3.4 Compatibility
Linking to the migration to clouds, all businesses in
this study highlighted the need for cloud services
that are compatible with existing services and
application. Participants felt that there is not enough
guidelines or support in terms of how suitable clouds
are to meet their needs and also their compatibly
with exist systems and applications the business
might still require. As businesses has already invest
in systems prior to considering the option of cloud it
is important those systems and applications are not
ignored if these are still fit for purpose. There is
limited documentation and advice on the matter to
aid businesses in finding suitable and available tools
and techniques to support this objective. 80% of the
participants during stage 1 stated if cloud systems
where used, they would still feel current systems and
application would have to remain for certain tasks.
Therefore this would be increase outgoing costs of
maintaining both an existing systems and cloud
system, therefore not providing the businesses with
any cost saving.
3.5 Security
CSP often claiming that security in the cloud is
tighter than in most enterprises (David Binning,
2009) however the following questions need clear
and defined answers for CSPs. Will SMEs data be
safe in the cloud? What about data protection? What
will happen if security threats or breeches occur on
the cloud even those the technology has been around
for several years now, Gartner warned in 2013 that
there are still six major security issues that
businesses should tackle when considering cloud
adoption. (Warwick Ashford, 2013) Each cloud is
unique, offering different benefits and ways to
reduce costing. However there are also significant
drawbacks of cloud systems, particularly in security.
The variation of security threats and possible
breaches that the system could encounter, further
complicates cloud. [7 Distributed denial of service
attacks are on the raise on cloud systems, as clouds
host services for different customers on their severs,
so it’s no surprise these systems are a hot target for
cybercrimes. The fact that different businesses and
users sharing the cloud space also increases the risk
of access errors and leading to data been vulnerable
and at risk of being accessed by others. How data is
moved across and between CSP and the end user
also places greater risk and vulnerabilities.
One major downside of clouds is that the
provider has control of the user’s data. Users have to
relay and trust their provider will protect their data
and privacy. Privacy is an important issue for cloud
computing, both in terms of legal compliance and
user trust and this need to be considered at every
phase of design. (S. Srinivasamurthy and D. Q. Liu,
2010) Privacy has yet to be fully acknowledged as a
serious problem by policy makers and CSP. The
limited regulations and legislation being enforced on
privacy and user protection rights reflect this.
According to a recent Cloud Security Alliance
Report, insider attacks are the third biggest threat in
cloud computing. (Top Threats to Cloud Computing
v1.0, 2014) The reasons for this may vary, from
users not understanding the system and the
configuration processors, through to users who are
motivated to create damage and misuse.
Administrators and development need to deal with
this situation in a more consistent manner across
different cloud platforms. Therefore it is essential to
access the dynamics of a range of configuration
techniques and tools to evaluate and distinguish the
impact these issues have on a cloud.
The survey used in stage 1 showed that (75%) of
the SMEs stated concerns over employees IT
knowledge and felt that employees would have to
receive additional education and support in order to
use the technology effectively. (50%) of these
businesses further stated they are currently not in a
position to invest in providing such support for
employees at the moment. This further outlines
drawback to using cloud technologies that
businesses are assuming that high investment in
education and training would be required to use
these systems, when in fact the role of using clouds
could be to simplify certain IT tasks, for example
updates security countermeasures.
3.6 Costing
One of most hyped aspect of cloud computing is
surrounding cost savings. Yet has stated in early
sections of this paper, If SMEs have to continue
using existing systems and applications along a
cloud system there are no financial benefits.
Businesses and individuals considering using cloud,
expect appropriately reliable and timely service
delivery, easy-to-use interfaces, collaborative
support, information about their services, etc.(M. A.
Vouk, 2008) Such high exceptions are
understandable as the CSP have promoted their
cloud service as being able to achieve such goals.
All CSP will be affect at some point by downtime,
for example during upgrades. There was been recent
cases of security breaches in Amazon, Gmail and
RealityVsHype-DoesCloudComputingMeettheExpectationsofSMEs?
175