Applying Security Policies in Small Business Utilizing Cloud Computing Technologies

نویسندگان

  • Louay Karadsheh
  • Samer Al Hawari
چکیده

Over a decade ago, cloud computing became an important topic for small and large businesses alike. The new concept promises scalability, security, cost reduction, portability, and availability. While addressing this issue over the past several years, there have been intensive discussions about the importance of cloud computing technologies. Therefore, this paper reviews the transition from traditional computing to cloud computing and the benefit for businesses, cloud computing architecture, cloud computing services classification, and deployment models. Furthermore, this paper discusses the security policies and types of internal risks that a small business might encounter implementing cloud computing technologies. It addresses initiatives towards employing certain types of security policies in small businesses implementing cloud computing technologies to encourage small business to migrate to cloud computing by portraying what is needed to secure their infrastructure using traditional security policies without the complexity used in large corporations. service provider interaction” (Mell & Grance, 2010). Furthermore, cloud computing enables dynamic provisioning of resources based on the requirements of the user (Yogesh & Navonil, 2010). In a recent study, Cloud computing is not a new technology, but it is a new way of delivering technology. It is a new way of executing business applications by relying more on a third party’s infrastructure, then local infrastructure (Srinivasan, 2010). In addition, the implementation of cloud computing is definitely accelerating (Cervone, 2010) and much of this is being motivated by new business requirements and enabled by information technology (IT). DOI: 10.4018/ijcac.2011040103 30 International Journal of Cloud Applications and Computing, 1(2), 29-40, April-June 2011 Copyright © 2011, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited. Most importantly, Katharine and David (2010) explained that in concepts of the cloud, while widespread usage is not yet common, some governments are taking stages to guarantee their information remains authentic and accessible. For this viewpoint, cloud computing is increasingly being considered as a technology that has the possible of changing how the internet and the information systems are presently operated and used (Amir, 2010). Lately, governments of several countries have realized the potential of cloud computing in offering enhanced services to its citizens. For example, UK Government is developing a secure cloud infrastructure called “G-Cloud” for public sector bodies. More significantly, the strategy will also provide some standardization for capabilities for the promotion of shared services with accredited cloud service providers (Heath, 2010). However, a client computer on the Internet can communicate with many servers at the same time, some of which may also be exchanging information among themselves (Hayes, 2008). Furthermore, the cost of this service can be determined by several factors such as an hour of usage, software type, and storage space utilization (Srinivasan, 2010). Therefore, this can be translated into saving of the software license, number of support labor, maintenance, office space and utilities. Recently, Wittow and Buller (2010) stated that traditional computing model is based on using hardware and software resources, which required on-site computing power and disk storage space, as well as the technical human expertise necessary to implement, maintain and secure those resources. Also, complicated and expensive upgrade procedures were necessary to take advantage of new developments and features available for software applications in the traditional computing model (Wittow & Buller, 2010). In addition, the upgraded software or/ and hardware often required upgrading licenses and increasing backup and recovery capabilities to reduce the downtime that users would experience should a software or hardware failure occur. Furthermore, local administrators with specialized, technical skill-sets were historically responsible for application and hardware maintenance (Wittow & Buller, 2010). In addition, the “traditional model” often involved managing a large hardware infrastructure with dissimilar operating systems and applications that required individual backups, monitoring and software updates (Wittow & Buller, 2010). The traditional computing model required companies (and individuals) to make a significant financial commitment to set up software and hardware resources, and these were frequently difficult to expand when the needs of users changed (Wittow & Buller, 2010). Furthermore, for small business, cloud computing can be a saving and reliability factors for relying increasingly on these technologies. In fact, clouds technologies may be very suitable for small businesses since clouds offer technical support and lower cost of service. Hence, an important issue in cloud computing allows for rapid increases in capacity or capability without the need to invest in additional infrastructure, personnel, or software licensing (Wittow & Buller, 2010). Furthermore, cloud computing free individuals and small businesses from worries about quick obsolescence and a lack of flexibility (Greengard, 2010). Therefore, small business will not need complicated infrastructure such as servers and lots of managed switches. Another advantage for small business is the increasing popularity of internet notebooks, or “netbooks,” (Wittow & Buller, 2010). Netbooks are typically low-cost, lightweight laptop computers with reduced hardware capacity and processing power that are primarily designed to provide the user with access to the Internet (Wittow & Buller, 2010). In this respect, netbooks provide users with vast resources because the cloud is fully accessible without requiring users to make a substantial investment in local hardware (Wittow & Buller, 2010). The virtually unlimited resources available in the cloud make the local system’s limited hardware capabilities irrelevant (Wittow & Buller, 2010). Therefore, the user will not need to install Microsoft Office locally, which uses more CPU 10 more pages are available in the full version of this document, which may be purchased using the "Add to Cart" button on the product's webpage: www.igi-global.com/article/applying-security-policies-smallbusiness/54718?camid=4v1 This title is available in InfoSci-Journals, InfoSci-Journal Disciplines Computer Science, Security, and Information Technology. Recommend this product to your librarian: www.igi-global.com/e-resources/libraryrecommendation/?id=2

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Cloud and IoT based Smart Car Parking System by using Mamdani Fuzzy Inference System (MFIS)

Internet of Things (IoT) and cloud computing technologies have connected the infrastructure of the city to make the context-aware and more intelligent city for utility its major resources. These technologies have much potential to solve thechallenges of urban areas around the globe to facilitate the citizens. A framework model that enables the integration of sensor’s data and analysis of ...

متن کامل

IMPACTS AND CHALLENGES OF CLOUD COMPUTING FOR SMALL AND MEDIUM SCALE BUSINESSES IN NIGERIA

Cloud computing technology is providing businesses, be it micro, small, medium, and large scale enterprises with the same level playing grounds. Small and Medium enterprises (SMEs) that have adopted the cloud are taking their businesses to greater heights with the competitive edge that cloud computing offers. The limitations faced by (SMEs) in procuring and maintaining IT infrastructures has be...

متن کامل

A Literature Review on Cloud Computing Security Issues

The use of Cloud Computing has increasedrapidly in many organization .Cloud Computing provides many benefits in terms of low cost and accessibility of data. In addition Cloud Computing was predicted to transform the computing world from using local applications and storage into centralized services provided by organization.[10] Ensuring the security of Cloud Computing is major factor in the Clo...

متن کامل

A Literature Review on Cloud Computing Security Issues

The use of Cloud Computing has increasedrapidly in many organization .Cloud Computing provides many benefits in terms of low cost and accessibility of data. In addition Cloud Computing was predicted to transform the computing world from using local applications and storage into centralized services provided by organization.[10] Ensuring the security of Cloud Computing is major factor in the Clo...

متن کامل

The impact of Cloud Computing in the banking industry resources

Today, one of the biggest problems that gripped the banking sphere, the high cost of implementing advanced technologies and the efficient use of the hardware. Cloud computing is the use of shared services on the Internet provides a large role in developing the banking system, without the need for operating expenses including staffing, equipment, hardware and software Reducing the cost of implem...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • IJCAC

دوره 1  شماره 

صفحات  -

تاریخ انتشار 2011