Cloud Storage Literature Review
Cloud Storage Literature Review
Cloud Storage Literature Review
Crafting a literature review on cloud storage can be a formidable task, requiring extensive research,
critical analysis, and adept synthesis of existing literature. As the digital landscape continues to
evolve, staying abreast of the latest advancements, challenges, and trends in cloud storage is
paramount for researchers, academics, and industry professionals alike. However, navigating the vast
sea of scholarly articles, journals, and research papers can often feel overwhelming and time-
consuming.
The complexity of writing a literature review on cloud storage lies in the need to sift through a
multitude of sources, ranging from theoretical frameworks to empirical studies, while also ensuring
relevance, coherence, and rigor. From understanding the fundamental concepts of cloud computing to
examining the latest innovations in storage technologies, the literature review process demands
meticulous attention to detail and a comprehensive understanding of the subject matter.
Moreover, synthesizing diverse perspectives, theories, and findings into a cohesive narrative requires
both analytical prowess and adept writing skills. Striking a balance between summarizing existing
research and providing insightful analysis can be challenging, as scholars aim to contribute novel
insights while also acknowledging the existing body of knowledge.
In light of these challenges, seeking expert assistance can be invaluable in streamlining the literature
review process and ensuring its quality and effectiveness. At ⇒ StudyHub.vip ⇔, we specialize in
providing tailored academic writing services, including literature reviews on cloud storage. Our team
of experienced writers possesses the expertise and proficiency needed to conduct thorough research,
critically evaluate existing literature, and craft compelling narratives that meet the highest academic
standards.
By entrusting your literature review to ⇒ StudyHub.vip ⇔, you can save time, alleviate stress, and
enhance the overall quality of your academic work. Our commitment to excellence and customer
satisfaction ensures that you receive a meticulously researched and meticulously written literature
review that reflects the latest developments and insights in cloud storage.
Don't let the daunting task of writing a literature review on cloud storage impede your academic
progress. Place your trust in ⇒ StudyHub.vip ⇔ and unlock the potential of your research
endeavors. Order now and experience the difference our expert writing services can make in your
academic journey.
Both dimensions correspond to the most used keywords in SCM and represent those keywords from
the big data analysis field. XfilesPro How we think about an advisor tech stack How we think about
an advisor tech stack Summit zigbee motion sensor user manual NAS-PD07B2.pdf zigbee motion
sensor user manual NAS-PD07B2.pdf Domotica daVinci From eSIMs to iSIMs: It’s Inside the
Manufacturing From eSIMs to iSIMs: It’s Inside the Manufacturing Soracom Global, Inc. We found
77 papers that are irrelevant which we could not find our answers to the research questions.
Moreover, every step of UPS’s shipping process includes supply chain data analysis. Evaluation of
the Proposed Scheme Av The proposed model is evaluated for security con- cerns and performance
in this section. This company uses the main technologies of big data such as Hadoop, HBase, and
Spark SQL. The purpose of this stage is to screen the documents to check their eligibility in the next
stage. It is evident that big data management conceptual models, and infrastructures of storage of
vast amounts of data remain challenging for many organisations. Figure 3 (Words Cloud) shows the
frequency of keywords used in the literature. Seyedan and Mafakheri ( 2020 ) provide an overview
of predictive BDA for the supply chain, including customer analysis, demand prediction, and trend
analysis. Some papers, however, may have been overlooked if the source was not found in these
databases. Cloud computing is a disruptive technology that has the potential to enhance
collaboration, agility, scaling and availability and provides the opportunities for cost reduction
through optimized and efficient computing. The TPA or another entity involved in the verification
process, will be given a timeframe for sending integrity checking messages to cloud storage server.
Another important concern of the managers is the potential of these platforms to be used in different
data life cycle phases from generation to destruction. (Chen and Zhao 2012 ) divided data life cycle
into seven stages including data generation, transfer, use, share, storage, archival and destruction.
But both methods are not practically possible for large amount of data. Download Free PDF View
PDF A Study of Data Storage Security Issues in Cloud Computing Rajarshi Biswas Cloud
computing provides on demand services to its clients. Section three presents findings and discussion
on materials evaluation. Some useful articles and reviews introduced different searching models,
classification frameworks, empirical studies, surveys, and literature reviews. The underlying
algorithms are so robust so that user applications are accessible from various client devices. One of
the primary uses of cloud computing is for data storage. Although technologically and
organisationally challenging, it is very important to publish papers including case studies and
practical examples to show the effectiveness and outcomes of optimising big data in real-world
supply chains. Remote data auditing, by which the data integrity or correctness of remotely stored
data is investigated, has been given more attention recently. Abstract This paper analyzes the current
state of research into Cloud Computing and Supply Chain Integration with the objective to identify
the findings to date, the areas of study developed and research gaps to provide guidance for future
research. Such as, a block of data represented by j BD then the related metadata is () Cj H FBD
which also a block digests and required to be accumulated at a chosen auditor. There are conceptual
models of data infrastructure, big data management solutions, and proposed approaches to tackle the
huge amount of big data. Lamba and Singh ( 2018 ) used three separate multi-criteria decision-
making (MCDM) techniques to inve(Lamba and Singh 2018 )stigate the relationships between big
data enablers in operations and SCM, including interpretive structural modelling, fuzzy complete
interpretive structural modelling, and decision-making trial and evaluation laboratory. Out of these
cookies, the cookies that are categorized as necessary are stored on your browser as they are
essential for the working of basic functionalities of the website. This project introduces the concept
of cloud computing and cloud storage as well as the architecture of cloud storage firstly. For
example, using Hadoop as a platform to manage massive data has been mentioned (Roy et al. 2018 ).
However, we assume that some beneficial techniques can still manage and control big data aside
from Hadoop. Cloud databases are essentially employed for information-escalated applications, such
as storage and mining of huge data or commercial data.
Furthermore, the literature review has several limitations; for instance, the use of exploratory
methodology makes the study to be prone to subjective bias. Ol Ol 11 CC nn OwRllOwR l ll SiG
SiG ?? ? ? ?? ?? ???? ?? ?? ?? (12) The man in the middle attack can be prevented, when the reply to
a challenge for verification is sent back to the auditor in the hash code generated from the metadata
and ID of the cloud server in the form of ?? ??, MCj RHsHHF ID. Google Drive is now the home of
Google Docs, a suite. A data-driven analytical hybrid NSDEA algorithm was involved in this
experiment to select the best control variables. What is Cloud Storage? (2009) Dent, S. (2012,
December 20). The random erasure codes create a matrix M in Z as follows: n I A M A A ?? ? ?? ??
(2) Algorithm for Data Storage START: Step 1: ? ?, j OwRDaTn BlockBD. As data, owners and
servers are different identities, the paradigm of data storage brings up many security challenges.
Such as, a block of data represented by j BD then the related metadata is () Cj H FBD which also a
block digests and required to be accumulated at a chosen auditor. Cloud data storage technology is
the core area in cloud computing and solves the data storage mode of cloud environment. The
distributed architecture of cloud data storage f acilitates the customer to get benefits from the greater
quality of storage and minimized the operating cost. These issues can be addressed by the
cooperation between supply chain managers and academic researchers, improving the culture of
managers to accept and employ new technologies, and enhance the skills of employees. While cost
and ease of use are the two main strong benefits of the cloud computing, there are some major.
Therefore, companies need to ensure proper management of big data applications and related
infrastructure. Cloud computing enables real-time access to production and demand data, allowing
for collaboration and coordination between companies and suppliers, resulting in greater supply chain
visibility and flexibility. One of the primary uses of cloud computing is for data storage. To better
answer the research questions in this paper, we reviewed and analysed each paper’s main work, the
contribution to the research field, and synthesised it with other similar articles. 3.1 How to optimise
big data in SCM. The algorithm to follow these entire steps is given as under. The two clusters are
obtained by using the Multidimensional Scaling method (MDS). Cloud databases are essentially
employed for information-escalated applications, such as storage and mining of huge data or
commercial data. Numerous value-based information administration applications, like banking,
online reservation, e-trade and inventory administration, etc. In addition, this paper also explains the
common challenges in adopting single and multi-cloud storage services. One of the main identified
gaps in the available literature in both dimensions of big data management and big data optimisation
in the SCM is the lack of case studies and practical examples. Big data optimisation and
management in supply chain management: a The increasing interest from technology enthusiasts and
organisational practitioners in big data applications in the supply chain has encouraged us to review
recent research development. Retrieved from Engadget: Dropbox, Inc. (n.d.). About Us. Retrieved
from Dropbox: Dropbox, Inc. (n.d.). Teams - Dropbox for Teams. Download citation Accepted: 12
May 2023 Published: 24 June 2023 Issue Date: October 2023 DOI: Share this article Anyone you
share the following link with will be able to read this content: Sorry, a shareable link is not currently
available for this article. SlideShare is the world's largest community for sharing presentations. Then a
brief discussion on the major gaps and the future directions is presented in section four. 2 Research
methodology 2.1 related work. Based on our collections of articles related to big data applications in
SCM, we created a small database of related review articles to compare between their scopes,
research methodologies, and their coverage. Though not yet firmly proven, text mining’s potential for
automatically eliminating studies should be viewed as encouraging. Big data management refers to
the infrastructures and frameworks to process and manage data as well as data storing tools and
techniques. From this table, optimisation methods have been used more than the other techniques in
this area.
Noticeably, in 2018, the number of records increased dramatically to 12 documents. Figure 5 shows
two clusters of the most occurrence keywords grouped in two different colours (red and blue),
indicating these keywords’ frequent appearance between different types of studies. Evaluation of the
Proposed Scheme Av The proposed model is evaluated for security con- cerns and performance in
this section. Open Access This article is licensed under a Creative Commons Attribution 4.0
International License, which permits use, sharing, adaptation, distribution and reproduction in any
medium or format, as long as you give appropriate credit to the original author(s) and the source,
provide a link to the Creative Commons licence, and indicate if changes were made. So here are
some security threats that make impact on. The keywords “optimisation” and “big data management”
have not been involved highly being focused on. Our study revealed three certain gaps in the research
conducted on the optimisation and management of big data in SCM. This paper discusses about an
overview of cloud computing and security issues of cloud computing. In this paper, we will discuss
the different techniques that are used for secure data storage on cloud. We use a systematic literature
review method to investigate these questions. Hofmann ( 2017 ) focused on how big data could be
used to optimise supply chain processes by reducing the bullwhip effect. This study reports some of
big data tools being used in SCM during the period from 2010 to 2021, however; there are expected
new tools and enhancements that leverage the capabilities of big data analytics and management
tools in SCM. Also, suggested routes are introduced in the study to provide enhanced decisions.
Another experimental study to obtain a decision support optimisation in logistics has been introduced
by the authors of Lee et al. ( 2018 ). They relied on weather historical big data to decide the optimal
speed that reduces the fuel consumption while vessels are serving. Adopting Cloud Computing in
Global Supply Chain: A Literature Review The objective of this article is to review the adoption of
cloud computing in global supply chain. A data-driven analytical hybrid NSDEA algorithm was
involved in this experiment to select the best control variables. These threats include loss of
intellectual property, several malware attacks, contract breaches with business partner; customers
trust issues, data unavailability and many more. The significance of this framework is counted in a
better approach to structure the data and connect the different streams of data to build a coherent
picture of a specific problem. Download Free PDF View PDF A Study of Data Storage Security
Issues in Cloud Computing Rajarshi Biswas Cloud computing provides on demand services to its
clients. The goal of this paper is to find out the advantages and disadvantages of databases widely
employed in cloud systems and to review the challenges in developing cloud databases. Table 7
shows the main work and ideas of reviewed papers in big data management. Keywords: Data
Storage; Integrity; Confidentiality; Cloud Computing 1. Integrity means data received by receiver
should be in the same form, the sender sends it; integrity helps in preventing modification from
unauthorized user. But both methods are not practically possible for large amount of data. The
proposed model also supports public verifiability and dynamic data recovery. This paper gives a
quick introduction to cloud storage. As a result, simulation-based methods are a viable alternative
(Tiwari et al. 2018 ). Privacy, security, and quality of data (Richey et al. 2016 ), data acquisition
continuity, data cleansing, and data standardising (Raghupathi and Raghupathi 2014 ) are mentioned
as the other challenges. Seyedan and Mafakheri ( 2020 ) provide an overview of predictive BDA for
the supply chain, including customer analysis, demand prediction, and trend analysis. Int J Inform
Eng Electron Bus 11(5):30 Ardjmand E, Ghalehkhondabi I, Young W, Sadeghi A, Sinaki R,
Weckman G (2020) A hybrid Artificial neural network, genetic algorithm and Column Generation
Heuristic for minimizing Makespan in Manual Order picking Operations. This paper provides
theoretical guidance for supply chain managers about BDI investment decisions and their
consequences.
Since the single cloud storage does not fulfil the demands of the individuals and organizations, a
move towards multi-cloud storage has been emerged. JSEA 24 It is important to have a system for
open verifiability, when the files are scattered athwart the several comput- ing systems. Herein, the
data files are stored in superflu- ous shape across various servers. In response to solve the problem of
data loss or replace the corrupted block, a new block will be created. The TPA which is as- signed
the task of verification will receive metadata in- formation j. Hofmann and Rutschmann ( 2018 )
presented a table of advanced applications of analytics to enhance the predictions in supply chain
retail through some optimisation tools. International J. of Computer Science Issues, 2012. 9(4): p. 77-
83. At the core of cloud computing is a datacenter that uses virtualization to. The underlying
algorithms are so robust so that user applications are accessible from various client devices. The
significance of this framework is counted in a better approach to structure the data and connect the
different streams of data to build a coherent picture of a specific problem. The availability of a large
amount of data gathered from various sources has increased the risk of privacy and security of data
(Fernando et al. 2018 ). However, big data analysis platforms and tools have enabled managers to
examine large data sets in all forms to discover useful information such as hidden patterns and
market trends, helping organisations improve business decision-making (Grover and Kar 2017 ). A
single click shares the publication to your Reading Feed automatically. Through case studies, they
showed the feasibility and practicality of the proposed approach which can reveal rich knowledge for
further advanced decision-makings like logistics planning, production planning and scheduling, and
enterprise-oriented strategies. Lee et al. ( 2018 ) applied data mining and optimization methods to
real-life cases from a liner shipping company considering weather data to optimize vessel speed, fuel
cost, and service level. The bibliometric package supports the process of importing data from
different databases such as Scopus, Web of Science, and PubMed and assists researchers in building
data metrics (Aria and Cuccurullo 2017 ). The TPA then verifies the response as under. Challenges
of cloud computing use: A systematic literature review Cloud computing represents a new model for
IT service delivery and it typically provides over-a-network, ondemand, self-service access, which is
dynamically scalable and elastic, using pools of often virtualized resources. Therefore, we conducted
a systematic literature review that (1) investigates the tools and techniques of optimising big data in
SCM, (2) provides comprehensive coverage of the applied big data management solutions in
industries, and (3) summarises the potential solutions that may address the research gaps. Much like
the Walkman and a portable hard disks are comprised of several existing concepts and technologies,
cloud computing merges several already existing technologies such as browser interfaces, Web 2.0
interactivity, high bandwidth networks, time sharing, and virtualization. From this table, optimisation
methods have been used more than the other techniques in this area. As data, owners and servers are
different identities, the paradigm of data storage brings up many security challenges. One of the
main identified gaps in the available literature in both dimensions of big data management and big
data optimisation in the SCM is the lack of case studies and practical examples. Abstract This paper
analyzes the current state of research into Cloud Computing and Supply Chain Integration with the
objective to identify the findings to date, the areas of study developed and research gaps to provide
guidance for future research. The reason is that the implementation of big data-related techniques in
the SCM has several challenges. Several scholars have empirically investigated the impacts of using
big data on the performance of supply chain by using statistical methods in a generic supply chain
(Chen et al. 2015; Gunasekaran et al. 2017; Hofmann and Rutschmann 2018 ). This project
introduces the concept of cloud computing and cloud storage as well as the architecture of cloud
storage firstly. Methodologies for Enhancing Data Integrity and Security in Distributed Cloud. The
admin can provide file access option to the authorized users. First, the process of the method used in
this research is introduced. Journals insights are helpful for whom interested publish in the future as
it offers an overview of metrics of the research. 2.2.2.2 The number of annually published articles.
Data, supply chain, planning cycles: Industry 5.0 utilizes decentralized IIOT (Industrial Internet. This
category only includes cookies that ensures basic functionalities and security features of the website.
Findings Today, digital technology is the primary enabler of supply chain (SC) competitiveness.
JustCloud automatically backs up your files to the Cloud at the. These cookies do not store any
personal information. This is one of the most significant revolutions in Information Technology, after
the emergence of the Internet. Data outsourcing creates many security challenges to both cloud
providers and users. The research question sought to investigate how big data in the supply chain can
be optimised. A Systematic Literature Review of Cloud Computing Adoption and Impacts
Additionally, among those that use, many face challenges to gain benefits as what is normally
claimed. The adopted analytics infrastructure framework (Tan et al. 2015 ) Different big data tools
offer different services for end users, which may offer different capabilities of analysing and
managing data in SCM. SlideShare is the top website to share, publish or view presentations. I found
it. Different levels of big data optimisation and management techniques are used to ensure effective
and seamless supply chain operations. Such problems have been frequently addressed using
mathematical modelling, simulation, and heuristic and metaheuristic solution algorithms (Ardjmand
et al. 2020; Cano et al. 2020; Schubert et al. 2020; (Shavaki and Jolai 2021a, b ). Instead of running
programs and data on an individual desktop computer, everything is hosted in the “cloud”. Data,
supply chain, planning cycles: Industry 5.0 utilizes decentralized IIOT (Industrial Internet. Ol 1 C 9::
n Nl lj l Nl A Step TPA END ?? ? ? ? ? ?? ? ? ? 5. We use a systematic literature review method to
investigate these questions. In the cloud integrity can be checked using a message authentication
code (MAC) algorithm. Improved data accessibility makes cloud storage attractive to businesses as
the. JSEA 25 The linear combination is preserved through the use of homomorphism, and each set ?
? 1 j BD wherejn. There are conceptual models of data infrastructure, big data management solutions,
and proposed approaches to tackle the huge amount of big data. Big data experts believe that, in the
next coming years, unstructured data will be the major proportion of the total generated data (Zhan
and Tan 2020 ). Figure 5 shows two clusters of the most occurrence keywords grouped in two
different colours (red and blue), indicating these keywords’ frequent appearance between different
types of studies. With the development of industry 4.0 in the business world, every object linked
with a supply chain is continuously generating data in structured (data generated with the formal
structure like records, files, docs, and tables), semi-structured (data contains distinct semantic
elements but does not have formal nature), or unstructured (data without any identifiable formal
structure such as blogs, audio, video, image, etc.) forms Biswas and Sen ( 2016 ). This paper presents
the model and design of a cloud system for use by members of the KTU community. The operation
of coding is performed by the new cloud storage server. For the dimension of big data management,
two categories of data architecture and storing data techniques are considered. These two research
questions have been addressed using the bibliometric analysis and content analysis methods. All data
transferred to the cloud is incredibly secure and is. Similarly, in most of the studies reported in the
literature of (Nguyen et al. 2018 ), the visualisation model is treated less significantly mostly as a
supplement of other state-of-the-art data mining models. Although big data applications in supply
chain management appear to be often studied and reported in the literature, different angles of big
data optimisation and management technologies in the supply chain are not clearly identified. To
browse Academia.edu and the wider internet faster and more securely, please take a few seconds to
upgrade your browser.
This is to ensure the relevance of the documents to our scope. JSEA 25 The linear combination is
preserved through the use of homomorphism, and each set ? ? 1 j BD wherejn. In the field of
information technology, privacy and data security have long been a serious concern. The adopted
analytics infrastructure framework (Tan et al. 2015 ) Different big data tools offer different services
for end users, which may offer different capabilities of analysing and managing data in SCM.
Screening stage using the document type filter in each database, we selected only peer-reviewed
papers, final documents and, English writing published in the last ten years. Besides, big data
comprises information collected from internet-enabled electronic devices such as tablets and
smartphones, especially voice recordings, videos, and social media (Chen et al. 2015 ). “SCM” is
generally defined as the management of relationship flow as well as the flow of material,
information, and resources within and across a network, including upstream and downstream
organisations (Rai 2019 ). Your comment will be available for future viewing at the end of the
document. The use of this code method helps in the recovery of file during server failures.
Consequently, the scope of this systematic literature review focuses on both big data management
and optimisation studies in SCM in recent years that gives our work a novel multidimensional
structure unlike previous literature reviews that mostly focused on big data analytics. The search
string differs from a database to another one because it is often difficult to reproduce the exact same
query between databases. We'll assume you're ok with this, but you can opt-out if you wish. A single
click shares the publication to your Reading Feed automatically. Lamba and Singh ( 2018 ) used
three separate multi-criteria decision- making (MCDM) techniques to inve(Lamba and Singh 2018
)stigate the relationships between big data enablers in operations and SCM, including interpretive
structural modelling, fuzzy complete interpretive structural modelling, and decision-making trial and
evaluation laboratory. Likewise, the application of IoT devices in conjunction with AI and analytical
approaches also has significant potential. Embed YouTube videos inside SlideShare presentations. To
help managers make better use of the available big data and obtain competitive advantages, a big
data infrastructure is required. These are a conceptual structure map, factorial map of the highest
cited documents, and a factorial map for the most contributed papers. Here are some other threats
that come under the Cloud computing. Fernando et al. ( 2018 ) also used structural equation
modelling to investigate the effects of big data analytics on data protection, innovation capacity, and
supply chain efficiency. Several scholars have empirically investigated the impacts of using big data
on the performance of supply chain by using statistical methods in a generic supply chain (Chen et al.
2015; Gunasekaran et al. 2017; Hofmann and Rutschmann 2018 ). The customer doesn’t have access
to the underlying cloud. The availability can be checked on every server usin g POR by a customer.
Resources, p 105193 Roy C, Rautaray S, Pandey M (2018) Big Data optimization techniques: a
Survey. An example of using optimization in supply chain is found in Amazon, which has
revolutionized the game by providing extremely fast delivery timeframes and alerts for projected
delivery times and minute-by-minute tracking. The customer can acquire numerous virtual storage
devices just using an ordinary web browser, and there is no need to have an entire awareness about
the installation and communication. However, there may be literature in this research topic that is
irrelevant. On the other hand, big data optimisation addresses the methods, techniques, and tools that
can be applied to big data to make data-driven decisions leading to improvement in the performance
of the supply chain. In demand management, Nita ( 2015 ) systematised demand forecasting using
heterogeneous mixture learning technology in the food supply chain. Boone et al. ( 2019 ) provided
an overview of how customer insights focused on big data and related technologies could improve
supply chain sales forecasting. However, this new paradigm is facing diverse challenges from many
fronts.
Combined with the high-performance requirements, the availability, reliability, security and
scalability of cloud storage, it focuses on analyzing such key issues of cloud storage like the
structure of cloud storage systems, public and private cloud, data types in cloud storage, internal
technical resources and the prerequisite for development of cloud storage technologies, at the same
time, it makes a conjecture on the development trend of cloud storage technology. Cloud Providers
mainly focus on delivering services and provides a lesser focus in data security and privacy which is
the main aspect in cloud computing. This paper provides theoretical guidance for supply chain
managers about BDI investment decisions and their consequences. Similarly, in most of the studies
reported in the literature of (Nguyen et al. 2018 ), the visualisation model is treated less significantly
mostly as a supplement of other state-of-the-art data mining models. Table 8 shows the most reported
big data management tools that have been most cited in the literature. For example, data collected
from a variety of sources, such as sensors and digital cameras, in the service and manufacturing
industries are usually unstructured, heterogeneous, incompatible, and non-standardised (Zhong et al.
2016 ). To cope with these difficulties, companies must pre-process the unstructured data and
develop a shared data warehouse to store relatively homogeneous information (Lamba and Singh
2017 ). Big data is accelerating the evolution of supply chain design and management (Tao et al.
2018 ). Also, big data analytics can enhance capacity utilisation, enable companies to create new
business models, improve customer experience, reduce fraud, improve supplier quality level, and
expand end-to-end supply chain visibility facilitating prescriptive and predictive analytics (Zhan and
Tan 2020 ). These cookies do not store any personal information. YouTube was designed and then
released in 2005 by three previous employees of. Furthermore, the literature review has several
limitations; for instance, the use of exploratory methodology makes the study to be prone to
subjective bias. Adopting Cloud Computing in Global Supply Chain: A Literature Review The
objective of this article is to review the adoption of cloud computing in global supply chain. As the
metadata is computed on the basis of a single block rather than the entire data, so the perform- ance
is improved. The two clusters are obtained by using the Multidimensional Scaling method (MDS).
While the methodology reported in the review of (Nguyen et al. 2018 ), has provided robust steps to
conduct the systematic review, they did not use bibliometric analysis that can assist in discovering the
urgent and published areas of research. You can download the paper by clicking the button above. In
addition to the studies mentioned above that demonstrate the positive impact of big data on supply
chain performance, the systematic literature review proved that big data optimisation is widely
applied in all functional areas within SCM. The TPA which is as- signed the task of verification will
receive metadata in- formation j. In cloud storage, the user sees a virtual server; it appears as if the
data is stored in a particular place with a specific name. Additionally, the main- tenance tasks of the
storage, for instance backing up the data, data duplication, and obtaining extra storage equipments,
are delegate to the liability of a supplier, permitting the business firms to only care for their main
business. The method proposed for the recovery of lost or corrupted data required the exact amount
of coded block one time only, and offer modified created block to the fresh cloud data server. With a
total of 37 papers published on this topic, Fig. 2 shows the annual number of articles published from
2015 to 2020 on big data applications in SCM. The big data term mentioned in the paper was to
extract the parameters-related data. It highlights some aspects of data management techniques that
have been applied in SCM. They adopted the structural equation modelling approach to test their
hypotheses on collected survey data. Using the Just Cloud storage system allows you to not only
upload your files to the. The first three categories are deeply rooted in well-known challenges of
cloud computing. We will improve the traditional file storage method and we will make a platform
which will get more privileges. However, in the most recent years, there was a substantial conversion
in the IT industry in terms of commercial applications. Jawed Karim. These three came up with and
designed the plan to have many. Cloud computing is a self-service Internet infrastructure that allows
people to access computing resources at any location worldwide.