DOI QR코드

DOI QR Code

A Study on the Isolated Cloud Security Using Next Generation Network

  • Park, Jae-Kyung (Dept. of Information Security, Seoul Gangseo Campus, Korea Polytechnics) ;
  • Lee, Won Joo (Dept. of Computer Science, Inha Technical College) ;
  • Lee, Kang-Ho (Dept. of Computer Information Security, Korea National University of Welfare)
  • Received : 2017.10.16
  • Accepted : 2017.11.20
  • Published : 2017.11.30

Abstract

In this paper, we propose to present a model of cloud security that has emerged as the biggest topic of cloud computing, replacing the traditional IT environment. While cloud computing is an extension of existing IT technology, security issues and threats can be applied to traditional security technologies. However, the biggest difference between a typical computing environment and a cloud computing environment is a virtualized environment with a hypervisor. Currently, there are many weaknesses in the virtualized environment, and there are few related security products. In order for a cloud computing environment to function as a reliable IT environment, we expect more research on hypervisor-based security technologies, and we expect to secure safer cloud services through a secure model over the next generation of new-based networks.

Keywords

References

  1. Ronald L. Krutz 외, "Cloud Security - A Comprehensive Guide to Secure Cloud Computing", WILEY, 2010.03
  2. http://news.inews24.com/php/news_view.php?g_serial=952021&g_menu=020200&rrf=nv, 2016.4.20.
  3. http://www.dt.co.kr/contents.html?article_no=2015100502150251753001, 2015.10.05.
  4. http://www3.opengroup.org/getinvolved/workgroups/cloudcomputing, Oct. 2012.
  5. Hyang-Jin Lee, "Security Consieration for use of Secure Cloud Services," CloudSec 2012, (2012) Mar 13; Seoul, Korea.
  6. https://cloudsecurityalliance.org/guidance/csaguide.v3.0.pdf, Nov. 2011.
  7. https://downloads.cloudsecurityalliance.org/initiatives/top_threats/Top_Threats_Cloud_Computing_Survey_2012.pdf, Nov. 2012.
  8. Ju-Young Kim, Jong-Pyo Kim, Kyung-Ho Lee, Hyuk-Jun, Kim, Yong-Hoi Kim, Chun-Sik Park, "A Guide of Security Management for Cloud Computing Services," KISA, 2010
  9. S.K. Un, N.S. Jho, Y.H. Kim and D.S. Choi, "Cloud Computing Security Technology," Electronics and Telecommunicati ons Trends. ETRI. Vol. 24, No. 4, pp. 79-88. Aug. 2009.
  10. Young-Sang Shin, "Hypervisor-based Security Techn ology of Virtualization Environment for Cloud Computing," The Clouds 2012, (2012) September 24-25; Seoul, Korea.
  11. Parc Homepage, http://www.parc.com/
  12. 4WARD Homepage, http://www.4ward-project.eu/
  13. PURSUIT Homepage, http://www.fp7-pursuit.eu/
  14. CCN & CCNx Homepage, http://www.ccnx.org/
  15. Hyung-Su Lee, Jae-Pyo Park, Jae-Kyung Park, "A Network Transport System Using Next Generation CCN Technology," Journal of The Korea Society of Computer and Information, Vol. 22, No. 10, pp. 93-100, Oct. 2017.