首页> 外文会议>International Workshop on Security in Information Systems >Security in Legacy Systems Migration to the Cloud: A Systematic Mapping Study
【24h】

Security in Legacy Systems Migration to the Cloud: A Systematic Mapping Study

机译:传统系统中的安全性迁移到云:系统映射研究

获取原文

摘要

While cloud computing emerges as a major trend in IT industry, early providers and adopters are paving the path with concerns and solutions. One of the most worrisome challenges that face the corporate clients of this new form of IT provision is how to maintain the security of their most important every day apps in the new environment, that is how to migrate securely their legacy systems that run on data centres fully controlled by the organization's IT department to a less clearly controlled infrastructure that is managed at least partly outside the scope of the clients premises and even completely off-shore. This paper presents a Systematic Mapping Study on the issue as the first step to analyze the different existing approaches in the literature about migration process to Cloud computing where taking into account the security aspects that have to be also moved to Cloud. We propose four research questions dealing with the existing strategies to migrate legacy, how they relate to common security issues as well as security issues specific to the cloud environment, and how the proposals are aligned with security standards.
机译:虽然云计算的出现为IT行业的一大趋势,及早提供者和使用者都用铺路关注和解决的路径。一个面临的IT提供的这种新形式的企业客户最令人担忧的挑战是如何保持其最重要的,每天的应用程序在新环境中的安全,那就是如何安全地迁移他们的遗留系统上的数据中心运行由该组织的IT部门完全控制到被管理的至少部分外的客户处所的范围,甚至完全离岸不太清楚控制的基础设施。本文提出了一种系统映射研究问题的第一步,分析不同的现有文献中有关迁移过程,云计算,其中考虑到了必须也搬到云安全方面的做法。我们提出了四个研究问题,处理现有策略迁移旧,它们与常见的安全问题以及安全问题的具体到云环境,并建议如何与安全标准相一致。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号