Security Migration Requirements: From Legacy System to Cloud and from Cloud to Cloud
- 10.2991/3ca-13.2013.62How to use a DOI?
- Cloud systems; migration; cloud to cloud; cloud security
Cloud computing became an emerging technology. The benefits have made a lot of institutions and companies looking to use this technology. The process of migration from legacy systems to cloud computing environments is a complex process. The migration process does not represent the movement of data, applications and service only but also presents the process from the early stages of planning and continue until after the selection and transfer of data to a specific deployment model. Security is the biggest concern to consumers during the migration process, whether immigration initial from legacy systems to the environment of cloud computing or migration between the clouds. This paper presents an overview of the security requirements: before, during and after the migration from legacy systems to cloud computing, as well as security requirements data migration between the clouds.
- © 2013, the Authors. Published by Atlantis Press.
- Open Access
- This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).
Cite this article
TY - CONF AU - Noor Ibrahim Hussein AU - Mervat Hashem AU - Zhiyong Li PY - 2013/04 DA - 2013/04 TI - Security Migration Requirements: From Legacy System to Cloud and from Cloud to Cloud BT - Proceedings of the 2nd International Symposium on Computer, Communication, Control and Automation PB - Atlantis Press SP - 248 EP - 252 SN - 1951-6851 UR - https://doi.org/10.2991/3ca-13.2013.62 DO - 10.2991/3ca-13.2013.62 ID - Hussein2013/04 ER -