2018
DOI: 10.1016/j.jisa.2017.11.004
|View full text |Cite
|
Sign up to set email alerts
|

Secure migration to compliant cloud services: A case study

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 8 publications
0
2
0
Order By: Relevance
“…General security and privacy issues Pearson et al (2009) Rogue employees of cloud computing providers, hackers, and even other customers of the same provider can steal the users' private information from the cloud. Data theft from virtual machines in the cloud is one of the biggest security and privacy challenges in cloud computing Sun et al (2011) Security and privacy issues of cloud computing pertain to control over the private information, safety of transferring information to the cloud, legal requirement responsibility and supervising the cloud subcontractors Takabi et al (2010) Security and privacy concerns about cloud computing are authentication and identity management, access control and accounting, trust management and policy integration, secure-service management, privacy and data protection and organizational security management Zhou et al (2010) Privacy concerns named so far are still scant and more threats can be contemplated in terms of five security features: availability, confidentiality, data integrity, control and audit Security and privacy design and architecture Alruwaili and Gulliver (2014) An information security, privacy and compliance readiness model is proposed to evaluate whether an organization is prepared sufficiently to resolve privacy issues and address compliance violations Pearson (2009) It is recommended that system designers, architects, and developers take into account the following guidelines when designing cloud computing: minimize personal information sent to and stored in the cloud; protect personal information in the cloud; maximize user control; allow user choice; specify and limit the purpose of data usage; provide feedback Sharma and Khiva (2013) A secure architecture to reduce privacy concerns and the secure cloud computing should include four components: the third-party website, the cloud service provider, the user, and the third-party database Security and privacy regulation Kerr and Teng (2012) Traditional contracts and licensing do not provide enough legal resources and protection associated with the cloud computing relationships; thus, terms of use agreements, and service level agreements need to employ new patterns to encompass different cloud computing scenarios Mather et al (2009) Security and privacy concerns about using cloud computing applications and services can be decreased if the following regulations are adopted: Cloud computing has serious risks of privacy and consumer rights, and the current privacy law is insufficient to address the risks. Thus, cloud computing services should be used cautiously Data security and privacy Chen and Zhao (2012) A data life cycle (generation, transfer, use, share, storage, archival and destruction) for cloud computing services is presented and security and privacy of data at each phase of data life cycle are analyzed Khan and Hamlen (2012) A mechanism of anonymizing circuit based on Tor can be implemented by cloud computing providers; this mechanism assists users to safely transfer their personal and sensitive information to the cloud The effect of security and privacy beliefs…”
Section: Research Stream Studies Argument and Findingmentioning
confidence: 99%
“…General security and privacy issues Pearson et al (2009) Rogue employees of cloud computing providers, hackers, and even other customers of the same provider can steal the users' private information from the cloud. Data theft from virtual machines in the cloud is one of the biggest security and privacy challenges in cloud computing Sun et al (2011) Security and privacy issues of cloud computing pertain to control over the private information, safety of transferring information to the cloud, legal requirement responsibility and supervising the cloud subcontractors Takabi et al (2010) Security and privacy concerns about cloud computing are authentication and identity management, access control and accounting, trust management and policy integration, secure-service management, privacy and data protection and organizational security management Zhou et al (2010) Privacy concerns named so far are still scant and more threats can be contemplated in terms of five security features: availability, confidentiality, data integrity, control and audit Security and privacy design and architecture Alruwaili and Gulliver (2014) An information security, privacy and compliance readiness model is proposed to evaluate whether an organization is prepared sufficiently to resolve privacy issues and address compliance violations Pearson (2009) It is recommended that system designers, architects, and developers take into account the following guidelines when designing cloud computing: minimize personal information sent to and stored in the cloud; protect personal information in the cloud; maximize user control; allow user choice; specify and limit the purpose of data usage; provide feedback Sharma and Khiva (2013) A secure architecture to reduce privacy concerns and the secure cloud computing should include four components: the third-party website, the cloud service provider, the user, and the third-party database Security and privacy regulation Kerr and Teng (2012) Traditional contracts and licensing do not provide enough legal resources and protection associated with the cloud computing relationships; thus, terms of use agreements, and service level agreements need to employ new patterns to encompass different cloud computing scenarios Mather et al (2009) Security and privacy concerns about using cloud computing applications and services can be decreased if the following regulations are adopted: Cloud computing has serious risks of privacy and consumer rights, and the current privacy law is insufficient to address the risks. Thus, cloud computing services should be used cautiously Data security and privacy Chen and Zhao (2012) A data life cycle (generation, transfer, use, share, storage, archival and destruction) for cloud computing services is presented and security and privacy of data at each phase of data life cycle are analyzed Khan and Hamlen (2012) A mechanism of anonymizing circuit based on Tor can be implemented by cloud computing providers; this mechanism assists users to safely transfer their personal and sensitive information to the cloud The effect of security and privacy beliefs…”
Section: Research Stream Studies Argument and Findingmentioning
confidence: 99%
“…According to [7], the legacy applications are usually incompatible with current technology stack of the cloud servers. Many times, the enterprises must refactor and change the legacy code to work on cloud server, which is a very cumbersome work [13]. Therefore, a cloud migration framework must provide suitable integrators and adaptors that facilitates the migration of legacy application without making big changes in the source code [10].…”
Section: Related Studymentioning
confidence: 99%