Full-text resources of CEJSH and other databases are now available in the new Library of Science.
Visit https://bibliotekanauki.pl

PL EN


2012 | 4(26) | 100-111

Article title

Security challenges in cloud computing for small and medium enterprises

Selected contents from this journal

Title variants

PL
Wyzwania dla bezpieczeństwa przetwarzania w chmurze dla małych i średnich przedsiębiorstw

Languages of publication

EN

Abstracts

EN
Cloud computing is a model of leveraging IT resources offered by providers via the Internet. In this model, small and medium-sized enterprises are able to transfer the costs of building and maintaining IT infrastructure to third parties. The IT resources are available on demand, and the consumers pay merely for the resources actually used. A key factor limiting the adoption of cloud computing are security concerns. However, these concerns should be collated with the security benefits possible to achieve thanks to the cloud’s characteristics. This paper presents an analysis of the risks and benefits in the area of security related to cloud computing implementation in companies and an overview of initiatives aimed at increasing the awareness in this area.

Year

Issue

Pages

100-111

Physical description

Dates

published
2012

Contributors

  • Uniwersytet Ekonomiczny w Poznaniu
  • Uniwersytet Ekonomiczny w Poznaniu
author
  • Uniwersytet Ekonomiczny w Poznaniu
  • Uniwersytet Ekonomiczny we Wrocławiu

References

  • Armbrust M. et al., Above the clouds: A Berkeley view of cloud computing, Technical Report No. UCB/EECS-2009-28, EECS Department, U.C. Berkeley 2009.
  • Catteddu D., Hogben G., An SME perspective on Cloud Computing, European Network and Information Security Agency, 2010, http://www.enisa.europa.eu/act/rm/files/deliverables/cloud-computing-sme-survey [accessed 19.01.2012].
  • Cloud Computing: Benefits, risks and recommendations for information security, eds. D. Catteddu, G. Hogben, European Network and Information Security Agency, 2009, http://www.enisa.europa.eu/act/rm/files/deliverables/cloud-computing-risk-assessment/at_download/fullReport [accessed 19.01.2012].
  • CSA, Security Guidance for Critical Areas of Focus in Cloud Computing V3.0, Cloud Security Alliance, 2011, https://cloudsecurityalliance.org/research/security-guidance/ [accessed 19.01.2012].
  • CSA, Top Threats to Cloud Computing V1.0, Cloud Security Alliance, 2010, https://cloudsecurityalliance.org/research/top-threats/[ accessed 19.01.2012].
  • Gartner, Gartner Identifies the Top 10 Strategic Technologies for 2011, Gartner Research, 2011, http://www.gartner.com/it/page.jsp?id=1454221 [accessed 19.01.2012].
  • Geelan J. (2009), Twenty-One Experts Define Cloud Computing, “Cloud Computing Journal”, http://cloudcomputing.sys-con.com/node/612375 [accessed 19.01.2012].
  • IDC, IDC IT Cloud Services Survey: Top Benefits and Challenges, IDC, 2009, http://blogs.idc.com/ie/?p=730 [accessed 20.01.2012].
  • Mell P., Grance T., The NIST Definition of Cloud Computing, National Institute of Standards and Technology, 2011, http://csrc.nist.gov/publications/nistpubs/800-145/SP800-145.pdf [accessed 19.01.2012].
  • SAJACC, Standards Acceleration to Jumpstart Adoption of Cloud Computing, National Institute of Standards and Technology, 2011, http://www.nist.gov/itl/cloud/sajacc.cfm [accessed 19.01.2012].
  • SecaaS, Defined Categories of Service 2011, Cloud Security Alliance, 2011, https://cloudsecurityalliance.org/research/secaas/ [accessed 19.01.2012].
  • Subashini S., Kavitha V., A survey on security issues in service delivery models of cloud computing, “Journal of Network and Computer Applications” 2011, vol. 34, no. 1.
  • Zissis D., Lekkas D., Addressing cloud computing security issues, “Future Generation Computer System” 2012, vol. 28, no. 3.

Document Type

Publication order reference

Identifiers

YADDA identifier

bwmeta1.element.desklight-e53f5096-6d54-4f3c-a6b8-184b121c23b6
JavaScript is turned off in your web browser. Turn it on to take full advantage of this site, then refresh the page.