Browse > Article
http://dx.doi.org/10.13089/JKIISC.2013.23.6.1239

A study on the vulnerability of the Cloud computing security  

Jeon, Jeong-Hoon (Dongduk Woman University)
Abstract
Recently, The cloud computing technology is emerging as an important issue in the world, and In technology and services, has attracted much attention. However, the positive aspects of cloud computing unlike the includes several vulnerabilities. For this reason, the Hacking techniques according to the evolution of a variety of attacks and damages is expected. Therefore, this paper will be analyzed management models through case studies and experiments to the threats and vulnerabilities of the cloud computing. and In the future, this is expected to be utilized as a basis for the security design and performance improvement.
Keywords
Cloud Computing; Cloud Service; Vulnerability; Security threat; Hypervisor; Virtualization;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Won-Young Kang, "Recently Trends in Cloud Computing Services," Internet & Security Issue, no. 3, pp. 20-24, Mar. 2012.
2 Tyson T. Brooks, Carlos Caicedo and Joon S. Park, "Security Vulnerability Analysis in Virtualized Computing Environments," International Journal of Intelligent Computing Research, vol. 3, pp. 227-291, Mar. 2012.
3 A. Mishra, R. Mathurm and J.S. Rathore, "Cloud Computing Security," International Journal on Recent and Innovation Trends in Computing and Communication, vol. 1(1), pp. 36-39, Jan. 2013.
4 J. Archer, D. Cullinane, N. Puhlmann , A. Boehme, and J. Reavis, "Security Guidance for critical areas of focus in cloud computing v3.0," Cloud Security Alliance, 2011.
5 Bryan Williams and Tom Cross, "Virtu alization System Security," IBM X-Force Advanced Research, Apr. 2010.
6 Young-Jin Chio, Jong-Hei Ra and Sang-Hak Lee, "Vulnerability and Security Management System from the Perspective of the Cloud Service Users," Journal of Information Technology and Architecture, vol. 9, no. 4, pp. 401-411, Dec. 2012.
7 Seong-Kyung Un, "Trends in Cloud co mputing security technology," Korea Institute of Information Security and Cryptology, vol. 20, no. 2, pp. 27-31, Apr. 2010.
8 Md.Tanzim Khorshed, A.B.M. Shawkat Ali, and Saleh A. Wasimi, "A survey on gaps, threat remediation challenges and some thoughts for proactive attack detection in cloud computing," Future Generation Computer System, vol. 28(6), pp. 833-851, Jun. 2012.   DOI   ScienceOn
9 Yang-Jin Lee, "The use of secure cloud services and security considerations," CloudSEC, 2012.
10 http://www.kisa.or.kr/jsp/common/downloadAction.jsp?bno=4&dno=1236&fseq=1
11 J. Archer, D. Cullinane, N. Puhlmann , A. Boehme, P. Kurtz, and J. Reavis, "Security Guidance for critical areas of focus in cloud computing v2.1," Cloud Security Alliance, Dec. 2009.
12 S.K. Un, N.S. Jho, Y.H Kim and D.S Choi, "Cloud Computing Security Technology," Electronics and Telecommunications Research Institute, vol. 24, no. 4, pp. 79-88, Aug. 2009.