Skip to main content

Adapting Enterprise Security Approaches for Evolving Cloud Processing and Networking Models

  • Conference paper
  • First Online:
  • 1206 Accesses

Part of the book series: Lecture Notes in Computer Science ((LNCCN,volume 10446))

Abstract

With the advent of public cloud services, enterprise are moving to adopt the lower cost, more flexible, scalable public cloud offerings like OTC, AWS and Azure. Simultaneously they are adapting their network models to move away from centralized enterprise QoS networks (with internet break out from a single or few large enterprise gateways) in favor of lower cost, direct offloading of corporate traffic from company locations via local and distributed Internet service providers. Using this model enterprises are also accessing cloud services from multiple entry points, and this completely changes the enterprise security deployment landscape. As an additional ongoing trend, the networking of physical devices is bringing a whole new ‘operational technology’ domain to the enterprise space, and a new approach to enterprise security is therefore required. In this paper the drivers of change in approaches to security for public cloud computing are presented, considering also the responsibilities of the customer and of the cloud service provider and the component which enterprises still need to focus on. In addition, the network model for security is explained and considered, with the new distributed deployment zone for security as described. Cyber physical/IoT type systems are also then discussed as an additional security landscape over which enterprises increasingly need to take special care.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Amazon Web Services, Inc.: Overview of Security Processes (2016)

    Google Scholar 

  2. Munch, B., Rickard, N.: Cloud Adoption is Driving Hybrid WAN Architectures. Gartner (2017)

    Google Scholar 

  3. ENISA: Ad-hoc and sensor networking for M2 M Communications – Threat Landscape and Good Practice Guide (2017)

    Google Scholar 

  4. Hutchison, A., Rieke, R.: Management of security information and events in future internet. In: Proceedings of Cyber Security and Global Affairs, Conference on Cyber Security, Budapest (2011)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Andrew Hutchison .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

Hutchison, A. (2017). Adapting Enterprise Security Approaches for Evolving Cloud Processing and Networking Models. In: Rak, J., Bay, J., Kotenko, I., Popyack, L., Skormin, V., Szczypiorski, K. (eds) Computer Network Security. MMM-ACNS 2017. Lecture Notes in Computer Science(), vol 10446. Springer, Cham. https://doi.org/10.1007/978-3-319-65127-9_2

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-65127-9_2

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-65126-2

  • Online ISBN: 978-3-319-65127-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics