Abstract
Given the growth of Cloud Computing in the recent years, the number of users adopting Cloud services is also increasing at a stupendous scale. Though the emergence of various service offering models and infrastructures in Cloud services widens the service options for the Cloud users, this also leaves the Cloud users in a state of chaos whilst choosing their appropriate Cloud services. To this end, defining policies for adopting Cloud services from the perspectives of both the individuals and organizations has become essential for choosing the right Cloud services. With this is mind, this chapter is aimed at uncovering the concerns incurred whilst migrating from private Cloud to public Cloud services. An important contribution of this chapter is the inferences, derived from a conducted survey amongst the Cloud users, which includes evaluating their satisfactory levels, requirements and desired improvements in their respective Cloud environments.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Amazon (2013) What is Amazon VPC? – Amazon Virtual Private Cloud. [online] Retrieved from: http://docs.aws.amazon.com/AmazonVPC/latest/UserGuide/VPC_Introduction.html. Accessed 25 Mar 2014
Antonopoulos N, Gillam L (2010) Cloud computing. Springer, London
Azeemi I, Lewis M, Tryfonas T (2013) Migrating to the cloud: lessons and limitations of ‘traditional’ IS success models. Procedia Comput Sci 16:737–746
Balduzzi M, Zaddach J, Balzarotti D, Kirda E, Loureiro S (2012) A security analysis of amazon’s elastic compute cloud service. In: Proceedings of the 27th annual ACM symposium on applied computing, SAC’12, Italy, March 2012, pp 1427–1434. doi:10.1145/2245276.2232005
BCS (2012) Cloud computing: moving IT out of the office. British Computer Society, Swindon
Bento AM, Aggarwal A (2013) Cloud computing service and deployment models. Business Science Reference, Hershey
Chen Y, Paxson V, Katz R (2010) What’s new about cloud computing security?. [report] University of Berkeley, Berkeley
Dillion T, Wu C, Chang E (2010) Cloud computing: issues and challenges. In: Proceedings of the 24th IEEE international conference on Advanced Information Networking and Applications (AINA), Perth, April 2010, pp 27–33
Gong C, Liu J, Zhang Q, Chen H, Gong Z (2010) The characteristics of cloud computing. In: Proceedings of the 39th International Conference on Parallel Processing Workshops (ICPPW), San Diego, September 2010, pp 275–279
Greenberg A (2011). Researchers find Amazon cloud servers teeming with backdoors and other people’s data. [online] 11th August. Retrieved from: http://www.forbes.com/sites/andygreenberg/2011/11/08/researchers-find-amazon-Cloud-servers-teeming-with-backdoors-and-other-peoples-data/. Accessed 26 Mar 2014
Hill R, Hirsch L, Lake P, Moshiri S (2013) Guide to cloud computing. Springer, London
Leavitt N (2009) Is cloud computing really ready for prime time. Growth 27:5
Northwestern University (1997) PROPHET StatGuide: do your data violate goodness of fit (chi-square) test assumptions?. [online] Retrieved from: http://www.basic.northwestern.edu/statguidefiles/gf-dist_ass_viol.html. Accessed 1 Apr 2014
Pariseau B (2013) Networking, security issues still irk large AWS shops. [online] Retrieved from: http://searchCloudcomputing.techtarget.com/news/2240203992/Networking-security-issues-still-irk-large-AWS-shops. Accessed 26 Mar 2014
Pennsylvania State University (2013) CHI-SQUARE TEST. [online] Retrieved from: http://www2.lv.psu.edu/jxm57/irp/chisquar.html. Accessed 27 Mar 2014
Reese G (2009) Cloud application architectures. O’reilly, Sebastopol
Ren K, Wang C, Wang Q, Others (2012) Security challenges for the public Cloud. IEEE Internet Comput 16(1): 69–73
RightScale (2014) Retrieved from: http://www.rightscale.com/blog/Cloud-industry-insights/Cloud-computing-trends-2014-state-Cloud-survey
Rimal BP, Choi E, Lumb I (2009) A taxonomy and survey of cloud computing systems. pp 44–51
Rong C, Nguyen ST, Jaatun MG (2013) Beyond lightning: a survey on security challenges in cloud computing. Comput Electr Eng 39(1):47–54
Schaller RR (1997) Moore’s law: past, present and future. Spectr IEEE 34(6):52–59
Seddon PB, Staples S, Patnayakuni R, Bowtell M (1999) Dimensions of information systems success. Communications Of The AIS, 2 (3es), p 5
Sultan N (2010) Cloud computing for education: a new dawn? Int J Inf Manag 30(2):109–116
Sultan N, Van De Bunt-Kokhuis S (2012) Organizational culture and cloud computing: coping with a disruptive innovation. Tech Anal Strat Manag 24(2):167–179
Wang L (2012) Cloud computing. CRC Press, Boca Raton
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Holding, T., Panneerselvam, J., Liu, L. (2015). Migrating to Public Clouds – From a Security Perspective. In: Zhu, S., Hill, R., Trovati, M. (eds) Guide to Security Assurance for Cloud Computing. Computer Communications and Networks. Springer, Cham. https://doi.org/10.1007/978-3-319-25988-8_3
Download citation
DOI: https://doi.org/10.1007/978-3-319-25988-8_3
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-25986-4
Online ISBN: 978-3-319-25988-8
eBook Packages: Computer ScienceComputer Science (R0)