MacDermott, Á, Shi, Q, Merabti, M and Kifayat, K (2015) Hosting critical infrastructure services in the cloud environment considerations. International Journal of Critical Infrastructures, 11 (4). pp. 365-381. ISSN 1475-3219
|
Text
X MACDERMOTT edit.pdf - Accepted Version Download (493kB) | Preview |
Abstract
Critical infrastructure technology vendors will inevitability take advantage of the benefits offered by the cloud computing paradigm. While this may offer improved performance and scalability, the associated security threats impede this progression. Hosting critical infrastructure services in the cloud environment may seem inane to some, but currently remote access to the control system over the internet is commonplace. This shares the same characteristics as cloud computing, i.e., on-demand access and resource pooling. There is a wealth of data used within critical infrastructure. There needs to be an assurance that the confidentiality, integrity and availability of this data remains. Authenticity and non-repudiation are also important security requirements for critical infrastructure systems. This paper provides an overview of critical infrastructure and the cloud computing relationship, whilst detailing security concerns and existing protection methods. Discussion on the direction of the area is presented, as is a survey of current protection methods and their weaknesses. Finally, we present our observation and our current research into hosting critical infrastructure services in the cloud environment, and the considerations for detecting cloud attacks. © 2015 Inderscience Enterprises Ltd.
Item Type: | Article |
---|---|
Uncontrolled Keywords: | 0905 Civil Engineering |
Subjects: | Q Science > QA Mathematics > QA75 Electronic computers. Computer science |
Divisions: | Computer Science & Mathematics |
Publisher: | Inderscience |
Date Deposited: | 15 Aug 2017 08:42 |
Last Modified: | 04 Sep 2021 11:18 |
DOI or ID number: | 10.1504/IJCIS.2015.073843 |
URI: | https://researchonline.ljmu.ac.uk/id/eprint/6934 |
View Item |