Nowa wersja platformy, zawierająca wyłącznie zasoby pełnotekstowe, jest już dostępna.
Przejdź na https://bibliotekanauki.pl

PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
2012 | 4(26) | 100-111
Tytuł artykułu

Security challenges in cloud computing for small and medium enterprises

Wybrane pełne teksty z tego czasopisma
Warianty tytułu
PL
Wyzwania dla bezpieczeństwa przetwarzania w chmurze dla małych i średnich przedsiębiorstw
Języki publikacji
EN
Abstrakty
EN
Cloud computing is a model of leveraging IT resources offered by providers via the Internet. In this model, small and medium-sized enterprises are able to transfer the costs of building and maintaining IT infrastructure to third parties. The IT resources are available on demand, and the consumers pay merely for the resources actually used. A key factor limiting the adoption of cloud computing are security concerns. However, these concerns should be collated with the security benefits possible to achieve thanks to the cloud’s characteristics. This paper presents an analysis of the risks and benefits in the area of security related to cloud computing implementation in companies and an overview of initiatives aimed at increasing the awareness in this area.
Rocznik
Numer
Strony
100-111
Opis fizyczny
Daty
wydano
2012
Twórcy
Bibliografia
  • Armbrust M. et al., Above the clouds: A Berkeley view of cloud computing, Technical Report No. UCB/EECS-2009-28, EECS Department, U.C. Berkeley 2009.
  • Catteddu D., Hogben G., An SME perspective on Cloud Computing, European Network and Information Security Agency, 2010, http://www.enisa.europa.eu/act/rm/files/deliverables/cloud-computing-sme-survey [accessed 19.01.2012].
  • Cloud Computing: Benefits, risks and recommendations for information security, eds. D. Catteddu, G. Hogben, European Network and Information Security Agency, 2009, http://www.enisa.europa.eu/act/rm/files/deliverables/cloud-computing-risk-assessment/at_download/fullReport [accessed 19.01.2012].
  • CSA, Security Guidance for Critical Areas of Focus in Cloud Computing V3.0, Cloud Security Alliance, 2011, https://cloudsecurityalliance.org/research/security-guidance/ [accessed 19.01.2012].
  • CSA, Top Threats to Cloud Computing V1.0, Cloud Security Alliance, 2010, https://cloudsecurityalliance.org/research/top-threats/[ accessed 19.01.2012].
  • Gartner, Gartner Identifies the Top 10 Strategic Technologies for 2011, Gartner Research, 2011, http://www.gartner.com/it/page.jsp?id=1454221 [accessed 19.01.2012].
  • Geelan J. (2009), Twenty-One Experts Define Cloud Computing, “Cloud Computing Journal”, http://cloudcomputing.sys-con.com/node/612375 [accessed 19.01.2012].
  • IDC, IDC IT Cloud Services Survey: Top Benefits and Challenges, IDC, 2009, http://blogs.idc.com/ie/?p=730 [accessed 20.01.2012].
  • Mell P., Grance T., The NIST Definition of Cloud Computing, National Institute of Standards and Technology, 2011, http://csrc.nist.gov/publications/nistpubs/800-145/SP800-145.pdf [accessed 19.01.2012].
  • SAJACC, Standards Acceleration to Jumpstart Adoption of Cloud Computing, National Institute of Standards and Technology, 2011, http://www.nist.gov/itl/cloud/sajacc.cfm [accessed 19.01.2012].
  • SecaaS, Defined Categories of Service 2011, Cloud Security Alliance, 2011, https://cloudsecurityalliance.org/research/secaas/ [accessed 19.01.2012].
  • Subashini S., Kavitha V., A survey on security issues in service delivery models of cloud computing, “Journal of Network and Computer Applications” 2011, vol. 34, no. 1.
  • Zissis D., Lekkas D., Addressing cloud computing security issues, “Future Generation Computer System” 2012, vol. 28, no. 3.
Typ dokumentu
Bibliografia
Identyfikatory
Identyfikator YADDA
bwmeta1.element.desklight-e53f5096-6d54-4f3c-a6b8-184b121c23b6
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.