Get Instant Help From 5000+ Experts For
question

Writing: Get your essay and assignment written from scratch by PhD expert

Rewriting: Paraphrase or rewrite your friend's essay with similar meaning at reduced cost

Editing:Proofread your work by experts and improve grade at Lowest cost

And Improve Your Grades
myassignmenthelp.com
loader
Phone no. Missing!

Enter phone no. to receive critical updates and urgent messages !

Attach file

Error goes here

Files Missing!

Please upload all relevant files for quick & complete assistance.

Guaranteed Higher Grade!
Free Quote
wave
Annotated Bibliography

Almorsy, M., Grundy, J. and Müller, I., 2016. An analysis of the cloud computing security problem. arXiv preprint arXiv:1609.01107.

This research paper published in the year of 2016 by Mohamed Almorsy, John Grundy and Ingo Muller focuses on the security issues of the cloud computing solutions. The aim of the research paper was to analyze and reveal various security issues in the cloud computing solutions which might compromise the sensitive information handled by the cloud computing solutions. The research involved various qualitative and quantitative analysis activities in order to determine the significance of various security issues and their effects on the data processed by the cloud computing solutions. The scope of the research was solely the security issues associated with the cloud computing solutions and their possible implications, which in turn compromise the business processes of the organizations. The biggest limitation of referring this research article in the review in hand is that the research focuses only on the security aspects of cloud computing solutions, but not all the aspects. However the usage of this article allows the literature review to cover a unique aspect of the cloud computing system, which is very important in real-world scenarios (Almorsy, 2016).

Dinh, H.T., Lee, C., Niyato, D. and Wang, P., 2013. A survey of mobile cloud computing: architecture, applications, and approaches. Wireless communications and mobile computing, 13(18), pp.1587-1611.

This research article was published in ‘Wireless communications and mobile computing’ journal in the year of 2013 by ‘Wiley Online Library’ publisher. The authors of the article are Hoang T Dinh and Chonho Lee and Dusit Niyato and Ping Wang. This article focuses on the analysis of the mobile cloud computing technologies and architectures along with the way in which these have been gaining popularity among the intense increase in the number of smartphone users. This research article aims at understanding the current market of the mobile cloud computing technologies and capabilities along with the various applications and approaches that are trying to leverage these technologies. The research method in this research article is a survey focusing on the mobile cloud computing technologies. The scope of the research is the analysis of the mobile cloud computing technologies along with the potential capabilities of such technologies. The article gives a brief overview of how mobile cloud computing can be used in the current society along with the various approaches to the cloud computing applications. This article doesn’t focus on the cloud computing technologies across all platforms and confines itself in the wireless communication and mobile computing platforms (Dinh, 2013).

Analysis of Cloud Computing Security Problem

Fernando, N., Loke, S.W. and Rahayu, W., 2013. Mobile cloud computing: A survey. Future generation computer systems, 29(1), pp.84-106.

This research article ‘Mobile cloud computing: A survey’ was published in the journal ‘Future generation computer systems’ in the year of 2013 under the publisher ‘Elsevier’. The authors Niroshinie Fernando, Seng W Loke and Wenny Rahayu analyzed the mobile computing technologies and their implementation in this research paper. The research paper aims at providing more knowledge on the current mobile computing technologies and applications along with their usage in various industries. The methodology used in this research is a survey containing questions pertaining to the cloud computing solutions in the workplace of various organizations. The scope of the research article is the cloud computing solutions implemented in the mobile devices and their usage in the real-time scenarios. The article is quite useful for getting an introductory idea about the current mobile cloud computing technologies and their usage in various industries along with the various technologies available for such solutions. The limitation of this research article is that it focuses only on the mobile platform cloud computing solutions (Fernando, 2013).

Hashem, I.A.T., Yaqoob, I., Anuar, N.B., Mokhtar, S., Gani, A. and Khan, S.U., 2015. The rise of “big data” on cloud computing: Review and open research issues. Information Systems, 47, pp.98-115.

This research paper was published in the year of 2015 under the publisher ‘Elsevier’. The authors Ibrahim Abaker Targio Hashem, Ibrar Yaqoob, Nor Badrul Anuar, Salimah Mokhtar, Abdullah Gani and Samee Ullah Khan gave an overview of the evolution of the ‘Big data’ era and the contribution of cloud computing in that. The aim of the research paper was to analyze the contribution of the cloud computing in the evolution of the ‘Big data’ era and how that led to the advancements in the cloud computing technologies. The research methodology used in this article included both qualitative and quantitative analysis of both historical and present data about the cloud computing implementations in various applications and organizations. The scope of the research was to define the capabilities of the current cloud computing technologies along with their possible implementations and usage in the ‘Big data’ activities. This article provides a lot of relevant data for the review of the topic in hand (Hashem, 2015).

Rittinghouse, J.W. and Ransome, J.F., 2016. Cloud computing: implementation, management, and security. CRC press.

This book was published in the year of 2016 by the ‘CRC press’ publisher. The authors John W Rittinghouse and James F Ransome gave an introduction into the world of cloud computing in this book. The aim of the book is to give a detailed overview on the cloud computing implementation, management and security strategies along with the approaches that should be followed for each of these activities. The book uses a number of research methods like surveys and questionnaires along with quantitative analysis of the historical records of various public organizations and reports published by other organizations. The scope of the book is the design of the implementation, management and security strategies for the cloud computing solutions. This book gives an overview of a lot of aspects of the implementing and maintaining a cloud computing solution in the workplace of an organization, which is pretty useful. However, the book doesn’t explain all the aspects of implementing the cloud computing solutions along with different approaches that can be taken while implementing the solution (Rittinghouse, 2016).

Survey of Mobile Cloud Computing: Architecture, Applications, and Approaches

All the research articles or papers selected in the previous section focus on various aspects of the cloud computing solutions along with their implementation, management and maintenance. All of these research works focus on providing more information on the development of the cloud computing technologies in the current market and their increasing capabilities in the recent times. These papers in turn allow the readers to have a fair overview regarding the possible approaches to implement the cloud computing solutions along with the various factors to consider to effectively maintain and manage it (Garg, 2013).

The paper ‘An analysis of the cloud computing security problem’ focuses on the security aspect of the cloud computing solutions. This in turn allows the readers to be familiar with the various security issues that might arise with the cloud computing systems and how these issues can be handled in the workplace of an organization. This paper limits itself to the analysis of the security problems that might arise in the cloud computing solutions, but don’t provide all the information regarding the capabilities of these solutions in various real-time scenarios (Hashem, 2015).

The paper ‘A survey of mobile cloud computing: architecture, applications, and approaches’ focuses on the analysis of the mobile computing solutions’ architecture, applications and approaches through an effective survey (Erl, 2013). This in turn allows the readers to have a fair idea of the capabilities of the cloud computing solutions in the mobile platforms. This paper limits itself to the mobile computing solutions and ignores all the other platforms in which the cloud computing solutions can contribute to the real-time requirements and issues (Herbst, 2013).

The paper ‘Mobile cloud computing: A survey’ provides similar information on the mobile cloud computing capabilities as the previous research paper, which focuses on the present capabilities of the mobile computing solutions and their applications in the real-time scenarios. Similar to the last paper, this one also limits itself to the cloud computing solutions on the mobile platforms and provides limited information about the contributions of cloud computing solutions on any other platform (Khan, 2013).

The research paper ‘The rise of “big data” on cloud computing: Review and open research issues’ focuses on the rise of the big data era and the contribution of the cloud computing solutions in it. This paper limits itself on the evolution of the big data era and doesn’t provide information regarding other contributions of the cloud computing solutions (Hashizume, 2013).

Mobile Cloud Computing: A Survey

Whereas the paper ‘Cloud computing: implementation, management, and security’ provides an in-depth knowledge on the implementation, management and security aspects of the cloud computing solutions in the real-time scenarios. This paper provides quite a lot of information regarding all the aspects of the cloud computing solutions (Li, 2013).

“How the effect of the cloud computing solutions of the employees in the workplace affect the implementation of a solution?”

The research focuses on the revelation and analysis of the possible effects of the cloud computing knowledge of the employees in the workplace on the process of implementing a cloud computing solution in the workplace (Oliveira, 2014).

This section provides a research proposal for the research problem identified in the previous section regarding the cloud computing solutions and how the knowledge of the employees affect its implementation in the workplace of an organization.

The research papers identified for the literature review contained a lot of information on the cloud computing solutions that are being used in the current rea-time scenarios along with the capabilities of these cloud computing technologies. The usage cloud computing technologies and solutions along with big data has increased a lot in the past decade. These technologies are shaping the future of the world now and should be analyzed to understand various issues associated with them along with their potential usage in the workplace of an organization (Othman, 2014).

As mentioned earlier the research problem is based on the effects of the employees’ knowledge on cloud computing technologies on the implementation of the cloud computing solutions in the workplace of an organization. The research is based on the problem statement mentioned below (Rahimi, 2014).

“How the effect of the cloud computing solutions of the employees in the workplace affect the implementation of a solution?”

The literatures gathered for the research include various research papers on the cloud computing technologies. These research papers provide a lot of information regarding the current capabilities of the cloud computing technologies along with the possible approaches that can be followed for successful implementation, management and maintenance of the cloud computing solutions in the workplace of an organization. These research papers also focus on the cloud computing technologies and solutions in various platforms including mobile platforms (Rittinghouse, 2016).

The research aims at revealing the positive or negative effects of the employees’ knowledge of the cloud computing technologies on the implementation and management of the cloud computing solution in the workplace of the organization. The research aims at providing efficient guidelines to the managers in the organization to effectively manage the human resources during the implementation and maintenance of the cloud computing solutions in the workplace (Yang, 2013).

The Rise of 'Big Data' on Cloud Computing: Review and Open Research Issues

The research will use surveys and questionnaires in order to analyze the current knowledge of the employees on cloud computing solutions along with the opinion of the managers regarding the factors affecting the implementation and maintenance of the cloud computing solutions in the workplace. So, the survey and questionnaire are the methodologies used for concluding from the research activities (Xiao, 2013).

The knowledge of the human resources on the cloud computing technologies affect the implementation, management and maintenance of the cloud computing solutions to a significant extent (Arora, 2013). As the employees are responsible for working on the cloud computing solution and they should have a clear picture of what the organization is trying to achieve through the cloud computing solution, the research problem is quite significant. Analyzing this problem efficiently allows the managers to have enough information to handle the corresponding situations in the workplace efficiently (Whaiduzzaman, 2014).

The research aims at the analysis of the role that the employees and their knowledge regarding the cloud computing technologies play in the process of implementing, managing and maintaining the cloud computing solutions in the workplace. The expected outcome out of the research is enough information regarding the effects of the employees and their knowledge on the cloud computing solution in the workplace, which allows the managers to develop effective strategies to implement and maintain the cloud computing solutions in the workplace (Wei, 2014).

For employees

  1. What do you understand about cloud computing technologies?
  2. Does your organization use any of the cloud computing technologies in any of its business processes?
  3. How do you think these cloud computing technologies can benefit the business of our organization?
  4. Could you think of any of your daily activities which can be implemented using any of the cloud computing technologies?
  5. Have you ever worked on any of the cloud computing technologies?
    1. Yes
    2. No
  6. If yes, could you describe a bit about your role and responsibilities in terms of the cloud computing technologies?
  7. Would you like to learn more about various cloud computing technologies?
  8. Does your organization provides any training on any of the cloud computing technologies? (Avram, 2014)
  9. Would you like to work on any of the cloud computing technologies if you are trained on it?
  10. Why do you think the cloud computing technologies are gaining a lot of popularity recently?
  11. Do you know any of the successful organizations in your organization’s industry, which are using any of the cloud computing technologies?
  12. Do you know any startups using the cloud computing technologies as the center of their business and operational models?

For managers

  1. Have you ever managed any project using any of the cloud computing technologies?
  2. What do you feel the difference is, between managing a cloud computing project and any other project?
  3. What do you think about the knowledge and capabilities of your subordinates on the cloud computing technologies?
  4. Would you recommend the higher management to train more employees on the cloud computing technologies?
  5. Does your organization has the infrastructure and technical capabilities required to implement any of the cloud computing technologies successfully?
  6. Are you managing any of the projects which can utilize any of the cloud computing technologies?
  7. Does any of your subordinates have any personal aspiration towards any of the cloud computing technologies?
  8. Is any of your subordinates getting trained in any of the cloud computing technologies currently? (Di Spaltro, 2016)
  9. What do you feel about the inclination of the higher management of your organization towards the usage of the cloud computing solutions in the business model of the organization?
  10. Do you feel that the higher management of your organization will invest in any of the cloud computing technologies or solutions?

A CAQDAS software is used to compile the gathered data into formal records arranged in a particular order. The data collected from the interviews with the employees and managers of the organization in terms of the survey questions, can be collected into a huge chuck of data. These responses from the employees and managers can be arranged in terms of their significance to the research objectives (Tao, 2014).

The CAQDAS software can be used to disassemble data efficiently along with using a formal coding method. The process of disassembling data allows the formal compiled data to be informative and sensible. For this we will create the below codes and will assign the corresponding responses from the employees and managers to the appropriate codes (Toosi, 2014).

Initial code (level 1)

Category code (level 2)

Positive employee knowledge

Knowledge about cloud computing

Knowledge about the cloud computing advancements

Positive employee interest

Interest to learn cloud computing

Interest to work in cloud computing

Positive manager knowledge

Knowledge about cloud computing

Knowledge about the cloud computing advancements and usages

Positive manager interest

Interested to use cloud computing

Available cloud computing capabilities among subordinates

Feasible organizational state

Available infrastructure and technical capabilities

The reassembling process can be done using the same CAQDAS software on the basis of the codes or coding method used in the previous process. This sorting of the data on the basis of the coded data allows the data to be more informative and provides more insight into it. This insight can be used to interpret from the collected data, which in turn leads to the conclusion of how the knowledge of the employees on cloud computing technologies can affect the implementation, management and maintenance of a cloud computing solution in the workplace of an organization (Sanaei, 2014). 

Cloud Computing: Implementation, Management, and Security

References

Almorsy, M., Grundy, J. and Müller, I., 2016. An analysis of the cloud computing security problem. arXiv preprint arXiv:1609.01107.

Arora, R., Parashar, A. and Transforming, C.C.I., 2013. Secure user data in cloud computing using encryption algorithms. International journal of engineering research and applications, 3(4), pp.1922-1926.

Avram, M.G., 2014. Advantages and challenges of adopting cloud computing from an enterprise perspective. Procedia Technology, 12, pp.529-534.

Di Spaltro, D., Polvi, A. and Welliver, L., Rackspace Us, Inc., 2016. Methods and systems for cloud computing management. U.S. Patent 9,501,329.

Dinh, H.T., Lee, C., Niyato, D. and Wang, P., 2013. A survey of mobile cloud computing: architecture, applications, and approaches. Wireless communications and mobile computing, 13(18), pp.1587-1611.

Erl, T., Puttini, R. and Mahmood, Z., 2013. Cloud computing: concepts, technology & architecture. Pearson Education.

Fernando, N., Loke, S.W. and Rahayu, W., 2013. Mobile cloud computing: A survey. Future generation computer systems, 29(1), pp.84-106.

Garg, S.K., Versteeg, S. and Buyya, R., 2013. A framework for ranking of cloud computing services. Future Generation Computer Systems, 29(4), pp.1012-1023.

Hashem, I.A.T., Yaqoob, I., Anuar, N.B., Mokhtar, S., Gani, A. and Khan, S.U., 2015. The rise of “big data” on cloud computing: Review and open research issues. Information Systems, 47, pp.98-115.

Hashizume, K., Rosado, D.G., Fernández-Medina, E. and Fernandez, E.B., 2013. An analysis of security issues for cloud computing. Journal of Internet Services and Applications, 4(1), p.5.

Herbst, N.R., Kounev, S. and Reussner, R.H., 2013, June. Elasticity in Cloud Computing: What It Is, and What It Is Not. In ICAC (pp. 23-27).

Khan, A.N., Kiah, M.M., Khan, S.U. and Madani, S.A., 2013. Towards secure mobile cloud computing: A survey. Future Generation Computer Systems, 29(5), pp.1278-1299.

Li, M., Yu, S., Zheng, Y., Ren, K. and Lou, W., 2013. Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption. IEEE transactions on parallel and distributed systems, 24(1), pp.131-143.

Oliveira, T., Thomas, M. and Espadanal, M., 2014. Assessing the determinants of cloud computing adoption: An analysis of the manufacturing and services sectors. Information & Management, 51(5), pp.497-510.

Othman, M., Madani, S.A. and Khan, S.U., 2014. A survey of mobile cloud computing application models. IEEE Communications Surveys & Tutorials, 16(1), pp.393-413.

Rahimi, M.R., Ren, J., Liu, C.H., Vasilakos, A.V. and Venkatasubramanian, N., 2014. Mobile cloud computing: A survey, state of art and future directions. Mobile Networks and Applications, 19(2), pp.133-143.

Rittinghouse, J.W. and Ransome, J.F., 2016. Cloud computing: implementation, management, and security. CRC press.

Sanaei, Z., Abolfazli, S., Gani, A. and Buyya, R., 2014. Heterogeneity in mobile cloud computing: taxonomy and open challenges. IEEE Communications Surveys & Tutorials, 16(1), pp.369-392.

Tao, F., Cheng, Y., Da Xu, L., Zhang, L. and Li, B.H., 2014. CCIoT-CMfg: cloud computing and internet of things-based cloud manufacturing service system. IEEE Transactions on Industrial Informatics, 10(2), pp.1435-1442.

Toosi, A.N., Calheiros, R.N. and Buyya, R., 2014. Interconnected cloud computing environments: Challenges, taxonomy, and survey. ACM Computing Surveys (CSUR), 47(1), p.7.

Wei, L., Zhu, H., Cao, Z., Dong, X., Jia, W., Chen, Y. and Vasilakos, A.V., 2014. Security and privacy for storage and computation in cloud computing. Information Sciences, 258, pp.371-386.

Whaiduzzaman, M., Sookhak, M., Gani, A. and Buyya, R., 2014. A survey on vehicular cloud computing. Journal of Network and Computer Applications, 40, pp.325-344.

Xiao, Z., Song, W. and Chen, Q., 2013. Dynamic resource allocation using virtual machines for cloud computing environment. IEEE transactions on parallel and distributed systems, 24(6), pp.1107-1117.

Yang, K. and Jia, X., 2013. An efficient and secure dynamic auditing protocol for data storage in cloud computing. IEEE transactions on parallel and distributed systems, 24(9), pp.1717-1726.

Cite This Work

To export a reference to this article please select a referencing stye below:

My Assignment Help. (2022). Critical Literature Review On Cloud Computing: Annotated Bibliography And Research Papers Essay.. Retrieved from https://myassignmenthelp.com/free-samples/educ6048-research-methodology/cloud-computing-system-file-A85192.html.

"Critical Literature Review On Cloud Computing: Annotated Bibliography And Research Papers Essay.." My Assignment Help, 2022, https://myassignmenthelp.com/free-samples/educ6048-research-methodology/cloud-computing-system-file-A85192.html.

My Assignment Help (2022) Critical Literature Review On Cloud Computing: Annotated Bibliography And Research Papers Essay. [Online]. Available from: https://myassignmenthelp.com/free-samples/educ6048-research-methodology/cloud-computing-system-file-A85192.html
[Accessed 19 April 2024].

My Assignment Help. 'Critical Literature Review On Cloud Computing: Annotated Bibliography And Research Papers Essay.' (My Assignment Help, 2022) <https://myassignmenthelp.com/free-samples/educ6048-research-methodology/cloud-computing-system-file-A85192.html> accessed 19 April 2024.

My Assignment Help. Critical Literature Review On Cloud Computing: Annotated Bibliography And Research Papers Essay. [Internet]. My Assignment Help. 2022 [cited 19 April 2024]. Available from: https://myassignmenthelp.com/free-samples/educ6048-research-methodology/cloud-computing-system-file-A85192.html.

Get instant help from 5000+ experts for
question

Writing: Get your essay and assignment written from scratch by PhD expert

Rewriting: Paraphrase or rewrite your friend's essay with similar meaning at reduced cost

Editing: Proofread your work by experts and improve grade at Lowest cost

loader
250 words
Phone no. Missing!

Enter phone no. to receive critical updates and urgent messages !

Attach file

Error goes here

Files Missing!

Please upload all relevant files for quick & complete assistance.

Plagiarism checker
Verify originality of an essay
essay
Generate unique essays in a jiffy
Plagiarism checker
Cite sources with ease
support
Whatsapp
callback
sales
sales chat
Whatsapp
callback
sales chat
close