Proceedings of the 2nd International Symposium on Computer, Communication, Control and Automation

Security Migration Requirements: From Legacy System to Cloud and from Cloud to Cloud

Authors
Noor Ibrahim Hussein, Mervat Hashem, Zhiyong Li
Corresponding Author
Noor Ibrahim Hussein
Available Online April 2013.
DOI
10.2991/3ca-13.2013.62How to use a DOI?
Keywords
Cloud systems; migration; cloud to cloud; cloud security
Abstract

Cloud computing became an emerging technology. The benefits have made a lot of institutions and companies looking to use this technology. The process of migration from legacy systems to cloud computing environments is a complex process. The migration process does not represent the movement of data, applications and service only but also presents the process from the early stages of planning and continue until after the selection and transfer of data to a specific deployment model. Security is the biggest concern to consumers during the migration process, whether immigration initial from legacy systems to the environment of cloud computing or migration between the clouds. This paper presents an overview of the security requirements: before, during and after the migration from legacy systems to cloud computing, as well as security requirements data migration between the clouds.

Copyright
© 2013, the Authors. Published by Atlantis Press.
Open Access
This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).

Download article (PDF)

Volume Title
Proceedings of the 2nd International Symposium on Computer, Communication, Control and Automation
Series
Advances in Intelligent Systems Research
Publication Date
April 2013
ISBN
978-90786-77-91-8
ISSN
1951-6851
DOI
10.2991/3ca-13.2013.62How to use a DOI?
Copyright
© 2013, the Authors. Published by Atlantis Press.
Open Access
This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).

Cite this article

TY  - CONF
AU  - Noor Ibrahim Hussein
AU  - Mervat Hashem
AU  - Zhiyong Li
PY  - 2013/04
DA  - 2013/04
TI  - Security Migration Requirements: From Legacy System to Cloud and from Cloud to Cloud
BT  - Proceedings of the 2nd International Symposium on Computer, Communication, Control and Automation
PB  - Atlantis Press
SP  - 248
EP  - 252
SN  - 1951-6851
UR  - https://doi.org/10.2991/3ca-13.2013.62
DO  - 10.2991/3ca-13.2013.62
ID  - Hussein2013/04
ER  -