Browse > Article
http://dx.doi.org/10.22156/CS4SMB.2021.11.07.007

Configuration Method of AWS Security Architecture for Cloud Service  

Park, Se-Joon (Information Security Group, SK)
Lee, Yong-Joon (Department of Hacking Security, Far East University)
Park, Yeon-Chool (Advanced Robotics LAB, LG)
Publication Information
Journal of Convergence for Information Technology / v.11, no.7, 2021 , pp. 7-13 More about this Journal
Abstract
Recently, due to the many features and advantages of cloud computing, cloud service is being introduced to countless industries around the world at an unbelievably rapid pace. With the rapid increase in the introduction of multi-cloud based services, security vulnerabilities are increasing, and the risk of data leakage from cloud computing services are also expected to increase. Therefore, this study will propose an AWS Well-Architected based security architecture configuration method such as AWS standard security architecture, AWS shared security architecture model that can be applied for personal information security including cost effective of cloud services for better security in AWS cloud service. The AWS security architecture proposed in this study are expected to help many businesses and institutions that are hoping to establish a safe and reliable AWS cloud system.
Keywords
AWS Security; Cloud; Architecture; Data Security; Security Threats;
Citations & Related Records
연도 인용수 순위
  • Reference
1 J. H. Jeong. (2017). Current status and challenges of cloud computing, INARS issue report, 313, 17-21.
2 C. J. Lee. (2017). A Study on Security Requirements for Privacy in a Home Cloud Environment. Master's Thesis. Graduate School of Soon Chun Hyang University, Asan.
3 ENSI-MARIA. (2017). IaaS, PaaS, SaaS - What do they mean?, Cloud on move (Online). http://cloudonmove.com/iaas-paas-saas-what-do-they-mean
4 Cloud Security Alliance. (2016). Cloud Computing Top Threats in 2016. The Threacherous 12.
5 S. H. Cho. (2018). A Study on Security Management Method for Hybrid Cloud Computing Environment. Master's Thesis, Graduate School of Dongguk University, Seoul.
6 Cloud Security Alliance. (2019). Top Threats to Cloud Computing in 2019. The Egregious 9.
7 Y. G. Lee. (2019). A Study on Improvement of Cloud Security Assurance Program. Master's Thesis, Graduate Schoolof Dongguk University, Seoul.
8 P. Mell & T. Grance. (2011). The NIST Definition of Cloud Computing. National Institute of Standards and Technology, U.S. Department of Commerce Version 15.
9 Multi-Cloud Blog. (2020). SaaS vs PaaS vs IaaS: What's the difference and how to choose. Accessed Time (Online). https://www.bmc.com/blogs/saas-vs-paas-vs-iaas-what's-difference-and-how-to-choose
10 T. Wang et al. (2016). Fog-based storage technology to fight to fight with cyber threat. Future Generation Computer Systems, 83, 208-218. DOI : 10.1016/j.future.2017.12.036   DOI