Browse > Article
http://dx.doi.org/10.15207/JKCS.2014.5.4.093

A Study on Security of Virtualization in Cloud Computing Environment for Convergence Services  

Lee, Bo-Kyung (Department of Computer Engineering, Korea Polytechnic University)
Publication Information
Journal of the Korea Convergence Society / v.5, no.4, 2014 , pp. 93-99 More about this Journal
Abstract
Cloud computing refers to borrow IT resources as needed by leveraging Internet technology and pay as much as you used by supporting real-time scalability depending on the service load. Virtualization which is the main technology of cloud computing is a technology that server, storage and hardware are regarded as not separate system but one system area and are allocated as needed. However, the security mechanisms provided by virtualized environments are difficult to cope with the traditional security mechanisms, having basic levels of visibility, control and audit function, on which the server is designed to monitor the traffic between the servers. In this paper, the security vulnerabilities of virtualization are analysed in the cloud computing environment and cloud virtualization security recommendations are proposed.
Keywords
Cloud computing; Cloud service security; Hypervisor; Virtualization; Vulnerability;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 Jeon Jeong Hoon, 'A study on the vulnerability and corresponding technique trends of the cloud computing service', Journal of Convergence Security, Vol. 13, Issue. 6, 2013.
2 CSA(Cloud Security Alliance), The Notorious Nine : Cloud Computing top Threats in 2013. 2013.
3 Lee Hyang Jin, Son Kyoung Ho, Lee Jae Il, 'Strategy for strengthening information security based on cloud service', Journal of The Korea Institute of Information Security and Cryptology, Vol. 23, Issue. 4, 2013.
4 NIST(National Institute of Standards and Technology), Guide to Security for Full Virtualization Technologies, 2010.
5 Dave Thomas, 'Enabling Application Agility Software as a Service, Cloud Computing and Dynamic Languages', Journal of Object Technology, Vol. 7, No. 4, 2008.
6 http://www.kisa.or.kr/jsp/common/downloadAction.jsp? bno=4&dno=1236&fseq=1