Sunday, May 17, 2020

Access to Justice in the English Legal System - Free Essay Example

Sample details Pages: 6 Words: 1919 Downloads: 2 Date added: 2017/06/26 Category Law Essay Type Narrative essay Level High school Tags: Justice Essay Did you like this example? Access to Justice Legal aid was introduced after the Second World War to permit people who could not otherwise afford the services of lawyers to be provided with those services by the State.[1]The system and costs grew hugely over the decades and underwent various restrictions and cutbacks during the late 1990s.[2]Although there have been many high cost claims on the legal aid budget, the scale of the continued rise in spending is not the result of individual or collective wastefulness.[3] It is the result of systemic weaknesses in the way legal aid services are obtained and therefore inefficiencies in the way those services are delivered.[4] The process for evaluating if an individual meet the requirements for civil legal aid and criminal legal aid is different. In civil legal aid, a personà ¢Ã¢â€š ¬Ã¢â€ž ¢s income and capital must be within definite limits, this is called the means test and their case needs to have a reasonable chance of winning; the meri ts test.[5] In criminal legal aid, the means test is also considered but in a different way. In addition, the more serious the charge and possible consequences, the more likely it is that the person will qualify for the interests of justice test.[6] The Community Legal Service (Financial Amendment) Regulations 2007 set out the onsets for financial eligibility for all requests for funding. Don’t waste time! Our writers will create an original "Access to Justice in the English Legal System" essay for you Create order The test uses basic concepts of à ¢Ã¢â€š ¬Ã‹Å"disposable incomeà ¢Ã¢â€š ¬Ã¢â€ž ¢, that is, income available to a person after deducting essential living expenses, and à ¢Ã¢â€š ¬Ã‹Å"disposal capitalà ¢Ã¢â€š ¬Ã¢â€ž ¢, that is, the assets owned by a person after essentials items like a home.[7] In addition to the financial eligibility, an applicantà ¢Ã¢â€š ¬Ã¢â€ž ¢s case must also satisfy a new merits test. The commission prepared a Code (2007) which replaces, and is intended to be more flexible than, the merits test that was used for civil legal aid. The code sets out the criteria for determining whether legal aid services should be provided in a particular case.[8] Further legal aid restrictions endanger access to justice; say MPs.[9]Joint committee on human rights warns that Ministry of Justice(MoJ) should not fall into trap of knowing the price of everything but value of nothing.[10]MoJ proposed one-year residence test, the committee calls for broader exemptions, specific ally in cases involving children.[11] It said: Refugees may be unable to access civil legal aid during their first few months of lawful residence in the UK. This is particularly worrying as this is the time that many refugees may need assistance in securing services they are entitled to. [12]Under the MoJ reforms prisoners will lose legal aid for challenges over prison conditions but can keep it for legal challenges involving their liberty. The report said: In some cases only the retention of public funding will be sufficient to prevent infringements of prisoners right of access to court arising in practice.[13] Removing legal aid funding for borderline cases could affect human rights challenges and save only  £1m a year, the JCHR added.[14] The orthodox view is that individualà ¢Ã¢â€š ¬Ã¢â€ž ¢s rights to access justice cannot be denied when considering Article 6 of the European Convention of Human Rights (ECHR). Article6givesyou therighttobringacivil or criminalcasetocou rt, the right to a fair and public hearing embodied in international human rights treaties. Thelegalsystemmust besetupinsuch a waythatthe general publicarenotomittedfrom thecourtprocess.Therightofaccessto courtisnot,however,unlimitedandthe ECHRhas acceptedthatcategoricalpeople[15] can berestrictedfrombringingcases. However, Article6doesnotgiveageneralrightto legalaidineverycivilcaseinvolvinga personwhocannotafford tobring proceedings[16]. However, legalaid mayberequiredbyArticle6insomecivil cases,forexampleincasesor proceedingsthatareverycomplex,orin circumstanceswhere a personisrequired tohavealawyerrepresentingthem.[17] In criminal cases, those who cannot pay the service of a lawyer to exercise their procedural rights are affected by the lack of effective protection of the right to legal aid. It may lessen their chance to influence the outcome of the proceedings when their liberty is at stake.[18] In civil cases, citizens are unable to protect and declare their civil, econom ic, social and cultural rights because of the lack of available mechanisms for resolving legal disputes. In both criminal and civil cases, the lack of access to justice results in reduced public assurance in the legal system, which is cornerstone for every democratic state rooted in the principles of the rule of law, human rights and democracy[19]. In a criminal case, a police custody officer will help you get legal aid if youà ¢Ã¢â€š ¬Ã¢â€ž ¢ve been detained and held at a police station. A solicitor will check if you qualify for legal aid if youà ¢Ã¢â€š ¬Ã¢â€ž ¢re charged with a crime. You will get legal aid automatically if youà ¢Ã¢â€š ¬Ã¢â€ž ¢re under 16 or on certain benefits.[20] However there was no right under common law to legal aid in all circumstances, but Grayling said that common law undoubtedly recognised a right of effective access to court, which means that legal aid may be required in certain circumstances in order for the right of access to be meaningful.[21] Meanwhile, the justice secretarys plan to cut defence  barristers fees by at least 30% in the most complex and demanding criminal cases came under attack in the House of Lords.[22] For instance, in the case of O.F. v Norway[23] the accused was deprived of legal aid by the State Party in defending charges of a traffic offence.[24] The State Party argued that there was no concern raised under article 14 3(d) owing to the triviality of the offence, therefore the consequence should only result in a small fine.[25] The Human Rights Court (HRC) concurred that the accused had not been able to show that in his particular case the interests of justice would have essentially required legal aid services.[26] Obviously when determining to grant or refuse legal aid in the context of à ¢Ã¢â€š ¬Ã…“interests of justiceà ¢Ã¢â€š ¬Ã‚ , the severity of the offence is considered. There has been a suggestion in the case law that a State may refuse legal aid to litigants on the basis of a val ue judgment on the objective chances of success, even in a case where the severity of the offence is not doubtful. In Z.P. v Canada[27] the Court upheld the decision by the Canadian authorities to deny access to legal aid in an appeal against a conviction for rape on the basis of an apparent lack of merits in the appeal. However, cases regarding capital punishment would be an exception to this rejection of legal.[28] Another issue presumably relevant to this header is the quality of representation. The issue is addressed in the jurisprudence of the HRC[29] on stating that lawyers should be able to counsel and to represent their clients in line with their established professional standards and judgment without any constraints, influences, pressures or undue interference from any quarter. The jurisprudence of the HRC also states that the authorities owe a duty to take measures as to ensure that the accused is efficiently represented[30]. Furthermore, in the case of a lawyer represe nting an accused on appeal, there should be effective support[31]. In Estrella v Uruguay[32] the HRC held that when an accused was offered only a limited choice of officially appointed counsel and the counsel then adopted à ¢Ã¢â€š ¬Ã…“the attitude of a prosecutorà ¢Ã¢â€š ¬Ã‚ , an adequate defence has been violated and there is a breach of Human Rights.[33] The Alternative Funding Arrangements[34] (AFA) increases access to justice whilst limiting public expenditure. AFA occur when payments to a law firm are based on a method other than billable hours[35].The conditional fee is the classic example of an AFA for which the percentage of the money won at trial or on settlement is collected by the firm; only if the legal action is financially successful that the client pays. However, AFAs encompass a large variety of arrangements and there is a disruptive but inevitable move to AFA[36]. The most recent approach intended to promote access to justice at proportionate cost is the Jackson Report in 2013. The idea is to dissuade avoidable claims from going to court[37]. According to the MoJ spokesman à ¢Ã¢â€š ¬Ã‹Å"this will require changes to legal rules and regulationsà ¢Ã¢â€š ¬Ã¢â€ž ¢[38].There can be no doubt that the Jackson reforms comprise significant changes[39] to civil procedure and will have a wide-ranging impact. However, the impact remains solely on how future court reports on their application and how alterations will really work in practice. The Access to Justice Act 1999 (ss 27-31), together with the Conditional Fee Order 2013, reformed the law relating to conditional fees with the intention to discourage weak cases and encourage settlements. Conditional fee agreements play a valuable role in helping people with valid claims to obtain access to justice.[40] This Order implementsSection 44of the Legal Aid, Sentencing and Punishment of Offenders Act 2012 (LASPO) which eradicates recoverability of success fees from the losing party in relation to any conditional fee agreements[41]. Insofar, it can be further argued that there has been an optimistic approach to allow potential individuals to access justice through legal aid system. WORD COUNT: 1540 Bibliography STATUTES: Access to Justice Act 1999 Conditional Fee Order 2013 Legal Aid, Sentencing and Punishment of Offenders Act 2012 (LASPO) Community Legal Service (Financial Amendment) Regulations 2007 Code (2007) CASES: O.F. v Norway [1984] CCPR/C/OP/2 at 44 (1990) Z.P. v Canada [1991] CCPR/C/41/D/341 Kelly v Jamaica [1991] CCPR/C/41/D/253 Estrella v Uruguay [1990] CCPR/C/OP/2 BOOKS: Gary Slapper Kelly, English Legal System, fourteenth edition, Routledge,2013 Ministry of Justice, makingsenseofHumanRights:Ashort introduction (summarybooklet), October2006 WEBSITES: https://www.lccsa.org.uk/assets/documents/consultation/carter%20review%2013072006.pdf , accessed on 02/12/2013 https://www.theguardian.com/law/2013/dec/13/further-legal-aid-restrictions-endangers-access-justice , accessed on 16/12/2013 https://www.gov.uk/legal-aid/eligibility ,accessed on 13/12/2013 https://www.nuigalway.ie/sites/eu-china-humanrights/seminars/ds0406d/marcela%20rodriguez-farrelly-eng.doc ,accessed on 13/12/13 https://www1.umn.edu/humanrts/gencomm/hrcom13.htm ,accessed on 12/12/13 www.justice.gov.uk , accessed on 12/12/2013 https://www.theguardian.com/law/2013/dec/13/committee-warns-legal-aid-cuts-may-breach-human-rights, accessed on 16/12/2013 https://www.legislation.gov.uk/ukpga/2012/10/contents/enacted accessed on 24/01/2014 accessed on 24/01/2014 https://www.newsquarechambers.co.uk/files/Newsletters/Legal%20Update%20-%20April%202013.pdf accessed on 24/01/2014 https://www.rawlisonbutler.com/news/22342 accessed on 25/01/2014 https://www.lawgazette.co.uk/64021.article accessed on 25/01/2014 https://www.lawdable.com/2009/02/articles/practice-areas/alternative-fee-arrangements-gain-traction/ accessed on 25/01/2014 https://www.hgexperts.com/article.asp?id=7551 accessed on 25/01/2014 https://www.afalaw.co.uk/ accessed on 26/01/2014 [1] Gary Slapper Kelly, English Legal System, fourteenth edition, Routledge,2013,page 651 [2] Ibid [3] https://www.lccsa.org.uk/assets/documents/consultation/carter%20review%2013072006.pdf, pg 3, accessed on 02/12/2013 [4] Ibid [5] www.justice.gov.uk accessed on 12/12/2013 [6] Ibid [7] Ibid [8] Gary Slapper Kelly, English Legal System, fourteenth edition, Routledge,2013,page 661 [9] https://www.theguardian.com/law/2013/dec/13/further-legal-aid-restrictions-endangers-access-justice, accessed on 16/12/2013 [10] Ibid [11] https://www.theguardian.com/law/2013/dec/13/further-legal-aid-restrictions-endangers-access-justice, accessed on 16/12/2013 [12] https://www.theguardian.com/law/2013/dec/13/further-legal-aid-restrictions-endangers-access-justice, accessed on 16/12/2013 [13] Ibid [14] Ibid [15] Ministry of Justice, makingsenseofHumanRights:Ashort introduction (summarybooklet), October2006, page 19 [16] Ibid [17] Ibid [18] https:// www.nuigalway.ie/sites/eu-china-humanrights/seminars/ds0406d/marcela%20rodriguez-farrelly-eng.doc accessed on 13/12/2013 [19]Ibid [20] https://www.gov.uk/legal-aid/eligibility, accessed on 13/12/2013 [21] https://www.theguardian.com/law/2013/dec/13/committee-warns-legal-aid-cuts-may-breach-human-rights, accessed on 16/12/2013 [22] Ibid [23] O.F. v Norway [1984] CCPR/C/OP/2 at 44 (1990) [24]https://www.nuigalway.ie/sites/eu-china-humanrights/seminars/ds0406d/marcela%20rodriguez-farrelly-eng.doc page 6, paragraph 5 accessed on 13/12/2013 [25] Ibid [26] Ibid [27] Z.P. v Canada [1991] CCPR/C/41/D/341 [28] Ibid [29] https://www1.umn.edu/humanrts/gencomm/hrcom13.htm, HRC Comment 13, paragraph 9, accessed on 12/12/13 [30] Kelly v Jamaica [1991] CCPR/C/41/D/253 [31] ibid [32] Estrella v Uruguay [1990] CCPR/C/OP/2 [33] Estrella v Uruguay [1990] CCPR/C/OP/2 [34] https://www.afalaw.co.uk/ accessed on 26/01/2014 [35] https://www.lawdable.com/20 09/02/articles/practice-areas/alternative-fee-arrangements-gain-traction/ accessed on 25/01/2014 [36] https://www.hgexperts.com/article.asp?id=7551 accessed on 25/01/2014 [37] https://www.rawlisonbutler.com/news/22342 accessed on 25/01/2014 [38] https://www.lawgazette.co.uk/64021.article accessed on 25/01/2014 [39] https://www.newsquarechambers.co.uk/files/Newsletters/Legal%20Update%20-%20April%202013.pdf accessed on 24/01/2014 [40] Gary Slapper Kelly, English Legal System, fourteenth edition, Routledge,2013 [41] https://www.legislation.gov.uk/ukpga/2012/10/contents/enacted accessed on 24/01/2014

Wednesday, May 6, 2020

Literary Analysis Of Gwendolyn Brooks s The Bean Eaters

Introduction Gwendolyn Brooks is among the most distinguished African-American poets of the twentieth century. With the publication of her second volume of poetry, Annie Allen (1949), she became the first black American writer to win a Pulitzer Prize. Noted traditional forms and poignant evocation of urban black experience, Brooks emerged as a leading black literary figure during the 1950s and 1960s. her lyrical poetry addresses racial injustice, poverty, and the private struggles of young black women with exceptional precision, psychological depth, and authenticity. In addition to Annie Allen, Brooks is best known for A Street in Bronzeville (1945), The Bean Eaters (1960), In the Mecca (1968), and her only novel, Maud Martha (1953). During the late 1960s, Brooks embraced the Black Power and Black Arts movements, marking a dramatic shift in her poetry toward increasingly polemical declarations of black pride and African cultural nationalism. Biographical Information Born in Topeka, Kansas, Brooks was raised in the poor South Side section of Chicago with her parents; her mother abandoned teaching for marriage and motherhood, and her father, the son of a runaway slave who fought in the Civil War, gave up his ambition to attend medical school to work as a janitor. Out of the loving security of her home, Brooks experienced racial prejudice early in grade school, where other black students ridiculed her for her dark skin and lack of social or athletic abilities. Brooks foundShow MoreRelated Gwendolyn Brooks Essay1061 Words   |  5 Pages Gwendolyn Brooks- A Critical Analysis of Her Work nbsp;nbsp;nbsp;nbsp;nbsp;Gwendolyn Brooks is the female poet who has been most responsive to changes in the black community, particularly in the community’s vision of itself. The first African American to be awarded a Pulitzer Prize; she was considered one of America’s most distinguished poets well before the age of fifty. Known for her technical artistry, she has succeeded in forms as disparate as Italian terza rima and the blues. She has

Cloud Architecture That Will Be Used Will Include Hybrid Cloud

Question: Explain Cloud Architecture That Will Be Used Will Include Hybrid Cloud? Answer: Introduction SoftArc Engineering Ltd is an Australian Company that has its domain in civil engineering. The company has decided to close it data centre that is currently located in Brisbane and has decided to shift the same in Sydney that is technically advanced. Also, the web services have been decided to be migrated on a cloud platform. The document covers the details and strategies that the organization should follow. Cloud Architecture Reasons for Deployment The cloud architecture that will be used will include Hybrid cloud as the deployment model as it will align with the business strategies. It is an integrated cloud computing model that will include certain parts of the information associated with the data centre to be stored on-premise and rest of the information to be present on the cloud. It is the model that will allow the organization to enhance its capability be easily aggregating and assembling with rest of the packages and will fit as per the business requirements and strategies (Tarannum, Ahmed, 2013). The delivery model that will be used in case of SoftArc Engineering Ltd will be Infrastructure as a Service (IaaS) model. It has been selected for the organization because of its features that have been listed below. It is the model that will allow accessibility to more than one user simultaneously leading to enhanced multi-tasking without any issues in the performance The model will allow the organization to carry out dynamic scaling which will allow the architecture and the associated components to be scaled up or down as per the requirement The cost that will come with model will be low Distributed resources will be used and will be associated with this model Benefits and Issues of Hybrid Cloud There will be several benefits that will be caused because of the deployment of hybrid cloud in the cloud architecture of the organization. This particular model will demand lesser funds and money in terms of the infrastructure which would allow the money to be spent on other areas. The security that will come along with hybrid cloud will also be better than the rest of the models and counterparts. The agility and flexibility associated with the organization will also improve as this particular model is scalable in nature. It will also allow enhanced form of accessibility which will lead to better customer satisfaction (Boava, Iano, 2016). However, there may also be certain issues that may come up with the deployment of hybrid cloud in the architecture. These issues will be in the form of the security concerns and issues along with the required set of skills for executing the cloud services. Data and application integration may also emerge as one of the challenges for the system analysts and experts. Risks and Countermeasures There may be a number of security and other risks that may emerge with the hybrid cloud strategy that have been described in the table below. Name of the Risk Description Possible Countermeasure Shared Access One of the prime features that come along with hybrid cloud is that of multi-tenancy along with multi-tasking of the cloud services and components. There are scenarios in which shared access is provided to the users which lead to the emergence of a lot many problems. There are several users that simultaneously access the cloud and there are several associated resources that are shared such as memory, database, equipment and many more. There may be emergence of various risks because of this reason such as the ones related with spoofing and IP addresses. Security and privacy of the information may get impacted because of the same (Padmavathi, 2016). There shall be access and identity right allotted to each of the user along with a dedicated timeframe to make use of the resource. Tracking and monitoring of the same shall be performed regularly. Cost and Schedule Risks There are various components that are involved with hybrid cloud and there is a cost that is involved with each of these components. It becomes difficult to estimate these costs and the associated schedule that leads to various issues for the management. There is always an uncertainty associated with the cloud because of this reason. It will be required to carry out detailed planning in order to make sure that the cost and schedule estimations are carried out in presence of an expert Legal Risks There will be a lot of information that will be stored on the hybrid cloud. This information may belong to several categories such as private, confidential, sensitive and likewise. Any violation in the properties of these information types will lead to legal obligations and issues. Legal policies and regulations shall be applied along with the enhancement of the security infrastructure to make sure that any such risks are not executed Security Risks Cloud data is present and accessible over the network which leads to several threats and risks associated with the access and authentication of the user. There may be several security risks in the form of network security attacks that may be given shape by the malicious entities and these entities may attempt to violate the access and identity controls that are implemented. Such an occurrence will lead to emergence of information security risks and threats. It will be necessary to enhance the overall security architecture to make sure that the security risks are avoided and it will be essential to adapt administrative as well as technical controls to make sure that the security risks are not executed by the attackers Availability Risks Availability of the cloud will be essential for the smooth functioning of the related operations. The availability may be hampered by the execution of various attacks on the cloud services and cloud model which may lead to deterioration of the reputation It will be necessary to enhance the overall security architecture to make sure that the security risks are avoided and it will be essential to adapt administrative as well as technical controls to make sure that the security risks are not executed by the attackers (Al-Rashedi, 2014) Data Ownership and Authority Risks Hybrid cloud will be composed of several users and the data will belong to many users. There may be risks of data ownership along with data authority that may emerge There shall be user roles and privileges defined and the same shall be carried out by the administrator General Security Steps There are primarily three steps to security that will be required to undertake. These three steps will include administrative, logical and physical security steps. Administrative steps shall include the enhancement of evaluation and validation checks along with their frequency to make sure that the progress is being done without any deviations. There shall also be reviews and audits that shall be carried out by the senior management along with the experts (Benkhelifa, Fernando, Welsh, 2013). Technical security will make up for the logical steps that will include the execution of measures such as use of automated tools and packages for prevention and detection of attacks, enhanced authentication and access control and likewise. Physical security shall also be improved by making use of the enhanced form of physical control over the entry and access points to avoid the attacks (Gordon, 2016). Components and Requirements Application Resilience In association with the requirements of the SoftArc Engineering Ltd, there are a few high availability requirements that will be met with the use of hybrid cloud and its deployment. There are a number of availability zones along with load balancing and dynamic scaling that is associated with this cloud model which will make sure that the application resilience is maintained and reflected (Varadharajan, Tupakula, 2016). Fault tolerance will be installed that will make sure that there is no single point of failure present in the clpud model There will be use of best practices and adherance to the defined standards will also be ensured Storage options that will come along with the model will be ample for data storage on the cloud Backup and Disaster Recovery There may be various security risks that may be given shape by the attackers and it will be necessary to include the backup and disaster recovery options in the cloud architecture. The backup model that comes along with hybrid cloud comprises of frequent and automated backup to make sure that the risks and attacks may be avoided. The disaster recovery plan that will be designed for the hybrid cloud and the one that will make sure that it applies to the same will include the following measures Preventative The basic form of security will be enhanced so that there is no occurrence of the security risk or an attack. Reactive These will be the measures and mechanisms that will be followed to minimize the damage. Detective Detection of the intruders using automated tools and packages will also be incorporated (Linthicum, 2016). Administrative Enhancement of the policies and the frameworks will be done to make sure that the checks and validations are performed. Remote Server Administration Administrators will be provided with the ability to remotely monitor the hybrid cloud along with all of its components. In case of remote server administrator, the common issues that come up are in the form of scalability and accessibility of the services and applications. However, in the case of hybrid cloud, there is dynamic scaling along with greater flexibility associated which makes sure that remote server administration is possible (Tarannum, Ahmed, 2013). There may be issues with the security and the strength of the evaluation process which will be made sure with the aid of protection mechanisms. Resource Management There will be several resources that will be involved with the hybrid cloud and these resources will be aptly managed. There will be an equilibrium that will be created between all of the employees and the resources that will be associated and time management along with change management will also be handled efficiently. Hybrid cloud has the mechanism to carry out required set of policies and administrative checks which will be done to make sure that the resources are adequately managed. SLA Management The following set of factors will be considered for SLA management in the organization. The services that have bee agreed upon between the cloud provider and SoftArc Engineering Ltd Duties and responsibilities that are allocated to the project resources Internal partners and their involvement Cost and details of the features that are implemented The above components that are associated with the hybrid cloud will be compatible with either of the IaaS or PaaS model of cloud. Migration to AWS It has been decided that the SharePoint location along with the SQL Server that has been deployed in the organization shall be moved to the AWS cloud which stands for Amazon Web Services. The following steps shall be taken to complete the process as these steps will make sure that the migration process is completed successfully without any risks and the business objectives are achieved. Planning phase shall be carried out with the definition of scope, goals, assumptions and dependencies. There shall be an analysis of the risks along with their treatment strategy that must be defined (Sekaran, Krishna, 2016). The migration process shall be carried out in a series of phases rather than all at once. Validations and verifications on the performance and compatibility checks shall be carried out. Next series of migration shall be executed after the completion of first iteration. Conclusion Cloud computing is an integral part of the modern day businesses and it is essential to make sure that the cloud models and architecture is applied across the organizations. SoftArc Engineering Ltd has taken step to move to the cloud by enhancing its cloud architecture with the incorporation of hybrid cloud along with IaaS model. There are several issues and risks that may be associated with the procedure that shall be handled with the aid of proper measures along with the enhancement of security. References Al-Rashedi, A. (2014). E-Government Based on Cloud Computing and Service-Oriented Architecture. International Journal Of Computer And Electrical Engineering, 6(3), 201-206. https://dx.doi.org/10.7763/ijcee.2014.v6.822 Benkhelifa, E., Fernando, D., Welsh, T. (2013). A Novel Cloud-Based Multi-Tenancy Architecture with Efficient Hybrid Authentication Mechanism for Enhanced Security and Resource Optimization. International Journal Of Cloud Applications And Computing, 3(3), 34-49. https://dx.doi.org/10.4018/ijcac.2013070103 Boava, A., Iano, Y. (2016). Secure Inter-Cloud architecture for virtual cloud computing based on hybrid IP and MPLS infrastructure solution. IEEE Latin America Transactions, 14(7), 3490-3495. https://dx.doi.org/10.1109/tla.2016.7587659 Gordon, A. (2016). The Hybrid Cloud Security Professional. IEEE Cloud Computing, 3(1), 82-86. https://dx.doi.org/10.1109/mcc.2016.21 Linthicum, D. (2016). Emerging Hybrid Cloud Patterns. IEEE Cloud Computing, 3(1), 88-91. https://dx.doi.org/10.1109/mcc.2016.22 Padmavathi, B. (2016). Implementation of IOT Based Health Care Solution Based on Cloud Computing. International Journal Of Engineering And Computer Science. https://dx.doi.org/10.18535/ijecs/v5i9.23 Sekaran, K., Krishna, P. (2016). Big Cloud: a hybrid cloud model for secure data storage through cloud space. International Journal Of Advanced Intelligence Paradigms, 8(2), 229. https://dx.doi.org/10.1504/ijaip.2016.075731 Tarannum, N., Ahmed, N. (2013). Efficient and Reliable Hybrid Cloud Architecture for Big Database. International Journal On Cloud Computing: Services And Architecture, 3(6), 17-29. https://dx.doi.org/10.5121/ijccsa.2013.3602 Tarannum, N., Ahmed, N. (2013). Efficient and Reliable Hybrid Cloud Architecture for Big Database. International Journal On Cloud Computing: Services And Architecture, 3(6), 17-29. https://dx.doi.org/10.5121/ijccsa.2013.3602 Varadharajan, V., Tupakula, U. (2016). On the Design and Implementation of an Integrated Security Architecture for Cloud with Improved Resilience. IEEE Transactions On Cloud Computing, 1-1. https://dx.doi.org/10.1109/tcc.2016.2535320