In recent years, the emergence of the internet of things (IoT) has accelerated the quality of day-to-day tasks. With the rapid development of IoT devices, the cloud computing paradigm has become an attractive solution by facilitating on-demand services. However, the remote location of third-party cloud reduces the overall user experience while increasing the latency involved. Fog computing has been introduced as a promising solution by improving the overall service quality. Fog computing comprises distributed and heterogeneous fog nodes with limited resource capabilities. Therefore, managing fog resources while satisfying users' service quality is a challenging task. This study attempts to conduct a systematic review by examining high-quality research papers published between 2018 and April 2022. This paper aims to address current trends, challenges, and theoretical gaps with a wide range of open issues to guide the researchers and practitioners interested in carrying out the further research in the current domain.
{"title":"Quality of Service-Based Resource Management in Fog Computing: A Systematic Review","authors":"Vibha Jain, B. Kumar","doi":"10.4018/ijcac.309934","DOIUrl":"https://doi.org/10.4018/ijcac.309934","url":null,"abstract":"In recent years, the emergence of the internet of things (IoT) has accelerated the quality of day-to-day tasks. With the rapid development of IoT devices, the cloud computing paradigm has become an attractive solution by facilitating on-demand services. However, the remote location of third-party cloud reduces the overall user experience while increasing the latency involved. Fog computing has been introduced as a promising solution by improving the overall service quality. Fog computing comprises distributed and heterogeneous fog nodes with limited resource capabilities. Therefore, managing fog resources while satisfying users' service quality is a challenging task. This study attempts to conduct a systematic review by examining high-quality research papers published between 2018 and April 2022. This paper aims to address current trends, challenges, and theoretical gaps with a wide range of open issues to guide the researchers and practitioners interested in carrying out the further research in the current domain.","PeriodicalId":442336,"journal":{"name":"Int. J. Cloud Appl. Comput.","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134394871","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Cloud computing is a big step in the parallel and distributed computing that offers pervasive access to the entire stack of computing resources located in the data center via the Internet in a virtualized manner. QoS is an important research direction in the cloud and is a collection of constraints that meets the service level agreement (SLA) between the users and service providers. These constraints are waiting time, completion time, response time, makespan, resource utilization, effective utilization of bandwidth, and load balancing. This work presents a distribution plan for transferring task loads to different virtual machines (VMs) with an efficient load balancing mechanism that is best suited in heterogeneous environments and improve the QoS parameter of users and cloud vendors simultaneously. In this paper, the expected uniform load of tasks that can be mapped to a particular VMs is calculated and after that, the optimal average completion time (OACT) of expected uniform tasks load to each VM is calculated.
{"title":"A Heuristic-Based Task Scheduling Policy for QoS Improvement in Cloud","authors":"Gaurav Tripathi, Rakesh Kumar","doi":"10.4018/ijcac.295238","DOIUrl":"https://doi.org/10.4018/ijcac.295238","url":null,"abstract":"Cloud computing is a big step in the parallel and distributed computing that offers pervasive access to the entire stack of computing resources located in the data center via the Internet in a virtualized manner. QoS is an important research direction in the cloud and is a collection of constraints that meets the service level agreement (SLA) between the users and service providers. These constraints are waiting time, completion time, response time, makespan, resource utilization, effective utilization of bandwidth, and load balancing. This work presents a distribution plan for transferring task loads to different virtual machines (VMs) with an efficient load balancing mechanism that is best suited in heterogeneous environments and improve the QoS parameter of users and cloud vendors simultaneously. In this paper, the expected uniform load of tasks that can be mapped to a particular VMs is calculated and after that, the optimal average completion time (OACT) of expected uniform tasks load to each VM is calculated.","PeriodicalId":442336,"journal":{"name":"Int. J. Cloud Appl. Comput.","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131154471","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In recent years, companies and researchers have hosted and rented computer resources over the internet due to cloud computing, which led to an increase in the energy consumed by data centers. This consumption is considered one of the world's highest, which pushed many researchers to propose several techniques such as server consolidation (SC) to solve the trade-off between energy saving and quality of service (QoS). SC requires maintaining service level agreements (SLA) violations and minimizing the number of active physical machines (PMs). Furthermore, to achieve this balance and avoid increasing hardware costs, the SC challenge targets placing new virtual machines (VMs) in suitable PMs. This work explored the existing SC algorithms that include CloudSim as a simulator environment and PlanetLab as a dataset. The authors compared the well-known optimization methods and extracted the weaknesses of the main three deployed approaches involved in the consolidation process: bin-packing model, metaheuristics, and machine learning-based solutions.
{"title":"Server Consolidation Algorithms for Cloud Computing: Taxonomies and Systematic Analysis of Literature","authors":"Hind Mikram, S. E. Kafhali, Y. Saadi","doi":"10.4018/ijcac.311034","DOIUrl":"https://doi.org/10.4018/ijcac.311034","url":null,"abstract":"In recent years, companies and researchers have hosted and rented computer resources over the internet due to cloud computing, which led to an increase in the energy consumed by data centers. This consumption is considered one of the world's highest, which pushed many researchers to propose several techniques such as server consolidation (SC) to solve the trade-off between energy saving and quality of service (QoS). SC requires maintaining service level agreements (SLA) violations and minimizing the number of active physical machines (PMs). Furthermore, to achieve this balance and avoid increasing hardware costs, the SC challenge targets placing new virtual machines (VMs) in suitable PMs. This work explored the existing SC algorithms that include CloudSim as a simulator environment and PlanetLab as a dataset. The authors compared the well-known optimization methods and extracted the weaknesses of the main three deployed approaches involved in the consolidation process: bin-packing model, metaheuristics, and machine learning-based solutions.","PeriodicalId":442336,"journal":{"name":"Int. J. Cloud Appl. Comput.","volume":"266 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133281122","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The advent of new vehicular advances and accessibility of new network access mediums have evolved service providers with heterogeneous-vehicular collaboration. The performance of heterogeneous-vehicular collaboration depends on the possibility of accurate, up-to-date vehicular information shared by Cooperative- Awareness Messages (CAMs) among neighboring vehicles. Although exchanging wrong mobility coordinates leading to disruption on the Internet of Vehicles (IoVs) applicability. To address these issues, a misbehavior detection approach is proposed which acts as a second wall of defense. Our scheme is divided into three phases context procurement, context sharing, and misbehavior detection. Mathematical modeling has been done to evaluate Sybil attack and false message generation attack detection under misbehavior detection. The proposed scheme attains 99% in detecting false message generation attacks and 98.5% in detecting Sybil attacks. Additionally, false-positive rate, overhead detection, and False-Measures are evaluated which demonstrates the effectiveness of our approach.
{"title":"Detecting and Preventing Misbehaving Intruders in the Internet of Vehicles","authors":"Richa Sharma, T. P. Sharma, A. Sharma","doi":"10.4018/ijcac.295242","DOIUrl":"https://doi.org/10.4018/ijcac.295242","url":null,"abstract":"The advent of new vehicular advances and accessibility of new network access mediums have evolved service providers with heterogeneous-vehicular collaboration. The performance of heterogeneous-vehicular collaboration depends on the possibility of accurate, up-to-date vehicular information shared by Cooperative- Awareness Messages (CAMs) among neighboring vehicles. Although exchanging wrong mobility coordinates leading to disruption on the Internet of Vehicles (IoVs) applicability. To address these issues, a misbehavior detection approach is proposed which acts as a second wall of defense. Our scheme is divided into three phases context procurement, context sharing, and misbehavior detection. Mathematical modeling has been done to evaluate Sybil attack and false message generation attack detection under misbehavior detection. The proposed scheme attains 99% in detecting false message generation attacks and 98.5% in detecting Sybil attacks. Additionally, false-positive rate, overhead detection, and False-Measures are evaluated which demonstrates the effectiveness of our approach.","PeriodicalId":442336,"journal":{"name":"Int. J. Cloud Appl. Comput.","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122984485","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In the modern IoT era, time and resource critical applications are more prevalent. Though cloud computing enables fast processing of data and producing results, the time and network overhead are huge. Fog based solutions have proved to eliminate this overhead. However, establishing a scalable fog based architecture for IoT applications involves a number of challenges such as guaranteeing QoS, reducing operational costs etc. Hence a viable fog based architecture must involve optimal service placement facilitated by suitable schemes for resource estimation and reservation, QoS monitoring, data interchange and integration. This paper surveys various service placement and optimization approaches proposed in the literature and compares them. This paper also explores various components that are required for composing a viable fog based architecture and presents a representative fog provisioning framework. Relevance of modern technologies and tools such as RESTful architecture, SDN, Kafka, RabbitMQ, Zookeeper in establishing an efficient framework for fog based IoT applications is discussed
{"title":"Survey on Service Placement, Provisioning, and Composition for Fog-Based IoT Systems","authors":"Thiruchadai Pandeeswari Sadatacharapandi, P. S.","doi":"10.4018/ijcac.305212","DOIUrl":"https://doi.org/10.4018/ijcac.305212","url":null,"abstract":"In the modern IoT era, time and resource critical applications are more prevalent. Though cloud computing enables fast processing of data and producing results, the time and network overhead are huge. Fog based solutions have proved to eliminate this overhead. However, establishing a scalable fog based architecture for IoT applications involves a number of challenges such as guaranteeing QoS, reducing operational costs etc. Hence a viable fog based architecture must involve optimal service placement facilitated by suitable schemes for resource estimation and reservation, QoS monitoring, data interchange and integration. This paper surveys various service placement and optimization approaches proposed in the literature and compares them. This paper also explores various components that are required for composing a viable fog based architecture and presents a representative fog provisioning framework. Relevance of modern technologies and tools such as RESTful architecture, SDN, Kafka, RabbitMQ, Zookeeper in establishing an efficient framework for fog based IoT applications is discussed","PeriodicalId":442336,"journal":{"name":"Int. J. Cloud Appl. Comput.","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116711519","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sarvesh Kumar, Surendra Kumar, Nikhil Ranjan, Shivam Tiwari, T. R. Kumar, Dinesh Goyal, G. Sharma, Varsha Arya, M. Rafsanjani
Cloud computing resource privacy is important and it becomes stronger when image-based security is applied. Most cloud service providers provision resources for images to the end users. Numerous encryption strategies are applied to safeguard information of the image while empowering visual component extractions. The work uses wavelet domain technique, visual cryptography, and Arnold transformation. This scheme provides additional security features to the secret share image at the trusted authority side for copyright protection of digital images. The proposed technique is robust against some selected attacks like scaling, blurring, etc. This technique protects the copyright of digital data over the cloud. It is a need and necessary to protect and prevent the illegal copying, redistribution, and copyright infringement of multimedia. This research work aims at increasing robustness and security of the digital image copyright scheme. The proposed scheme is a hybrid authentication framework that will perform better in the watermarking system of security using simulation over MATLAB.
{"title":"Digital Watermarking-Based Cryptosystem for Cloud Resource Provisioning","authors":"Sarvesh Kumar, Surendra Kumar, Nikhil Ranjan, Shivam Tiwari, T. R. Kumar, Dinesh Goyal, G. Sharma, Varsha Arya, M. Rafsanjani","doi":"10.4018/ijcac.311033","DOIUrl":"https://doi.org/10.4018/ijcac.311033","url":null,"abstract":"Cloud computing resource privacy is important and it becomes stronger when image-based security is applied. Most cloud service providers provision resources for images to the end users. Numerous encryption strategies are applied to safeguard information of the image while empowering visual component extractions. The work uses wavelet domain technique, visual cryptography, and Arnold transformation. This scheme provides additional security features to the secret share image at the trusted authority side for copyright protection of digital images. The proposed technique is robust against some selected attacks like scaling, blurring, etc. This technique protects the copyright of digital data over the cloud. It is a need and necessary to protect and prevent the illegal copying, redistribution, and copyright infringement of multimedia. This research work aims at increasing robustness and security of the digital image copyright scheme. The proposed scheme is a hybrid authentication framework that will perform better in the watermarking system of security using simulation over MATLAB.","PeriodicalId":442336,"journal":{"name":"Int. J. Cloud Appl. Comput.","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114922065","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This study's two objectives are first to assess the relationships between customer loyalty and potential determinants (customer satisfaction with the website, after sale customer service, and product return handling) in the special PaaS environment where users can produce a greater variety of website features compared to the more widely studied SaaS environment and second to test the impact of the website's customer decision support system as a potential moderator for the relationship between customer satisfaction with the website and customer loyalty. To test the hypotheses, 138 CC client organizations participated by collecting data from their website customers accessing their order entry website applications. The results confirmed the importance of the proposed relationships and enabled several important managerial insights, including the importance of client organization choosing the appropriate CC approach to improve customer loyalty to the website.
{"title":"Determinants of Customer Loyalty in a Cloud Computing Environment","authors":"T. Guimaraes, Mike Walton, K. Paranjape","doi":"10.4018/ijcac.308278","DOIUrl":"https://doi.org/10.4018/ijcac.308278","url":null,"abstract":"This study's two objectives are first to assess the relationships between customer loyalty and potential determinants (customer satisfaction with the website, after sale customer service, and product return handling) in the special PaaS environment where users can produce a greater variety of website features compared to the more widely studied SaaS environment and second to test the impact of the website's customer decision support system as a potential moderator for the relationship between customer satisfaction with the website and customer loyalty. To test the hypotheses, 138 CC client organizations participated by collecting data from their website customers accessing their order entry website applications. The results confirmed the importance of the proposed relationships and enabled several important managerial insights, including the importance of client organization choosing the appropriate CC approach to improve customer loyalty to the website.","PeriodicalId":442336,"journal":{"name":"Int. J. Cloud Appl. Comput.","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126859621","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Cloud Computing has now successfully emerged as an integral trend in Information Technology market. It is internet-based concept of virtualization. Many failures can occur in computing environment that actually leads to non-availability and non-reliability upon service providers. To ensure this, a mechanism has been proposed in this paper which can deploy the checkpoint module so that faults can be detected timely and shall be removed in due course of time so that reliable and fault free cloud services can be provided to consumers. In this, fault tolerance agent has been used which actually is an intelligent and reliable agent that helps in detecting the malicious faults on time. The proposed framework considers throughout overheads, checkpoints overheads, monetary costs overheads and availability overheads in its performance validation. The proposed framework has been compared with other two frameworks and has been identified that AFTTM outperforms several on-going techniques in fault tolerant techniques.
{"title":"AFTTM: Agent-Based Fault Tolerance Trust Mechanism in Cloud Environment","authors":"S. Jaswal, M. Malhotra","doi":"10.4018/ijcac.297105","DOIUrl":"https://doi.org/10.4018/ijcac.297105","url":null,"abstract":"Cloud Computing has now successfully emerged as an integral trend in Information Technology market. It is internet-based concept of virtualization. Many failures can occur in computing environment that actually leads to non-availability and non-reliability upon service providers. To ensure this, a mechanism has been proposed in this paper which can deploy the checkpoint module so that faults can be detected timely and shall be removed in due course of time so that reliable and fault free cloud services can be provided to consumers. In this, fault tolerance agent has been used which actually is an intelligent and reliable agent that helps in detecting the malicious faults on time. The proposed framework considers throughout overheads, checkpoints overheads, monetary costs overheads and availability overheads in its performance validation. The proposed framework has been compared with other two frameworks and has been identified that AFTTM outperforms several on-going techniques in fault tolerant techniques.","PeriodicalId":442336,"journal":{"name":"Int. J. Cloud Appl. Comput.","volume":"139 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114756908","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The Internet of Things (IoT) has become a part of our everyday life. Due to limited storage and computational capabilities, data collected by IoT devices outsource to cloud servers. Although cloud servers provide many benefits, confidentiality and authenticity are the major issues. Signcryption is a cryptographic technique to address the above issues. Several identity-based signcryption schemes are proposed; however, these schemes create heavy computation and communication overhead because of bilinear pairings. This paper proposes an Efficient Pairing-Free Identity-based Signcryption (EPFIBSC) scheme based on Elliptic Curve Cryptography (ECC), which reduces computation and communication overhead. The EPFIBSC scheme's security is proven under Elliptic Curve Discrete Logarithm Problem (ECDLP). The scheme also meets the security requirements such as confidentiality, authenticity, and unforgeability. In performance analysis, the authors compare the scheme with some of the existing schemes; the comparison shows that this scheme is more efficient in computation and communication costs.
{"title":"Efficient Pairing-Free Identity-Based Signcryption Scheme for Cloud-Assisted IoT","authors":"M. Kiran, S. Pasupuleti, R. Eswari","doi":"10.4018/ijcac.305216","DOIUrl":"https://doi.org/10.4018/ijcac.305216","url":null,"abstract":"The Internet of Things (IoT) has become a part of our everyday life. Due to limited storage and computational capabilities, data collected by IoT devices outsource to cloud servers. Although cloud servers provide many benefits, confidentiality and authenticity are the major issues. Signcryption is a cryptographic technique to address the above issues. Several identity-based signcryption schemes are proposed; however, these schemes create heavy computation and communication overhead because of bilinear pairings. This paper proposes an Efficient Pairing-Free Identity-based Signcryption (EPFIBSC) scheme based on Elliptic Curve Cryptography (ECC), which reduces computation and communication overhead. The EPFIBSC scheme's security is proven under Elliptic Curve Discrete Logarithm Problem (ECDLP). The scheme also meets the security requirements such as confidentiality, authenticity, and unforgeability. In performance analysis, the authors compare the scheme with some of the existing schemes; the comparison shows that this scheme is more efficient in computation and communication costs.","PeriodicalId":442336,"journal":{"name":"Int. J. Cloud Appl. Comput.","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133613789","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The pay-and-use approach is the basis for the cloud computing services that are currently popular. Resource management is one of the more difficult tasks since it takes a while to identify requests and determine what kind of resources are needed to satisfy the customer's needs. Resource provisioning's goal is to identify and make available the right resources depending on user workload's QoS needs so that applications may make efficient use of the resources. The CSPs now offer advanced resource reserves for both short- and long-term periods. Cloud brokers are required to manage the on-demand cloud resource and maintain track of the SLA list of resource providers for their individual cloud customers in our suggested algorithm RSCC (Reservation System for Cloud Computing). According to the user's needs and cost, the RSCC algorithm functions as a flexible reservation that can accommodate a variety of services. The numerical findings demonstrated that the suggested long-term resource planning method was able to produce operational costs that were almost ideal.
{"title":"Reservation System for Cloud Computing Resources (RSCC): Immediate Reservation of the Computing Mechanism","authors":"Ashish Tiwari, R. Garg","doi":"10.4018/ijcac.311502","DOIUrl":"https://doi.org/10.4018/ijcac.311502","url":null,"abstract":"The pay-and-use approach is the basis for the cloud computing services that are currently popular. Resource management is one of the more difficult tasks since it takes a while to identify requests and determine what kind of resources are needed to satisfy the customer's needs. Resource provisioning's goal is to identify and make available the right resources depending on user workload's QoS needs so that applications may make efficient use of the resources. The CSPs now offer advanced resource reserves for both short- and long-term periods. Cloud brokers are required to manage the on-demand cloud resource and maintain track of the SLA list of resource providers for their individual cloud customers in our suggested algorithm RSCC (Reservation System for Cloud Computing). According to the user's needs and cost, the RSCC algorithm functions as a flexible reservation that can accommodate a variety of services. The numerical findings demonstrated that the suggested long-term resource planning method was able to produce operational costs that were almost ideal.","PeriodicalId":442336,"journal":{"name":"Int. J. Cloud Appl. Comput.","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128870522","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}