Browse > Article
http://dx.doi.org/10.9728/dcs.2015.16.1.1

A Study on the Virtualization and Security Technology for the Operation of Novel Reliable Networks  

Jang, Jung-Sook (The School of IT Engineering, Catholic University of Daegu)
Jeon, Yong-Hee (The School of IT Engineering, Catholic University of Daegu)
Publication Information
Journal of Digital Contents Society / v.16, no.1, 2015 , pp. 1-12 More about this Journal
Abstract
In this paper, we analyze the research trend and problems of the existing virtualization technology and present the most applicable virtualization technology in order to apply the technology to the operation of novel reliable networks. By using the virtualization technology, there is advantage in that the utilization of resource becomes higher and maintenance cost goes down. While, from the security perspective, there exist advantage in using the virtualization, it also introduces new vulnerabilities due to the adoption. Thus it is necessary to analyze the problem and establish the strategy to solve it. Therefore we derive threat elements to the virtualized system, analyze and describe the virtualization security policy.
Keywords
virtualization; security modeling; Reliable Networks; security vulnerability;
Citations & Related Records
Times Cited By KSCI : 5  (Citation Analysis)
연도 인용수 순위
1 J.T. Song, H.S. Park, J.D. Park, S.K. KIM, "Safe Network Technologies", Electronics and Telecommunications Trends, ETRI, Vol. 28, No. 6, pp.28-36, 2013.
2 IBM Virtualization White Paper, IBM, 2006.
3 Future Internet: Terminology, TTAK.KO-01.0142, November 2011.
4 Seonho Kang, Hwangkyu Choi, "Design and Implementation of Scalable Webhard API Based on Storage Virtualization for Groupware Systems", Journal of Digital Contents Society, Vol. 15, No. 3, pp.395-403, Jun. 2014.   DOI   ScienceOn
5 Guidelines for the administration cloud construction and office environment, Ministry of Security and Public Administration, September 2012.
6 S.J. Jung, M.G. Sin, H.J. Kim, "Development trends of network virtualization standard techniques for the future Internet", TTA Journal No. 132, 2012.
7 S.J. Jung, M.G. Sin, H.J. Kim, "Development trends of network virtualization standard techniques for the future Internet", TTA Journal No. 132, 2012.
8 NIST, Guide to Security for Full Virtualization Technologies, Jan. 2011.
9 C.S. Kim, B.I. Jang, H.K. Jung, "A Study on the Security Technology for Introduction the Secure Cloud Computing Service", Journal of Security Engineering, Vol, No.5, pp.568-579, 2013.
10 J. Archer, D. Culliname, N. Puhlmann, A. Boehme, P. Kurtz, and J. Reavis, "Security Guidance for critical areas of focus in cloud computing v2.1", Cloud Security Alliance, Dec. 2009.
11 Md. Tanzim Khorshed, A.B.M. Shawkat Ali, Saleh A. Wasimi, "A survey on gaps, threat remediation challenges and some thoughts for proactive attackdetectgion in cloud computing", Future Generation Computer System, vol. 28, no. 6, June.2012.
12 J.H. Jeon, "A study on the vulnerability and corresponding technique trends of the cloud computing service", Journal of Korea Convergence Security Association, Vol 13, No 6, Dec. 2013.
13 S.J. Jung, Y.M. Bae, "Trend analysis of Threats and Technologies for Cloud Security", Journal of Security Engineering, Vol. 10, No. 2, pp.199-212, 2013(in Korea).
14 NIST, Guide to Security for Full Virtualization Technologies, Jan. 2011.
15 Security Guidance for Critical Areas of focus in Cloud Computing v3.0, CSA, 2011.
16 A guide to information security for cloud services, KISA, October 2011.