Review of res701

I have learnt a lot from doing res701 this year and I enjoyed everything I have done from learning to read academic papers to writing up a proposal for my project next year.

BUT the most thing I have enjoyed from this paper is actually Clare’s approach to teaching us compared to the other tutors as she knows how to balance lectures with the assignments which I quite like from a tutor.

But if I had to chose one academic thing that I have learnt it will have to be the academic papers and how to read them as at the start  didn’t know a thing about academic papers but I am quite surprised that people take time out of there own time and share their knowledge on a subject


Cloud computing question 

Question: What are the benefits of using cloud computing for small to medium businesses? How can Cloud Computing be implemented in an actual business?

I want to be able to show the benefits of using cloud computing to a small to medium sized business so they can decide whether or not to implement it in the actual business.

Right now I think it can be set as a DSR as basically, I can actually implement an actual mock up of the system to show them as a benefit but at the same time I have to learn about it myself so means I will have to set time to research more into it.


  1. Research benefits of Cloud computing for small to medium sized businesses (20-30 hours)
  2. Research benefits of Cloud Computing in general for any size business. (25-35 hours)
  3. Research the ways Cloud Computing can be implemented and the time it takes to implement. (Could be in the way of tools) (40-45 hours)
  4. Summarize the information gathered. (10-20 hours)
  5. Research the differences between Cloud Computing and a physical network.(25-30 hours)
  6. Implement an example of how Cloud Computing works. (15-25 hours) (Depends on knowledge at the time)
  7. Summarise notes. (3-5 hours)

Cloud security

The topic I have chosen for my proposal is Cloud Computing but more around the security side of it.

Cloud computing is basically the use of virtual machines on the internet which are stored on an offsite server which is better than a local network as they can be accessed at any time from home or work depending on your access needs.

But my proposal is going to focus on the security side of cloud computing this is because the security side of a VM on the cloud can be a bit of a concern to businesses as they are worried that people will access the data on the actual server that it’s being hosted on as they will have access to the server. SO cloud security basically focuses on these concerns and tries to find ways of making sure that the data is not lost or accessed by people who get into the network.

Krautheim, F. J. (2009). Private Virtual Infrastructure for Cloud Computing. HotCloud9, 2009-1. 

Which this is the paper that inspired me into looking more into Cloud Computing.

Areas of interest RES701

Description of area of IT that interests you

I have enormous areas that I like from networking to system analysis but the most interesting one that I want to learn more about is Cloud computing. Which is basically focusing on the virtualization side of networking meaning that the machines aren’t physically real.

Why is it interesting to you

Will the reason I am interested in cloud computing is because ever since the start of this year in NET601 and NET602 we are using a program called Vsphere for us to do our assignments on and from playing with the Vsphere creating virtual machines I started wondering on how it actually works and why people are using.  

Three things you know about it

To be honest I only actually know 2 things about cloud computing the first is that the machines that are made are actually in a cluster which can have lots of virtual machines on it.

A second is that when the machines are created they don’t actually have physical CPU, hard drives and RAM on them as they are allocated and on the host cluster.

Three things you believe about it

Will I can actually write just one paragraph about what I believe about Cloud computing, I believe that at first it is hard to use as from what my NET tutor has had to go through with the class one there are a lot of problems involved, the second is that it is much easier to set up than a normal network as you can have multiple consoles open at the same time when doing the installation process and the last one is that Cloud computing has changed a lot since it first came along but still has the same meaning to it.

Three things you don’t know about it

I haven’t actually worked with all the functions yet as we are only restricted to managing our own VM’s which I really want to try these functions without having the restrictions.

I don’t know how it feels to manage a big system like that as it must be hard running into problems all the time with having only limited knowledge and functions so I want to learn more about the problem-solving side of it.

Would you rather Do something, Research something or do both?

I would rather do both as I am more hands on but at the same time I like my research as with my hands on I usually come into problems that I don’t know how to fix so I go and research the solution to it. An ever since I have been little I have been a more hands on person as it keeps me moving and I find it easier to concentrate if I am physically shown how to do something.



So the reason I answered these questions the way I did is for multiple reasons the first is ever since before I started this course I always had an interest in computers mainly the networking side and ever since I grown up I have had more interest as this has happened.

The second is that networking is what I want to major in which I planned to do even the year before I came here which shows I had a great interest in it.

Lastly, it also because since the start of this year I have had interesting experience with cloud computing with the problems I have had and which I really want to learn more because of this.



Assignment 2

Krautheim, F. J. (2009). Private Virtual Infrastructure for Cloud Computing. HotCloud9, 2009-1. 

Brief summary

The paper I have chosen for the actual assignment is another Cloud Computing paper which is a bit different to my practice as it is more focusing on the private side of the Cloud Computing and how business can benefit moving to Cloud Computing.

But again like from my practice the author F John Krautheim is aiming this paper on pointing out the problems with Cloud Computing and how it would affect businesses if they moved to a virtual network.

It also about pointing out the current security flaws as well as if anyone experiences these they would need to know how to prevent the problem going further or the steps of actually preventing the problem to occur.

The type of research method that the author has used in this paper is 3 different ones which they were Case Study Research, Experimental Research, and Secondary Research. Which because of these research methods the paper is valid as they had to do their own research and which in resulted in the author having to reference 9 different sites in his paper.

But it is also because the paper has been cited to date 116 times which is pretty good for a paper to be cited that many of times.

What is the title and what does the title tell you about the paper?

The title of the paper is Private Virtual Infrastructure for Cloud Computing which from this title it tells me the topic is going to be around the business side of Cloud Computing and how they are going to be affected by the Cloud Computing with their network infrastructure.

It also tells me that it going to probably talk about the security as anything to me with the word Infrastructure is going to have something related to security problems and flaws and how they can be fixed at the same time.

Lastly, it also tells me that the author knows a bit about the topic as Cloud Computing is a hard topic to talk about as it links into the networking and virtualization and sometimes these subjects are hard to talk about together.

Who is the paper written by and do they seem credible to you?

This paper is written by F.J Krautheim and which I do think this author is credible for numerous reason, the first being a number of references there is in the paper as when he references a part in this paper he is actually giving credit where credit is due. It also because it’s showing that he has done his research on the matter and is referencing the resources he has used.

The second thing that makes this a credible paper is the number of citations the paper has, which is about 116 citations to date. The reason this makes it credible is because citations are basically the amount of people who have read the paper and have approved it as being correct.

Lastly is because of the author’s paper is been written by the support of a USA government agency. The Department of Defense Information Assurance Scholarship Program which helped by giving him the money and help that he needed to publish this paper. It also because he had help from 2 people which were Dhananjay Phatak who is a lecturer at the Universty of Maryland teaching computer science and electric engineering and the second person being Alan T. Sherman who also teaches at Universty of Maryland being the professor of computer science and electric engineering.

Does it have a helpful abstract?

Yes it is a helpful abstract as it’s talking about the aim of the paper and why they are writing this paper which for F J Krautheim he is talking about “significant level of risk on the privacy and security of the data”  which again gives the reader the intention that this paper is going to talk about the security flaw’s and how they think they should be fixed.

But it also shows that they ever had experience with Cloud Computing as they are using real complicated software to get these results or they basically researched about this software as it sounds really complicate to use.

Lastly from what is said in the abstract is they propose that the workload should be basically split between the cloud companies and their clients as they believe that it will put the risk down if this happens and minimize the exposure to these risk.

What did the author(s) do in their research,  what research approach and what method(s) did they use?

The research method that is being used here is mainly the action research approach which is basically focusing on the real world question which how we can improve the security of Cloud Computing is a real life question and is a subject that keeps changing over the years but the same question is always there. I also think another research method is being used in this research and this is the experimental research approach this is because while reading this I can see how he is answering questions and trying to link back to them it gives the feel of a cause and effect feel to it.

This is backed by what they are actually doing in their research as their answers are going back to relate back to the question that is shown in the abstract as in section 3.2 we can see that he is listing his views so maybe this can be a sign that he is also being a little bias to the topic but not enough to turn me away from reading the paper.

Do you think the method(s) they used was appropriate to the question they were asking?

I think that one of the methods suit more to answer the question than the other as the question to me was more of a cause and effect related question than anything.

The reason I think this is when reading the question and the answers it is basically giving a looks on more of a cause and effect view, but at the same time also giving a little bit of the action research method side as it is actually a real question that is being answered here.

So I agree that the experimental research method is more suit to be the major research method here as it is talking more about how security flaws are a common factor in Cloud Computing and how the effects are causing problems in the business industry for the customers of these types of businesses.

What results does the paper report?

From the conclusion of this paper results, it is basically giving their view of how the Cloud Computing needs to review how the security settings need to give more user control over the settings so the user can see more into how the security works.

Was the paper worth reading?

To me, this paper was worth reading this is because although this is my second time reading an academic paper I actually quite enjoyed reading this paper as I learned skills that will come handy in the future.

I also learned a bit more on Cloud Computing and what to expect next year when it comes to writing notes about Cloud Computing and also even people like tutors have to learn more about Cloud Computing.

It also that even the private businesses have security flaws when it comes to cloud computing.

Do you believe the results/findings or the paper?

Yes I agree with the paper this is because from his research I can say that I can totally agree with what he is saying about Cloud Security as there are many flaws with the settings for the Cloud and at the same time these flaws are just normal security as all networking programs and software have.

I also kind of don’t believe that the Cloud computing companies should open these security settings as it means that it’s actually opening there system to customers that might actually try to hack the system so I personally think that he should of suggest something more that updates these security flaws as that will mean that they get fixed without opening the systems to more threats.

What did you learn from reading the paper?

From reading this paper I have learn 2 things one is actually knowing what each part represents as before  I started this assignment I didn’t even know what an academic paper was or how to read one so I want personally want to thank Clare for teaching me how to read an academic paper. But also I learn that even people who are experts in a certain area like this author who was a lecturer had to do research himself.

The last thing I learnt a little about Cloud Computing before even starting the paper next year and it kind of interesting that it’s similar to your normal network just virtual and isn’t physical machines.

It also the author answers his question with only a little bit of bias from him as I noticed that he references one of his own papers which people can see a bit bias as he is using work from one of the recent papers.




Assignment 2 practice (draft)

International Journal of Computer Theory and Engineering, Vol. 4, No. 5, October 2012

This articles abstract has I believe met all the three parts that makes this article an academic paper. First off it talks about what the topic is so for this paper I am using for my practice is talking about cloud computing as in the first couple of paragraph it talks about what cloud computing is and the concerns or security risk it has in terms of for a business.

Then it has what his aim was for the paper so Farzad he said “This paper tries to describe
security problems in the virtualization in cloud-environment aspect of view.”  Which basically he is saying to me that he is trying to explain the security problems which are present in cloud computing or virtualization.

(Last bit later)


What was the research question(s)?

From just looking at the abstract I believe that Farzad’s aim was to basically point out the security flaws in cloud computing and also at the same time he was looking for solutions to these current problems as if he was going to talk about the security flaws he might as well at the same time research about the fixes about this making sure that his audience or readers knew what the fixes were to him from this research.

But he also mentions in the introduction what his aims were with each section meaning that he had certain goals he wanted to meet when writing this up.

What  method(s) did they use to answer the question(s)


I actually believe this credible article this is because of two things that stand out to me and are really strong evidence that it is credible. The first is at the very end of the article it talks about the researcher and his current occupation at the time which it was as lecture at the Azad university in electrical and computing engineering.He also has a degree himself from there at the same university. It also states that he has published passed papers also and is part of committee for IEEE and this is since the year 2006.

The second part is the evidence he has used throughout the article as I was skim reading it I noticed that in some parts he backups his evidence or answers with diagrams which relate and show the answer. He has also referenced these and which again these references are another part of it being credible as there are 14 references he has made which means he has then done his own research into the matter.

Did you agree, or not, with what they wrote in their conclusion? Why?

From the conclusion I can say that I do agree with the conclusion as from what he says virtualization is quick to deploy compared to doing it physically as you have to be in front of only one computer when doing it physically.

But it also because from what I have been told and read myself that virtual machines are cheaper to run as he quotes this “the cloud will be allowed to recover from many hardware/software failures.” Which I agree as you can just snap to a snapshot if anything goes wrong and virtual machines are hard to get into.

Two things I learnt from this paper

One of the two things I learnt from this paper is that there are different types of affects that a attacker can do on the virtual machine as if one gets affected basically all will get affected as they have access to other machines and also sometimes the actual physical machine.

Another is that I actually learnt that virtual machines were also used ages ago as I thought only recently that they were actually started being used by people but they actually had them back then so I learnt that they some parts that they were really concerned about virtual machines back then and that they were really searching about security risk about them.


Week 8 post 2

Secure Virtualization Technology, Farzad Sabahi

To come later

I use ProQuest for this one and used network security as the keyword for this one


Right now I am still debating whether or not it is an academic paper as one of the parts weren’t meet but by the looks of it they put that information at the end instead of beginning it also because of the length of the paper it only a couple of pages meaning it’s questionable to me.

It has 14 references in this paper.


Right now I’m still debating whether or not to use this as an article to use for assignment 2 as the length and other parts are not meet but personally, I haven’t reviewed and article before so this will be a first time.