Alemami, Y., Al-Ghonmein, A., Al-Moghrabi, K., & Mohamad, A. M. (2023). Cloud data security and various cryptographic algorithms. International Journal of Electrical and Computer Engineering, 13(2), 1867-1879. https://doi.org/10.11591/ijece.v13i2.pp1867-1879 Accessed September 3, 2023.
The people behind this research paper are well learned computer scientists and professors. This source speaks briefly about how Cloud storage algorithms and codes have become more popular recently and the methods are varied. They analyze many different varieties of Cloud encryption and algorithms to determine how secure each of them is. The algorithms are in comparison of each other and how well they encrypt data and how fast, to also their complexity and storage capacity. This is important for the benefits of well-developed security measures and the social issues that would come from not having properly protected Clouds for organizations and employees at risk of having data stolen or naturally erased.
Maayan, G. D. (2023, April 13). How the Cloud has evolved over the past 10 years. DATAVERSITY. https://www.dataversity.net/how-the-Cloud-has-evolved-over-the-past-10-years/. Accessed September 3, 2023
Gilad David Maayan is a technology writer on Dataversity and a 3-time winner of international technical communication awards for his work. This website paper describes the history of the Cloud Storage System as it developed through the internet and how data is stored on independent networks. It goes further into how multiple companies in the early 2000s were pioneering this technology and the social benefits it provided for people who could work remotely and how it is developing today. Then finishes with growing methods of storage like Infrastructure-as-a-Service and the MultiCloud services.
Rhoton, J. (2009). Cloud computing explained implementation handbook for enterprises (2nd ed.). Recursive Press. Accessed September 19, 2023.
John Rhoton is well established Computer Science specialist and has been a strategist for Cloud Computing and other developments for companies like Microsoft and forums like the HP Technology Forum. This book covers the basics of what cloud computing is and the various storage services provided. He goes into detail about Public, Private, and Hybrid services and the expanse of Cloud Computing. He gives recommendations on what organizations are best suited to each type and how to assess providers. While not all of his information was utilized for this paper, he has a comprehensible style of writing that makes it easy to digest. The IT landscape has been changed by Rhoton’s work and has been influential on this paper.
Brady, K. (2010, December). Cloud Computing—Panacea or Ethical “Black Hole” for Lawyers (The Bencher—November/December 2010). American Inns of Court., http://www.innsofcourt.org/Content/Default.aspx?Id=5499. Accessed September 21, 2023
Kevin Brady is a well-educated figure currently working on the Corporate Counsel E-Discovery RIM of Volkswagen of America. He received his Master’s in Business Administration as well as being a Juris Doctor from Widener University. His article was cited here from The Bencher, the publication of The American Inns of Court, its features are written by experts with “central themes such as legal ethics, professionalism, civility, or mentoring.” His article was written for the purpose of expressing the legal and ethical concerns that lawyers and businesses should be aware of when dealing with cloud technology.
White, R. (2010, August 24). Cloud Computing: Advantages and Disadvantages | The Boardroom Brief Blog. Gunster’s Boardroom Brief., http://boardroombrief.com/theblog/2010/08/24/Cloud-computing-advantages-and-disadvantages/. Accessed September 21, 2023
Robert White is a lawyer with many years working as a consultant to firms when it comes to dealings with service providers and in 2007 was, as one of the “Best Lawyers in America” for corporate and technology law. His article goes over the potential benefits of Cloud computing for businesses and entrepreneurs but also goes over risks. For the purposes of this paper, he was primarily used for the risks associated with legality of certain practices and for privacy concerns. He notes that third party service providers do not provide full information about their practices and policies and warns organizations about how they will have little control over the data storage and encryption. He recommends organizations make contingency plans based on the practices of the service providers. For legal protections re recommends organizations have a clear written form of what the relationship between the provider and organization is and what is to be provided.
Watts, S., & Raza, M. (2019, June 15). SaaS vs PaaS vs IaaS: What’s The Difference & How to choose. BMC Blogs. https://www.bmc.com/blogs/saas-vs-paas-vs-iaas-whats-the-difference-and-how-to-choose/. Accessed September 21, 2023
Stephen Watts is a marketing professional and professional website developer, so he has experience with finding and working with service providers and the systems they use. Muhammad Raza is a computer scientist who works with the KTH Royal Institute of Technology and works in developing Cloud Computing and Security. They focus on the different kinds of infrastructure and varieties of Cloud Storage. They talk about SaaS, IaaS, and PaaS, but for this paper PaaS was not discussed. They describe the benefits of both SaaS and IaaS and in which situations and for what organizations they are best suited for, particularly based on size and growth. Then they describe the delivery of the services and how secure and reliable they are.
"Open Computer With Code". Aquired from Unsplash for its many free to use images. Used to represent some of the things we have learned over the course of this class, most notabley html and website creationt as represented on the computer. Owned by Clement Helardot. Obtained 10/3/2023. Source: https://unsplash.com/photos/black-and-silver-laptop-computer-on-table-95YRwf6CNw8. Permissions Page: https://unsplash.com/terms.
"video". The video details the use of html that created the website and follows the path the viewer will follow as they go through the website with brief descriptions of what to expect on each page. Created 11/14/2023. https://coursemedia.gmu.edu/media/Shad+Gafoor+Website+Video/1_c4j7kgor>. video is original and created by me.
"Digital Cloud Image". Aquired from Unsplash for its many free to use images. The Cloud is the main talking point of this website and my paper, so its representation is to draw an immediate connection to how people usually percieve or imagine the Cloud. While not being a physical object it made of many components that we interact with daily: The Internet where data is transfered, Servers where data is stored, and connections to other people we work with. Owned by Growtika. Obtained 11/13/2023. Scource: https://unsplash.com/photos/diagram-Am6pBe2FpJw Permissions Page: https://unsplash.com/license.
"Shadowy Figure in Front of Screen". Aquired from Unsplash for its many free to use images. This image is ment to represent a hacker for the the purposes of being a visual representation of some people who pose a security threat to people and organizations. Security is a major talking point when it comes to Cloud storage, as expressed in my paper, the availibility of data and also the ability to have any contracts with data service providers are proving to be an increasing form of attack in the modern day. Owned by Mika Baumeister. Obtained 11/13/2023. Source: https://unsplash.com/photos/flat-screen-computer-monitor-displaying-white-and-black-screen-J5yoGZLdpSI. Permissions Page: https://unsplash.com/terms.
"Lock Clipart". Aquired from Unsplash for its many free to use images. The lock is to represent the actions many organizations have to take, whether or not they themselves are data service providers, for their employees and customers. Data and personal security are important for any Cloud server or provider and how people can also be locked down by certain business practices that they have to look out for when choosing a service provider. Owned by Mohamed Hassan. Obtained 11/13/2023. Source: https://pixabay.com/illustrations/business-image-sign-communication-3079910/. Permissions Page: https://pixabay.com/service/terms/.
"Conclusion Art". Created in Microsoft Paint. Created 11/13/2023. Artwork is original and created by me.
Blog: