
3.4 Compatibility  
Linking to the migration to clouds, all businesses in 
this study highlighted the need for cloud services 
that are compatible with existing services and 
application. Participants felt that there is not enough 
guidelines or support in terms of how suitable clouds 
are to meet their needs and also their compatibly 
with exist systems and applications the business 
might still require. As businesses has already invest 
in systems prior to considering the option of cloud it 
is important those systems and applications are not 
ignored if these are still fit for purpose. There is 
limited documentation and advice on the matter to 
aid businesses in finding suitable and available tools 
and techniques to support this objective. 80% of the 
participants during stage 1 stated if cloud systems 
where used, they would still feel current systems and 
application would have to remain for certain tasks. 
Therefore this would be increase outgoing costs of 
maintaining both an existing systems and cloud 
system, therefore not providing the businesses with 
any cost saving.  
3.5 Security  
CSP often claiming that security in the cloud is 
tighter than in most enterprises (David Binning, 
2009) however the following questions need clear 
and defined answers for CSPs.  Will SMEs data be 
safe in the cloud? What about data protection? What 
will happen if security threats or breeches occur on 
the cloud even those the technology has been around 
for several years now, Gartner warned in 2013 that 
there are still six major security issues that 
businesses should tackle when considering cloud 
adoption. (Warwick Ashford, 2013) Each cloud is 
unique, offering different benefits and ways to 
reduce costing. However there are also significant 
drawbacks of cloud systems, particularly in security. 
The variation of security threats and possible 
breaches that the system could encounter, further 
complicates cloud. [7 Distributed denial of service 
attacks are on the raise on cloud systems, as clouds 
host services for different customers on their severs, 
so it’s no surprise these systems are a hot target for 
cybercrimes.  The fact that different businesses and 
users sharing the cloud space also increases the risk 
of access errors and leading to data been vulnerable 
and at risk of being accessed by others. How data is 
moved across and between CSP and the end user 
also places greater risk and vulnerabilities.   
One major downside of clouds is that the 
provider has control of the user’s data. Users have to 
relay and trust their provider will protect their data 
and privacy. Privacy is an important issue for cloud 
computing, both in terms of legal compliance and 
user trust and this need to be considered at every 
phase of design. (S. Srinivasamurthy and D. Q. Liu, 
2010) Privacy has yet to be fully acknowledged as a 
serious problem by policy makers and CSP. The 
limited regulations and legislation being enforced on 
privacy and user protection rights reflect this. 
According to a recent Cloud Security Alliance 
Report, insider attacks are the third biggest threat in 
cloud computing. (Top Threats to Cloud Computing 
v1.0, 2014) The reasons for this may vary, from 
users not understanding the system and the 
configuration processors, through to users who are 
motivated to create damage and misuse. 
Administrators and development need to deal with 
this situation in a more consistent manner across 
different cloud platforms. Therefore it is essential to 
access the dynamics of a range of configuration 
techniques and tools to evaluate and distinguish the 
impact these issues have on a cloud. 
The survey used in stage 1 showed that (75%) of 
the SMEs stated concerns over employees IT 
knowledge and felt that employees would have to 
receive additional education and support in order to 
use the technology effectively. (50%) of these 
businesses further stated they are currently not in a 
position to invest in providing such support for 
employees at the moment. This further outlines 
drawback to using cloud technologies that 
businesses are assuming that high investment in 
education and training would be required to use 
these systems, when in fact the role of using clouds 
could be to simplify certain IT tasks, for example 
updates security countermeasures.  
3.6 Costing 
One of most hyped aspect of cloud computing is 
surrounding cost savings. Yet has stated in early 
sections of this paper, If SMEs have to continue 
using existing systems and applications along a 
cloud system there are no financial benefits. 
Businesses and individuals considering using cloud, 
expect appropriately reliable and timely service 
delivery, easy-to-use interfaces, collaborative 
support, information about their services, etc.(M. A. 
Vouk, 2008) Such high exceptions are 
understandable as the CSP have promoted their 
cloud service as being able to achieve such goals.  
All CSP will be affect at some point by downtime, 
for example during upgrades. There was been recent 
cases of security breaches in Amazon, Gmail and 
RealityVsHype-DoesCloudComputingMeettheExpectationsofSMEs?
175