2015 15th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing 2015
DOI: 10.1109/ccgrid.2015.37
|View full text |Cite
|
Sign up to set email alerts
|

Security-Oriented Cloud Platform for SOA-Based SCADA

Abstract: During the last 10 years, experts in critical infrastructure security have been increasingly directing their focus and attention to the security of control structures such as Supervisory Control and Data Acquisition (SCADA) systems in the light of the move toward Internet-connected architectures. However, this more open architecture has resulted in an increasing level of risk being faced by these systems, especially as they became offered as services and utilised via Service Oriented Architectures (SOA). For e… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
20
0
1

Year Published

2015
2015
2020
2020

Publication Types

Select...
5
1
1

Relationship

4
3

Authors

Journals

citations
Cited by 32 publications
(22 citation statements)
references
References 10 publications
(6 reference statements)
0
20
0
1
Order By: Relevance
“…Any production cloud service vitally protects the network and thus, firewalls, DS monitoring as well as other standard management mechanisms should be applied by any public/private provider to offer adequate security level. Furthermore, Unified Threat Management (UTM) systems, which can establish a kind of more subtle attack characteristics and strong networking mechanisms for the purpose of automatic reaction through activating remedial measures, may be applied [26].…”
Section: Security Approachesmentioning
confidence: 99%
See 3 more Smart Citations
“…Any production cloud service vitally protects the network and thus, firewalls, DS monitoring as well as other standard management mechanisms should be applied by any public/private provider to offer adequate security level. Furthermore, Unified Threat Management (UTM) systems, which can establish a kind of more subtle attack characteristics and strong networking mechanisms for the purpose of automatic reaction through activating remedial measures, may be applied [26].…”
Section: Security Approachesmentioning
confidence: 99%
“…A consistent and reliable connectivity level, just like any other interference to the service can be both expensive and extremely influence the broader system performance, will be needed after the services are moved into the cloud. Thus, this is identified to have two aspects: a) strengthening the current best-effort IP routing mechanisms in the Internet with additional redundancy and b) mitigating malicious denial of service attacks [26].…”
Section: Network Resiliencementioning
confidence: 99%
See 2 more Smart Citations
“…Research to identify methods for performing IoT-based digital forensic analysis is essential. Mackay et al [18] and Baker et al [19] present a set of essential security services, embedded within a cloud-based "Security Toolbox", including end-to-end security services (e.g., secure virtualisation, and encrypted file system), service planning (e.g., Trust-based cloud, and SLA negotiation), and monitoring and policing (e.g., dynamic cloud monitoring and user access control). It should be noted that the toolbox and the associated services are developed in the context of a centralised SOA-based SCADA systems platform for critical infrastructures, in which none of the services were designed to help in data acquisition for forensic purposes.…”
Section: Internet Of Anything (Ioa)mentioning
confidence: 99%