Abstract
Small and Medium-sized Enterprises (SMEs) are the backbone of a nation’s economy. In order to remain competitive and become a market leader in this globalization era, SMEs need to look into innovative IT solutions. One of these IT solutions is cloud computing, where it delivers Infrastructure, Platform, and Software as a Service (IaaS, PaaS, and SaaS) on a simple pay-per-use basis. Nevertheless, enterprises are sceptical about adopting the cloud, because of the risks involved in outsourcing services into the cloud.
To reduce the barrier for SMEs, this paper proposes a solution towards a two step service migration approach, 1) pre-defined Service-Level Agreement templates and 2) risk analyses, combined with a self-protecting cloud service that monitors, for example, the pre-defined privacy regulations and privacy protection measures.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
CISCO Systems Inc.: Planning the migration of enterprise applications to the cloud, http://www.cisco.com/en/US/services/ps2961/ps10364/ps10370/ps11104/Migration_of_Enterprise_Apps_to_Cloud_White_Paper.pdf
Jansen, W.A.: Cloud hooks: Security and privacy issues in cloud computing. In: HICSS, pp. 1–10. IEEE Computer Society (2011)
MacInnes, B.: Leading the SME to cloud, http://www.microscope.co.uk/feature/Leading-the-SME-to-cloud
Ren, K., Wang, C., Wang, Q.: Security challenges for the public cloud. IEEE Internet Computing 16(1), 69–73 (2012)
Winkler, J.R.V.: Securing the Cloud: Cloud Computer Security Techniques and Tactics. Syngress Publishing (2011)
OECD: OECD Guidelines on the Protection of Privacy and Transborder Flows of Personal Data. OECD Publishing (February 2002)
Data Protection Directive 95/46/EC: Data Protection Directive 95/46/EC, http://europa.eu/legislation_summaries/information_society/data_protection/l14012_en.htm
European Commision: General data protection regulation, http://ec.europa.eu/justice/data-protection/document/review2012/com_2012_11_en.pdf
Sotto, L.J., Treacy, B.C., McLellan, M.L.: Privacy and Data Security Risks in Cloud Computing. In: Electronic Commerce & Law Report (February 2010)
Council Directive 2002/58/EC: On the protection of individuals with regard to the processing of personal data and on the free movement of such data. Official Journal L 281, pp. 31–50 (October 24, 1995)
Betge-Brezetz, S., Kamga, G.B., Ghorbel, M., Dupont, M.P.: Privacy control in the cloud based on multilevel policy enforcement. In: 2012 IEEE 1st International Conference on Cloud Networking (CLOUDNET), pp. 167–169 (2012)
Samarati, P., di Vimercati, S.D.C.: Data protection in outsourcing scenarios: issues and directions. In: Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, ASIACCS 2010, pp. 1–14. ACM, New York (2010)
Joseph, N.M., Daniel, E., Vasanthi, N.A.: Article: Survey on privacy-preserving methods for storage in cloud computing. In: IJCA Proceedings on Amrita International Conference of Women in Computing - 2013 AICWIC(4), pp. 1–4. Foundation of Computer Science, New York (2013)
Anil, S.L., Thanka, R.: A survey on security of data outsourcing in cloud. International Journal of Scientific and Research Publications (IJSRP) 3 (2013)
Sayi, T., Krishna, R., Mukkamala, R., Baruah, P.K.: Data outsourcing in cloud environments: A privacy preserving approach. In: 2012 Ninth International Conference on Information Technology: New Generations (ITNG), pp. 361–366 (2012)
Jiazhu, D., Shuangyan, L., Hongxia, L.: A privacy-preserving access control in outsourced storage services. In: 2011 IEEE International Conference on Computer Science and Automation Engineering, CSAE, vol. 3, pp. 247–251 (2011)
Wang, C., Wang, Q., Ren, K., Lou, W.: Privacy-preserving public auditing for data storage security in cloud computing. In: Proceedings of the 29th Conference on Information Communications, INFOCOM 2010, pp. 525–533. IEEE Press, Piscataway (2010)
ITIL: ITIL - IT Infrastructure Library, http://www.itil-officialsite.com/home/home.aspx
Menascé, D.A., Kephart, J.O.: Guest editors’ introduction: Autonomic computing. IEEE Internet Computing 11(1), 18–21 (2007)
IBM: An architectural blueprint for autonomic computing, http://www-03.ibm.com/autonomic/pdfs/AC%20Blueprint%20White%20Paper%20V7.pdf
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Sulistio, A., Reich, C. (2013). Towards a Self-protecting Cloud. In: Meersman, R., et al. On the Move to Meaningful Internet Systems: OTM 2013 Conferences. OTM 2013. Lecture Notes in Computer Science, vol 8185. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-41030-7_28
Download citation
DOI: https://doi.org/10.1007/978-3-642-41030-7_28
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-41029-1
Online ISBN: 978-3-642-41030-7
eBook Packages: Computer ScienceComputer Science (R0)