PL EN


2012 | 4(26) | 100-111
Article title

Security challenges in cloud computing for small and medium enterprises

Title variants
PL
Wyzwania dla bezpieczeństwa przetwarzania w chmurze dla małych i średnich przedsiębiorstw
Languages of publication
EN
Abstracts
EN
Cloud computing is a model of leveraging IT resources offered by providers via the Internet. In this model, small and medium-sized enterprises are able to transfer the costs of building and maintaining IT infrastructure to third parties. The IT resources are available on demand, and the consumers pay merely for the resources actually used. A key factor limiting the adoption of cloud computing are security concerns. However, these concerns should be collated with the security benefits possible to achieve thanks to the cloud’s characteristics. This paper presents an analysis of the risks and benefits in the area of security related to cloud computing implementation in companies and an overview of initiatives aimed at increasing the awareness in this area.
Year
Issue
Pages
100-111
Physical description
Dates
published
2012
Contributors
  • Uniwersytet Ekonomiczny w Poznaniu
  • Uniwersytet Ekonomiczny w Poznaniu
author
  • Uniwersytet Ekonomiczny w Poznaniu
  • Uniwersytet Ekonomiczny we Wrocławiu
References
  • Armbrust M. et al., Above the clouds: A Berkeley view of cloud computing, Technical Report No. UCB/EECS-2009-28, EECS Department, U.C. Berkeley 2009.
  • Catteddu D., Hogben G., An SME perspective on Cloud Computing, European Network and Information Security Agency, 2010, http://www.enisa.europa.eu/act/rm/files/deliverables/cloud-computing-sme-survey [accessed 19.01.2012].
  • Cloud Computing: Benefits, risks and recommendations for information security, eds. D. Catteddu, G. Hogben, European Network and Information Security Agency, 2009, http://www.enisa.europa.eu/act/rm/files/deliverables/cloud-computing-risk-assessment/at_download/fullReport [accessed 19.01.2012].
  • CSA, Security Guidance for Critical Areas of Focus in Cloud Computing V3.0, Cloud Security Alliance, 2011, https://cloudsecurityalliance.org/research/security-guidance/ [accessed 19.01.2012].
  • CSA, Top Threats to Cloud Computing V1.0, Cloud Security Alliance, 2010, https://cloudsecurityalliance.org/research/top-threats/[ accessed 19.01.2012].
  • Gartner, Gartner Identifies the Top 10 Strategic Technologies for 2011, Gartner Research, 2011, http://www.gartner.com/it/page.jsp?id=1454221 [accessed 19.01.2012].
  • Geelan J. (2009), Twenty-One Experts Define Cloud Computing, “Cloud Computing Journal”, http://cloudcomputing.sys-con.com/node/612375 [accessed 19.01.2012].
  • IDC, IDC IT Cloud Services Survey: Top Benefits and Challenges, IDC, 2009, http://blogs.idc.com/ie/?p=730 [accessed 20.01.2012].
  • Mell P., Grance T., The NIST Definition of Cloud Computing, National Institute of Standards and Technology, 2011, http://csrc.nist.gov/publications/nistpubs/800-145/SP800-145.pdf [accessed 19.01.2012].
  • SAJACC, Standards Acceleration to Jumpstart Adoption of Cloud Computing, National Institute of Standards and Technology, 2011, http://www.nist.gov/itl/cloud/sajacc.cfm [accessed 19.01.2012].
  • SecaaS, Defined Categories of Service 2011, Cloud Security Alliance, 2011, https://cloudsecurityalliance.org/research/secaas/ [accessed 19.01.2012].
  • Subashini S., Kavitha V., A survey on security issues in service delivery models of cloud computing, “Journal of Network and Computer Applications” 2011, vol. 34, no. 1.
  • Zissis D., Lekkas D., Addressing cloud computing security issues, “Future Generation Computer System” 2012, vol. 28, no. 3.
Document Type
Publication order reference
Identifiers
YADDA identifier
bwmeta1.element.desklight-e53f5096-6d54-4f3c-a6b8-184b121c23b6
JavaScript is turned off in your web browser. Turn it on to take full advantage of this site, then refresh the page.