Browse > Article

A study on the vulnerability and corresponding technique trends of the cloud computing service  

Jeon, Jeong Hoon (동덕여자대학교 컴퓨터학과)
Publication Information
Abstract
Recently, the cloud computing technology is emerging as an important issue in the world, and In the technology and services has attracted much attention. However, the positive aspects of cloud computing unlike the includes several vulnerabilities. For this reason, the hacking techniques according to the evolution of a variety of attacks and damages is expected. Therefore, this paper will be analyzed through case studies and experiments to the security technology trends of the cloud computing. and In the future, this is expected to be utilized as a basis for the security system design and corresponding technology development.
Keywords
Cloud computing security; Cloud service security; Security System; Virtualization; Vulnerability;
Citations & Related Records
연도 인용수 순위
  • Reference
1 http://www.kisa.or.kr/jsp/common/downloadAction.jsp? bno=4&dno=1236&fseq=1
2 정현준, "가상화 기술의 동향 및 주요 이슈(II)," 한국정보통신정책연구원, vol. 25, no. 5(550), Mar. 2013.
3 강원영, "최근 클라우드 컴퓨팅 서비스 동향," 한국인터넷진흥원, no. 3, pp. 20-24, 2011.
4 Tyson T. Brooks, C. Caicedo and J.S. Park, "Security Vulnerability Analysis in Virt ualized Computing Environments," International Journal of Intelligent Computing Research, vol. 3, pp. 227-291, Mar. 2012.
5 A. Mishra, R. Mathurm and J.S. Rathore, "Cloud Computing Security," International Journal on Recent and Innovation Trends in Computing and Communication, vol. 1(1), pp. 36-39, Jan. 2013.
6 은성경, 외 3인, "클라우드 보안기술," 한국전자통신동향분석, vol. 24, no. 4, pp. 79-88, Aug. 2009.
7 Johnson, "http://erpcloudnews.com/2010/06/multi-tenant-versus-single-tenant-erp-a-comparison/," Jun. 2010.
8 B. Williams and T. Cross, "Virtualization System Security," IBM Advanced Research, Apr. 2010.
9 J. Archer, D. Cullinane, N. Puhlmann , A. Boehme, P. Kurtz, and J. Reavis, "Security Guidance for critical areas of focus in cloud computing v2.1," Cloud Security Alliance, Dec. 2009.
10 Md.T. Khorshed, A.B.M. S. Ali, S. A.Wasimi "A survey on gaps, threat remediation challenges and some thoughts for proactive attack detection in cloud computing," Future Generation Computer System, vol. 28(6), pp. 833-851, Jun. 2012.   DOI   ScienceOn
11 이향진, "안전한 클라우드 서비스 제공.이용을 위한 보안 고려사항," KISA, CloudSEC, 2012.