Cloud computing and security.
dc.contributor.author | Simões, Paulo | |
dc.contributor.author | Cardoso, Abílio | |
dc.date.accessioned | 2015-11-16T10:30:48Z | |
dc.date.available | 2015-11-16T10:30:48Z | |
dc.date.issued | 2012 | |
dc.description.abstract | There is always a strong pressure on Information Technology (IT) to do more with fewer resources. Over the decades, this pressure to rationalize IT costs spurred a number of paradigms, technologies and buzzwords. Some of them failed to meet their promises, while others became successfully embed in IT practices and infrastructures, providing sizeable benefits. The paradigm of cloud computing is currently riding this wave, promising to be the next great revolution in IT. Cloud computing appears to have the right technological and market ingredients to become widely successful. However, there are some key areas where cloud computing is still underperforming – such as security. Availability, security, privacy and integrity of information are some of the biggest concerns in the process of designing, implementing and running IT services based on cloud computing, due to technological and legal matters. There is already an extensive set of recommendations for IT management and IT governance in general – such as the popular Information Technology Infrastructure Library (ITIL) guidelines and Control Objectives for Information and related Technology (COBIT) recommendations. However, the field of cloud computing remains poorly covered. ITIL and other general sources can be sometimes translated to the context of cloud computing, but there are many new challenges not addressed by those generic resources. Recognizing this state of affairs, a number of initiatives already started focusing on novel proposals specifically targeting cloud computing but, up to now, with no significant outcomes. In this paper, we discuss the security implications involved in the migration of IT services to the cloud-computing model, proposing a set of rules and guidelines to be followed in the process of migrating IT services to the cloud. This set of rules and guidelines largely builds on general ITIL recommendations, discussing how to extend/adapt them to the field of cloud computing and identifying which a number of novel areas not covered by current ITIL recommendations. | pt |
dc.identifier.citation | Cardoso, A., & Simões, P. (2012). Cloud computing and security. In E. Filiol and R. Erra (Ed.), Proceedings of the 11th European Conference on Information Warfare and Security (pp.70-77), Laval, France 5-6 Jul.2012. | pt |
dc.identifier.uri | http://hdl.handle.net/11328/1310 | |
dc.language.iso | eng | pt |
dc.peerreviewed | yes | pt |
dc.publisher | Academic Publishing International Limited | pt |
dc.relation.publisherversion | http://academic-conferences.org/pdfs/ECIW_2012-Book.pdf. | pt |
dc.rights | open access | pt |
dc.subject | Cloud computing | pt |
dc.subject | Security | pt |
dc.subject | ITIL | pt |
dc.title | Cloud computing and security. | pt |
dc.type | conferenceObject | pt |
degois.publication.firstPage | p. 70 | pt |
degois.publication.lastPage | p. 77 | pt |
degois.publication.location | Laval, France | pt |
degois.publication.title | 11th European Conference on Information Warfare and Security. | pt |
dspace.entity.type | Publication | en |
person.affiliation.name | REMIT – Research on Economics, Management and Information Technologies | |
person.familyName | Cardoso | |
person.givenName | Abílio | |
person.identifier.ciencia-id | 2417-87C6-E2CC | |
person.identifier.orcid | 0000-0002-0829-3982 | |
person.identifier.rid | E-8789-2016 | |
person.identifier.scopus-author-id | 55345200900 | |
relation.isAuthorOfPublication | 1ea7473f-3118-4145-bac8-74613149c730 | |
relation.isAuthorOfPublication.latestForDiscovery | 1ea7473f-3118-4145-bac8-74613149c730 |
Files
Original bundle
1 - 1 of 1
Loading...
- Name:
- Cloud computing and Security.pdf
- Size:
- 255.22 KB
- Format:
- Adobe Portable Document Format