reliable although outdated. It is in the process of
updating these equipments.
Recently, we see renewed interests in SCADA
systems. Not only are SCADA systems still used in
our national critical infrastructures such as power
grid, railway systems, gas pipelines and nuclear
power plants, but also the movement from isolated
systems to more open systems and lack of skilled
professionals. Research and training are both impor-
tant. Both NSA (National Security Agency) and
DHS (Department of Homeland Security) have
looked into our national SCADA systems, its vulne-
rability and weakness as well as protection mechan-
isms ((SCADA and CS; Testimony of Deputy Under
Secretary Philip Reitinger; Securing Industrial Con-
trol Systems in the Chemical Sector, 2011), for ex-
ample).
In summary, we should pay more attentions to
SCADA systems and the trend of upgrading. Proper
risk assessment should be done. Cloud computing
has huge potential in IT services. Incorporating both
should be able to deliver more efficient control sys-
tems.
REFERENCES
Securing Supervisory Control and Data Acquisition
(SCADA) and Control Systems (CS), http://
www.nsa.gov/ia/_files/factsheets/scada_factsheet.pdf
SCADA at http://en.wikipedia.org/wiki/SCADA
Protecting America's Critical Infrastructures: PDD 63
http://www.justice.gov/criminal/cybercrime/white_pr.
htm
Krutz R., Securing SCADA Systems, Wiely Publishing
Inc, 2006
NIST Definition of Cloud Computing v15, http://
csrc.nist.gov/groups/SNS/cloud-computing/cloud-def-
v15.doc
Security Guidance for Critical Areas of Focus in Cloud
Computing V2.1, by Cloud Security Alliance, Decem-
ber 2009. https://cloudsecurityalliance.org/
csaguide.pdf
Chen, Z. and Yoon, J.: IT Auditing to Assure a Secure
Cloud Computing. The proceedings of the 6th IEEE
World Congress on Services, July 5-10, 2010, Miami,
Florida, USA, 253-259
http://en.wikipedia.org/wiki/Stuxnet for general descrip-
tion
Will Forrest, Clearing the Air on Cloud Computing, Dis-
cussion Document from McKinsey and Company,
March 2009
NIST Presentation on Effectively and Securely Using the
Cloud Computing Paradigm v26, accessed on
4/15/2010, http://csrc.nist.gov/groups/SNS/
cloud-computing/cloud-computing-v26.ppt
Open Security Architecture Group http://
www.opensecurityarchitecture.org/cms/library/patternl
andscape/251-pattern-cloud-computing
Vyatkin, V., et al, Toward Digital Ecologies: Intelligent
Agent Networks Controlling Interdependent Infra-
structures, 1st IEEE Conference on Smart Grid Com-
munications, Gaithersburg, October, 2010
Gustavsson, R.; Ståhl, B.; The empowered user - The
critical interface to critical infrastructures, the 5th In-
ternational Conference on Critical Infrastructure
(CRIS), 2010
Geberslassie, M.; Bitzer, B.; Future SCADA systems for
decentralized distribution systems, the 45th Interna-
tional Universities Power Engineering Conference
(UPEC), 2010
Communication in ACM, Virtualization is good for securi-
ty
Bratus, S., Locasto M., Ramaswamy, A. and Smith
S.;VM-based security overkill: a lament for applied
systems security research, Proceedings of the 2010
workshop on New security paradigms, 51-60, 2010
The NSF Workshop on Critical Infrastructure Protection
for SCADA & IT in Dr., Director - National Institute
of Standards & Technology, October 20, 2003,
http://www.nist.gov/director/speeches/bement_102003
.cfm
Selig, Gad J. “Strategic Planning for Information Resource
Management A Multinational Perspective” UMI Re-
search Press Ann Arbor, Michigan 2003
Testimony of Deputy Under Secretary Philip Reitinger,
National Protection and Programs Directorate, Before
the United States House Committee on Homeland Se-
curity Subcommittee on Cybersecurity, Infrastructure
Protection, and Security Technologies, "Examining the
Cyber Threat to Critical Infrastructure and the Ameri-
can Economy" (http://www.dhs.gov/ynews/testimony/
testimony_1300283858976.shtm)
Securing Industrial Control Systems in the Chemical
Sector, Roadmap Awareness Campaign – A Case For
Action, Developed by the Chemical Sector Coordinat-
ing Council in partnership with the U.S. Department
of Homeland Security, April, 2011 (http://
www.dhs.gov/xlibrary/assets/oip-chemsec-case-for-
action-042011.pdf). Note, DHS has many relevant
documents related to the SCADA systems.
ADAPTING SCADA SYSTEMS TO CLOUD COMPUTING ENVIRONMENT
563