Write an annotation of 10 bibliography

  • Category:
    Logic & Programming
  • Document type:
    Assignment
  • Level:
    Undergraduate
  • Page:
    2
  • Words:
    1465

Cloud Computing: Annotated Bibliography

Cloud Computing: Annotated Bibliography

Bansal, A., Sethi, M., Rani, P., & Sharma, D 2014, ‘Introduction to Cloud Computing. 8300 defect for UNSW,’ International Journal of Computers & Technology, vol.13, no. 8, pp.4747-4752

In this article, Bansal, Sethi, Rani and Sharma all of whom are research scholars at Adesh Institute of Engineering and Technology, Faridkot notes that cloud computing is gaining a lot of popularity in the IT, research and computing industries. In this study, the researchers reviewed cloud computing by defining what cloud computing means, how it operates, services offered by cloud computing and the models of deployment. The researchers concluded by describing the benefits and shortcomings associated with cloud computing that must be taken into consideration before using to store, manage and process data. This article is useful to my research as it explains how cloud computing works, deployment models and the benefits and challenges associated with the technology.

Tari, Z., Premarathne, U., Bertok, P., & Khalil, I 2015, ‘Security and privacy in cloud computing: vision, trends, and challenges,’ IEEE Cloud Computing, vol. 2, no. 2, pp. 30-38.

In this article, Tari, Premarathne, Bertok and Khalil all of theRMIT University explores the security challenges associated with cloud computing and how to overcome them. The authors begin by noting that cloud computing is fast becoming a trend in various industries, such as IT and research where it is used to process, store and relay information in a very cost effective manner. Despite the benefits, the authors note that the rapid adoption of cloud-based services is hampered by the security issues associated with cloud computing. As such, the authors examined the challenges related to cloud-based services and solutions, thereof. Additionally, the authors explored the limitations of cloud by focusing mainly on the management aspects, such as data analytics, storage and access control. This article suits my research as it explores the benefits and security challenges that must be addressed to ensure effective deployment and use of cloud-based services.

), vol.1, no. 2, pp.53-58.International Journal of Cloud Computing and Services Science (IJ-CLOSER ‘World of cloud computing & security,’Kumar, A 2012,

In this article, Ashish Kumar explores the benefits and challenges associated with cloud computing. The author argues that cloud computing is likely to become the next IT Enterprise architecture because its ability to lower cost, foster innovation and improve business agility. The author proceeds to note that the nature of cloud computing allows for cost to be driven out of the service delivery while at the same time enhancing the speed with which services as deployed. However, the author suggests that, because cloud computing has many benefits to businesses; there is a need to ensure that the correctness of the user’s data is maintained in the cloud by enhancing security of the cloud. This article is useful to my study because it highlights the benefits associated with cloud computing and the security aspects of cloud that should be maintained.

Che, J., Duan, Y., Zhang, T., & Fan, J 2011, ‘Study on the security models and strategies of cloud computing,’ Procedia Engineering, vol.23, pp.586-593.

In this article, Jianhua and colleagues reviewed the security issues associated with cloud computing. The authors argue that, as much as cloud computing has a lot of benefits to businesses and individuals, it also brings in a lot of problems to people’s lives and ways of working. According to the authors, security of cloud computing has been the main issue to most users and also the major barrier to its adoption. To understand the security issues associated with cloud, the authors evaluated a variety of existing cloud computing models namely risk accumulation, multiple-tenancy, and cube models. Based on the findings of the security issues identified, the authors recommended the measures that ought to be taken to respond to the security challenges associated with cloud. This article is useful for my study as it investigates security challenges associated with cloud computing and suggests response strategies to adopt.

Li, X 2012, ‘The new trend of security in cloud computing,’ International Journal of Engineering Innovations and Research, vol.1, no. 6, pp. 516-519.

In this article, Xiangdong Li NYC College of Technology examines the security issues associated with the use of cloud computing technology. The authors note that cloud computing has become a trend in various industries. According to the author, the increased use of cloud computing is attributed to the many benefits associated with the use of this technology that includes increased efficiency, scalability, flexibility and lower cost. Despite the benefits, the author cautions that there are security aspects that must be taken into consideration and mitigated. As such, the author proceeded to describe the threats associated with the use of clouds and suggests various techniques that can be adopted to minimize or prevent the threats altogether. This article is suitable for my research as it not only describes the reasons for the growing use of cloud computing technology, but also highlights the threats and how to prevent them.

Kamboj, S., & Ghumman, N. S 2016, ‘Load balancing in cloud environment: a review,’ International Journal of Computers & Technology, vol. 15, no. 8, pp. 1-10.

In this article, Kamboj, and Ghumman examines the importance of load balancing in addressing some of the challenges associated with cloud computing technology. According to the authors, using load balancing on the provider and the consumer side of cloud help enhance efficiency to the provider and consumer, as well as improves resource utilization. This article is useful for my study as it explores the ways in which load balancing can be used to enhance the performance of cloud computing technology and minimize the challenges associated with the use of this technology.

Alsanea, M., & Barth, J 2014, ‘Factors affecting the adoption of cloud computing in the government sector: A case study of Saudi Arabia,’International Journal of Cloud Computing and Services Science, vol. 3, no. 6, pp. 1.

In this paper, Alsanea, and Barth explored the factors that affect the implementation of cloud-based services by governments with a focus on Saudi Arabian governmental organization. The researchers used a theoretical study design based on available literature to study four Saudi governmental organizations. The researchers used online study that involved 169 respondents from different organizations. The data was quantitatively analyzed to arise at a conclusion. The researchers noted that 85.80% of the respondents supported adoption of cloud-based services while 97.63% felts that its usefulness should be used as the basis for its adoption while 95.26 considered quality of service and security as the most important factors to consider. The article is useful for my researcher as it examines the factors that affect the adoption of cloud-based technology in organizations.

Walden,J 2011, Cloud computing security (YouTube), viewed 26 May 2016 https://www.youtube.com/watch?v=EeYUhwmagBY

In this video, Dr. James Walden of Northern Kentucky University explores the cloud services models, their functions and the security issues associated with cloud-based technology. Some of the data security issues highlighted by the author include data loss, downtimes, phishing, password cracking and botnets and other malware. Walden also described the various strategies that businesses and individuals can use to secure their data in a cloud computing environment. This video is useful for my research as it points out the security issues related to cloud-based technology and solutions to the challenges.

Bojanova, I., Dimitrov, V., & Corno, F 2014, Advancing cloud computing. IEEE Cloud Computing, viewed 26 May 2016 https://www.computer.org/web/computingnow/security/content?g=53319&type=article&urlTitle=advancing-cloud-computing

In this documentary on the IEEE Cloud ComputingBojanova, Dimitrov, and Corno notes that, cloud computing has numerous benefits to an organization and individuals as it enhances flexibility and that it is a cost effective. Nonetheless, the authors argue that cloud has numerous security challenges that must be addressed to ensure its effectiveness. Some of the security challenges include data loss, data breaches, hacking, malicious insiders and insecure interfaces. In the documentary, the authors discuss the practical techniques that organizations and individuals can use to secure the cloud. This documentary is useful for my research as it examines the security issues related to the cloud and offers practical solution to the cloud.

Proquest 2015, Software as a service and cloud computing: key considerations for libraries.Proquest Computing, viewed 26 May 2016 http://media2.proquest.com/documents/saas-and-cloud-computing-key-considerations-for-libraries.pdf

In this article on Proquest, the authors note that cloud computing is increasingly being adopted in libraries to enhance service delivery in library services. The authors begin by explaining key terms associated with cloud computing, and its benefits, which includes improved performance, cost effectiveness, rapid deployment and greater flexibility. This article is suitable for use in my research as it describes the importance of cloud in libraries and its benefits. Despite its usefulness of this article, it had a shortcoming in the sense that the author failed to highlight the security issues that librarians should take note of and minimize.