Cloud computing became an emerging technology. The benefits have made alot of institutions and companies looking to use this technology. Theprocess of migration from legacy systems to cloud computing environmentsis a complex process. The migration process does not represent themovement of data, applications and service only but also presents theprocess from the early stages of planning and continue until after theselection and transfer of data to a specific deployment model.Security is the biggest concern to consumers during the migrationprocess, whether immigration initial from legacy systems to theenvironment of cloud computing or migration between the clouds. Thispaper presents an overview of the security requirements: before, duringand after the migration from legacy systems to cloud computing, as wellas security requirements data migration between the clouds.
CITATION STYLE
Hussein, N. I., Hashem, M., & Li, Z. (2013). Security Migration Requirements: From Legacy System to Cloud and from Cloud to Cloud. In Proceedings of the 2nd International Symposium on Computer, Communication, Control and Automation (Vol. 68). Atlantis Press. https://doi.org/10.2991/3ca-13.2013.62
Mendeley helps you to discover research relevant for your work.