@incollection{, 3BEC1AFE893332588D1776E4F00FC058 , author={{FaisalKhalil-Ur-Rehman} and {Limkokwing Universty of Creative Technology Malayisa}}, journal={{Global Journal of Computer Science and Technology}}, journal={{GJCST}}0975-41720975-435010.34257/gjcst, address={Cambridge, United States}, publisher={Global Journals Organisation}19117 } @incollection{b0, , title={{Autonomic Clouds on the Grid}} , author={{ Abraham }} , journal={{Journal of Grid Computing}} , year={2009} } @book{b1, , author={{ AAderemi } and { *Atayero } and { **Oluwaseyi Feyisetan }} , title={{Journal of Emerging Trends in Computing and Information Sciences. Security Issues in Cloud Computing: The Potentials of Homomorphic Encryption}} , year={October 2011} 2 } @book{b2, , title={{-freenetwork-monitoring-and-analysis-tools-for-sysadmins/. Last accessed 2nd}} , author={{ AndrewTabona }} , year={2013. November 2014} , note={The Top 20 Free Network Monitoring and Analysis Tools for Sys Admins} } @book{b3, , title={{Above the Clouds: A Berkeley View of Cloud Computing}} , author={{ MArmbrust } and { AFox } and { RGriffith } and { AJoseph } and { RKatz } and { AKonwinski } and { GLee } and { DPatterson } and { ARabkin } and { IStoica } and { MZaharia }} , year={2009} University of California at Berkeley , note={Technical Report} } @book{b4, , title={{-Ouya-vs-Raspberry-Pi}} , author={{ Bessie }} , year={December 2012. October 2014} , note={Ouya vs Raspberry Pi} } @book{b5, , title={{Platform-as-a-Service Architecture for Real-time Quality of Service Management in Clouds}} , author={{ MBoniface } and { BNasser } and { JPapay } and { SPhillips } and { AServin } and { XYang }} , year={2009} } @incollection{b6, , title={{Cloud security is not (just) virtualization security}} , author={{ MChristodorescu } and { RSailer } and { DLSchales } and { DSgandurra } and { DZamboni }} , booktitle={{Proceedings of the ACM Cloud Computing Security Workshop (CCSW)}} the ACM Cloud Computing Security Workshop (CCSW) , year={2009} } @book{b7, , author={{ Cisco }} , title={{Cisco Packet Tracer}} , year={2013. 2018th November 2014} } @book{b8, , title={{Top Threat to Cloud Computing V1.0}} , year={March 2010} Cloud Security Alliance } @incollection{b9, , title={{The Raspberry Pi B}} , author={{ Cn Vr }} , booktitle={{Raspberry-Pi-2-0-Model-B-512MB-ARM11-Linux-System-Development-Board-Kit-/261189408347. Last accessed 11}} , year={17 September 2014. October 2014} } @book{b10, , title={{Ethernet Tutorial -Part I: Networking Basics}} , author={{ DavidOven }} , year={2013. 2018th November 2014} } @book{b11, , title={{Cloud Computing and Grid Computing 360-Degree Compared}} , author={{ IFoster } and { YZhao } and { IRaicu } and { SLu }} , year={2008} University of Chicago } @book{b12, , title={{Privacy impact assessment handbook}} , author={{ Ico }} , year={2013. Jul} , note={v2.0, Information Commissioner's Office, UK. [Online]. Available: http} } @book{b13, , title={{Current status and the future direction of IPv6 in Japan}} 15. jaipa.or.jp. 2011 , year={April 2018} 9 } @book{b14, , title={{Designing and Building the Best Small Office Network From the Ground Up}} , author={{ JamesHilton }} , year={June, 2013. 2018th November 2014} } @book{b15, , title={{What is a Computer Network}} , author={{ JhonyJackson }} , year={2012. 2018th November 2014} } @book{b16, , title={{Networking Tutorials}} , author={{ Lantronix }} , year={2014. 2018th November 2014} } @incollection{b17, , title={{Data protection jurisdiction and cloud computing when cloud users and providers subject to eu data protection law are? the cloud of unknowing, Part 3}} , author={{ Marianthi }} , journal={{International Review of Law, Computers & Technology}} 26 9 , year={2013. 2012 20. April 2018} , note={Meetings.apnic.net. 2012.} , note={IPV6 deployement of KDDI} }