TY - JOUR
T1 - Security-oriented cloud computing platform for critical infrastructures
AU - MacKay, M.
AU - Baker, T.
AU - Al-Yasiri, A.
PY - 2012/11/17
Y1 - 2012/11/17
N2 - The rise of virtualisation and cloud computing is one of the most significant features of computing in the last 10 years. However, despite its popularity, there are still a number of technical barriers that prevent it from becoming the truly ubiquitous service it has the potential to be. Central to this are the issues of data security and the lack of trust that users have in relying on cloud services to provide the foundation of their IT infrastructure. This is a highly complex issue, which covers multiple inter-related factors such as platform integrity, robust service guarantees, data and network security, and many others that have yet to be overcome in a meaningful way. This paper presents a concept for an innovative integrated platform to reinforce the integrity and security of cloud services and we apply this in the context of Critical Infrastructures to identify the core requirements, components and features of this infrastructure.
AB - The rise of virtualisation and cloud computing is one of the most significant features of computing in the last 10 years. However, despite its popularity, there are still a number of technical barriers that prevent it from becoming the truly ubiquitous service it has the potential to be. Central to this are the issues of data security and the lack of trust that users have in relying on cloud services to provide the foundation of their IT infrastructure. This is a highly complex issue, which covers multiple inter-related factors such as platform integrity, robust service guarantees, data and network security, and many others that have yet to be overcome in a meaningful way. This paper presents a concept for an innovative integrated platform to reinforce the integrity and security of cloud services and we apply this in the context of Critical Infrastructures to identify the core requirements, components and features of this infrastructure.
UR - http://www.scopus.com/inward/record.url?eid=2-s2.0-84869395212&partnerID=MN8TOARS
U2 - 10.1016/j.clsr.2012.07.007
DO - 10.1016/j.clsr.2012.07.007
M3 - Article
VL - 28
SP - 679
EP - 686
JO - Computer Law and Security Review
JF - Computer Law and Security Review
IS - 6
ER -