DAS’s Change to a Shared Services Approach
In this report there is a description of a fictional department named Department of Administrative Services (DAS). The report as been prepared to include details about the topics related to the security of data of the employees, privacy of the data and the subsequent identification of the identity issues. The solutions provided has been discussed along with the sensitivity of the data has been discussed and demonstrated (Pahl, Xiong & Walshe, 2013). The case study provided has showed the migration planning with the help of a SaaS integration into the business model. Separate discussion has been done based on the different identification methods o the case study. The required risk identification and the mitigation of such risks has been discussed in the following report based on the outcomes which has been asked to be discussed. The employee privacy has been guaranteed based on the privacy of the data that has been collected and then migrated into the new SaaS system of the solution (Chang, Walters & Wills, 2013).
Cloud computing has both the inclusion of positive benefits as well as negative risk factors in the use of the process. Under the association of the governments cloud computing policy, all agencies have to adopt for the use of cloud computing when they are trying to acquire the use of ICT services. These help in providing extra protection on the data security measures and also delivers the value for money. Looking at the problem from a legal point of view the use of an information technology services which are based on the cloud model the documents comprising of confidential information are transferred for the use in the analysis procedure involving the security management of the information and the protection of the personal information.
From the point of view of the case study it can be said that the use of a centralized database can help in better assessment of the data and the information that is being collected by the organizations. The application which the government is providing for the organizations are the use of the personnel management, contractor management, payroll controlling and a common platform for the sharing of data across platforms. The authorization procedures has been made to be simple and of high security so that no third person will be able to get access for the information. Moreover keeping the company database on a single location would help in keeping the data safe from one location. The risk assessment can be done easily on the data and can be assessed by a single person form the remote location. Keeping the data in a single location would help in tracking the changes which has been done on the files. The data once uploaded is checked by the analyst at an intermediate level and then clears out the data.
Cloud-First Approach and Security and Privacy Risk Assessment
Under the regulation set out by the Australian Privacy Principle (APP) outlines the use of an entity for the collection of solicited personal information (Jamshidi, Ahmad & Pahl, 2013). It can help in the solicitation of the personal information collection and the provision of sharing the information with other persons. The APP also stops an organization rom collecting sensitive information from individuals until and unless the individual gives the consent of collecting the information or if the organization collecting the information is of high profile government company (Chang, Walters & Wills, 2013). The information being collected is to be of correct authorization from the Australian la w or the court. There is a permit which allows thee collection of information without any prior notice which has been approved by APP. Collection of any type of solicited information has to be done in accordance with the laws and in a fair manner. The collection of the information is to be done only after the consent of the individual, for the course of an ongoing investigation or where it is unreasonable and impractical for the collection of information to be done.
Personal information is a group of information about an individual which comprises of name, addresses, phone number, IP number, birth data, e-mail address, social insurance number and everything about the employment. These information has to be protected and use din the operation and purpose of the management issues. During the time of collection of the information the applicants has to be informed about the reason the information is being collected, the rights the information has exercise to and the correction of the information. The individuals whose informations are being collected the has to be given the information that where the information will be disclosed or shared to: reason for the sharing of the information, where it is to be disclosed. The responsibility of the information collected from the individuals is to be taken up by the organization that is collecting the information. There are officials who are trained to keep track of the protection of the privacy (Jamshidi, Ahmad & Pahl, 2013). Though no responsibility is to be taken by the organization when the information is to be shared by the individual on a third party portal. That information is shared by the individual on his or her own responsibility. The information collected is necessary for the performing of the administrative functions like:
- Merit and administrative review of the applications
- Awarding of the administration
- Planning and evaluation of the established databases.
- For the development of potential external assessors
Personal Data Protection and Australian Privacy Principle (APP)
In context to the case study for the disclosure of the personal information which are to be collected by the organization are not only related to the employees of the organization but also related to the users who are using the services of the organization. This information is important to be kept in safeguard by the organization. In the hands of the hackers this information can be used by them to extract money in the form of ransom or in the form of extortion. The cloud services which the DAS use are located across the world and can help in keeping the information safe. All the departments and the agencies under the government has to follow these rules to keep in mind the privacy and the sharing of the data with other agencies.
The identities which are to be created for the employees of the organization needs to be authentic and in correct format that is being followed by the organization. There is a threat vision in terms pf identity theft from the information that has been collected form the employees and huge loss of resources can be done. This is the main reason due to which the use and the nominal security of the identities be cleared and made in form of authentic. The attacks and the vulnerabilities which can be caused due to the use of the digital identity theft can make the company fall down. With respect to the case study the organization being a government body should keep the data safe and make correct validation protocols for the users (Jamshidi, Ahmad & Pahl, 2013).
From the point of view of the case study it can be said that the use of a centralized database can help in better assessment of the data and the information that is being collected by the organizations. The application which the government is providing for the organizations are the use of the personnel management, contractor management, payroll controlling and a common platform for the sharing of data across platforms (Pahl & Xiong, 2013). The authorization procedures has been made to be simple and of high security so that no third person will be able to get access for the information. Moreover keeping the company database on a single location would help in keeping the data safe from one location. The risk assessment can be done easily on the data and can be assessed by a single person form the remote location. Keeping the data in a single location would help in tracking the changes which has been done on the files
Sensitive Data Protection
From the point of view of the case study it can be said that the use of a centralized database can help in better assessment of the data and the information that is being collected by the organizations. The application which the government is providing for the organizations are the use of the personnel management, contractor management, payroll controlling and a common platform for the sharing of data across platforms. The authorization procedures has been made to be simple and of high security so that no third person will be able to get access for the information. Moreover keeping the company database on a single location would help in keeping the data safe from one location. The risk assessment can be done easily on the data and can be assessed by a single person form the remote location. Keeping the data in a single location would help in tracking the changes which has been done on the files. The data once uploaded is checked by the analyst at an intermediate level and then clears out the data.
The data protection act helps the individual to a safe guard their information form theft from the hands of the hackers. The access of the informations has be made sensitive and made in an hierarchical methods. This method if followed by the organization will help them to find out the one who was able to steal from the database (Jamshidi et al., 2015). this would also help in making the data to be correctly visual to the category of employees who really need the information. For the lower hierarchical employees who need the access to the information has to apply directly to the higher authorities to get the access for the data. This helps in keeping the data safe from the hands of the hackers. For the access to the information related to himself the company is bound to provide the information directly to him without any prior notice form the individual. The organization can also reject the issue if it is found that the information is in a highly inaccessible position or under the location of the law. In the respect of the case study provided there needs to be safe guarding of the personal information. This is due to the fact that many agencies are there who are using the system. Information leakage through the portal can cause disastrous effect on the agencies.
Authentic Identities and Identity Theft Protection
An APP (Australian privacy principle) entity takes the whole principle of delivering the steps which is mainly to ensure that the personal information it has collected is accurate, complete and up-to-date. An APP entity must take the steps which are responsible in order to achieve the standards that are in context to the personal information it uses and mainly discloses, having regard to the main purpose of the standard the users should use or disclosure, complete, up-to-date and complete and relevant.
From the point of view of the case study it can be said that the use of a centralized database can help in better assessment of the data and the information that is being collected by the organizations. The application which the government is providing for the organizations are the use of the personnel management, contractor management, payroll controlling and a common platform for the sharing of data across platforms. The authorization procedures has been made to be simple and of high security so that no third person will be able to get access for the information. Moreover keeping the company database on a single location would help in keeping the data safe from one location. The risk assessment can be done easily on the data and can be assessed by a single person form the remote location. Keeping the data in a single location would help in tracking the changes which has been done on the files
- Risk assessments complexities: a number of unknown parameters are introduced by the complexities of the cloud services. The service providers and the consumers are cautious about providing guarantee about the compliance-ready services and adopting the services. The real challenge occurs when a check is done on the data processing lifecycle and the acquiescence with legal structures even when the service suppliers promote a modest way for the movement of private data regardless of the national borders. To answer the issues related to privacy of data the solution state that there must remain a transparent policy among the individuals regarding the processing of private data. It needs to be specified by the stakeholders about the necessities for cloud computing so to meet the level of security and privacy.
- Loss of control: the owners of the data are the cloud provider, when the user uses cloud computing. If the user wishes to change the provider, then the risk of misuse or manipulation of the data which exists in the data center of the current provider still remains. Whenever there is a use of the SaaS environment, then the service provider becomes accountable for the storage of the data in which the perceptibility and control is limited. Processing of data of the customer is done in the clouds on machines which the consumer does not own or control. There is a threat of misuse of data or theft of the data or unauthorized sale of the data.
- Individual storage: The data may be stored in space of the cloud which are in appropriate, as the payment for storing is to be done by the provider, when the provider uses real storage to store the data of the client. This causes a main concern about the privacy of the user.
- Access control: When the user does not use data kept in the cloud for a long time then this type of issue occurs. An access which is not authorized will use the data unlawfully due to deficiency of the authorization in controlling the access.
- Data boundary: The cloud providers has made many copies so as to provide data to the user at any location whenever required. Whenever a data has been hosted by the data center and the data has not been used for a long time then there is a need of removing the data from the data center. This making of copies can lead to leak of information or theft of the data.
The concept of the loud computing can be considered very much globalized, and within the concept of the cloud there are no such boundaries that exist. Computers which are mainly used for the purpose of storing and processing of data and the information and communication technology (ICT) infrastructure of the network can be identified and detected anywhere in the globe. The concept just depends upon the requisite capacities which are available for execution of the task related to the ICT which is in accordance to the optimization – oriented management of the resources in the global concept which is mainly used for the cloud computing. Taking emphasis on the current situation the user has to establish their own identity each time they use a new prospective and majorly providing the personal information like the names, credit card number and phone number. If taking into account, the number of users that have involved in the access of the website and giving the personal information. The leftover of the information can be gained access from anywhere. There can be situation which can be related to the left over which can be stated over as a “digital bread crumbs” thought-out the cyber space. The users have no idea how the data would be affected in the scenario and who can gain access of the data and the overall features are very much liable to be detected by the intruders.
Benefits of Centralized Database
When relating to some of the basic approaches used by the service providers of the cloud computing, they offer the customers with the option of choosing between certain availability zones. With the selected process or the selected zone, the customer data remains secured in the selected zone. Encryption is the main solution to secure the information. It is better to encrypt the data before storing the data in the cloud. Owners of the data can give permission to certain members of the company so as to provide access to the encrypted data. Heterogeneous data centric security is to be provided so as to provide data access control. The data security model of the company should contain authenticated, data encrypted data and data integrity, recovery of data and protection of user data is to be designed so as to improve the security of the data in the cloud. Data protection can be used as a service so as to ensure re privacy and security of the data (Gholami et al., 2016). Normal encryption can cause complexities and made unusable to unauthorized users. Before uploading the data into the cloud the company must verify whether the data stored is stored in the backup folder and the keys of the file must not be changed. Altering of data is not done for that the company must count the number of files before uploading them. This calculation is very difficult to maintain and can be used for data integrity. RSA based data integrity check can be provided by combining identity based cryptography and RSA Signature. SaaS helps in segregating data and make clear boundaries between the physical level and application level
Regarding the concept of personal information, the term may can interpreted in many ways by different people. The concept which is related in this scenario is the privacy aspect of sensitive information that can be included in the following manners:
Personal Identification information (PII): The information that can be used to locate or identify an individual for example address, name or information that can be correlated with the information in order to identify an individual.
Sensitive information: Information which can be related to religious ground of race, sexual orientation, race or union membership or other information which can be considered as private data. such information should always be having an additional safeguard.
Information which can be considered as a sensitive PII for example information which is received from the biometric or collections or surveillance images of the camera in the public place (Bergmayr et al., 2013).
Data Protection Act
Unique device identities: putting emphasis on other types of information that can be considered to be traceable uniquely to a device of the user for example radio frequency identity, IP address and unique hardware identities.
Data de-identification is mainly a computing standard in which the sensitive information is mainly contained in the server that can be identified so that the access to the data to the unauthorized user is denied. There are mainly two types of data can be identified in the de-identification and can be considered as a statically method which can be implemented in order to make the system more efficient.
Almost all the activities which are done now a day for example sending mails, managing the concepts which are related to the cloud or meeting people in the virtual world mainly requires the information identity (Tilley & Parveen, 2012). Taking emphasis on the current situation the user has to establish their own identity each time they use a new prospective and majorly providing the personal information like the names, credit card number and phone number. If taking into account, the number of users that have involved in the access of the website and giving the personal information. The leftover of the information can be gained access from anywhere. There can be situation which can be related to the left over which can be stated over as a “digital bread crumbs” thought-out the cyber space. The users have no idea how the data would be affected in the scenario and who can gain access of the data and the overall features are very much liable to be detected by the intruders (Kavis, 2014; Theoharidou et al., 2013).
The main thing which is to be done is that user- centric identity management and flexibility should be done. The need of flexibility is due to factor that it needs to support the multitude of the mechanism and directly the protocols that exist and the protocols that have to be engaged in the near future. In the near future the user does not have to enter the personal credentials over and over again (Repschlaeger et al., 2012).
Security of the personal data can be considered one of the most important issue that can be related to the concept of the storage of the data in any server. Bringing the term of security which is related to the personal data, it mainly refers to the protection of the integrity, accessibility of the data and the confidentiality (Ahmad & Babar, 2014). The question whether the data are better secured in the cloud is not an easy question to be answered at all. The answer that can be stated with the question is that the trust related aspect have to gain in regards to the cloud service provider., relating to it the operating system, the software part and the hardware part should also be taken into account. There is different concept that can be involved in the concept of the outsourcing if the computing capabilities are taken into account the incorporating concept can be taken into account. The trust of the outside processor has to be trusted in order to achieve the security issue related to the terminology (Frey, Hasselbring & Schnoor, B. (2013).
Conclusion
The issue that can be directly be related to the concept of the cloud computing is that the gain of the cloud services in the field of personal data. when the data is stored in a server the data has to be kept secured from the interruption of the intruders. The hackers in this concept play a very vital role. There are mainly two types of hackers that can be involved in the concept. The active attackers and the passive attackers. The active attackers are those type of hackers which do not modify the data in the file and just use the data for their personal benefits. On the other hand, is the active attackers who use the data and modify the data according to their needs. They can be easily being detected and prompted (Ardagna et al., 2012). Encryption is the main solution to secure the information. It is better to encrypt the data before storing the data in the cloud. Owners of the data can give permission to certain members of the company so as to provide access to the encrypted data. Heterogeneous data centric security is to be provided so as to provide data access control. The data security model of the company should contain authenticated, data encrypted data and data integrity, recovery of data and protection of user data is to be designed so as to improve the security of the data in the cloud. Data protection can be used as a service so as to ensure re privacy and security of the data (Gholami et al., 2016). Normal encryption can cause complexities and made unusable to unauthorized users. Before uploading the data into the cloud the company must verify whether the data stored is stored in the backup folder and the keys of the file must not be changed. Altering of data is not done for that the company must count the number of files before uploading them. This calculation is very difficult to maintain and can be used for data integrity. RSA based data integrity check can be provided by combining identity based cryptography and RSA Signature. SaaS helps in segregating data and make clear boundaries between the physical level and application level
Security: Risks regarding the misuse of data remains when multiple organizations share the same resources. To avoid such risks, it becomes mandatory to secure the data that mainly involves the storage and processes. The most important challenge is protection of data. For the protection of the data it is very much important to provide essential verification, authorization and access of the data stored in the cloud. The most important areas of data security are:
Confidentiality: Top vulnerabilities are checked so as to protect the data from any type of external attack.
Integrity: To guarantee that the protection of the data from any attack, users should make sure that they do not store any passwords in the cloud so that there remains an assurance of reliability. Availability: one of the most significant issue is the availability which is being faced by many organizations. This availability issue depends on the contract between the user and the service provider.
Locality: searching for data in cloud computing is very much difficult due to storing of data in different locations of the cloud. The laws governing the data changes whenever the movement of data takes place from one location to another. Customers must know the location of their stored data and this information is to be provided by the service provider.
Access: the security policies of the data id mainly discussed in this topic. Access to the different parts of the data by the employee is to be done according to the security policies of the company. Accessing of the same data is not possible by different employees of the same organization. Various encryption keys and key management tools are used so as to guarantee that the data is stored only with the authorized user’s. Distribution of keys id done to authorized parties only so that the security policies are strictly followed. Access to privileged user is necessary as the access is given to all cloud users through the internet. Data encryption and protection mechanism is provided to the users for avoiding security risks.
Confidentiality: storing of data is done in remote servers by the users using one or multi cloud providers. Data confidentiality is one of the key factor required for storing data in remote servers. To ensure about the data security and confidentially the user must be sure about the data which is to be stored in the cloud and also maintain the access control of the data.
Data breach: Breach of data is another one of the important security factor in cloud storage. Since data is stored by many users’ in the cloud so the risk of accessing the data remains by malicious user’s. Breach may also occur due to inside attack or due to accidental transmissions.
Segregation: most significant key of cloud computing is multi-tenancy. There remains a risk of data intrusion as multiple data are stored in cloud.
Storage: Storing of data in the virtual machines may increase the risk of dependability of data storage. Storing of virtual machines in physical infrastructure is the main cause of security risk.
Operations in Data Center: when the data is transferred during bottlenecks and disasters, the originations can use the cloud computing for protecting the data without any damage. Deficiency in proper management of the data then the issue of storing the data and access of data might occur. In case of disaster, the cloud suppliers are accountable for the loss of data.
Securing of the information is mainly done through encryption. Before storing the data, it is necessary to encrypt the data. Permission to certain users are given by the owners so as to provide access to the encrypted data. Diverse data centric security techniques are to be provided so as to deliver access to the data. The data security architecture of the company should contain authenticated, data encrypted data and data integrity, recovery of data and protection of user data is to be planned so as to advance the security of the information in the cloud. Protection of data can be used as a service so the privacy and security of the information could be ensured. Normal encryption can cause complexities and made unusable to unauthorized users. The company must conform if the data that is being stored in the cloud is encrypted or not. They must also make sure the data stored is kept in the backup folder and the keys of the file must not be changed. Altering of data is not done for that the company must count the number of files before uploading them. This calculation is very difficult to maintain and can be used for data integrity. RSA based information integrity check can be delivered by combining identity based cryptography and RSA Signature. SaaS helps in segregating data and make clear boundaries between the physical level and application level. Distributed access control architecture can be used by the company for managing the access in the cloud. Credential and attributed policies are the better ways to identify unauthorized users. Permission as a service can be used so as to express which part of data can be accessed by the user.
Conclusion
The main emphasis of the report is putting into discussion the concept of migrating to the SaaS solution. The concept of the data governance risk can be initially with administration and the control of the privacy issue along with the aspect of the cloud computing. The risk with the compliance is in regards to the major parts which are related to the risk and the privacy policy which can be directly be related to the capability and the availability. The configuration aspect that can be related to the concept is the DAS resources of the human application and the technologies that require the level of the privacy and the privacy with it can be achieved from the same. The main issue with the privacy and the threat assessment is mainly performed with identifying the concept of the risk and threats which are performed under the tabular format. The network privacy risk which is associated with the concept can be termed as catastrophic severity and likelihood as may be considered as for the DAS organization. With the privacy aspect of the network there can be several consequences reading the quality of the data and the security which is related to the data. the SaaS mitigation solution can have former issue with the network privacy risk factor.
Interface risk is another primary catalyst for turning into significant and most likely risk. Identified interfacing risk has immense impact over SaaS cloud solution integration. Data privacy risk has another major scoring above 9 and it has moderate consequences along with likely aspect. The data privacy is considered to have impact over cloud data privacy and significant level of privacy risk in context of DAS organization. As cloud solution is SaaS; therefore, the virtualization risk has unlikely situation. Data governance is common threat for any HRM application; no exception is this context of DAS organization as well. The compliance threat is associated with SaaS solution as it has compliance threats regarding threat aspects. The legal threats exist in terms of considering privacy acts and laws in SaaS solution of DAS.
References
Ahmad, A., & Babar, M. A. (2014, April). A framework for architecture-driven migration of legacy systems to cloud-enabled software. In Proceedings of the WICSA 2014 Companion Volume (p. 7). ACM.
Ardagna, D., Di Nitto, E., Casale, G., Petcu, D., Mohagheghi, P., Mosser, S., … & Nechifor, C. S. (2012, June). Modaclouds: A model-driven approach for the design and execution of applications on multiple clouds. In Proceedings of the 4th international workshop on modeling in software engineering (pp. 50-56). IEEE Press.
Badger, L., Bernstein, D., Bohn, R., De Vaulx, F., Hogan, M., Iorga, M., … & Sokol, A. (2014). US government cloud computing technology roadmap. US Department of Commerce, National Institute of Standards and Technology.
Bergmayr, A., Bruneliere, H., Izquierdo, J. L. C., Gorronogoitia, J., Kousiouris, G., Kyriazis, D., … & Wimmer, M. (2013, March). Migrating legacy software to the cloud with ARTIST. In Software Maintenance and Reengineering (CSMR), 2013 17th European Conference on (pp. 465-468). IEEE.
Beserra, P. V., Camara, A., Ximenes, R., Albuquerque, A. B., & Mendonça, N. C. (2012, September). Cloudstep: A step-by-step decision process to support legacy application migration to the cloud. In Maintenance and Evolution of Service-Oriented and Cloud-Based Systems (MESOCA), 2012 IEEE 6th International Workshop on the (pp. 7-16). IEEE.
Boillat, T., & Legner, C. (2014, July). Why do companies migrate towards cloud enterprise systems? A post-implementation perspective. In Business Informatics (CBI), 2014 IEEE 16th Conference on (Vol. 1, pp. 102-109). IEEE.
Chang, V., Walters, R. J., & Wills, G. (2013). The development that leads to the Cloud Computing Business Framework. International Journal of Information Management, 33(3), 524-538.
Chauhan, M. A., & Babar, M. A. (2012, November). Towards process support for migrating applications to cloud computing. In Cloud and Service Computing (CSC), 2012 International Conference on (pp. 80-87). IEEE.
Demchenko, Y., Ngo, C., De Laat, C., Garcia-Espin, J. A., Figuerola, S., Rodriguez, J., … & Ciulli, N. (2013, March). Intercloud architecture framework for heterogeneous cloud based infrastructure services provisioning on-demand. In Advanced Information Networking and Applications Workshops (WAINA), 2013 27th International Conference on (pp. 777-784). IEEE.
Frey, S., Hasselbring, W., & Schnoor, B. (2013). Automatic conformance checking for migrating software systems to cloud infrastructures and platforms. Journal of Software: Evolution and Process, 25(10), 1089-1115.
Gholami, M. F., Daneshgar, F., Low, G., & Beydoun, G. (2016). Cloud migration process—A survey, evaluation framework, and open challenges. Journal of Systems and Software, 120, 31-69.
Halton, W. M., & Rahman, S. (2012). The top ten cloud-security practices in next-generation networking. International Journal of Communication Networks and Distributed Systems, 8(1-2), 70-84.
Howell-Barber, H., Lawler, J., Desai, S., & Joseph, A. (2013). A study of cloud computing software-as-a-service (SaaS) in financial firms. Journal of Information Systems Applied Research, 6(3).
Jamshidi, P., Ahmad, A., & Pahl, C. (2013). Cloud migration research: a systematic review. IEEE Transactions on Cloud Computing, 1(2), 142-157.
Jamshidi, P., Pahl, C., Chinenyeze, S., & Liu, X. (2015). Cloud migration patterns: a multi-cloud service architecture perspective. In Service-Oriented Computing-ICSOC 2014 Workshops (pp. 6-19). Springer, Cham.
Kavis, M. J. (2014). Architecting the cloud: design decisions for cloud computing service models (SaaS, PaaS, and IaaS). John Wiley & Sons.
Masud, M. A. H., Yong, J., & Huang, X. (2012, May). Cloud computing for higher education: A roadmap. In Computer Supported Cooperative Work in Design (CSCWD), 2012 IEEE 16th International Conference on (pp. 552-557). IEEE.
Opara-Martins, J., Sahandi, R., & Tian, F. (2016). Critical analysis of vendor lock-in and its impact on cloud computing migration: a business perspective. Journal of Cloud Computing, 5(1), 4.
Pahl, C., & Xiong, H. (2013, September). Migration to PaaS clouds-migration process and architectural concerns. In Maintenance and Evolution of Service-Oriented and Cloud-Based Systems (MESOCA), 2013 IEEE 7th International Symposium on the (pp. 86-91). IEEE.
Pahl, C., Xiong, H., & Walshe, R. (2013, September). A comparison of on-premise to cloud migration approaches. In European Conference on Service-Oriented and Cloud Computing (pp. 212-226). Springer, Berlin, Heidelberg.
Rai, R., Sahoo, G., & Mehfuz, S. (2015). Exploring the factors influencing the cloud computing adoption: a systematic study on cloud migration. SpringerPlus, 4(1), 197.
Rashmi, M. S., & Sahoo, G. (2012). A five-phased approach for the cloud migration. Int J Emerg Technol Adv Eng, 2(4), 286-291.
Repschlaeger, J., Wind, S., Zarnekow, R., & Turowski, K. (2012, January). A reference guide to cloud computing dimensions: infrastructure as a service classification framework. In System Science (HICSS), 2012 45th Hawaii International Conference on (pp. 2178-2188). IEEE.
Repschlaeger, J., Zarnekow, R., Wind, S., & Turowski, K. (2012). Cloud Requirement Framework: Requirements and Evaluation Criteria to Adopt Cloud solutions. In ECIS (p. 42).
Silva, G. C., Rose, L. M., & Calinescu, R. (2013, December). Towards a model-driven solution to the vendor lock-in problem in cloud computing. In Cloud Computing Technology and Science (CloudCom), 2013 IEEE 5th International Conference on (Vol. 1, pp. 711-716). IEEE.
Strauch, S., Andrikopoulos, V., Bachmann, T., Karastoyanova, D., Passow, S., & Vukojevic-Haupt, K. (2013, December). Decision support for the migration of the application database layer to the cloud. In Cloud Computing Technology and Science (CloudCom), 2013 IEEE 5th International Conference on (Vol. 1, pp. 639-646). IEEE.
Sun, K., & Li, Y. (2013, March). Effort estimation in cloud migration process. In Service Oriented System Engineering (SOSE), 2013 IEEE 7th International Symposium on (pp. 84-91). IEEE.
Tang, C., & Liu, J. (2015). Selecting a trusted cloud service provider for your SaaS program. Computers & Security, 50, 60-73.
Theoharidou, M., Papanikolaou, N., Pearson, S., & Gritzalis, D. (2013, December). Privacy risk, security, accountability in the cloud. In Cloud Computing Technology and Science (CloudCom), 2013 IEEE 5th International Conference on (Vol. 1, pp. 177-184). IEEE.
Tilley, S., & Parveen, T. (2012). Software testing in the cloud: migration and execution. Springer Science & Business Media.
Weng, F., & Hung, M. C. (2014). Competition and challenge on adopting cloud ERP. International Journal of Innovation, Management and Technology, 5(4), 309.
Zhao, J. F., & Zhou, J. T. (2014). Strategies and methods for cloud migration. international Journal of Automation and Computing, 11(2), 143-152.