2020 IEEE Power &Amp; Energy Society Innovative Smart Grid Technologies Conference (ISGT) 2020
DOI: 10.1109/isgt45199.2020.9087760
|View full text |Cite
|
Sign up to set email alerts
|

A Seamless Cloud Migration Approach to Secure Distributed Legacy Industrial SCADA Systems

Abstract: Currently deployed legacy industrial systems were not designed with the future industry 4.0 vision in mind and lack advanced, and often even basic, security features. Further, the presence of legacy systems not only introduces security and data privacy challenges but is also a barrier for the adoption of emerging cloud technologies. This paper proposes an approach for seamless and secure migration of legacy industrial control systems to the cloud. It investigates whether the cloud can meet the real-time requir… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
3
0
1

Year Published

2020
2020
2024
2024

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 16 publications
0
3
0
1
Order By: Relevance
“…Lins et al (2017) propose a method for retrofitting existing CNC machines, which depicts in detail the functional requirements, the design parameters, data model and the system architecture. Khan et al (2020) propose an architecture for the cloud migration that can be applied to legacy industrial SCADA systems. These transformation methods are specific to certain devices and do not consider all the aspects of CPPSs but only part of its technological agents and IT agents.…”
Section: Related Work On Transformation Methodsmentioning
confidence: 99%
“…Lins et al (2017) propose a method for retrofitting existing CNC machines, which depicts in detail the functional requirements, the design parameters, data model and the system architecture. Khan et al (2020) propose an architecture for the cloud migration that can be applied to legacy industrial SCADA systems. These transformation methods are specific to certain devices and do not consider all the aspects of CPPSs but only part of its technological agents and IT agents.…”
Section: Related Work On Transformation Methodsmentioning
confidence: 99%
“…Active distribution networks are at risk from cyber-attacks [119] and advanced security measures are needed to secure existing communication systems [120]. Cyber security attacks have been increasing side-by-side with the internet of things.…”
Section: Cyber Securitymentioning
confidence: 99%
“…Khan et al [42] Investigate the challenges associated to a secure cloud-migration approach for legacy ICS/SCADA systems.…”
Section:    mentioning
confidence: 99%