Browse > Article
http://dx.doi.org/10.14400/JDC.2014.12.11.299

A Study on the Security Requirement for Transforming Cloud Data Center : Focusing on N - Data Center  

Ra, Jong-Hei (Dept. of Logistics & Distribution, Gwangju University)
Lee, Jae-Sook (Dept. of Management Information System, Chungbuk University)
Publication Information
Journal of Digital Convergence / v.12, no.11, 2014 , pp. 299-307 More about this Journal
Abstract
N-Data Center which provide of cloud computing service for the Government departments, will be prepared transforming to cloud data center and transformed into an 'IT service' provided as a service to the information resources required by each department. N-Data center already provide a cloud service to the departments as maintains a high level of security, and plan to connecting with the private sector as a precondition of security. Therefore, in order to promote them effectively, it is necessary to determine the level of security in the cloud data center, and we have proposed appropriate measures. In this paper, we analyze security requirements of cloud data centers in developed countries and identify the leading private cloud data center security. In addition, we identify the N-data center security level, and analyzes the data center and private cloud gap and provide a transition strategy in terms of security finally.
Keywords
Cloud; Data center; Cloud Data Center; Security Requirement; Security Levels;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Buyya, Rajkumar, Chee Shin Yeo,Srikumar Venugopal, Market-oriented cloud computing: Vision, hype, and reality for delivering it services as computing utilities, International Conference on High Performance Computing and Communications, 2008.
2 Armbrust, Michael, Armando Fox, Rean Griffith, Above the Clouds: A Berkeley View of Cloud Computing, Berkeley EECS Department, University of California, 2008.
3 IDC, IT Cloud Services User Survey, pt.2: Top Benefits & Challenges ,2008.
4 NIST Special Publication 800-145, The NIST Definition of Cloud Computing, 2011.
5 DANISH JAMIL, HASSAN ZAKI, CLOUD COMPUTING SECURITY," International Journal of Engineering Science and Technology, 3(4), pp3478-3483, 2011.
6 Vaquero L, Rodero-Merino L, Mor D, Locking the sky: a survey on IaaS cloud security, Computing, 91, pp93-118, 2011.   DOI
7 R. Chow, P. Golle, M. Jakobsson, E. Shi, et. al, Controlling data in the cloud: outsourcing computation without outsourcing control. Proceedings of the 2009 ACM Workshop on Cloud Computing Security, 2009.
8 Pearson, S., Taking account of privacy when designing cloud computing services, In ICSE Workshop on Software Engineering Challenges of Cloud Computing, Vancouver, Canada, pp44-52, 2009.
9 LG CNS, "Introduction of LG CNS Public Cloud", http://cloud.lgcns.com/
10 M.Balduzzi, J.Zaddach, D.Balzarotti, E.Kirda, and S.Loureiro, A Security Analysis of Amazon's Elastic Cloud Service.Proceeding SAC '12 Proceedings of the 27th Annual ACM Symposium on Applied Computing, pp1427-1434, 2012.
11 Google, "Google's Approach to IT Security, https://cloud.google.com/files/Google- CommonSecurity-WhitePaper-v1.4.pdf"
12 https://cloud.google.com/files/Google-CommonSecurity-WhitePaper-v1.4.pdf