Betts, B. (2018). Blockchain and the promise of cooperative cloud storage. ComputerWeekly.com . Retrieved 3 April 2018, from https://www.computerweekly.com/feature/Blockchain-and-the-promise-of-cooperative-cloud-storage
Betts begins by saying that although blockchain technology is widely used in the crypto-currency world, it has many applications. Betts seemingly investigates how the blockchain technology can be used in distributing data and recording transactions. The author tries to show how the technology can be used to secure data in cloud computing by examining some of the advantages.
Delegate your assignment to our experts and they will do the rest.
Summarily, the objective of Bett is to emphasize that indeed blockchain technology can be used in carrying out transactions and can be a relief to many online companies engaging in financial transactions. Stored data is encrypted and one can tell whether the data has been tampered with. Betts even asserts that most of the time the theft of bitcoins is as a result of the owner’s insufficient security of the digital wallet than insecurities in the blockchain technology .
This is a helpful source particularly in defending the use of the blockchain technology in carrying out transactions. The author exhaustively outlines the advantages of the blockchain technology hence will be an important source in the research paper in defending cloud computing. The information in the article is also reliable because the author analyzes experiments done by different researchers.
Catallini, C. (2017). How blockchain applications will move beyond finance. Harvard Business Rev , 2 .
Although governments have been a little skeptical about crypto-currencies, many central banks are investigating the possibility of embracing the blockchain technology to carry out transactions. The main aspects being investigated include , t he security, as well as, whether the technology will be in tandem with the existing payment networks and taxation requirements. In trying to solve the skepticism of most government and other entities that would like to use the blochain technology, Catallini outlines how the system works. The most prominent aspect in regard to how the technology works is that every user has access to the database as well as the history. That means that the system is transparent and as a result can be verified
I will use this source to demonstrate how the blockchain technology works so that institutions that are skeptical can understand . The limitation with this article is that it does not show how the technology can be used by the various governments to align with their financial transactions while making sure that people comply with tax rules. Nevertheless, this is a useful source in demonstrating how the now popular blockchain technology works and how it is being used by some companies.
Dul ík, M., & Junior, M. D. (2016). Security in Military Cloud Computing Applications. Science & Military Journal , 11 (1), 26.
The military often relies heavily on human effort for issuance of command even if there is an impending danger. The success of military operations relies on the efficiency of communication among various military personnel. Specific people are given roles , and the success relies on how well each person performs. Nevertheless, problems do occur in the conventional military models.
On the possibility of using cloud computing in the military, Dulik and Junior first investigate how the military operates and how cloud computing can make its operations easier. First, only authorized personnel will be allowed to have access to the military database. The most important thing is that individuals do not know the exact location of the database but have access to a broad network of data.
This source is significant in showing how cloud computing can be applied in varied fields. The military will be one of the case studies in the research paper where I will show how cloud computing can improve efficiency. While most of the other sources give a general overview of cloud computing, this source delves into the specifics.
Ko, R. K., Kirchberg, M., & Lee, B. S. (2014). Special issue on trust and security in cloud computing. Security and Communication Networks , 7 (11), 2183-2184.
As earlier mentioned in the article written by Catallini (2017), Ko, Kirchberg and Lee also examine the fear expressed by governments and other institutions that deal with sensitive data such as banks and hospitals with regard to the security of cloud computing. While Catallini sought to address the security of the technology, mainly using the blockchain technology, the authors in this article investigate some of the ways attacks may occur.
Ko, Kirchberg and Lee posit that cloud computing services may be attacked through the Internet Protocol (IP) prefix hijacking because of their reliance on routing infrastructure. As a result, the authors seem to advise the cloud computing service providers that they ought to use efficient, high performance, as well as, throughput measures to instill confidence in institutions that deal with sensitive data.
Majority of the articles provided only give positive impacts of cloud computing while ignoring that cloud computing may also have negative impacts. I will use this article to show how cloud computing can also have weaknesses. This article is resourceful in that it will help my research paper to be free of bias.
Lansiti, M., & Lakhani, K. (2017). The Truth About Blockchain. Harvard Business Review . Retrieved 3 April 2018, from https://hbr.org/2017/01/the-truth-about-blockchain
Financial transactions, contracts and other written records guide important exchanges between people, organizations and countries. Although most transactions can be typed and most of the time stored in files for future reference, they are not always safe. Lansiti and Lakhani criticize institutions that have failed to evolve in terms of keeping their records securely.
The two authors suggest that cloud computing provides a digital method of recording important transactions. The advantage provided is that information from ledgers, for instance, can be retrieved at any time. Additionally, if there are changes made to the transactions, individuals can know because the history is always available hence one can know whether the documents have been tampered with.
This article is related to Dulik and Junior’s (2016) article in regard to narrowing to the specifics. Whereas Dulik and Junior examine the application of cloud computing in the military, Lansiti and Lakhani examine how the technology can be used in managing various transactions. This article will help in ensuring that my research paper has a wide scope in application of cloud computing.
Ølnes, S., Ubacht, J., & Janssen, M. (2017). Blockchain in government: Benefits and implications of distributed ledger technology for information sharing.
The authors seem to criticize the often ‘exaggerated’ benefits of cloud computing services. Seemingly, governments may experience administrative problems if they allow the blockchain technology to operate in their countries. As Ko, Kirchberg and Lee (2014) variously stated, there is justification for governments to register their suspicions over the blockchain technology.
Implications of the blockchain technology are not well understood. More specifically, there is concern over the distribution of the ledger and sharing of information. Although information stored using cloud computing cannot be deleted, there is concern over who can access the information. The government also needs to monitor what happens among people to ensure that people are not transacting illegal transactions.
I will use this source to present some of the suspicions that governments and other institutions have over the blockchain technology in particular and cloud computing in general. This source will be important in informing the background of my research paper. Then the other sources will provide the arguments, as well as, the solutions.