Browse > Article

Cloud Computing in the Vulnerability Analysis for Personal Information Security  

Sun, Jae-Hoon (경기산업기술보안협의회)
Kim, Kui-Nam J. (경기대학교 산업보안학과)
Publication Information
Abstract
Cloud computing is defined as numerous concepts by research institutions and scholars. However, due to the present business trend in the IT sector, emphasizing on cost and efficiency, cloud computing has been defined as a form of computing which can provide extendable mass storage components in the virtual environment. As a result, security issues have been arising due to the variety of cloud computing services provided by the industries. This paper aims to analyze the weaknesses such as security techniques and inquiries, and personal information protection required for various cloud computing services.
Keywords
Cloud Computing; Security; Authentication; DRDos; Man-In-The-Middle;
Citations & Related Records
Times Cited By KSCI : 2  (Citation Analysis)
연도 인용수 순위
1 Gartner says cloud computing will be as influential as e-business, 2008. http://ww w.gartner.com/it/page.jsp?id = 707508.
2 Asia Pacific End-user Cloud Computing Survey, IDC, 2009.
3 정제호, 클라우드 컴퓨팅의 현재와 미래 그리고 시장 전략, 한국소프트웨어진흥원, 2008.
4 Gartner, Assessing the Security Risks of Cloud Computing, 2008. 6, http://www.gar tner.com/DisplayDocument?id=685308.
5 임철수, "클라우드 컴퓨팅 보안 기술", 정보보호학회지, 2009.   과학기술학회마을
6 NIST, Cryptographic hash algorithm competition, http://csrc.nist.gov/groups/ST/hash /sha-3/index.html.
7 jaehoon. sun, A Study on the Enhanced Security Technique of BGP for DRDoS Attack, ICISA2010, 2010.
8 Amazon Web Service : Overview of Security Process, Amazon, 2008.
9 김현승, 박춘식, "클라우드 컴퓨팅과 개인 인증 서비스", 정보보호학회지, 2010.   과학기술학회마을
10 Malware, Man-in-the-Middile and Other Online Mischief, Entrust, 2009.