Published in

Inderscience, International Journal of Critical Infrastructures, 4(11), p. 365

DOI: 10.1504/ijcis.2015.073843

Links

Tools

Export citation

Search in Google Scholar

Hosting critical infrastructure services in the cloud environment considerations

Journal article published in 2014 by Aine Macdermott, Qi Shi, Madjid Merabti, Kashif Kifayat
This paper is available in a repository.
This paper is available in a repository.

Full text: Download

Green circle
Preprint: archiving allowed
Orange circle
Postprint: archiving restricted
Red circle
Published version: archiving forbidden
Data provided by SHERPA/RoMEO

Abstract

Critical infrastructure technology vendors will inevitability take advantage of the benefits offered by the Cloud Computing paradigm. While this may offer improved performance and scalability, the associated security threats impede this progression. Hosting critical infrastructure services in the cloud environment may seem inane to some, but currently remote access to the control system over the Internet is commonplace. This shares the same characteristics as Cloud Computing, i.e. on-demand access and resource pooling. There is a wealth of data used within critical infrastructure. There needs to be an assurance that the confidentiality, integrity and availability of this data remains. Authenticity and non-repudiation are also important security requirements for critical infrastructure systems. This paper provides an overview of critical infrastructure and the Cloud Computing relationship, whilst detailing security concerns and existing protection methods. Discussion on the direction of the area is presented, as is a survey of current protection methods and their weaknesses. Finally, we present our observation and our current research into hosting critical infrastructure services in the cloud environment, and the considerations for detecting cloud attacks.