2015
DOI: 10.1504/ijcis.2015.073843
|View full text |Cite
|
Sign up to set email alerts
|

Hosting critical infrastructure services in the cloud environment considerations

Abstract: Hosting critical infrastructure services in the cloud environment considerations http://researchonline.ljmu.ac.uk/6934/ Article LJMU has developed LJMU Research Online for users to access the research output of the University more effectively. Copyright © and Moral Rights for the papers on this site are retained by the individual authors and/or other copyright owners. Users may download and/or print one copy of any article(s) in LJMU Research Online to facilitate their private study or for non-commercial resea… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
3
1
1

Relationship

2
3

Authors

Journals

citations
Cited by 7 publications
(8 citation statements)
references
References 19 publications
(14 reference statements)
0
8
0
Order By: Relevance
“…The connectivity of SCADA networks increases the risk of cyber attacks, and hence, there is a need to improve the security of these networks. SCADA systems are rarely patched or updated as engineers are often hesitant to do so due to concerns that the patch itself could potentially adversely impact the operation of the system . Sajid et al highlighted the security challenges of cloud‐assisted IoT‐based SCADA systems and provided recommendations and best practices for improving and maintaining their security.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The connectivity of SCADA networks increases the risk of cyber attacks, and hence, there is a need to improve the security of these networks. SCADA systems are rarely patched or updated as engineers are often hesitant to do so due to concerns that the patch itself could potentially adversely impact the operation of the system . Sajid et al highlighted the security challenges of cloud‐assisted IoT‐based SCADA systems and provided recommendations and best practices for improving and maintaining their security.…”
Section: Related Workmentioning
confidence: 99%
“…Institutional security policies and access rules can be specified and mapped to the cloud environment. Requirement‐based security issues can be different for CI applications and for common IT applications but need to be considered in combination for the given context . With this in mind, our proposed platform is detailed below.…”
Section: An Integrated Approach To Secure Cloud‐enabled Iot‐based Scamentioning
confidence: 99%
“…The importance of protecting these infrastructures has been particularly highlighted by the increase in advanced persistent threats (APTs), such as 'Stuxnet' and 'Duqu', which were designed to target these control systems and disrupt their functionality [7]. Effective protection of SCADA systems is therefore crucial, as these are important components of critical infrastructures, and it is apparent that existing methods do not meet the security requirements of such interconnected infrastructures [4].…”
Section: Critical Infrastructure Overviewmentioning
confidence: 99%
“…Previous work of ours MacDermott et al [4] has detailed a way in which critical infrastructure could utilise the cloud environment for improved performance and analysis of the automation processes.…”
Section: Critical Infrastructure Overviewmentioning
confidence: 99%
See 1 more Smart Citation