DOI QR코드

DOI QR Code

A Study on the Security Requirement for Transforming Cloud Data Center : Focusing on N - Data Center

클라우드 데이터센터로의 전환을 위한 보안요건 - N데이터센터를 중심으로

  • Ra, Jong-Hei (Dept. of Logistics & Distribution, Gwangju University) ;
  • Lee, Jae-Sook (Dept. of Management Information System, Chungbuk University)
  • 나종회 (광주대학교 물류유통경영학과) ;
  • 이재숙 (충북대학교 경영정보학과)
  • Received : 2014.09.07
  • Accepted : 2014.11.20
  • Published : 2014.11.28

Abstract

N-Data Center which provide of cloud computing service for the Government departments, will be prepared transforming to cloud data center and transformed into an 'IT service' provided as a service to the information resources required by each department. N-Data center already provide a cloud service to the departments as maintains a high level of security, and plan to connecting with the private sector as a precondition of security. Therefore, in order to promote them effectively, it is necessary to determine the level of security in the cloud data center, and we have proposed appropriate measures. In this paper, we analyze security requirements of cloud data centers in developed countries and identify the leading private cloud data center security. In addition, we identify the N-data center security level, and analyzes the data center and private cloud gap and provide a transition strategy in terms of security finally.

N데이터센터는 정부부처를 대상으로 클라우드 컴퓨팅 서비스를 제공하는 '클라우드 컴퓨팅센터'로 변모를 꾀하고 있으며, 각 부처에 필요한 만큼 정보자원을 서비스 형태로 제공하는 'IT서비스 센터'로 탈바꿈 예정이다. N센터 8중의 보안체계 하에서 클라우드서비스가 이미 정부부처에 제공되고 있으며, 향후 보안을 전제조건으로 민간분야까지 확대할 계획이다. 따라서 보안은 민간분야와의 클라우드 확산에 있어 선결요건이며, 이의 체계적이고 효율적 추진을 위해서 클라우드 데이터 센터로서의 보안수준을 파악하고 적절한 방안을 제시할 필요가 있다. 본 연구에서는 이를 위해 선진 각국의 클라우드 데이터 센터의 보안 요건을 분석하고 클라우드 서비스 형태에 클라우드 컴퓨팅의 취약점을 파악하고, 선진 민간 클라우드 데이터 센터의 보안수준을 파악하고, 현행 N데이터센터 보안 수준과 선진 민간 클라우드 데이터센터와의 갭을 분석하여 보안관점에서 전환을 위한 요건을 제시하였다.

Keywords

References

  1. Armbrust, Michael, Armando Fox, Rean Griffith, Above the Clouds: A Berkeley View of Cloud Computing, Berkeley EECS Department, University of California, 2008.
  2. Buyya, Rajkumar, Chee Shin Yeo,Srikumar Venugopal, Market-oriented cloud computing: Vision, hype, and reality for delivering it services as computing utilities, International Conference on High Performance Computing and Communications, 2008.
  3. IDC, IT Cloud Services User Survey, pt.2: Top Benefits & Challenges ,2008.
  4. NIST Special Publication 800-145, The NIST Definition of Cloud Computing, 2011.
  5. DANISH JAMIL, HASSAN ZAKI, CLOUD COMPUTING SECURITY," International Journal of Engineering Science and Technology, 3(4), pp3478-3483, 2011.
  6. Vaquero L, Rodero-Merino L, Mor D, Locking the sky: a survey on IaaS cloud security, Computing, 91, pp93-118, 2011. https://doi.org/10.1007/s00607-010-0140-x
  7. R. Chow, P. Golle, M. Jakobsson, E. Shi, et. al, Controlling data in the cloud: outsourcing computation without outsourcing control. Proceedings of the 2009 ACM Workshop on Cloud Computing Security, 2009.
  8. Pearson, S., Taking account of privacy when designing cloud computing services, In ICSE Workshop on Software Engineering Challenges of Cloud Computing, Vancouver, Canada, pp44-52, 2009.
  9. LG CNS, "Introduction of LG CNS Public Cloud", http://cloud.lgcns.com/
  10. M.Balduzzi, J.Zaddach, D.Balzarotti, E.Kirda, and S.Loureiro, A Security Analysis of Amazon's Elastic Cloud Service.Proceeding SAC '12 Proceedings of the 27th Annual ACM Symposium on Applied Computing, pp1427-1434, 2012.
  11. Google, "Google's Approach to IT Security, https://cloud.google.com/files/Google- CommonSecurity-WhitePaper-v1.4.pdf"
  12. https://cloud.google.com/files/Google-CommonSecurity-WhitePaper-v1.4.pdf