Cloud computing and security.

dc.contributor.authorSimões, Paulo
dc.contributor.authorCardoso, Abílio
dc.date.accessioned2015-11-16T10:30:48Z
dc.date.available2015-11-16T10:30:48Z
dc.date.issued2012
dc.description.abstractThere is always a strong pressure on Information Technology (IT) to do more with fewer resources. Over the decades, this pressure to rationalize IT costs spurred a number of paradigms, technologies and buzzwords. Some of them failed to meet their promises, while others became successfully embed in IT practices and infrastructures, providing sizeable benefits. The paradigm of cloud computing is currently riding this wave, promising to be the next great revolution in IT. Cloud computing appears to have the right technological and market ingredients to become widely successful. However, there are some key areas where cloud computing is still underperforming – such as security. Availability, security, privacy and integrity of information are some of the biggest concerns in the process of designing, implementing and running IT services based on cloud computing, due to technological and legal matters. There is already an extensive set of recommendations for IT management and IT governance in general – such as the popular Information Technology Infrastructure Library (ITIL) guidelines and Control Objectives for Information and related Technology (COBIT) recommendations. However, the field of cloud computing remains poorly covered. ITIL and other general sources can be sometimes translated to the context of cloud computing, but there are many new challenges not addressed by those generic resources. Recognizing this state of affairs, a number of initiatives already started focusing on novel proposals specifically targeting cloud computing but, up to now, with no significant outcomes. In this paper, we discuss the security implications involved in the migration of IT services to the cloud-computing model, proposing a set of rules and guidelines to be followed in the process of migrating IT services to the cloud. This set of rules and guidelines largely builds on general ITIL recommendations, discussing how to extend/adapt them to the field of cloud computing and identifying which a number of novel areas not covered by current ITIL recommendations.pt
dc.identifier.citationCardoso, A., & Simões, P. (2012). Cloud computing and security. In E. Filiol and R. Erra (Ed.), Proceedings of the 11th European Conference on Information Warfare and Security (pp.70-77), Laval, France 5-6 Jul.2012.pt
dc.identifier.urihttp://hdl.handle.net/11328/1310
dc.language.isoengpt
dc.peerreviewedyespt
dc.publisherAcademic Publishing International Limitedpt
dc.relation.publisherversionhttp://academic-conferences.org/pdfs/ECIW_2012-Book.pdf.pt
dc.rightsopen accesspt
dc.subjectCloud computingpt
dc.subjectSecuritypt
dc.subjectITILpt
dc.titleCloud computing and security.pt
dc.typeconferenceObjectpt
degois.publication.firstPagep. 70pt
degois.publication.lastPagep. 77pt
degois.publication.locationLaval, Francept
degois.publication.title11th European Conference on Information Warfare and Security.pt
dspace.entity.typePublicationen
person.affiliation.nameREMIT – Research on Economics, Management and Information Technologies
person.familyNameCardoso
person.givenNameAbílio
person.identifier.ciencia-id2417-87C6-E2CC
person.identifier.orcid0000-0002-0829-3982
person.identifier.ridE-8789-2016
person.identifier.scopus-author-id55345200900
relation.isAuthorOfPublication1ea7473f-3118-4145-bac8-74613149c730
relation.isAuthorOfPublication.latestForDiscovery1ea7473f-3118-4145-bac8-74613149c730

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
Cloud computing and Security.pdf
Size:
255.22 KB
Format:
Adobe Portable Document Format