journal article Mar 25, 2020

Analysis of a cloud migration framework for offline risk assessment of cloud service providers

Software: Practice and Experience Vol. 50 No. 6 pp. 998-1021 · Wiley
Abstract
SummaryGeneric notions of security on cloud platforms make clients apprehensive about fully migrating their applications on these platforms. The challenge lies in the capability of personalizing the security assessments of different cloud service providers from the perspective of the security requirements of the client applications to be hosted on them. This challenge was addressed by the previously proposed offline risk assessment framework for cloud service providers. This article presents a comprehensive analysis of a cloud migration framework that has been designed by adapting the novel security assessment principles of the offline risk assessment framework. The migration strategy has been modeled as a multiobjective optimization problem to further study the performance of numerous evolutionary algorithms in designing various cloud migration scenarios. The overall effectiveness of the proposed framework has been examined using a use‐case application scenario and semisynthetic cloud service providers.
Topics

No keywords indexed for this article. Browse by subject →

References
31
[2]
Khajeh‐HosseiniA GreenwoodD SommervilleI. Cloud migration: a case study of migrating an enterprise IT system to IaaS. Paper presented at: Proceedings of the IEEE 3rd International Conference on Cloud Computing; 2010:450‐457. 10.1109/cloud.2010.37
[3]
JohnsonB QuY. A holistic model for making cloud migration decision: a consideration of security architecture and business economics. Paper presented at: Proceedings of the 10th IEEE International Symposium on Parallel and Distributed Processing with Applications ISPA; 2012:435‐441. 10.1109/ispa.2012.63
[4]
NussbaumerN LiuX. Cloud migration for SMEs in a service oriented approach. Paper presented at: Proceedings of the IEEE 37th Annual Computer Software and Applications Conference Workshops; 2013. 10.1109/compsacw.2013.71
[5]
KashefMM AltmannJ. A cost model for hybrid clouds. Paper presented at: Proceedings of the 8th International Workshop Economics of Grids Clouds Systems and Services; 2012:46‐60. 10.1007/978-3-642-28675-9_4
[6]
AndrikopoulosV StrauchS LeymannF. Decision support for application migration to the cloud: challenges and vision. Paper presented at: Proceedings of the 3rd International Conference on Cloud Computing and Service Science (CLOSER'13); 2013:1‐7; SciTePress.
[7]
Khajeh‐HosseiniA SommervilleI BogaertsJ TeregowdaP. Decision support tools for cloud migration in the enterprise. Paper presented at: Proceedings of the 2011 IEEE International Conference on Cloud Computing (CLOUD); 2011:541‐548. 10.1109/cloud.2011.59
[9]
TranV KeungJ LiuA FeketeA. Application migration to cloud: a taxonomy of critical factors. Paper presented at: Proceedings of the 2nd International Workshop on Software Engineering for Cloud Computing SECLOUD '11; 2011:22‐28. 10.1145/1985500.1985505
[10]
GunkaA SeycekS KühnH. Moving an application to the cloud: an evolutionary approach. Paper presented at: Proceedings of the 2013 International Workshop on Multi‐cloud Applications and Federated Clouds MultiCloud '13; 2013:35‐42. 10.1145/2462326.2462334
[13]
A fast and elitist multiobjective genetic algorithm: NSGA-II

K. Deb, A. Pratap, S. Agarwal et al.

IEEE Transactions on Evolutionary Computation 10.1109/4235.996017
[15]
Accurately estimate your software maintenance costsgalorath.com/software_maintenance_cost.
[16]
JamkhedkarP SzeferJ Perez‐BoteroD ZhangT TrioloG LeeRB. A framework for realizing security on demand in cloud computing. Paper presented at: Proceedings of the 2013 IEEE 5th International Conference on Cloud Computing Technology and Science; vol. 1 2013:371‐378. 10.1109/cloudcom.2013.55
[17]
HaleML GambleR. SecAgreement: advancing security risk calculations in cloud services. Paper presented at: Proceedings of the 8th IEEE World Congress on Services; 2012. 10.1109/services.2012.31
[18]
KamongiP GomathisankaranM KaviK. Nemesis: automated architecture for threat modeling and risk assessment for cloud computing. Paper presented at: Proceedings of the 6th ASE International Conference on Privacy Security Risk and Trust (PASSAT); 2014; Cambridge MA.
[19]
Shostacj Adam (2008)
[20]
MoranaMM. Managing software security risks using application threat modeling IMI security symposium and Expo; 2008.
[21]
SenA MadriaS. Off‐line risk assessment of cloud service provider. Paper presented at: Proceedings of the 2014 IEEE World Congress on Services; 2014:58‐65. 10.1109/services.2014.20
[22]
OptimizingIT. Technology Refresh Policies.2015.archstoneconsulting.com/services/it‐strategy‐opeations/white‐papers/optimizing‐it‐technology.jsp.
[23]
Loucks DP (2005)
[24]
Global sensitivity indices for nonlinear mathematical models and their Monte Carlo estimates

I.M Sobol′

Mathematics and Computers in Simulation 10.1016/s0378-4754(00)00270-6
[27]
BarkerSK ChiY MoonHJ HacigümüsH ShenoyPJ. "Cut me some slack": latency‐aware live migration for databases. Paper presented at: Proceedings of the 15th International Conference on Extending Database Technology EDBT; 2012:432‐443. 10.1145/2247596.2247647
[30]
YahiaWB AyadiO MasmoudiF. A sensitivity analysis of multi‐objective cooperative planning optimization using NSGA‐II. Paper presented at: Proceedings of the Multiphysics Modelling and Simulation for Systems Design Conference; 2015:327‐337. 10.1007/978-3-319-14532-7_34
Cited By
6
Journal of Information Security and...
Metrics
6
Citations
31
References
Details
Published
Mar 25, 2020
Vol/Issue
50(6)
Pages
998-1021
License
View
Cite This Article
Amartya Sen, Sanjay Madria (2020). Analysis of a cloud migration framework for offline risk assessment of cloud service providers. Software: Practice and Experience, 50(6), 998-1021. https://doi.org/10.1002/spe.2809
Related

You May Also Like

Graph drawing by force‐directed placement

Thomas M. J. Fruchterman, Edward M. Reingold · 1991

4,151 citations

Garbage collection in an uncooperative environment

Hans‐Juergen Boehm, Mark Weiser · 1988

407 citations

Quantum computing: A taxonomy, systematic review and future directions

Sukhpal Singh Gill, Adarsh Kumar · 2021

370 citations