NIT6130: Literature Review on Cost Optimization in Cloud Computing
VerifiedAdded on 2024/04/25
|19
|3929
|165
Literature Review
AI Summary
This document presents a literature review focused on cloud computing, starting with a broad scan of research papers and culminating in a focused analysis of key articles. The review covers topics such as cloud computing vulnerabilities, forensic investigation approaches using VM snapshots, and the application of inventory theory for cost optimization. It details the process of selecting and analyzing relevant papers, updating bibliographic files, and developing a final outline for the literature review chapter. The review explores the background of cloud computing, its service models, and the challenges associated with its adoption, including data security, privacy, and cost structure. The document also discusses the potential of inventory theory to optimize costs in cloud computing environments, highlighting its value deliverables and expected outcomes. This assignment examines the role of cloud computing in IT, emphasizing its importance for both individuals and organizations seeking efficient information access, storage, and sharing solutions.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.

NIT6130 INTRODUCTION TO RESEARCH
ASSIGNMENT 2 – LITERATURE REVIEW
ASSIGNMENT 2 – LITERATURE REVIEW
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

Table of Contents
Table of Contents...............................................................................................................................ii
List of Figures...................................................................................................................................iii
List of Tables....................................................................................................................................iv
1.1 Broad Scan...............................................................................................................................1
1.1.1 Research Journal................................................................................................................1
1.1.2 Filing System.....................................................................................................................3
1.1.3 Bibliographic file from broad scan....................................................................................4
1.2 Focused Review.......................................................................................................................6
1.2.1 Updated filing system........................................................................................................6
1.2.2 Updated bibliographic file from focused review................................................................7
1.3 Cloud Computing.....................................................................................................................8
1.3.1 Background.......................................................................................................................9
1.3.2 Framework and Method.....................................................................................................9
1.3.3 Overview of the Proposed System.....................................................................................9
1.3.4 Discussion.......................................................................................................................10
1.4 Theory based on inventory applied to cost optimization in Cloud Computing.......................11
1.4.1 What is theory related to inventory and should be applied in organisation to Cost
Optimization in Cloud Computing?..........................................................................................11
1.4.2 Functioning of Inventory Theory Model.........................................................................11
1.4.3 Value Deliverables..........................................................................................................12
1.4.4 Outcome..........................................................................................................................12
1.4.5 Conclusion.......................................................................................................................13
1.5 Final Outline of the Literature review Chapter.......................................................................13
1.6 Introduction............................................................................................................................14
List of References............................................................................................................................15
ii
Table of Contents...............................................................................................................................ii
List of Figures...................................................................................................................................iii
List of Tables....................................................................................................................................iv
1.1 Broad Scan...............................................................................................................................1
1.1.1 Research Journal................................................................................................................1
1.1.2 Filing System.....................................................................................................................3
1.1.3 Bibliographic file from broad scan....................................................................................4
1.2 Focused Review.......................................................................................................................6
1.2.1 Updated filing system........................................................................................................6
1.2.2 Updated bibliographic file from focused review................................................................7
1.3 Cloud Computing.....................................................................................................................8
1.3.1 Background.......................................................................................................................9
1.3.2 Framework and Method.....................................................................................................9
1.3.3 Overview of the Proposed System.....................................................................................9
1.3.4 Discussion.......................................................................................................................10
1.4 Theory based on inventory applied to cost optimization in Cloud Computing.......................11
1.4.1 What is theory related to inventory and should be applied in organisation to Cost
Optimization in Cloud Computing?..........................................................................................11
1.4.2 Functioning of Inventory Theory Model.........................................................................11
1.4.3 Value Deliverables..........................................................................................................12
1.4.4 Outcome..........................................................................................................................12
1.4.5 Conclusion.......................................................................................................................13
1.5 Final Outline of the Literature review Chapter.......................................................................13
1.6 Introduction............................................................................................................................14
List of References............................................................................................................................15
ii

List of Figures
Figure 1: Global Spending Forecast....................................................................................10
iii
Figure 1: Global Spending Forecast....................................................................................10
iii

List of Tables
Table 1: Research Journal Tasks...........................................................................................1
Table 2: Table of Filling System.............................................................................................3
Table 3: Updated Filling System............................................................................................7
iv
Table 1: Research Journal Tasks...........................................................................................1
Table 2: Table of Filling System.............................................................................................3
Table 3: Updated Filling System............................................................................................7
iv
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

CHAPTER 1
LITERATURE REVIEW
In the present assignment, literature review is to be written on the topic “Cloud
Computing”. I am analysing and investigating the two papers which depends on cloud
computing. I am selecting two diversified papers, first one is demonstrating the
vulnerabilities which are related to Cloud Computing. In the second paper, I am
evaluating the efficient approach which is related to the forensic investigation in Cloud
Computing by adopting VM snapshots and this is more reliable. This literature review is
starting from the beginning and it includes some steps which they have to follow:
Segment 1.1 is identified with expansive sweep and in this, I talk about my exploration
papers, a gathering of research articles and in addition a list of sources of all papers. Area
1.2 is relying upon the engaged output and in this, I channel my exploration and discover
more papers which are significant with the subject. At that point, after this, I again
refreshed the book index. Area 1.3 and 1.4 depend on writing Review where I chose and
broke down the two papers. Area 1.5 gives the layout of the section which is identified
with Literature Review. Last, Section 1.6 is the Introduction of my point.
1.1 Broad Scan
In Broad Scan I have chosen my theme by doing research on the Internet by utilizing
enhanced catchphrases. I sought point on the distinctive stage, for example, VU library,
IEEE and also Google Scholar. I discovered such a large number of papers and select
twenty-five from them for the following level.
1.1.1 Research Journal
Table 1: Research Journal Tasks
Date Task Action Comment
15/01/2018 Topic search Choose appropriate Selected one topic
1
LITERATURE REVIEW
In the present assignment, literature review is to be written on the topic “Cloud
Computing”. I am analysing and investigating the two papers which depends on cloud
computing. I am selecting two diversified papers, first one is demonstrating the
vulnerabilities which are related to Cloud Computing. In the second paper, I am
evaluating the efficient approach which is related to the forensic investigation in Cloud
Computing by adopting VM snapshots and this is more reliable. This literature review is
starting from the beginning and it includes some steps which they have to follow:
Segment 1.1 is identified with expansive sweep and in this, I talk about my exploration
papers, a gathering of research articles and in addition a list of sources of all papers. Area
1.2 is relying upon the engaged output and in this, I channel my exploration and discover
more papers which are significant with the subject. At that point, after this, I again
refreshed the book index. Area 1.3 and 1.4 depend on writing Review where I chose and
broke down the two papers. Area 1.5 gives the layout of the section which is identified
with Literature Review. Last, Section 1.6 is the Introduction of my point.
1.1 Broad Scan
In Broad Scan I have chosen my theme by doing research on the Internet by utilizing
enhanced catchphrases. I sought point on the distinctive stage, for example, VU library,
IEEE and also Google Scholar. I discovered such a large number of papers and select
twenty-five from them for the following level.
1.1.1 Research Journal
Table 1: Research Journal Tasks
Date Task Action Comment
15/01/2018 Topic search Choose appropriate Selected one topic
1

topic
16/01/2018 Identify papers on
the different
sources which
include IEEE, VU
Library and etc.
Read those papers
and save some of
them.
Make a folder and
save the work
which is related to
that topic.
18/01/2018 Literature Review After collection of
paper, read them.
Found best topic to
do research.
20/01/2018 Literature Review Read another two
more papers
Not properly
relevant to the
research. Discard
them.
23/01/2018 4 final documents
should select
All papers should
read in a proper
manner.
Select two for the
final examination.
24/01/2018 Start Assignment Started citations
related to topic
Insert the citations.
25/01/2018 Start assignment
from reviewing first
paper.
Read all the papers. Put some comments
in LR section.
27/01/2018 Reading of paper Prepare notes
related to the topic.
Put them into our
own words.
28/01/2018 Analyse and
examine of second
paper
Read all the papers. Picked some
important work and
analyse them.
1/02/2018 Analysing and
written down some
articles
Some data written
down from the two
articles.
Fill all fields and
prepare assignment.
2
16/01/2018 Identify papers on
the different
sources which
include IEEE, VU
Library and etc.
Read those papers
and save some of
them.
Make a folder and
save the work
which is related to
that topic.
18/01/2018 Literature Review After collection of
paper, read them.
Found best topic to
do research.
20/01/2018 Literature Review Read another two
more papers
Not properly
relevant to the
research. Discard
them.
23/01/2018 4 final documents
should select
All papers should
read in a proper
manner.
Select two for the
final examination.
24/01/2018 Start Assignment Started citations
related to topic
Insert the citations.
25/01/2018 Start assignment
from reviewing first
paper.
Read all the papers. Put some comments
in LR section.
27/01/2018 Reading of paper Prepare notes
related to the topic.
Put them into our
own words.
28/01/2018 Analyse and
examine of second
paper
Read all the papers. Picked some
important work and
analyse them.
1/02/2018 Analysing and
written down some
articles
Some data written
down from the two
articles.
Fill all fields and
prepare assignment.
2

1.1.2 Filing System
Table 2: Table of Filling System
Source Keyword use No. of returned
Literature
No. of Collected
Literature
Scholar Cloud Computing
Use of Cloud
Computing
1000
2000
5
6
VU Library Cloud Computing
Appropriate
strategies and
theories
6000
500
4
5
IEEE Theories based on
inventory and that
should be applied
on cost optimization
in the cloud
computing
3000 5
1.1.3 Bibliographic file from broad scan
Jiang, Q., Feng, W., Peng, J., Han, F., Li, Q., Zhang, W and Su, H. (2012). Inventory -
Based Resource Management in Cloud Computing. IEEE Xplore.
Gupta, K., Beri, R and Behal, V. (2016). Cloud Computing: A survey on Cloud
Simulation Tools. International Journal for Innovative Research in Science and
Technology. Vol. 2, Issue 11.
3
Table 2: Table of Filling System
Source Keyword use No. of returned
Literature
No. of Collected
Literature
Scholar Cloud Computing
Use of Cloud
Computing
1000
2000
5
6
VU Library Cloud Computing
Appropriate
strategies and
theories
6000
500
4
5
IEEE Theories based on
inventory and that
should be applied
on cost optimization
in the cloud
computing
3000 5
1.1.3 Bibliographic file from broad scan
Jiang, Q., Feng, W., Peng, J., Han, F., Li, Q., Zhang, W and Su, H. (2012). Inventory -
Based Resource Management in Cloud Computing. IEEE Xplore.
Gupta, K., Beri, R and Behal, V. (2016). Cloud Computing: A survey on Cloud
Simulation Tools. International Journal for Innovative Research in Science and
Technology. Vol. 2, Issue 11.
3
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Rani, D. R., Geethakumari, G. (2015). An Efficient Approach to Forensic investigation in
Cloud using VM Snapshots. International Conference on Pervasive Computing.
Subramanian, S and Munuswamy, D. (2015). Features. ISACA Journal. Volume 3.
Nodari, A., Nurminen, J.K and Fruhwirth, C. (2016). Inventory Theory Applied to Cost
optimization in Cloud Computing. IEEE Xplore.
Dustdar, S. (2016). Cloud Computing. IEEE.
Sanaei, Z., Abolfazli, S., Gani, A. and Buyya, R. (2014). Heterogeneity in mobile cloud
computing: taxonomy and open challenges. IEEE Communications Surveys &
Tutorials, 16(1), pp.369-392.
Botta, A., De Donato, W., Persico, V. and Pescapé, A. (2016). Integration of cloud
computing and internet of things: a survey. Future Generation Computer Systems, 56,
pp.684-700.
Oliveira, T., Thomas, M. and Espadanal, M. (2014). Assessing the determinants of cloud
computing adoption: An analysis of the manufacturing and services sectors. Information
& Management, 51(5), pp.497-510.
Garrison, G., Wakefield, R.L. and Kim, S. (2015). The effects of IT capabilities and
delivery model on cloud computing success and firm performance for cloud supported
processes and operations. International Journal of Information Management, 35(4),
pp.377-393.
Ratten, V. (2016). Continuance use intention of cloud computing: innovativeness and
creativity perspectives. Journal of Business Research, 69(5), pp.1737-1740.
Zhang, H., Jiang, H., Li, B., Liu, F., Vasilakos, A.V. and Liu, J., (2016). A framework for
truthful online auctions in cloud computing with heterogeneous user demands. IEEE
Transactions on Computers, 65(3), pp.805-818.
4
Cloud using VM Snapshots. International Conference on Pervasive Computing.
Subramanian, S and Munuswamy, D. (2015). Features. ISACA Journal. Volume 3.
Nodari, A., Nurminen, J.K and Fruhwirth, C. (2016). Inventory Theory Applied to Cost
optimization in Cloud Computing. IEEE Xplore.
Dustdar, S. (2016). Cloud Computing. IEEE.
Sanaei, Z., Abolfazli, S., Gani, A. and Buyya, R. (2014). Heterogeneity in mobile cloud
computing: taxonomy and open challenges. IEEE Communications Surveys &
Tutorials, 16(1), pp.369-392.
Botta, A., De Donato, W., Persico, V. and Pescapé, A. (2016). Integration of cloud
computing and internet of things: a survey. Future Generation Computer Systems, 56,
pp.684-700.
Oliveira, T., Thomas, M. and Espadanal, M. (2014). Assessing the determinants of cloud
computing adoption: An analysis of the manufacturing and services sectors. Information
& Management, 51(5), pp.497-510.
Garrison, G., Wakefield, R.L. and Kim, S. (2015). The effects of IT capabilities and
delivery model on cloud computing success and firm performance for cloud supported
processes and operations. International Journal of Information Management, 35(4),
pp.377-393.
Ratten, V. (2016). Continuance use intention of cloud computing: innovativeness and
creativity perspectives. Journal of Business Research, 69(5), pp.1737-1740.
Zhang, H., Jiang, H., Li, B., Liu, F., Vasilakos, A.V. and Liu, J., (2016). A framework for
truthful online auctions in cloud computing with heterogeneous user demands. IEEE
Transactions on Computers, 65(3), pp.805-818.
4

Zhan, Z.H., Liu, X.F., Gong, Y.J., Zhang, J., Chung, H.S.H. and Li, Y. (2015). Cloud
computing resource scheduling and a survey of its evolutionary approaches. ACM
Computing Surveys (CSUR), 47(4), p.63.
Li, J., Li, J., Chen, X., Jia, C. and Lou, W. (2015). Identity-based encryption with
outsourced revocation in cloud computing. Ieee Transactions on computers, 64(2),
pp.425-437.
Bera, S., Misra, S. and Rodrigues, J.J. (2015). Cloud computing applications for smart
grid: A survey. IEEE Transactions on Parallel and Distributed Systems, 26(5), pp.1477-
1494.
Wang, B., Zheng, Y., Lou, W., & Hou, Y. T. (2015). DDoS attack protection in the era of
cloud computing and software-defined networking. Computer Networks, 81, 308-319.
Manvi, S. S., & Shyam, G. K. (2014). Resource management for Infrastructure as a
Service (IaaS) in cloud computing: A survey. Journal of Network and Computer
Applications, 41, 424-440.
Aazam, M., Khan, I., Alsaffar, A. A., & Huh, E. N. (2014, January). Cloud of Things:
Integrating Internet of Things and cloud computing and the issues involved. In Applied
Sciences and Technology (IBCAST), 2014 11th International Bhurban Conference
on (pp. 414-419). IEEE.
Ahmed, E., Gani, A., Khan, M. K., Buyya, R., & Khan, S. U. (2015). Seamless
application execution in mobile cloud computing: Motivation, taxonomy, and open
challenges. Journal of Network and Computer Applications, 52, 154-172.
Sharma, A. K., & Jha, R. K. (2015). Cloud Computing. Expansion, Impact and
Challenges of IT & CS, 103.
Chang, V., Kuo, Y.H. and Ramachandran, M., 2016. Cloud computing adoption
framework: A security framework for business clouds. Future Generation Computer
Systems, 57, pp.24-41.
5
computing resource scheduling and a survey of its evolutionary approaches. ACM
Computing Surveys (CSUR), 47(4), p.63.
Li, J., Li, J., Chen, X., Jia, C. and Lou, W. (2015). Identity-based encryption with
outsourced revocation in cloud computing. Ieee Transactions on computers, 64(2),
pp.425-437.
Bera, S., Misra, S. and Rodrigues, J.J. (2015). Cloud computing applications for smart
grid: A survey. IEEE Transactions on Parallel and Distributed Systems, 26(5), pp.1477-
1494.
Wang, B., Zheng, Y., Lou, W., & Hou, Y. T. (2015). DDoS attack protection in the era of
cloud computing and software-defined networking. Computer Networks, 81, 308-319.
Manvi, S. S., & Shyam, G. K. (2014). Resource management for Infrastructure as a
Service (IaaS) in cloud computing: A survey. Journal of Network and Computer
Applications, 41, 424-440.
Aazam, M., Khan, I., Alsaffar, A. A., & Huh, E. N. (2014, January). Cloud of Things:
Integrating Internet of Things and cloud computing and the issues involved. In Applied
Sciences and Technology (IBCAST), 2014 11th International Bhurban Conference
on (pp. 414-419). IEEE.
Ahmed, E., Gani, A., Khan, M. K., Buyya, R., & Khan, S. U. (2015). Seamless
application execution in mobile cloud computing: Motivation, taxonomy, and open
challenges. Journal of Network and Computer Applications, 52, 154-172.
Sharma, A. K., & Jha, R. K. (2015). Cloud Computing. Expansion, Impact and
Challenges of IT & CS, 103.
Chang, V., Kuo, Y.H. and Ramachandran, M., 2016. Cloud computing adoption
framework: A security framework for business clouds. Future Generation Computer
Systems, 57, pp.24-41.
5

Tao, F., Cheng, Y., Da Xu, L., Zhang, L., & Li, B. H. (2014). CCIoT-CMfg: cloud
computing and internet of things-based cloud manufacturing service system. IEEE
Transactions on Industrial Informatics, 10(2), 1435-1442.
Hashem, I. A. T., Yaqoob, I., Anuar, N. B., Mokhtar, S., Gani, A., & Khan, S. U. (2015).
The rise of “big data” on cloud computing: Review and open research issues. Information
Systems, 47, 98-115.
Wang, W., Li, B., & Liang, B. (2014, April). Dominant resource fairness in cloud
computing systems with heterogeneous servers. In INFOCOM, 2014 Proceedings
IEEE (pp. 583-591). IEEE.
Bruneo, D. (2014). A stochastic model to investigate data center performance and QoS in
IaaS cloud computing systems. IEEE Transactions on Parallel and Distributed
Systems, 25(3), 560-569.
1.2 Focused Review
I have selected two main articles on the topic “Cloud Computing” from the 10 articles
and these are helpful for me in doing proper and effective research.
1.2.1 Updated filing system
The below table contains the efficient as well as updated filling system:
Table 3: Updated Filling System
Source Keyword use No. of returned
Literature
No. of Collected
Literature
Scholar Cloud Computing
Use of Cloud
Computing
1000
2000
3
3
VU Library Cloud Computing 6000 2
6
computing and internet of things-based cloud manufacturing service system. IEEE
Transactions on Industrial Informatics, 10(2), 1435-1442.
Hashem, I. A. T., Yaqoob, I., Anuar, N. B., Mokhtar, S., Gani, A., & Khan, S. U. (2015).
The rise of “big data” on cloud computing: Review and open research issues. Information
Systems, 47, 98-115.
Wang, W., Li, B., & Liang, B. (2014, April). Dominant resource fairness in cloud
computing systems with heterogeneous servers. In INFOCOM, 2014 Proceedings
IEEE (pp. 583-591). IEEE.
Bruneo, D. (2014). A stochastic model to investigate data center performance and QoS in
IaaS cloud computing systems. IEEE Transactions on Parallel and Distributed
Systems, 25(3), 560-569.
1.2 Focused Review
I have selected two main articles on the topic “Cloud Computing” from the 10 articles
and these are helpful for me in doing proper and effective research.
1.2.1 Updated filing system
The below table contains the efficient as well as updated filling system:
Table 3: Updated Filling System
Source Keyword use No. of returned
Literature
No. of Collected
Literature
Scholar Cloud Computing
Use of Cloud
Computing
1000
2000
3
3
VU Library Cloud Computing 6000 2
6
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

Appropriate
strategies and
theories
500
1
IEEE Inventory theory
which applied to
cost optimization in
cloud computing
3000 1
1.2.2 Updated bibliographic file from focused review
Jiang, Q., Feng, W., Peng, J., Han, F., Li, Q., Zhang, W and Su, H. (2012). Inventory-
Based Resource Management in Cloud Computing. IEEE Xplore.
Gupta, K., Beri, R and Behal, V. (2016). Cloud Computing: A survey on Cloud
Simulation Tools. International Journal for Innovative Research in Science and
Technology. Vol. 2, Issue 11.
Rani, D. R., Geethakumari, G. (2015). An Efficient Approach to Forensic investigation in
Cloud using VM Snapshots. International Conference on Pervasive Computing.
Subramanian, S and Munuswamy, D. (2015). Features. ISACA Journal. Volume 3.
Nodari, A., Nurminen, J.K and Fruhwirth, C. (2016). Inventory Theory Applied to Cost
optimization in Cloud Computing. IEEE Xplore.
Dustdar, S. (2016). Cloud Computing. IEEE.
Sanaei, Z., Abolfazli, S., Gani, A. and Buyya, R. (2014). Heterogeneity in mobile cloud
computing: taxonomy and open challenges. IEEE Communications Surveys &
Tutorials, 16(1), pp.369-392.
7
strategies and
theories
500
1
IEEE Inventory theory
which applied to
cost optimization in
cloud computing
3000 1
1.2.2 Updated bibliographic file from focused review
Jiang, Q., Feng, W., Peng, J., Han, F., Li, Q., Zhang, W and Su, H. (2012). Inventory-
Based Resource Management in Cloud Computing. IEEE Xplore.
Gupta, K., Beri, R and Behal, V. (2016). Cloud Computing: A survey on Cloud
Simulation Tools. International Journal for Innovative Research in Science and
Technology. Vol. 2, Issue 11.
Rani, D. R., Geethakumari, G. (2015). An Efficient Approach to Forensic investigation in
Cloud using VM Snapshots. International Conference on Pervasive Computing.
Subramanian, S and Munuswamy, D. (2015). Features. ISACA Journal. Volume 3.
Nodari, A., Nurminen, J.K and Fruhwirth, C. (2016). Inventory Theory Applied to Cost
optimization in Cloud Computing. IEEE Xplore.
Dustdar, S. (2016). Cloud Computing. IEEE.
Sanaei, Z., Abolfazli, S., Gani, A. and Buyya, R. (2014). Heterogeneity in mobile cloud
computing: taxonomy and open challenges. IEEE Communications Surveys &
Tutorials, 16(1), pp.369-392.
7

Botta, A., De Donato, W., Persico, V. and Pescapé, A. (2016). Integration of cloud
computing and internet of things: a survey. Future Generation Computer Systems, 56,
pp.684-700.
Oliveira, T., Thomas, M. and Espadanal, M. (2014). Assessing the determinants of cloud
computing adoption: An analysis of the manufacturing and services sectors. Information
& Management, 51(5), pp.497-510.
Garrison, G., Wakefield, R.L. and Kim, S. (2015). The effects of IT capabilities and
delivery model on cloud computing success and firm performance for cloud supported
processes and operations. International Journal of Information Management, 35(4),
pp.377-393.
1.3 Cloud Computing
According to Grobauer, et. al (2016), it has been analysed that cloud computing
demonstrate the essential role in IT sector for the both individual and organisations from
the appropriate way so that they can properly access, store along with the sharing
information. For the experiment, they have to above some vulnerabilities which are
related to cloud computing. Along with this, they have to adopt appropriate service model
which are related to cloud computing. Section 1.3.1 provides the lights on the background
of the topic. This includes the vulnerabilities and service model which are related to
cloud computing. Section 1.3.2 shows the appropriate outline by which they investigated.
Section 1.3.3 provides the indication of service model which is related to cloud
computing. Section 1.3.4 is the discussion part and in this pros and cons related to the
topic.
8
computing and internet of things: a survey. Future Generation Computer Systems, 56,
pp.684-700.
Oliveira, T., Thomas, M. and Espadanal, M. (2014). Assessing the determinants of cloud
computing adoption: An analysis of the manufacturing and services sectors. Information
& Management, 51(5), pp.497-510.
Garrison, G., Wakefield, R.L. and Kim, S. (2015). The effects of IT capabilities and
delivery model on cloud computing success and firm performance for cloud supported
processes and operations. International Journal of Information Management, 35(4),
pp.377-393.
1.3 Cloud Computing
According to Grobauer, et. al (2016), it has been analysed that cloud computing
demonstrate the essential role in IT sector for the both individual and organisations from
the appropriate way so that they can properly access, store along with the sharing
information. For the experiment, they have to above some vulnerabilities which are
related to cloud computing. Along with this, they have to adopt appropriate service model
which are related to cloud computing. Section 1.3.1 provides the lights on the background
of the topic. This includes the vulnerabilities and service model which are related to
cloud computing. Section 1.3.2 shows the appropriate outline by which they investigated.
Section 1.3.3 provides the indication of service model which is related to cloud
computing. Section 1.3.4 is the discussion part and in this pros and cons related to the
topic.
8

1.3.1 Background
In the lights of Dustdar (2016), it has been analysed that cloud computing is essential in
IT sector for both individuals and enterprises. As the paradigm related to cloud
computing has matured, then this will assist in expanding the research so that they can
include all the aspects related to the distribution system which include management,
deployment, networking storage along with the resources which are associated with
computing. They have to provide a proper overview related to current efforts so that
analyse the proper potential of implementing the technology related to cloud computing
as well as address some challenges while adoption includes the over the loss of control,
data security and privacy as well as cost structure which is unpredictable in nature.
1.3.2 Framework and Method
According to Gupta, et. al (2016), for the cloud computing, they can adopt service model
which is categorized into three level that is substructure as a service, stage as a service
and software as a service. Infrastructure as a service delivers the hardware services to the
user. This will be having a responsibility to maintain security which is related to
hardware. Platform as a service offers the hardware services with the operating system. In
the last one, cloud service providers provide the service related to software to the users.
1.3.3 Overview of the Proposed System
As states by Subramanian and Munuswamy (2015), it has been evaluated that cloud
Computing describes the set of hardware, network, services as well as interfaces which
combines to deliver the aspects of computing as a service. It helps business entity in
going to the market and assist in reducing the spending of capital because of the cloud’s
capability to provision and release the resources on the elasticity of demand. This graph
denotes the statistics related to expenditure on cloud computing. This will assist in
increasing the investment on cloud.
9
In the lights of Dustdar (2016), it has been analysed that cloud computing is essential in
IT sector for both individuals and enterprises. As the paradigm related to cloud
computing has matured, then this will assist in expanding the research so that they can
include all the aspects related to the distribution system which include management,
deployment, networking storage along with the resources which are associated with
computing. They have to provide a proper overview related to current efforts so that
analyse the proper potential of implementing the technology related to cloud computing
as well as address some challenges while adoption includes the over the loss of control,
data security and privacy as well as cost structure which is unpredictable in nature.
1.3.2 Framework and Method
According to Gupta, et. al (2016), for the cloud computing, they can adopt service model
which is categorized into three level that is substructure as a service, stage as a service
and software as a service. Infrastructure as a service delivers the hardware services to the
user. This will be having a responsibility to maintain security which is related to
hardware. Platform as a service offers the hardware services with the operating system. In
the last one, cloud service providers provide the service related to software to the users.
1.3.3 Overview of the Proposed System
As states by Subramanian and Munuswamy (2015), it has been evaluated that cloud
Computing describes the set of hardware, network, services as well as interfaces which
combines to deliver the aspects of computing as a service. It helps business entity in
going to the market and assist in reducing the spending of capital because of the cloud’s
capability to provision and release the resources on the elasticity of demand. This graph
denotes the statistics related to expenditure on cloud computing. This will assist in
increasing the investment on cloud.
9
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Figure 1: Global Spending Forecast
Source: (Subramanian and Munuswamy, 2015)
1.3.4 Discussion
When the organisations are using service model related to cloud computing then they are
facing some issues such as high monetary cost which is included in the cost resources and
this will create the disturbance in the budget of the firm. This will assist in delivering the
better results and in this, no capital investment is included.
1.4 Theory based on inventory applied to cost optimization in Cloud Computing
My second paper is based on the theory which is related to inventory and that should be
applied by the organisation in the optimization of cost in the cloud computing. Cloud
10
Source: (Subramanian and Munuswamy, 2015)
1.3.4 Discussion
When the organisations are using service model related to cloud computing then they are
facing some issues such as high monetary cost which is included in the cost resources and
this will create the disturbance in the budget of the firm. This will assist in delivering the
better results and in this, no capital investment is included.
1.4 Theory based on inventory applied to cost optimization in Cloud Computing
My second paper is based on the theory which is related to inventory and that should be
applied by the organisation in the optimization of cost in the cloud computing. Cloud
10

computing assist in delivering the offer with the diversified pricing schemes whether it is
reserved as well as on-demand instances. This will assist in fulfilling the demand and
assist in minimising the cost.
Section 1.4.1 explains about the inventory theory which is applied to cost optimization.
Section 1.4.2 tells about the functioning of the model. Section 1.4.3 delivers the values by
doing an experiment. Section 1.4.4 offers the outcomes. Section 1.4.5 is related to the
conclusion of the different articles.
1.4.1 What is theory related to inventory and should be applied in organisation to
Cost Optimization in Cloud Computing?
In the lights of Nodari, et. al (2016), it has been analysed that inventory theory refers to
the branch of operations and this will help in doing proper research and this will provide
focus on the scientific management related to inventory. It assists in determining the
optimal policies for reducing as well as minimizing the cost while providing satisfaction
by fulfilling demand. In the circumstance of cloud computing, the individuals who are
making a decision needs to manage the reserved instances portfolio along with the
optimisation purchases which aid in satisfying the demand with the minimum cost.
1.4.2 Functioning of Inventory Theory Model
In the lights of Nodari, et. al (2016), it has been analysed that inventory theory model
assists in doing the work which proposes the stochastic model and this will aid in
formulating the total cost which is included in satisfying the demand of computing
capacity according to random variables. The solution which is based on analysis assist in
minimising the cost. If they are using the reversed instances for fulfilling demand then
this will include more cost. With the reserved additional on-demand instance is added,
then it become more expensive and then they are using inventory model then this will
11
reserved as well as on-demand instances. This will assist in fulfilling the demand and
assist in minimising the cost.
Section 1.4.1 explains about the inventory theory which is applied to cost optimization.
Section 1.4.2 tells about the functioning of the model. Section 1.4.3 delivers the values by
doing an experiment. Section 1.4.4 offers the outcomes. Section 1.4.5 is related to the
conclusion of the different articles.
1.4.1 What is theory related to inventory and should be applied in organisation to
Cost Optimization in Cloud Computing?
In the lights of Nodari, et. al (2016), it has been analysed that inventory theory refers to
the branch of operations and this will help in doing proper research and this will provide
focus on the scientific management related to inventory. It assists in determining the
optimal policies for reducing as well as minimizing the cost while providing satisfaction
by fulfilling demand. In the circumstance of cloud computing, the individuals who are
making a decision needs to manage the reserved instances portfolio along with the
optimisation purchases which aid in satisfying the demand with the minimum cost.
1.4.2 Functioning of Inventory Theory Model
In the lights of Nodari, et. al (2016), it has been analysed that inventory theory model
assists in doing the work which proposes the stochastic model and this will aid in
formulating the total cost which is included in satisfying the demand of computing
capacity according to random variables. The solution which is based on analysis assist in
minimising the cost. If they are using the reversed instances for fulfilling demand then
this will include more cost. With the reserved additional on-demand instance is added,
then it become more expensive and then they are using inventory model then this will
11

decrease the cost. They have to make assumption according to the observation to be
independent.
1.4.3 Value Deliverables
Above, I mentioned that they are worked on inventory theory model and this will provide
different solutions along with the diversified values which include cost reducing,
satisfaction and so on. According to Jiang, et. al (2012), it has been analysed that when
the organisation is adopting new model then cloud computing enables the users which
assist in distributing the virtual resource in the cloud data centre according to the demand.
When users are increasing, then this will be declining the performance. It provides the
focus on network as well as I/O performance decline because of the image based on the
virtual machines and disks. This model assists in sharing the resources which aid in
sharing the storage as well as inventory theory.
1.4.4 Outcome
As per the viewpoint of Nodari, et. al (2016), it has been evaluated that the main goal of
the inventory theory model is to authenticate the correctness by using the appropriate and
planned model. They have to do effective computation by analysing the value of the
optimal number which is related to reserved instances. This will aid in computing or
analyse the cost which assists in sustaining the request by boosting the amount of
reserved instances and it should be stopped when the cost increases. When organisations
are using the extensive empirical tests should be properly performed by using the
diversified instance types along with the traces of demand. This will assist in providing
the accurate results to the firm that is minimizing the cost and generate more revenue.
12
independent.
1.4.3 Value Deliverables
Above, I mentioned that they are worked on inventory theory model and this will provide
different solutions along with the diversified values which include cost reducing,
satisfaction and so on. According to Jiang, et. al (2012), it has been analysed that when
the organisation is adopting new model then cloud computing enables the users which
assist in distributing the virtual resource in the cloud data centre according to the demand.
When users are increasing, then this will be declining the performance. It provides the
focus on network as well as I/O performance decline because of the image based on the
virtual machines and disks. This model assists in sharing the resources which aid in
sharing the storage as well as inventory theory.
1.4.4 Outcome
As per the viewpoint of Nodari, et. al (2016), it has been evaluated that the main goal of
the inventory theory model is to authenticate the correctness by using the appropriate and
planned model. They have to do effective computation by analysing the value of the
optimal number which is related to reserved instances. This will aid in computing or
analyse the cost which assists in sustaining the request by boosting the amount of
reserved instances and it should be stopped when the cost increases. When organisations
are using the extensive empirical tests should be properly performed by using the
diversified instance types along with the traces of demand. This will assist in providing
the accurate results to the firm that is minimizing the cost and generate more revenue.
12
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

1.4.5 Conclusion
This paper provides the focus on the implementation and execution of Inventory Theory
which is related to Cloud Computing. It is having a potential improvement which
includes the discount rate and that should be taken into account which assists in
maintaining money as well as time in the model. Along with this, they have to provide
the appropriate direction based on research by utilizing and implementing the inventory
system. Moreover, they have to take more risk so that maximum profit can be generated.
This model assists in working and formulating the optimization problem and it provides
the solution by using appropriate programming.
1.5 Final Outline of the Literature review Chapter
1. Introduction
2. Cloud Computing
2.1 Vulnerabilities related to cloud computing
2.2 Models based on service related to Cloud Computing
3. Inventory Theory Applied to Cost Optimization in Cloud Computing
3.1 Resource Allocation
3.2 Inventory Theory Model
4. Discussion
5. Conclusion
13
This paper provides the focus on the implementation and execution of Inventory Theory
which is related to Cloud Computing. It is having a potential improvement which
includes the discount rate and that should be taken into account which assists in
maintaining money as well as time in the model. Along with this, they have to provide
the appropriate direction based on research by utilizing and implementing the inventory
system. Moreover, they have to take more risk so that maximum profit can be generated.
This model assists in working and formulating the optimization problem and it provides
the solution by using appropriate programming.
1.5 Final Outline of the Literature review Chapter
1. Introduction
2. Cloud Computing
2.1 Vulnerabilities related to cloud computing
2.2 Models based on service related to Cloud Computing
3. Inventory Theory Applied to Cost Optimization in Cloud Computing
3.1 Resource Allocation
3.2 Inventory Theory Model
4. Discussion
5. Conclusion
13

1.6 Introduction
My topic is Cloud Computing as it is a paradigm which is associated to information
technology which enables to access related to the shared pools of system resource which
are configured and delivered the higher-level services by putting the minimal efforts
which are related to management. In the present time, use of cloud computing is
increasing. I searched so many articles related to topics and I select two articles from that
which depend on both cloud computing and the theory which is related to inventory to
the cost optimization in cloud computing. First article, discussion on cloud computing
whereas second paper, examination of inventory theory which help in optimization of
cost. Cloud Computing is helpful in improving infrastructure as well as a service
platform. Along with this, analytics related to big data and also helpful in file storage are
discussed in the paper.
14
My topic is Cloud Computing as it is a paradigm which is associated to information
technology which enables to access related to the shared pools of system resource which
are configured and delivered the higher-level services by putting the minimal efforts
which are related to management. In the present time, use of cloud computing is
increasing. I searched so many articles related to topics and I select two articles from that
which depend on both cloud computing and the theory which is related to inventory to
the cost optimization in cloud computing. First article, discussion on cloud computing
whereas second paper, examination of inventory theory which help in optimization of
cost. Cloud Computing is helpful in improving infrastructure as well as a service
platform. Along with this, analytics related to big data and also helpful in file storage are
discussed in the paper.
14

List of References
Subramanian, S and Munuswamy, D., (2015). Features. ISACA Journal. Volume 3.
Nodari, A., Nurminen, J.K and Fruhwirth, C., (2016). Inventory Theory Applied to Cost
optimization in Cloud Computing. IEEE Xplore.
Dustdar, S., (2016). Cloud Computing. IEEE.
15
Subramanian, S and Munuswamy, D., (2015). Features. ISACA Journal. Volume 3.
Nodari, A., Nurminen, J.K and Fruhwirth, C., (2016). Inventory Theory Applied to Cost
optimization in Cloud Computing. IEEE Xplore.
Dustdar, S., (2016). Cloud Computing. IEEE.
15
1 out of 19
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.