Browse > Article

A study on the Privacy threats factors of Cloud Services  

Jeon, Jeong Hoon (동덕여자대학교/컴퓨터학과)
Publication Information
Abstract
Recently, The cloud computing technology is emerging as an important issue in the world, and In technology and services, has attracted much attention. Cloud services have evolved from simple forms to complex forms(using multiple mobile devices and communication services(Kakao talk, Facebook, etc.). In particular, as the cloud is especially facilitated the collection of user information, it can now be analyzed with the user's taste and preference. And many of the benefits of the cloud became increasingly closely with our lives. However, the positive aspects of cloud computing unlike the includes several vulnerabilities. For this reason, the Hacking techniques according to the evolution of a variety of attacks and damages is expected. Therefore, this paper will be analyzed through case studies of attack and vulnerability to the privacy threats factors of the cloud computing services. and In the future, this is expected to be utilized as a basis for the Privacy security and Response.
Keywords
Cloud computing services; Privacy Threats factors; Cloud computing security; Security vulnerability;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 강원영, "최근 클라우드컴퓨팅 서비스동향," KISA, NETTerm No. 3, pp. 20-24, 2011.
2 Anupama Prasanth, Monika Bajpei, Vertika Shrivastava, Raj Gaurav Mishra "A Survey of Associated Service," HCTL Open India, chapter3, 2015.
3 양희동, 황세운, "클라우드 컴퓨팅 보안 위협요소 소개와 창조경제 실현을 위한 방향성 제안," KISA, Internet & Security Focus, pp. 66-83, 2013.12.
4 신영상, "클라우드 환경에서의 하이퍼바이저 기반 가상화 보안 기술 동향," KISA, Internet & Security Focus, pp. 55-75, 2014.8.
5 전정훈, "클라우드 컴퓨팅 서비스의 취약성과 대응 기술 동향에 관한 연구" 한국융합보안학회, Vol. 13, No. 6, pp. 1239-1246, 2013.4.
6 박완규, "클라우드 컴퓨팅 환경에서의 개인정보의 미국 이전에 따른 문제점 및 대응방안 연구," 경북대학교 법학연구원, pp. 456-478, 2012.2.
7 http://i1.daumcdn.net/thumb/R750x0/?fname=http%3A%2F%2Fcfile30.uf.tistory.com%2Fimage%2F253E094F54D33F3F1B610A
8 http://blog.naver.com/PostView.nhn?blogId=zzxcvgh&logNo=30126611476&categoryNo=28&viewDate=& currentPage=1&listtype=0, "SKT Tstore 설치 방법"
9 박진호, 이재휘, "클라우드 컴퓨팅 서비스 침해사례 분석 및 정보보안 기술 동향," 경북대학교, pp. 3-14, 2013.7.
10 유우영, 임종인, "클라우드 컴퓨팅 서비스 제공자의 개인정보보호 조치 방안에 대한 연구," 한국정보보호학회, pp. 337-346, Vol. 22, No. 2, 2012.4.
11 장은영 외4명, "모바일 클라우드 서비스의 보안 위협 대응 방안 연구," 한국정보보호학회, pp.177-186, vol.21, no.1, 2011.2.
12 한국인터넷진흥원 "국내 클라우드 서비스 보안 취약점 점검," 2012.8.
13 Christian Moss, "Integrating Cloud Computing and Mobile Application," JCC, 2014.
14 T Cloud 서비스 "https://www.tcloud.co.kr/main.do," 통지안내메일, 2015.8.27.