Facial reconstruction

Search LJMU Research Online

Browse Repository | Browse E-Theses

Hosting critical infrastructure services in the cloud environment considerations

MacDermott, Á and Shi, Q and Merabti, M and Kifayat, K (2015) Hosting critical infrastructure services in the cloud environment considerations. International Journal of Critical Infrastructures, 11 (4). pp. 365-381. ISSN 1475-3219

[img] Text
X MACDERMOTT edit.pdf - Accepted Version

Download (493kB)

Abstract

Critical infrastructure technology vendors will inevitability take advantage of the benefits offered by the cloud computing paradigm. While this may offer improved performance and scalability, the associated security threats impede this progression. Hosting critical infrastructure services in the cloud environment may seem inane to some, but currently remote access to the control system over the internet is commonplace. This shares the same characteristics as cloud computing, i.e., on-demand access and resource pooling. There is a wealth of data used within critical infrastructure. There needs to be an assurance that the confidentiality, integrity and availability of this data remains. Authenticity and non-repudiation are also important security requirements for critical infrastructure systems. This paper provides an overview of critical infrastructure and the cloud computing relationship, whilst detailing security concerns and existing protection methods. Discussion on the direction of the area is presented, as is a survey of current protection methods and their weaknesses. Finally, we present our observation and our current research into hosting critical infrastructure services in the cloud environment, and the considerations for detecting cloud attacks. © 2015 Inderscience Enterprises Ltd.

Item Type: Article
Uncontrolled Keywords: 0905 Civil Engineering
Subjects: Q Science > QA Mathematics > QA75 Electronic computers. Computer science
Divisions: Computer Science
Publisher: Inderscience
Date Deposited: 15 Aug 2017 08:42
Last Modified: 15 Aug 2017 08:42
DOI or Identification number: 10.1504/IJCIS.2015.073843
URI: http://researchonline.ljmu.ac.uk/id/eprint/6934

Actions (login required)

View Item View Item