, J., Li, J., Chen, X., Jia, C. and Lou, W. (2015). Identity-based encryption with outsourcedrevocationincloudcomputing.IeeeTransactionsoncomputers,64(2), pp.425-437. Bera, S., Misra, S. and Rodrigues, J.J. (2015). Cloud computing applications for smart grid: A survey.IEEE Transactions on Parallel and Distributed Systems,26(5), pp.1477- 1494. Wang, B., Zheng, Y., Lou, W., & Hou, Y. T. (2015). DDoS attack protection in the era of cloud computing and software-defined networking.Computer Networks,81, 308-319. Manvi, S. S., & Shyam, G. K. (2014). Resource management for Infrastructure as a Service(IaaS)incloudcomputing:Asurvey.JournalofNetworkandComputer Applications,41, 424-440. Aazam, M., Khan, I., Alsaffar, A. A., & Huh, E. N. (2014, January). Cloud of Things: Integrating Internet of Things and cloud computing and the issues involved. InApplied SciencesandTechnology(IBCAST),201411thInternationalBhurbanConference on(pp. 414-419). IEEE. Ahmed, E., Gani, A., Khan, M. K., Buyya, R., & Khan, S. U. (2015). Seamless application execution in mobile cloud computing: Motivation, taxonomy, and open challenges.Journal of Network and Computer Applications,52, 154-172. Sharma,A.K.,&Jha,R.K.(2015).CloudComputing.Expansion,Impactand Challenges of IT & CS,103. Chang,V.,Kuo,Y.H.andRamachandran,M.,2016.Cloudcomputingadoption framework: A security framework for business clouds.Future Generation Computer Systems,57, pp.24-41. 5
Tao, F., Cheng, Y., Da Xu, L., Zhang, L., & Li, B. H. (2014). CCIoT-CMfg: cloud computingandinternetofthings-basedcloudmanufacturingservicesystem.IEEE Transactions on Industrial Informatics,10(2), 1435-1442. Hashem, I. A. T., Yaqoob, I., Anuar, N. B., Mokhtar, S., Gani, A., & Khan, S. U. (2015). The rise of “big data” on cloud computing: Review and open research issues.Information Systems,47, 98-115. Wang, W., Li, B., & Liang, B. (2014, April). Dominant resource fairness in cloud computingsystemswithheterogeneousservers.InINFOCOM,2014Proceedings IEEE(pp. 583-591). IEEE. Bruneo, D. (2014). A stochastic model to investigate data center performance and QoS in IaaScloudcomputingsystems.IEEETransactionsonParallelandDistributed Systems,25(3), 560-569. 1.2Focused Review I have selected two main articles on the topic “Cloud Computing” from the 10 articles and these are helpful for me in doing proper and effective research. 1.2.1Updated filing system The below table contains the efficient as well as updated filling system: Table3: Updated Filling System SourceKeyword useNo.ofreturned Literature No.ofCollected Literature ScholarCloud Computing UseofCloud Computing 1000 2000 3 3 VU LibraryCloud Computing60002 6
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Appropriate strategiesand theories 500 1 IEEEInventorytheory whichappliedto cost optimization in cloud computing 30001 1.2.2Updated bibliographic file from focused review Jiang, Q., Feng, W., Peng, J., Han, F., Li, Q., Zhang, W and Su, H. (2012). Inventory- Based Resource Management in Cloud Computing.IEEE Xplore. Gupta, K., Beri, R and Behal, V. (2016). Cloud Computing: A survey on Cloud SimulationTools.InternationalJournalforInnovativeResearchinScienceand Technology. Vol. 2, Issue 11. Rani, D. R., Geethakumari, G. (2015). An Efficient Approach to Forensic investigation in Cloud using VM Snapshots. International Conference on Pervasive Computing. Subramanian, S and Munuswamy, D. (2015). Features.ISACA Journal. Volume 3. Nodari, A., Nurminen, J.K and Fruhwirth, C. (2016). Inventory Theory Applied to Cost optimization in Cloud Computing.IEEE Xplore. Dustdar, S. (2016). Cloud Computing.IEEE. Sanaei, Z., Abolfazli, S., Gani, A. and Buyya, R. (2014). Heterogeneity in mobile cloud computing:taxonomyandopenchallenges.IEEECommunicationsSurveys& Tutorials,16(1), pp.369-392. 7
Botta, A., De Donato, W., Persico, V. and Pescapé, A. (2016). Integration of cloud computing and internet of things: a survey.Future Generation Computer Systems,56, pp.684-700. Oliveira, T., Thomas, M. and Espadanal, M. (2014). Assessing the determinants of cloud computing adoption: An analysis of the manufacturing and services sectors.Information & Management,51(5), pp.497-510. Garrison, G., Wakefield, R.L. and Kim, S. (2015). The effects of IT capabilities and delivery model on cloud computing success and firm performance for cloud supported processesandoperations.InternationalJournalofInformationManagement,35(4), pp.377-393. 1.3Cloud Computing According to Grobauer, et. al (2016), it has been analysed that cloud computing demonstrate the essential role in IT sector for the both individual and organisations from the appropriate way so that they can properly access, store along with the sharing information. For the experiment, they have to above some vulnerabilities which are related to cloud computing. Along with this, they have to adopt appropriate service model which are related to cloud computing. Section 1.3.1 provides the lights on the background of the topic. This includes the vulnerabilities and service model which are related to cloud computing. Section 1.3.2 shows the appropriate outline by which they investigated. Section1.3.3providestheindicationofservicemodelwhichisrelatedtocloud computing. Section 1.3.4 is the discussion part and in this pros and cons related to the topic. 8
1.3.1Background In the lights of Dustdar (2016), it has been analysed that cloud computing is essential in ITsectorforbothindividualsandenterprises.Astheparadigmrelatedtocloud computing has matured, then this will assist in expanding the research so that they can include all the aspects related to the distribution system which include management, deployment, networking storage along with the resources which are associated with computing. They have to provide a proper overview related to current efforts so that analyse the proper potential of implementing the technology related to cloud computing as well as address some challenges while adoption includes the over the loss of control, data security and privacy as well as cost structure which is unpredictable in nature. 1.3.2Framework and Method According to Gupta, et. al (2016), for the cloud computing, they can adopt service model which is categorized into three level that is substructure as a service, stage as a service and software as a service. Infrastructure as a service delivers the hardware services to the user. This will be having a responsibility to maintain security which is related to hardware. Platform as a service offers the hardware services with the operating system. In the last one, cloud service providers provide the service related to software to the users. 1.3.3Overview of the Proposed System As states by Subramanian and Munuswamy (2015), it has been evaluated that cloud Computing describes the set of hardware,network, services as well as interfaces which combines to deliver the aspects of computing as a service. It helps business entity in going to the market and assist in reducing the spending of capital because of the cloud’s capability to provision and release the resources on the elasticity of demand. This graph denotes the statistics related to expenditure on cloud computing. This will assist in increasing the investment on cloud. 9
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Figure1: Global Spending Forecast Source: (Subramanian and Munuswamy, 2015) 1.3.4Discussion When the organisations are using service model related to cloud computing then they are facing some issues such as high monetary cost which is included in the cost resources and this will create the disturbance in the budget of the firm. This will assist in delivering the better results and in this, no capital investment is included. 1.4Theory based on inventory applied to cost optimization in Cloud Computing My second paper is based on the theory which is related to inventory and that should be applied by the organisation in the optimization of cost in the cloud computing. Cloud 10
computing assist in delivering the offer with the diversified pricing schemes whether it is reserved as well as on-demand instances. This will assist in fulfilling the demand and assist in minimising the cost. Section 1.4.1 explains about the inventory theory which is applied to cost optimization. Section 1.4.2 tells about the functioning of the model. Section 1.4.3 delivers the values by doing an experiment. Section 1.4.4 offers the outcomes. Section 1.4.5 is related to the conclusion of the different articles. 1.4.1What istheory related to inventory and should be applied in organisation to Cost Optimization in Cloud Computing? In the lights of Nodari, et. al (2016), it has been analysed that inventory theory refers to the branch of operations and this will help in doing proper research and this will provide focus on the scientific management related to inventory. It assists in determining the optimal policies for reducing as well as minimizing the cost while providing satisfaction by fulfilling demand. In the circumstance of cloud computing, the individuals who are making a decision needs to manage the reserved instances portfolio along with the optimisation purchases which aid in satisfying the demand with the minimum cost. 1.4.2Functioning of Inventory Theory Model In the lights of Nodari, et. al (2016), it has been analysed that inventory theory model assists in doing the work which proposes the stochastic model and this will aid in formulating the total cost which is included in satisfying the demand of computing capacity according to random variables. The solution which is based on analysis assist in minimising the cost. If they are using the reversed instances for fulfilling demand then this will include more cost. With the reserved additional on-demand instance is added, then it become more expensive and then they are using inventory model then this will 11
decrease the cost. They have to make assumption according to the observation to be independent. 1.4.3Value Deliverables Above, I mentioned that they are worked on inventory theory model and this will provide differentsolutionsalongwiththediversifiedvalueswhichincludecostreducing, satisfaction and so on. According to Jiang, et. al (2012), it has been analysed that when the organisation is adopting new model then cloud computing enables the users which assist in distributing the virtual resource in the cloud data centre according to the demand. When users are increasing, then this will be declining the performance. It provides the focus on network as well as I/O performance decline because of the image based on the virtual machines and disks. This model assists in sharing the resources which aid in sharing the storage as well as inventory theory. 1.4.4Outcome As per the viewpoint of Nodari, et. al (2016), it has been evaluated that the main goal of the inventory theory model is to authenticate the correctness by using the appropriate and planned model. They have to do effective computation by analysing the value of the optimal number which is related to reserved instances. This will aid in computing or analyse the cost which assists in sustaining the request by boosting the amount of reserved instances and it should be stopped when the cost increases. When organisations are using the extensive empirical tests should be properly performed by using the diversified instance types along with the traces of demand. This will assist in providing the accurate results to the firm that is minimizing the cost and generate more revenue. 12
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
1.4.5Conclusion This paper provides the focus on the implementation and execution of Inventory Theory which is related to Cloud Computing. It is having a potential improvement which includes the discount rate and that should be taken into account which assists in maintaining money as well as time in the model. Along with this, they have to provide the appropriate direction based on research by utilizing and implementing the inventory system. Moreover, they have to take more risk so that maximum profit can be generated. This model assists in working and formulating the optimization problem and it provides the solution by using appropriate programming. 1.5Final Outline of the Literature review Chapter 1. Introduction 2. Cloud Computing 2.1 Vulnerabilities related to cloud computing 2.2 Models based on service related to Cloud Computing 3.Inventory Theory Applied to Cost Optimization in Cloud Computing 3.1 Resource Allocation 3.2 Inventory Theory Model 4. Discussion 5. Conclusion 13
1.6Introduction My topic is Cloud Computing as it is a paradigm which is associated to information technology which enables to access related to the shared pools of system resource which are configured and delivered the higher-level services by putting the minimal efforts which are related to management. In the present time, use of cloud computing is increasing. I searched so many articles related to topics and I select two articles from that which depend on both cloud computing and the theory which is related to inventory to the cost optimization in cloud computing. First article, discussion on cloud computing whereas second paper, examination of inventory theory which help in optimization of cost. Cloud Computing is helpful in improving infrastructure as well as a service platform. Along with this, analytics related to big data and also helpful in file storage are discussed in the paper. 14
List of References Subramanian, S and Munuswamy, D., (2015). Features.ISACA Journal. Volume 3. Nodari, A., Nurminen, J.K and Fruhwirth, C., (2016). Inventory Theory Applied to Cost optimization in Cloud Computing.IEEE Xplore. Dustdar, S., (2016). Cloud Computing.IEEE. 15