Browse > Article

A Study on Improving the Reliability of Cloud Computing  

Yang, Jeong Mo (중부대학교 정보보호학과)
Publication Information
Journal of Korea Society of Digital Industry and Information Management / v.8, no.4, 2012 , pp. 107-113 More about this Journal
Abstract
Cloud computing has brought changes to the IT environment. Due to the spread of LTE, users of cloud services are growing more. This which provides IT resources to meet the needs of users of cloud services are noted as a core industry. But it is not activated because of the security of personal data and the safety of the service. In order to solve this, intrusion detection system is constructed as follows. This protects individual data safely which exists in the cloud and also protects information exhaustively from malicious attack. The cause of most attack risk which exists to cloud computing can find in distributed environment. In this study, we analyzed about necessary property of network-based intrusion detection system that process and analyze large amount of data which occur in cloud computing environment. Also, we studied functions which detect and correspond attack occurred in interior of virtualization.
Keywords
Cloud Computing; Cloud Security; Intrusion Detection;
Citations & Related Records
연도 인용수 순위
  • Reference
1 B. R. Kandukuri, R. Paturi, A. Rakshit, "Cloud Security Issues," In Proceedings of IEEE International Conference on Services Computing, 2009, pp. 517-520.
2 A. Kundu, C. D. Banerjee, P. Saha, "Introducing New Services in Cloud Computing Environment," International Journal of Digital Content Technology and its Applications, AICIT, Vol. 4, No. 5, 2010, pp. 143-152.
3 신대철, 김홍윤, "침입탐지 알고리즘 성능 최적화 및 평가 방법론 개발," 디지털산업정보학회지, 제 8권, 제1호, 2012, pp. 125-137.
4 M. Jensen, N. Gruschka, L. L. Iacono, and G. Horst, "On Technical Security Issues in Cloud Computing," IEEE International Conference on Cloud Computing, 2009, pp. 109-116.
5 Z. Mahmood, "Cloud Computing: Characteristics and Deployment Approaches," 11th IEEE International Conference on Computer and Information Technology, 2011, pp. 121-126.
6 임양환, "이동통신과 인터넷 결합상품의 경쟁력 연구 : 소비자 효용을 중심으로," 디지털산업정보학회지, 제6권, 제1호, 2010, pp. 159-167.
7 K. Vieira, A. Schulter, C. B. Westphall, and C. M. Westphall, "Intrusion Detection for Grid and Cloud Computing," IT Professional, Vol. 12, 2010, pp. 38-43.
8 I. Gul and M. Hussain, "Distributed Cloud Intrusion Detection Model," International Journal of Advanced Science and Technology, vol. 34, 2011, pp. 71-82.