Skip to main content

Migrating to Public Clouds – From a Security Perspective

  • Chapter
  • First Online:
  • 996 Accesses

Part of the book series: Computer Communications and Networks ((CCN))

Abstract

Given the growth of Cloud Computing in the recent years, the number of users adopting Cloud services is also increasing at a stupendous scale. Though the emergence of various service offering models and infrastructures in Cloud services widens the service options for the Cloud users, this also leaves the Cloud users in a state of chaos whilst choosing their appropriate Cloud services. To this end, defining policies for adopting Cloud services from the perspectives of both the individuals and organizations has become essential for choosing the right Cloud services. With this is mind, this chapter is aimed at uncovering the concerns incurred whilst migrating from private Cloud to public Cloud services. An important contribution of this chapter is the inferences, derived from a conducted survey amongst the Cloud users, which includes evaluating their satisfactory levels, requirements and desired improvements in their respective Cloud environments.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   54.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Amazon (2013) What is Amazon VPC? – Amazon Virtual Private Cloud. [online] Retrieved from: http://docs.aws.amazon.com/AmazonVPC/latest/UserGuide/VPC_Introduction.html. Accessed 25 Mar 2014

  2. Antonopoulos N, Gillam L (2010) Cloud computing. Springer, London

    Book  MATH  Google Scholar 

  3. Azeemi I, Lewis M, Tryfonas T (2013) Migrating to the cloud: lessons and limitations of ‘traditional’ IS success models. Procedia Comput Sci 16:737–746

    Article  Google Scholar 

  4. Balduzzi M, Zaddach J, Balzarotti D, Kirda E, Loureiro S (2012) A security analysis of amazon’s elastic compute cloud service. In: Proceedings of the 27th annual ACM symposium on applied computing, SAC’12, Italy, March 2012, pp 1427–1434. doi:10.1145/2245276.2232005

  5. BCS (2012) Cloud computing: moving IT out of the office. British Computer Society, Swindon

    Google Scholar 

  6. Bento AM, Aggarwal A (2013) Cloud computing service and deployment models. Business Science Reference, Hershey

    Book  Google Scholar 

  7. Chen Y, Paxson V, Katz R (2010) What’s new about cloud computing security?. [report] University of Berkeley, Berkeley

    Google Scholar 

  8. Dillion T, Wu C, Chang E (2010) Cloud computing: issues and challenges. In: Proceedings of the 24th IEEE international conference on Advanced Information Networking and Applications (AINA), Perth, April 2010, pp 27–33

    Google Scholar 

  9. Gong C, Liu J, Zhang Q, Chen H, Gong Z (2010) The characteristics of cloud computing. In: Proceedings of the 39th International Conference on Parallel Processing Workshops (ICPPW), San Diego, September 2010, pp 275–279

    Google Scholar 

  10. Greenberg A (2011). Researchers find Amazon cloud servers teeming with backdoors and other people’s data. [online] 11th August. Retrieved from: http://www.forbes.com/sites/andygreenberg/2011/11/08/researchers-find-amazon-Cloud-servers-teeming-with-backdoors-and-other-peoples-data/. Accessed 26 Mar 2014

  11. Hill R, Hirsch L, Lake P, Moshiri S (2013) Guide to cloud computing. Springer, London

    Book  Google Scholar 

  12. Leavitt N (2009) Is cloud computing really ready for prime time. Growth 27:5

    Google Scholar 

  13. Northwestern University (1997) PROPHET StatGuide: do your data violate goodness of fit (chi-square) test assumptions?. [online] Retrieved from: http://www.basic.northwestern.edu/statguidefiles/gf-dist_ass_viol.html. Accessed 1 Apr 2014

  14. Pariseau B (2013) Networking, security issues still irk large AWS shops. [online] Retrieved from: http://searchCloudcomputing.techtarget.com/news/2240203992/Networking-security-issues-still-irk-large-AWS-shops. Accessed 26 Mar 2014

  15. Pennsylvania State University (2013) CHI-SQUARE TEST. [online] Retrieved from: http://www2.lv.psu.edu/jxm57/irp/chisquar.html. Accessed 27 Mar 2014

  16. Reese G (2009) Cloud application architectures. O’reilly, Sebastopol

    Google Scholar 

  17. Ren K, Wang C, Wang Q, Others (2012) Security challenges for the public Cloud. IEEE Internet Comput 16(1): 69–73

    Google Scholar 

  18. RightScale (2014) Retrieved from: http://www.rightscale.com/blog/Cloud-industry-insights/Cloud-computing-trends-2014-state-Cloud-survey

  19. Rimal BP, Choi E, Lumb I (2009) A taxonomy and survey of cloud computing systems. pp 44–51

    Google Scholar 

  20. Rong C, Nguyen ST, Jaatun MG (2013) Beyond lightning: a survey on security challenges in cloud computing. Comput Electr Eng 39(1):47–54

    Article  Google Scholar 

  21. Schaller RR (1997) Moore’s law: past, present and future. Spectr IEEE 34(6):52–59

    Article  Google Scholar 

  22. Seddon PB, Staples S, Patnayakuni R, Bowtell M (1999) Dimensions of information systems success. Communications Of The AIS, 2 (3es), p 5

    Google Scholar 

  23. Sultan N (2010) Cloud computing for education: a new dawn? Int J Inf Manag 30(2):109–116

    Article  Google Scholar 

  24. Sultan N, Van De Bunt-Kokhuis S (2012) Organizational culture and cloud computing: coping with a disruptive innovation. Tech Anal Strat Manag 24(2):167–179

    Article  Google Scholar 

  25. Wang L (2012) Cloud computing. CRC Press, Boca Raton

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to John Panneerselvam .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Holding, T., Panneerselvam, J., Liu, L. (2015). Migrating to Public Clouds – From a Security Perspective. In: Zhu, S., Hill, R., Trovati, M. (eds) Guide to Security Assurance for Cloud Computing. Computer Communications and Networks. Springer, Cham. https://doi.org/10.1007/978-3-319-25988-8_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-25988-8_3

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-25986-4

  • Online ISBN: 978-3-319-25988-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics