Proposed Pricing Model for Cloud Computing
نویسندگان
چکیده
منابع مشابه
MDP based optimal pricing for a cloud computing queueing model
We study the optimization of dynamic pricing in a queueing model with a finite buffer, where arrival rates depend on advertised price levels.We apply our study to a pricing policy in a cloud computing service provider setup. The main result of this paper is the multi-threshold structure of the optimal policy. © 2014 Elsevier B.V. All rights reserved.
متن کاملA Proposed Framework for Cloud Computing adoption
This paper presents a review related to Cloud Computing focusing on Cloud business requirements. From the review we recommend a number of methods managing Cloud services and evaluating its service performance, including the use of a pair of the Hexagon Models. Three organizational challenges of Cloud adoption are identified: (i) Organizational Sustainability; (ii) Portability and (iii) Linkage....
متن کاملPricing Strategy for Cloud Computing Services
The cloud services market exhibits unique characteristics such as instant accessibility, fluctuating demand and supply, and interruptible service provision. Various pricing mechanisms exist in current industry practice, however, none is comprehensive enough to capture all these features. In my work, I identify key factors related to cloud computing pricing. My dissertation includes three essays...
متن کاملPricing the Cloud: An Adaptive Brokerage for Cloud Computing
Using a multi-agent social simulation model to predict the behavior of cloud computing markets, Rogers & Cliff (R&C) demonstrated the existence of a profitable cloud brokerage capable of benefitting cloud providers and cloud consumers alike. Functionally similar to financial market brokers, the cloud broker matches provider supply with consumer demand. This is achieved through options, a type o...
متن کاملCloud Security Proposed and Demonstrated by Cloud Computing Adoption Framework
This paper presents the Cloud security by Cloud Computing Adoption Framework (CCAF) from its system design, development and implementation. We illustrate the required attributes and explain its significance, including the CCAF security design. To demonstrate how it works, software schema is developed. CCAF can perform quarantine and protective actions based on “Rescue”, an XML-based schema and ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Computer Science and Information Technology
سال: 2014
ISSN: 2331-6063,2331-6071
DOI: 10.13189/csit.2014.020405