14 Aug 2022

57

Information Assurance Issues In Cloud Computing

Format: APA

Academic level: Master’s

Paper type: Annotated Bibliography

Words: 1061

Pages: 3

Downloads: 0

Betts, B. (2018). Blockchain and the promise of cooperative cloud storage.    ComputerWeekly.com . Retrieved 3 April 2018, from https://www.computerweekly.com/feature/Blockchain-and-the-promise-of-cooperative-cloud-storage 

Betts begins by saying that although blockchain technology is widely used in the crypto-currency world, it has many applications. Betts seemingly investigates how the blockchain technology can be used in distributing data and recording transactions. The author tries to show how the technology can be used to secure data in cloud computing by examining some of the advantages. 

It’s time to jumpstart your paper!

Delegate your assignment to our experts and they will do the rest.

Get custom essay

Summarily, the objective of Bett is to emphasize that indeed blockchain technology can be used in carrying out transactions and can be a relief to many online companies engaging in financial transactions. Stored data is encrypted and one can tell whether the data has been tampered with. Betts even asserts that most of the time the theft of bitcoins is as a result of the owner’s insufficient security of the digital wallet than insecurities in the blockchain technology . 

This is a helpful source particularly in defending the use of the blockchain technology in carrying out transactions. The author exhaustively outlines the advantages of the blockchain technology hence will be an important source in the research paper in defending cloud computing. The information in the article is also reliable because the author analyzes experiments done by different researchers. 

Catallini, C. (2017). How blockchain applications will move beyond finance.  Harvard Business Rev ,    2

Although governments have been a little skeptical about crypto-currencies, many central banks are investigating the possibility of embracing the blockchain technology to carry out transactions. The main aspects being investigated include , t he security, as well as, whether the technology will be in tandem with the existing payment networks and taxation requirements. In trying to solve the skepticism of most government and other entities that would like to use the blochain technology, Catallini outlines how the system works. The most prominent aspect in regard to how the technology works is that every user has access to the database as well as the history. That means that the system is transparent and as a result can be verified 

I will use this source to demonstrate how the blockchain technology works so that institutions that are skeptical can understand . The limitation with this article is that it does not show how the technology can be used by the various governments to align with their financial transactions while making sure that people comply with tax rules. Nevertheless, this is a useful source in demonstrating how the now popular blockchain technology works and how it is being used by some companies. 

Dul ík, M., & Junior, M. D. (2016). Security in Military Cloud Computing Applications.  Science & Military Journal ,    11 (1), 26. 

The military often relies heavily on human effort for issuance of command even if there is an impending danger. The success of military operations relies on the efficiency of communication among various military personnel. Specific people are given roles  , and the success relies on how well each person performs. Nevertheless, problems do occur in the conventional military models. 

On the possibility of using cloud computing in the military, Dulik and Junior first investigate how the military operates and how cloud computing can make its operations easier. First, only authorized personnel will be allowed to have access to the military database. The most important thing is that individuals do not know the exact location of the database but have access to a broad network of data. 

This source is significant in showing how cloud computing can be applied in varied fields. The military will be one of the case studies in the research paper where I will show how cloud computing can improve efficiency. While most of the other sources give a general overview of cloud computing, this source delves into the specifics. 

Ko, R. K., Kirchberg, M., & Lee, B. S. (2014). Special issue on trust and security in cloud computing.  Security and Communication Networks ,    7 (11), 2183-2184. 

As earlier mentioned in the article written by Catallini (2017), Ko, Kirchberg and Lee also examine the fear expressed by governments and other institutions that deal with sensitive data such as banks and hospitals with regard to the security of cloud computing. While Catallini sought to address the security of the technology, mainly using the blockchain technology, the authors in this article investigate some of the ways attacks may occur. 

Ko, Kirchberg and Lee posit that cloud computing services may be attacked through the Internet Protocol (IP) prefix hijacking because of their reliance on routing infrastructure. As a result, the authors seem to advise the cloud computing service providers that they ought to use efficient, high performance, as well as, throughput measures to instill confidence in institutions that deal with sensitive data. 

Majority of the articles provided only give positive impacts of cloud computing while ignoring that cloud computing may also have negative impacts. I will use this article to show how cloud computing can also have weaknesses. This article is resourceful in that it will help my research paper to be free of bias. 

Lansiti, M., & Lakhani, K. (2017).    The Truth About Blockchain. Harvard Business Review . Retrieved 3 April 2018, from https://hbr.org/2017/01/the-truth-about-blockchain 

Financial transactions, contracts and other written records guide important exchanges between people, organizations and countries. Although most transactions can be typed and most of the time stored in files for future reference, they are not always safe. Lansiti and Lakhani criticize institutions that have failed to evolve in terms of keeping their records securely. 

The two authors suggest that cloud computing provides a digital method of recording important transactions. The advantage provided is that information from ledgers, for instance, can be retrieved at any time. Additionally, if there are changes made to the transactions, individuals can know because the history is always available hence one can know whether the documents have been tampered with. 

This article is related to Dulik and Junior’s (2016) article in regard to narrowing to the specifics. Whereas Dulik and Junior examine the application of cloud computing in the military, Lansiti and Lakhani examine how the technology can be used in managing various transactions. This article will help in ensuring that my research paper has a wide scope in application of cloud computing. 

Ølnes, S., Ubacht, J., & Janssen, M. (2017). Blockchain in government: Benefits and implications of distributed ledger technology for information sharing. 

The authors seem to criticize the often ‘exaggerated’ benefits of cloud computing services. Seemingly, governments may experience administrative problems if they allow the blockchain technology to operate in their countries. As Ko, Kirchberg and Lee (2014) variously stated, there is justification for governments to register their suspicions over the blockchain technology. 

Implications of the blockchain technology are not well understood. More specifically, there is concern over the distribution of the ledger and sharing of information. Although information stored using cloud computing cannot be deleted, there is concern over who can access the information. The government also needs to monitor what happens among people to ensure that people are not transacting illegal transactions. 

I will use this source to present some of the suspicions that governments and other institutions have over the blockchain technology in particular and cloud computing in general. This source will be important in informing the background of my research paper. Then the other sources will provide the arguments, as well as, the solutions. 

Illustration
Cite this page

Select style:

Reference

StudyBounty. (2023, September 16). Information Assurance Issues In Cloud Computing.
https://studybounty.com/information-assurance-issues-in-cloud-computing-annotated-bibliography

illustration

Related essays

We post free essay examples for college on a regular basis. Stay in the know!

Security Implication of the Internet of Things

The Internet of Things (IoT) can be described as s system of interconnected devices that have the ability to transfer information over a computer network without the need of human-to-computer or human-to-human...

Words: 892

Pages: 3

Views: 96

Modern Day Attacks Against Firewalls and VPNs

Introduction The need to have an enhanced security of the computer connectivity happens to be one of the reasons that attract companies and organizations towards wide usage of VPNs. Several simple techniques...

Words: 2025

Pages: 7

Views: 134

How to Deploy and Administer Windows Server 2012

Securing a reliable, and expandable configuration for a company is important to build a strong network. The new and enhanced features of the Windows Server 2012 can be used to implement the network. In this...

Words: 1673

Pages: 6

Views: 87

Deployment Model in Cloud Computing

Deployment model is a representation of a cloud environment primarily distinguished by parameters such as accessibility, proprietorship, and storage size. The National Institute of Standards and Technology gives the...

Words: 254

Pages: 1

Views: 81

How to Use Web Search Engines for Business Research

The advancement of technology has made it possible for many people around the world to have easy access to information whenever they want. The development of the Wide World Web-enabled different kinds of information...

Words: 773

Pages: 3

Views: 86

Distributed Database Management System (DDBMS)

Introduction Data management has been a headache to many technology enthusiasts for quite a long period of time. They have successfully managed to logically collect interrelated data and share it. If the data is...

Words: 799

Pages: 3

Views: 127

illustration

Running out of time?

Entrust your assignment to proficient writers and receive TOP-quality paper before the deadline is over.

Illustration