Paper is geared towards the advantage and disadvantages of cloud computing.
Below are 10 sources.
Armrust, M., Fox, A., Griffith, R., Joseph, A., Katz, R., Konwinski, A., Zaharia, M. (n.d.). A View of Cloud Computing. Retrieved from https://s3.amazonaws.com/academia.edu.documents/34578652/a_view_of_cc.pdf?response-content-disposition=inline%3B filename%3DA_View_of_Cloud_Computing_Clearing_the_c.pdf&;X-Amz-Algorithm=AWS4-HMAC-SHA256&;X-Amz-Credential=AKIAIWOWYYGZ2Y53UL3A%2F20191107%2Fus-east-1%2Fs3%2Faws4_request&;X-Amz-Date=20191107T034556Z&;X-Amz-Expires=3600&;X-Amz-SignedHeaders=host&;X-Amz-Signature=e07943b201d86fb91568797d9ba0ec7a8ac0eb92822a9bff14f0de2fb0d9c74e
Arora, R., &; Parashart, A. (2013, August 1). a9f9bec6cf85715ca236035b5d89204b326a.pdf. Retrieved from https://pdfs.semanticscholar.org/9799/a9f9bec6cf85715ca236035b5d89204b326a.pdf
Garg, S., Varshney, M., Rajpoot, A., &; Jyotsa, S. (2017, June 1). 8229c2e7dd1afb6cdb9354a10a90cf694bc8.pdf. Retrieved from https://pdfs.semanticscholar.org/4e40/8229c2e7dd1afb6cdb9354a10a90cf694bc8.pdf
Gonzalez, N., Miers, C., Redigolo, F., Simplicio, M., Carvalho, T., Naslund, M., &; Pourzandi, M. (2012). Data Security Issues and Challenges in Cloud Computing: A Conceptual Analysis and Review. Retrieved from https://journalofcloudcomputing.springeropen.com/track/pdf/10.1186/2192-113X-1-11
Harfoushi, O., Alfawwaz, B., Ghatasheh, N., Obiedat, R., Abu-Faraj, M., &; Faris, H. (2014, February 1). Data Security Issues and Challenges in Cloud Computing: A Conceptual Analysis and Review – CN_42813.pdf. Retrieved from https://s3.amazonaws.com/academia.edu.documents/37195873/CN_42813.pdf?response-content-disposition=inline%3B filename%3DData_Security_Issues_and_Challenges_in_C.pdf&;X-Amz-Algorithm=AWS4-HMAC-SHA256&;X-Amz-Credential=AKIAIWOWYYGZ2Y53UL3A%2F20191107%2Fus-east-1%2Fs3%2Faws4_request&;X-Amz-Date=20191107T033959Z&;X-Amz-Expires=3600&;X-Amz-SignedHeaders=host&;X-Amz-Signature=f123bc36150e4d9d41fa9f9cb63d28ea844f86ce88d5d3a2bb03dcfd25697ed9
Harvey, C. (2017, March 27). What is Cloud Computing. Retrieved from https://www.datamation.com/cloud-computing/what-is-cloud-computing.html
Hayes, B. (2008, July 1). CACM_V51.7.indb – news-cloud-computing.pdf. Retrieved from https://s3.amazonaws.com/academia.edu.documents/30550235/news-cloud-computing.pdf?response-content-disposition=inline%3B filename%3DCloud_computing.pdf&;X-Amz-Algorithm=AWS4-HMAC-SHA256&;X-Amz-Credential=AKIAIWOWYYGZ2Y53UL3A%2F20191107%2Fus-east-1%2Fs3%2Faws4_request&;X-Amz-Date=20191107T035642Z&;X-Amz-Expires=3600&;X-Amz-SignedHeaders=host&;X-Amz-Signature=b13999915146e9fd72c34a62d30017fdf5fc199c99f47ff84abbd71029c7ee85
Mell, P., &; Grance, T. (2011, September 1). NIST.pdf. Retrieved from http://faculty.winthrop.edu/domanm/csci411/Handouts/NIST.pdf
Padhy, R., Patra, M., &; Satapathy, S. (2011, December 1). Cloud Computing: Security Issues and Research Challenges. Retrieved from https://pdfs.semanticscholar.org/01d9/aa2c8e91c6629eaa07d62ebc8e4892861676.pdf
Zissis, D., &; Lekkas, D. (2010, December 22). Addressing cloud computing security issues. Retrieved from http://extev.syros.aegean.gr/papers/J50.pdf
A very basic outline below:
1. Cloud computing is revolutionary
a. Models
i. Identify which model is best suited
2. Cloud computing provides vast amount of advantages
a. Financially
b. Operational
c. Economy
3. Cloud computing faces security concerns
a. Challenges
b. Identifying concerns
i. Privacy
ii. Architecture
iii. Compliance
c. Security solutions
