Fig. 1. Cloud Introduction Effect and Reason
Fig. 2. Cloud Access Security Broker
Fig. 3. Current Connected Model Based TCP/IP
Fig. 4. Connected Model Based SDP
Fig. 5. SDP Specification 1.0, CSA
Fig. 6. SDP Specification 1.0, CSA(flow description)
Fig. 7. Genian SDP Applicate Architecture
Table 1. The Treacherous 12
Table 2. Compared to NAC and SDP components
Table 3. Compare to NAC, SDP, Genian SDP
References
- Korea IDG Report. what makes you hesitate to be applicate cloud security?
- Take The Wheel: Build Your Cloud Computing Strategic Plan Now Strategic Plan: The Cloud Computing Playbook.
- CLOUD SECURITY ALLIANCE(April 2014), Software Defined Perimeter Working Group, SDP Specification 1.0
- Check Point, 2017 Global Cyber Attack Trends Report
- Cyxtera, How to Overcome NAC Limitations.
- Musa Abubakar Muhammad, Aladdin Ayesh, Pooneh Bagheri Zadeh,(2017). Developing an Intelligent Filtering Technique for Bring Your Own Device Network Access Control, the International Conference on Future Networks and Distributed System, No. 46. DOI : 10.1145/3102304.3105573.
- Choi Eun-bok, Lee Sang-joon (2016). MAC Policy-based Access Control Mechanism for Cloud Convergence, Journal 7 of the Korean Convergence Society, 1-8.
- Jung Yoon-soo, Han Gun-hee (2018). Effective access control techniques between different IoT devices in the cloud environment, Journal 9 of the[ Korean Convergence Society, No. 4, 57-63.
- Kang Yong-hyuk, Kim Moon-jung, Han Moon-seok (2017), a study on the intrusion detection technique using software-defined networking techniques in wireless sensor networks, Journal 8 of the Korean Convergence Society, 51-57. https://doi.org/10.15207/JKCS.2017.8.1.051
- Jung Sung-jae, Bae Yu-mi, (2013). Analysis of cloud security threats and technology trends, Journal of Security Engineering Research, No. 10, No. 2, 199-212
- Kim Chang-soo, Jang Bong-im, Chung Hoi-kyung (2013). Analysis of cloud security threats and technology trends, Journal of Security Engineering Research, No. 10, No. 2, 199-212.
- Ashish Singh & Kakali Chatterjee. (2017). Cloud security issues and challenges: A survey. Journal of Network and Computer Applications, 79, 88-115. DOI : 10.1016/j.jnca.2016.11.027.
- Miss. Shakeeba S & Khan, Miss. Sakshi S. Deshmukh. (2017). Security in Cloud Computing Using Cryptographic Algorithms. Journal of Computer Science and Mobile Computing, 3, 517-525.
- SalmanIqbal. Miss Laiha Mat Kiah. Babak Dhaghighi. Muzammil Hussain. Suleman Khan. Muhammad Khurram Khan. Kim-Kwang Raymond Choo. (2016). On cloud security attacks: A taxonomy and intrusion detection and prevention as a service. Journal of Network and Computer Applications, 74, 98-120. DOI : 10.1016/j.jnca.2016.08.016.
- Won-Bon Koo, Kab-Seung Kou, Jae-In Shin, Jae-goo Jeong&Young-Gi Min. (2013). A Study on Information Security Requirements Considering the Security Technical Aspects in Cloud Service. Journal of Security Engineering, 10(3), 355-370.