클라우드 보안 개요

  • 발행 : 2015.09.30

초록

현재 아마존을 선두로 하여 구글, MS, 애플 등 글로벌 기업들이 클라우드 서비스 시장에 사활을 걸고 뛰어 들고 있으며, 미국, 영국, 일본 등 각국 정부도 클라우드 서비스 활성화를 위한 정책을 수립하는 등 IT 환경이 클라우드 환경으로 급속히 진화하고 있다. 본 고에서는 클라우드 기술을 소개하고 클라우드 환경에서의 보안 위협 및 이에 대응하는 보안기술 및 향후 전망 등에 대해 살펴 본다.

키워드

참고문헌

  1. North Bridge Venture Partners, "Future of Cloud Computing Survey", 2013.6
  2. CSA, Security Guidance for Critical Areas of Focus in Cloud Computing V3.0, CSA Research, 2011
  3. NIST (2009). The NIST Cloud Definition Framework. Retrieved March 14, 2011 from http://csrc.nist.gov/groups/SNS/cloud-computing/cloud-computing-v26.ppt
  4. Cloud Security Top Threats, CSA, 2013
  5. "VM escape" http://www.zdnet.com/blog/security/us-cert-warns-of-guest-to-host-vm-escape-vulnerability/12471
  6. "Xen security advisory 19 (CVE-2012-4411). guest administrator can access QEMU monitor console." http://lists.xen.org/archives/html/xenannounce/2012-09/msg00008.html
  7. V. Varadarajan, et al., "Resource-freeing attacks: improve your cloud performance (at your neighbor's expense)," in Proc. 2012 ACM Comput. Commun. Security Conf.
  8. J. Somorovsky, et al., "All your clouds belong to us.security analysis of cloud management interfaces," in 2011 ACM Comput. Commun. Security Conf.
  9. Y. Zhang, et al., "Cross-VM side channels and their use to extract private keys," in 2012 ACM Comput. Commun. Security Conf.
  10. R. Beverly, R. Koga, and K. C Claffy, "Initial longitudinal analysis of IP source spoofing capability on the Internet," July 2013. http://www.internetsociety.org/doc/initial-longitudinalanalysis-ipsource-spoofing-capability-internet
  11. J. Idziorek, M. F. Tannian, and D. Jacobson, "The insecurity of cloud utility models," IEEE Cloud Comput., pp. 14.18, May.June 2013.
  12. Habiba, U., Masood, R., Shibli, M. A., & Niazi, M. A. (2014). Cloud identity management security issues & solutions: a taxonomy. Complex Adaptive Systems Modeling, 2(1), 1-37. https://doi.org/10.1186/2194-3206-2-1
  13. Y. Shin, M. Yoon, K. Son, "Design of a Versatile Hypervisor-based Platform for Virtual Network-Host Intrusion Prevention", Proceedings of International Conference on Information Processing and Management (ICIPM), 2013
  14. VMware, "vCloud Networking and Security," http://www.vmware.com/products/datacentervirtualization/vcloud-network-security/