Security Migration Requirements: From Legacy System to Cloud and from Cloud to Cloud

被引:0
作者
Hussein, Noor Ibrahim [1 ]
Hashem, Mervat [2 ]
Li, Zhiyong [2 ]
机构
[1] Hunan Univ, Coll Informat Sci & Engn, Minist Higher Educ & Sci Res Iraq, Changsha 410082, Hunan, Peoples R China
[2] Hunan Univ, Coll Informat Sci & Engn, Changsha 410082, Hunan, Peoples R China
来源
PROCEEDINGS OF THE 2ND INTERNATIONAL SYMPOSIUM ON COMPUTER, COMMUNICATION, CONTROL AND AUTOMATION | 2013年 / 68卷
基金
国家高技术研究发展计划(863计划); 中国国家自然科学基金;
关键词
Cloud systems; migration; cloud to cloud; cloud security;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Cloud computing became an emerging technology. The benefits have made a lot of institutions and companies looking to use this technology. The process of migration from legacy systems to cloud computing environments is a complex process. The migration process does not represent the movement of data, applications and service only but also presents the process from the early stages of planning and continue until after the selection and transfer of data to a specific deployment model. Security is the biggest concern to consumers during the migration process, whether immigration initial from legacy systems to the environment of cloud computing or migration between the clouds. This paper presents an overview of the security requirements: before, during and after the migration from legacy systems to cloud computing, as well as security requirements data migration between the clouds.
引用
收藏
页码:248 / 252
页数:5
相关论文
共 9 条
[1]  
Bhopale Shrikant D., IOSR J COMPUTER ENG, P40
[2]  
Jansen W.A., 2011, SYST SCI HICSS 2011, P10
[3]  
Kaisler Stephen, 2011, IEEE SERVICE MIGRATI
[4]  
Khajeh-Hosseini A., 2011, P 2011 IEEE 4 INT C
[5]  
Marwaha Mohit, COMPUTER SCI ENG PUN
[6]  
Shen Qingni, 2011, 9 SECDM SECURING DAT
[7]  
Sitaram D, 2012, MOVING TO THE CLOUD: DEVELOPING APPS IN THE NEW WORLD OF CLOUD COMPUTING, P1
[8]  
Zhang Xiao, 2011, ENSURE DATA SECURITY
[9]  
Zhao Gansen, 2010, DEPLOYMENT MODELS EL