Impact of Critical Infrastructure Requirements on Service Migration Guidelines to the Cloud

作者: Christian Wagner , Aleksandar Hudic , Silia Maksuti , Markus Tauber , Frank Pallas

DOI: 10.1109/FICLOUD.2015.79

关键词:

摘要: A high level of information security in critical infrastructure IT systems and services has to be preserved when migrating their the cloud. Often various legislative constraints have met line with best practice guidelines international standards perform migration. To support providers cloud we are developing a process based migration guideline for focusing on security. First all investigate, via questionnaires, how importance individual topics covered such differentiates between industry stakeholders providers. This supports selection relevant considered standards, which survey search common topics. Subsequently present analysis above-mentioned requirements they affect here developed taxonomy process-based guideline. Furthermore potential service use cases our methodology would secure services.

参考文章(32)
Timothy Grance, Wayne Jansen, SP 800-144. Guidelines on Security and Privacy in Public Cloud Computing National Institute of Standards & Technology. ,(2011)
Hart Rossman, Richard Kissel, Matthew A. Scholl, Kevin M. Stine, James Fahlsing, Jessica Gulick, SP 800-64 Rev. 2. Security Considerations in the System Development Life Cycle National Institute of Standards & Technology. ,(2008)
Rajkumar Buyya, Chee Shin Yeo, Srikumar Venugopal, James Broberg, Ivona Brandic, None, Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility Future Generation Computer Systems. ,vol. 25, pp. 599- 616 ,(2009) , 10.1016/J.FUTURE.2008.12.001
Sarita Paudel, Markus Tauber, Christian Wagner, Aleksandar Hudic, Wee-Kong Ng, Categorization of Standards, Guidelines and Tools for Secure System Design for Critical Infrastructure IT in the Cloud ieee international conference on cloud computing technology and science. pp. 956- 963 ,(2014) , 10.1109/CLOUDCOM.2014.172
Dimitrios Zissis, Dimitrios Lekkas, Addressing cloud computing security issues Future Generation Computer Systems. ,vol. 28, pp. 583- 592 ,(2012) , 10.1016/J.FUTURE.2010.12.006
Kewei Sun, Ying Li, Effort Estimation in Cloud Migration Process service oriented software engineering. pp. 84- 91 ,(2013) , 10.1109/SOSE.2013.29
Pooyan Jamshidi, Aakash Ahmad, Claus Pahl, None, Cloud Migration Research: A Systematic Review ieee international conference on cloud computing technology and science. ,vol. 1, pp. 142- 157 ,(2013) , 10.1109/TCC.2013.10
Cristina Alcaraz, Sherali Zeadally, Critical infrastructure protection International Journal of Critical Infrastructure Protection. ,vol. 8, pp. 53- 66 ,(2015) , 10.1016/J.IJCIP.2014.12.002
Jean-Henry Morin, Jocelyn Aubert, Benjamin Gateau, Towards Cloud Computing SLA Risk Management: Issues and Challenges hawaii international conference on system sciences. pp. 5509- 5514 ,(2012) , 10.1109/HICSS.2012.602