Browse > Article
http://dx.doi.org/10.13089/JKIISC.2016.26.2.319

A Study on Service Security Framework for SW-IaaS Cloud  

Choi, Myeonggil (Chung-Ang University)
Park, Choonsik (Seoul Women's University)
Jeong, Jaehun (Chung-Ang University)
Abstract
Cloud computing-related security incidents have occurred recently are beyond the scope of a enterprise's security incident is expanded to the entire range of customers who use the cloud computing environment. The control technology for the overall integrated security of the cloud data center is required for this purpose. This study research integrated and additional security elements for the cloud data center control to understand the existing control technology. It is a better understanding of the IaaS cloud environment to build the IaaS cloud environment by CloudStack. SW-IaaS cloud structure by combining CloudStack and IaaS cloud model presented by NIST is proposed in this study. This paper derive a security framework to consider in each layer of The SW-IaaS cloud components, which are composed of the Cloud Manager, Cluster Manager, and Computer Manager.
Keywords
Cloud Service; Security Framework; IaaS Cloud;
Citations & Related Records
연도 인용수 순위
  • Reference
1 J. Brodkin, "Gartner: Seven Cloud-Computing Security Risks," Infoworld, 2008.
2 M. Zareapoor, P. Shamsolmoali and M.A. Alam, "Establishing Safe Cloud: Ensuring Data Security and Performance Evaluation," International Journal of Electronics and Information Engineering, vol. 1, no. 2, pp. 88-99, Dec. 2014.
3 M. Darwish, A. Ouda and L.F. Capretz, "A Cloud-Based Secure Authentication (CSA) Protocol Suite for Defense Against Denial of Service (DoS) Attacks," Journal of Information Security and Applications, vol. 20, pp. 90-98, Feb. 2015.   DOI
4 G. Brunette and R. Mogull, "Security Guidance for Critical Areas of Focus in Cloud Computing," v2.1, Cloud Security Alliance, pp. 1-76, 2009.
5 D. Hubbard and M. Sutton, "Top Threats to Cloud Computing," v1.0, Cloud Security Alliance, 2010.
6 European Network and Information Security Agency, "Cloud Computing: Benefits, Risks and Recommendations for Information Security," ENISA, 2009.
7 D. Catteddu, "Cloud Computing: Benefits, Risks and Recommendations for Information Security," In Web Application Security Springer Berlin Heidelberg, pp. 17, 2010.
8 L. Badger, T. Grance, R. Patt-Corner and J. Voas, "DRAFT Cloud Computing Synopsis and Recommendations," SP 800-146, NIST, May. 2011.
9 M. Hogan, F. Liu, A. Sokol and J. Tong, "NIST Cloud Computing Standards Roadmap," NIST Cloud Computing Standards Roadmap Working Group, SP 500-291-v1.0, NIST, Jul. 2011.