IDEAS home Printed from https://ideas.repec.org/a/ids/ijcist/v11y2015i4p365-381.html
   My bibliography  Save this article

Hosting critical infrastructure services in the cloud environment considerations

Author

Listed:
  • Ã ine MacDermott
  • Qi Shi
  • Madjid Merabti
  • Kashif Kifayat

Abstract

Critical infrastructure technology vendors will inevitability take advantage of the benefits offered by the cloud computing paradigm. While this may offer improved performance and scalability, the associated security threats impede this progression. Hosting critical infrastructure services in the cloud environment may seem inane to some, but currently remote access to the control system over the internet is commonplace. This shares the same characteristics as cloud computing, i.e., on-demand access and resource pooling. There is a wealth of data used within critical infrastructure. There needs to be an assurance that the confidentiality, integrity and availability of this data remains. Authenticity and non-repudiation are also important security requirements for critical infrastructure systems. This paper provides an overview of critical infrastructure and the cloud computing relationship, whilst detailing security concerns and existing protection methods. Discussion on the direction of the area is presented, as is a survey of current protection methods and their weaknesses. Finally, we present our observation and our current research into hosting critical infrastructure services in the cloud environment, and the considerations for detecting cloud attacks.

Suggested Citation

  • Ã ine MacDermott & Qi Shi & Madjid Merabti & Kashif Kifayat, 2015. "Hosting critical infrastructure services in the cloud environment considerations," International Journal of Critical Infrastructures, Inderscience Enterprises Ltd, vol. 11(4), pages 365-381.
  • Handle: RePEc:ids:ijcist:v:11:y:2015:i:4:p:365-381
    as

    Download full text from publisher

    File URL: http://www.inderscience.com/link.php?id=73843
    Download Restriction: Access to full text is restricted to subscribers.
    ---><---

    As the access to this document is restricted, you may want to search for a different version of it.

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Jannati, Hoda & Bahrak, Behnam, 2017. "An improved authentication protocol for distributed mobile cloud computing services," International Journal of Critical Infrastructure Protection, Elsevier, vol. 19(C), pages 59-67.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:ids:ijcist:v:11:y:2015:i:4:p:365-381. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Sarah Parker (email available below). General contact details of provider: http://www.inderscience.com/browse/index.php?journalID=58 .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.