Skip to main content

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 8185))

Abstract

Small and Medium-sized Enterprises (SMEs) are the backbone of a nation’s economy. In order to remain competitive and become a market leader in this globalization era, SMEs need to look into innovative IT solutions. One of these IT solutions is cloud computing, where it delivers Infrastructure, Platform, and Software as a Service (IaaS, PaaS, and SaaS) on a simple pay-per-use basis. Nevertheless, enterprises are sceptical about adopting the cloud, because of the risks involved in outsourcing services into the cloud.

To reduce the barrier for SMEs, this paper proposes a solution towards a two step service migration approach, 1) pre-defined Service-Level Agreement templates and 2) risk analyses, combined with a self-protecting cloud service that monitors, for example, the pre-defined privacy regulations and privacy protection measures.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. CISCO Systems Inc.: Planning the migration of enterprise applications to the cloud, http://www.cisco.com/en/US/services/ps2961/ps10364/ps10370/ps11104/Migration_of_Enterprise_Apps_to_Cloud_White_Paper.pdf

  2. Jansen, W.A.: Cloud hooks: Security and privacy issues in cloud computing. In: HICSS, pp. 1–10. IEEE Computer Society (2011)

    Google Scholar 

  3. MacInnes, B.: Leading the SME to cloud, http://www.microscope.co.uk/feature/Leading-the-SME-to-cloud

  4. Ren, K., Wang, C., Wang, Q.: Security challenges for the public cloud. IEEE Internet Computing 16(1), 69–73 (2012)

    Article  Google Scholar 

  5. Winkler, J.R.V.: Securing the Cloud: Cloud Computer Security Techniques and Tactics. Syngress Publishing (2011)

    Google Scholar 

  6. OECD: OECD Guidelines on the Protection of Privacy and Transborder Flows of Personal Data. OECD Publishing (February 2002)

    Google Scholar 

  7. Data Protection Directive 95/46/EC: Data Protection Directive 95/46/EC, http://europa.eu/legislation_summaries/information_society/data_protection/l14012_en.htm

  8. European Commision: General data protection regulation, http://ec.europa.eu/justice/data-protection/document/review2012/com_2012_11_en.pdf

  9. Sotto, L.J., Treacy, B.C., McLellan, M.L.: Privacy and Data Security Risks in Cloud Computing. In: Electronic Commerce & Law Report (February 2010)

    Google Scholar 

  10. Council Directive 2002/58/EC: On the protection of individuals with regard to the processing of personal data and on the free movement of such data. Official Journal L 281, pp. 31–50 (October 24, 1995)

    Google Scholar 

  11. Betge-Brezetz, S., Kamga, G.B., Ghorbel, M., Dupont, M.P.: Privacy control in the cloud based on multilevel policy enforcement. In: 2012 IEEE 1st International Conference on Cloud Networking (CLOUDNET), pp. 167–169 (2012)

    Google Scholar 

  12. Samarati, P., di Vimercati, S.D.C.: Data protection in outsourcing scenarios: issues and directions. In: Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, ASIACCS 2010, pp. 1–14. ACM, New York (2010)

    Google Scholar 

  13. Joseph, N.M., Daniel, E., Vasanthi, N.A.: Article: Survey on privacy-preserving methods for storage in cloud computing. In: IJCA Proceedings on Amrita International Conference of Women in Computing - 2013 AICWIC(4), pp. 1–4. Foundation of Computer Science, New York (2013)

    Google Scholar 

  14. Anil, S.L., Thanka, R.: A survey on security of data outsourcing in cloud. International Journal of Scientific and Research Publications (IJSRP) 3 (2013)

    Google Scholar 

  15. Sayi, T., Krishna, R., Mukkamala, R., Baruah, P.K.: Data outsourcing in cloud environments: A privacy preserving approach. In: 2012 Ninth International Conference on Information Technology: New Generations (ITNG), pp. 361–366 (2012)

    Google Scholar 

  16. Jiazhu, D., Shuangyan, L., Hongxia, L.: A privacy-preserving access control in outsourced storage services. In: 2011 IEEE International Conference on Computer Science and Automation Engineering, CSAE, vol. 3, pp. 247–251 (2011)

    Google Scholar 

  17. Wang, C., Wang, Q., Ren, K., Lou, W.: Privacy-preserving public auditing for data storage security in cloud computing. In: Proceedings of the 29th Conference on Information Communications, INFOCOM 2010, pp. 525–533. IEEE Press, Piscataway (2010)

    Google Scholar 

  18. ITIL: ITIL - IT Infrastructure Library, http://www.itil-officialsite.com/home/home.aspx

  19. Menascé, D.A., Kephart, J.O.: Guest editors’ introduction: Autonomic computing. IEEE Internet Computing 11(1), 18–21 (2007)

    Article  Google Scholar 

  20. IBM: An architectural blueprint for autonomic computing, http://www-03.ibm.com/autonomic/pdfs/AC%20Blueprint%20White%20Paper%20V7.pdf

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Sulistio, A., Reich, C. (2013). Towards a Self-protecting Cloud. In: Meersman, R., et al. On the Move to Meaningful Internet Systems: OTM 2013 Conferences. OTM 2013. Lecture Notes in Computer Science, vol 8185. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-41030-7_28

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-41030-7_28

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-41029-1

  • Online ISBN: 978-3-642-41030-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics