Bibliography

Research Paper References

Anand, A. (2017). Cloud computing and cloud related security issues. International Journal of Advanced Research in Computer Science, 8(5) Retrieved from https://search-proquest-com.mutex.gmu.edu/docview/1912631341?accountid=14541

In Cloud Computing and Cloud Related Security Issues, the author goes into detail about the components of cloud computing and the security concerns associated with it. The initial portion of the article is an explanation on the various cloud computing platforms, like the cloud services delivery models Later in the article, the author classifies the various security threats and suggests some ways of dealing with them in the interest of the cloud service providers, by extension the users of the applications. There is no doubt this article is reliable, not only did the author explain everything in a way that makes sense for someone who is unfamiliar with the intricacies of the cloud, I was also able to learn some of the terminology of cloud computing. I can use the information from here during the current use and security concerns of my paper.

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Galov, N. (2020, January 2). Cloud Adoption Statistics for 2020. Retrieved February 8, 2020, from https://hostingtribunal.com/blog/cloud-adoption-statistics/#gref

Seeing as data is an important aspect of cloud computing I thought using this blog, Cloud Adoption Statistics for 2020, would be appropriate since it contains a lot of statistical data on cloud computing. When it comes to cloud adoption data, the public cloud is used by 91% of businesses while the private cloud is used by 72%. Through a survey conducted by 166 IT leaders, the reasons why an enterprise might choose to rely on cloud computing has been revealed, with 61% of companies saying it was for cost-cutting initiative. According to the collected information concerning the United States government, around 50% of its organizations are actively using cloud services, specifically most of them using a private cloud. Speaking of the government, most of its agencies spend between $2 million and $3 million per year for cloud services.

In my eyes, what makes this article trustworthy is how its writer has gathered this information from multiple sources. These sources determine the number or organizations who’ve decided to use cloud computing, as well as the reasons why they decided to do so. More often than not, people tend to use this type of data just for the numbers without considering other factors at play. Because of the broad focus Cloud Adoption Statistics for 2020 has, it will be helpful when I am discussing the current use, security concerns, and the future of cloud computing.

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Graf, Marlon, Jakub, & L., B. (2016, April 7). Emerging Challenges for the Cloud Computing Industry. Retrieved February 8, 2020, from https://www.rand.org/pubs/working_papers/WR1144.html

Emerging Challenges for the Cloud Computing Industry is a research paper written for the purpose of explaining the legal subjects related to cloud computing, such as the laws and regulations meant to everything under control. To put it simply, the privacy laws in the United States that are meant to protect a person against data collection by private entities are considered to be weak. This is the result of the hands-off approach the federal government has adopted ever since internet’s infrastructure was privatized during the mid-1990s. Although there are many laws and regulations in the United States meant to protect the data of its citizens, there is some ambiguity whether some rights of privacy are extended to data stored in the cloud.

Of all the sources of information I have acquired, this research paper is the most trustworthy one. Just like any good research paper, the authors frequency cites their sources throughout their writing. On top of that, there is even an extensive bibliography at the very end. In regards to the usage of this research paper, there is no doubt I’ll use it when the legal and ethical aspects of cloud computing must be addressed.

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Tang, A. (2016). Up in the cloud: Data and security concerns in cloud computing. Chicago Policy Review (Online), Retrieved from https://search-proquest-com.mutex.gmu.edu/docview/1800272548?accountid=14541

The focal point of Up in the cloud: Data and security concerns in cloud computing, a scholarly article, is the summarization of factors that could create security issues for people who use the cloud. As the author accurately points out, there is a growing number of people and groups who have started the use of cloud computing. While this is not a bad thing by itself, the main issue is number of concerns emerging from this growth. One of these concerns is with communication, specifically with communication between customers and the cloud, along with communication within the cloud itself. As a result of people having to share a network infrastructure within the cloud in order to share cloud resources, this means there is more difficultly in using standard intrusion detection and prevention mechanisms. There are security issues for the cloud on an architectural level as well, such as there being data breaches and cross-user attacks from an error in virtualization. Since the data stored in the cloud is controlled by the service providers, plenty of people are uncertain about how secure their data is and whether their privacy is ensured. Similarly, the fact cloud service providers have administrative control of private data has caused legal issues. Because cloud users have a limited access to information, this means the information provided by cloud service providers can be unreliable. This can cause certain difficulties in determining who is responsible for the transgression of a cloud-related dispute.

Initially I had my doubts on the reliability of this scholarly article due to the lack of references to any outside sources of information. What change my mind was the author’s ability to explain cloud computing, a fairly complex subject, in a way I was able to understand. In my mind, this certainly speaks of the article’s quality. Initially I thought this article would be mainly explain the security aspects of cloud computing, but I pleasantly surprised to see it goes over the legal issues that can emerge from a security issue.

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

What Is Cloud Computing? A Beginner's Guide: Microsoft Azure. (n.d.). Retrieved February 11, 2020, from https://azure.microsoft.com/en-us/overview/what-is-cloud-computing/

For those who are unfamiliar with cloud computing, such as myself during the beginning portion of my research, this document provides and goes over the many aspects of cloud computing. After this guide explains what exactly cloud computing, it then lists the benefits of using cloud computing. I was surprised to learn there are also various types of cloud computing and cloud services. Even though the article does not provide any sources, I still think it is reliable since it a guide from a well-known company meant to familiarize people with their product, meaning it would be unwise if they did a sloppy job in informing people about their product. Using the information from here, I will be able to describe.

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

What is cloud computing? (2016, Sep). Micro Mart, , 14-16,18,20,22. Retrieved from https://search-proquest-com.mutex.gmu.edu/docview/1861758397?accountid=14541

Unlike other articles and blogs dedicated to the explanation on what cloud computing is, What is cloud computing? was perfectly clear in what it had to say due to its simplicity. From what I understand by reading this article, cloud computing allows an individual to access all sorts of software and services from the internet instead of it being just restricted locally to the computer. After this portion, the author goes over the most notable cloud services, such as Google Cloud Platform, Azure and Amazon Web Services. There is even a portion of the article dedicated to providing a brief summarization of the history of cloud computing. For me, it was very surprising how the idea of the cloud came as early as the sixties, and cloud computing has only been used by the public for around a decade.

The sheer detail the author puts into describing cloud computing is impressive, and for me it is an indication of the reliability of this article. It is evident the writing is the product of a person taking their time to describe a complex subject in a detailed manner. All of this information would be useful when I need to describe cloud computing’s current use and background.

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Williams, H. (2018, March 13). The history of cloud computing: A timeline of key moments from the 1960s to now. Retrieved February 6, 2020, from https://www.computerworld.com/article/3412271/the-history-of-cloud-computing--a-timeline-of-key-moments-from-the-1960s-to-now.html#slide1

The title of this slideshow presentation, The history of cloud computing: A timeline of key moments from the 1960s to now, provides a substantial hint of the content, that being a detailed timeline of cloud computing. For me the most surprising part of this slideshow was how the idea of cloud computing came as early as 1969 with the Advanced Research Projects Agency Network, or the ARPANET, an early packet-switching network created by the U.S. government to give scientific users the chance to use their computers to communicate and share computer resources with each other. The modern internet then began being developed after the ARPANET saw the incorporation of the TCIP/IP, which stands for transmission control protocol/internet protocol, and it became available during 1990. During 1999, cloud computing famously used by Salesforce.com, whose usage of Software-as-a-surface led to the cloud being used by more businesses. Since then, cloud computing experienced its own evolution from all the usage it experienced from countless individuals and organizations.

Despite each slide being brief, its contents were fairly descriptive in the important events cloud computing has experienced. After taking some time to conduct additional research on the background of cloud computing, I can say the slideshow presentation is trustworthy because of its accuracy. With the information from the slides, I believe I can accurately explain the history of cloud computing with all of this information.

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Website Media Reference

Cloud Computing. (2015, March 23). Retrieved April 16, 2020 from https://www.flickr.com/photos/61423903@N06/16284069063/in/photolist-qNY7pr-WfR2iS-eAZ7cy-7Hfa7K-ZEhSqf-fC9wKs-SBUM9L-fn6eLX-io1nqk-XwCHvt-XwCHCc-8Qq4ux-8Qq4dn-5GpPns-ej4mUz-fBUedK-2bs7fAL-7tpmPP-8rwVj9-8rtPag-8rwVKj-8rwVeL-eapLp2-8rwV6m-8rwVSU-8rwV4h-8rtPuR-8rwVrE-8rtP68-6qSK7C-5FYFZe-8Qq46g-8Qq3XV-8Qt9Jf-bPoKuR-8Qq3QZ-8K6pZ6-8rwVHW-8rtPB2-8rwUVL-8rwURb-8rwUME-8rwVWd-8rwVU9-8rwVAE-8rwVgf-8rtNUR-8rtNGr-8rwVYw-8rwVRj

The image I used for the Introduction content page, which I obtained through Flickr on the 16th of April, shows a blue cloud with arrows that are pointing at technological devices. While I do not know the real name of the picture's copyright holder, their profile name is FutUndBeidl. According to FutUndBeidl, people were allowed to use the image as long as they provide attribution by giving appropriate credit, providing a link to the license, and indicating if any changes were made. I respected this request by creating a citation for the image and posting a comment thanking FutUndBeidl.

I chose this image because I believe it provides a meaningful illustration on one of the core attributes of cloud computing. This attribute is how a large portion of technology nowadays are connected to the cloud. Furthermore, due to how advanced modern day technology has become, the computing services a person can receive on their devices are almost indistinguishable. Another reason why I decided to use this image is because it shows the devices that are capable of using the cloud: a smartphone, a tablet, and a laptop. In the past decade, these technological devices have been used the most to access the cloud.

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Cloud Computing Types. (2009, March 4). Retrieved April 16, 2020 from https://commons.wikimedia.org/wiki/File:Cloud_computing_types.svg

For the Background content page, the image I used, a diagram showing the three main types of cloud computing, was retrieved on the 16th as well. The creator of this diagram is Sam Johnston, who used OminGroup's OmniGraffle and Inkscape to create the image. In order for other people, including myself, to use the image, they have to provide attribution. Another condition that an individual has to follow if they want to remix, transform, or build upon the material, is that they have to distribute their contributions under the same license as the original. By creating a citation, I provided attribution to Sam Johnston

As soon as I saw this diagram, I knew it would be the perfect image for the Background content page. It effectively summarized the second paragraph of the page by illustrating the available types of cloud deployment: the public, private, and hybrids. In addition to this, not only did the diagram show the relationship between the deployment types, it also depicted how the public cloud is owned and operated by a third-party cloud service providers while the private cloud is almost exclusively used by a specific group of people. Even though I believe I adequately explained the nature of cloud deployment on the content page, images like this go a long way in helping any potential viewers to gain a better understanding of the content. What helps with this is how simple the diagram’s appearance and design is.

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Future Cloud Computing. (2020, April 23). Retrieved April 23, 2020 from Future Cloud Computing.jpg

The artwork that is original and created by me was made on April 23, 2020 using the icon shapes from Microsoft Word to create an image for the Future Uses content page. In the image, it is a computer whose screen has a clock within a blue cloud. I created this artwork since I was unable to acquire any images related to the future uses of cloud computing. This is because of how specific the material of the content page was, it detailed how individuals, mainly organizations and businesses, would use cloud computing in the foreseeable future. Each component of this image represents the idea of cloud computing’s future. Keeping this in mind, the clock within the computer screen is meant to represent time, specifically the future, and the computer within the cloud is supposed to represent cloud computing.

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

My Computer. (2020, Arpril 16). Retrieved April 17, 2020 from My Computer.jpg

For the digital photograph that was taken by me, which was on April 17, 2020, I used the camera on my iPhone to make a picture of my computer. As to why I chose to use an image of my computer as the digital photograph, it is because I thought it was related to the material in the Syllabus content page since it was about the content of IT 104, a class meant to act as an introcution to ocomputing. Seeing as how I had to use my own computer to complete the work for this class, I thought having a digitial photograph on the tool I used would have been appropiate. Furthermore, at the time I was not sure if I would be able to create a digital photograph or original artwork that would be compatible for the other content pages. Although my choice is rather simple, I think it serves its purpose as an illustration.

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Secure Cloud Computing. (2012, March 23). Retrieved April 23, 2020 from https://www.flickr.com/photos/61423903@N06/7557181168/in/photolist-cvNwF3-SBsLKe-7nmCFz-6hd6ad-Ld3Utq-mZdr2n-mZedzX-9R2DoW-6kkRs9-bz2dNP-mZfcku-5Gr9Cm-de17K8-mZdrbD-p4zk7n-q1rQN1-q1iVLB-inZJTW-mZdrhn-8iQvng-5EPuhR-7kAz1Q-bybBXa-dCjx4z-szTREp-7kwFyZ-9LhWwo-7kwAkp-7kwHmB-7PBa81-7nmCBr-9S5Pa8-inZDAF-7eWofD-7PBarh-2gmwf5f-5yp1jq-7Ack2K-7AcjWc-7PBaxu-7AcjLV-7Ag6Bq-YyZPDY-a2NqdE-6zkb5E-ihpG9W-64ADEb-A1s53f-65DL8G-d3aVCG

Similarly to the image I have on the Introduction content page, the picture I included in the Security Concerns content page was obtained on the April 16, 2020 through Flickr. The image itself is a cloud-shaped lock, with the copyright holder also being FutUndBeidl. Just like before, people were allowed to use the image as long as they provide attribution . I made sure to give attribution by creating a citation for the image and posting a comment thanking FutUndBeidl.

To put it simply, I chose this image due to the appearance of the lock in the picture. Seeing how the content of the Security Concerns page was on the potential security threats, I knew there would not be many images containing anything too descriptive about the material I wrote about. Because of this, I needed an image that would give any viewers an idea on what the topic was. When I saw how the cloud-shaped lock was unlocked, I realized it would go pretty well with the topic of the content page. After all, cloud computing security threats emerge when there is a vulnerability, and an unlocked lock implies that there are vulnerabilities to something that is supposed to be secured.

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Surveillance spying computer screen. (2018, April 26). Retrieved April 23, 2020 from https://pixabay.com/illustrations/surveillance-spying-computer-screen-3351758/

Unlike the previous references, the image for the Ethical & Legal Implications content page does not contain any conditions, as stated by the Simplified Pixabay License. The username of the owner of the image, a computer with an eyeball on the screen, is Tumisu. I used this image, which I found on April 23,2020, since it provided a direct illustration on one of the main concerns of cloud computing. Ever since cloud computing has become an integrated part of modern-day society, people have been concerned with the idea of that their online activities are being monitored. I address this in the content page itself, and I do point out how their fears are in the end justified. Instead of there being a random person who is conducting surveillance, it is the U.S. government who is watching people. There being a eye in the computer screen of the image drives to point very bluntly.

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

The Various Components of Cloud Computing. (2020, February 20) Retrieved April 23, 2020 from https://www.youtube.com/watch?v=9lph-7vxevE

The Various Components of Cloud Computing , the video that is original and created by me, was posted on YouTube on February 20, 2020 as an assignment for my IT-104-215 class. My video, a PowerPoint presentation recording, serves as an overview for what cloud computing is. Just like the website, a large portion of the information from the video is from the research paper I created. Each slide of the PowerPoint goes over a different aspect of cloud computing that I discuss in the research paper and the website. This video also contains the references of the sources that I used to acquire the information I needed.

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Website Links

Research Paper Blog & Wiki:

  1. Cloud Computing Overview Wiki
  2. The Intricacies of Cloud Computing