DOI QR코드

DOI QR Code

The Security Architecture for Secure Cloud Computing Environment

  • Choi, Sang-Yong (Cyber Security Research Center, Korea Advanced Institute of Science and Technology) ;
  • Jeong, Kimoon (HPC Cloud Center, Korea Institute of Science and Technology Information)
  • Received : 2018.10.11
  • Accepted : 2018.11.16
  • Published : 2018.12.31

Abstract

Cloud computing is a computing environment in which users borrow as many IT resources as they need to, and use them over the network at any point in time. This is the concept of leasing and using as many IT resources as needed to lower IT resource usage costs and increase efficiency. Recently, cloud computing is emerging to provide stable service and volume of data along with major technological developments such as the Internet of Things, artificial intelligence and big data. However, for a more secure cloud environment, the importance of perimeter security such as shared resources and resulting secure data storage and access control is growing. This paper analyzes security threats in cloud computing environments and proposes a security architecture for effective response.

Keywords

CPTSCQ_2018_v23n12_81_f0001.png 이미지

Fig. 1. AWS Security Function

CPTSCQ_2018_v23n12_81_f0002.png 이미지

Fig. 2. Google Security Layers

CPTSCQ_2018_v23n12_81_f0003.png 이미지

Fig. 3. Naver Cloud Security Service

CPTSCQ_2018_v23n12_81_f0004.png 이미지

Fig. 4. Cloud Security Architecture

Table 1. Characteristics by Cloud Service Type

CPTSCQ_2018_v23n12_81_t0001.png 이미지

Table 2. Security Threats on Cloud Computing

CPTSCQ_2018_v23n12_81_t0002.png 이미지

Table 3. Security Function for Cloud Computing

CPTSCQ_2018_v23n12_81_t0003.png 이미지

References

  1. DEMPSEY, David; KELLIHER, Felicity. Industry Trends in Cloud Computing. 2018.
  2. JOSHI, N.; SHAH, S. A Comprehensive Survey of Services Provided by Prevalent Cloud Computing Environments. In: Smart Intelligent Computing and Applications. Springer, Singapore 2019, pp. 413-424, 2018.
  3. VARGHESE, Blesson; BUYYA, Rajkumar. Next generation cloud computing: New trends and research directions. Future Generation Computer Systems, pp. 849-861, 2018.
  4. https://cloud.google.com/security/security-design/
  5. https://aws.amazon.com/security/
  6. https://gov.ucloudbiz.olleh.com/portal/ktcloudportal.epc.productintro.waf.html
  7. https://cloud.naver.com
  8. Cloud Security Alliance, "The Treacherous 12 CloudComp uting Top Threats in 2016," Security, no. February, pp. 1-34, 2016.
  9. M. Kazim and S. Zhu, "A Survey on Security Threats in CloudComputing Technology," Int. J. Res., vol. 1, no. 8, pp. 1071-1081, 2015.
  10. G. Aswini and R. Mervin, "A Survey on Cloud Security Issuesand Techniques," Int. J. Comput. Sci. Appl., vol. 4, no. 1, pp.125-132, 2016. https://doi.org/10.5121/ijcsa.2014.4112
  11. https://cloudsecurityalliance.org/download/top-threats-cloud-computing-plus-industry-insights/
  12. PARK, Jae-Kyung; LEE, Won Joo; LEE, Kang-Ho. A Study on the Isolated Cloud Security Using Next Generation Network. Journal of The Korea Society of Computer and Information, Vol. 22, No. 11, pp. 9-16, 2017. https://doi.org/10.9708/jksci.2017.22.01.009