Fig. 1. AWS Security Function
Fig. 2. Google Security Layers
Fig. 3. Naver Cloud Security Service
Fig. 4. Cloud Security Architecture
Table 1. Characteristics by Cloud Service Type
Table 2. Security Threats on Cloud Computing
Table 3. Security Function for Cloud Computing
References
- DEMPSEY, David; KELLIHER, Felicity. Industry Trends in Cloud Computing. 2018.
- JOSHI, N.; SHAH, S. A Comprehensive Survey of Services Provided by Prevalent Cloud Computing Environments. In: Smart Intelligent Computing and Applications. Springer, Singapore 2019, pp. 413-424, 2018.
- VARGHESE, Blesson; BUYYA, Rajkumar. Next generation cloud computing: New trends and research directions. Future Generation Computer Systems, pp. 849-861, 2018.
- https://cloud.google.com/security/security-design/
- https://aws.amazon.com/security/
- https://gov.ucloudbiz.olleh.com/portal/ktcloudportal.epc.productintro.waf.html
- https://cloud.naver.com
- Cloud Security Alliance, "The Treacherous 12 CloudComp uting Top Threats in 2016," Security, no. February, pp. 1-34, 2016.
- M. Kazim and S. Zhu, "A Survey on Security Threats in CloudComputing Technology," Int. J. Res., vol. 1, no. 8, pp. 1071-1081, 2015.
- G. Aswini and R. Mervin, "A Survey on Cloud Security Issuesand Techniques," Int. J. Comput. Sci. Appl., vol. 4, no. 1, pp.125-132, 2016. https://doi.org/10.5121/ijcsa.2014.4112
- https://cloudsecurityalliance.org/download/top-threats-cloud-computing-plus-industry-insights/
- PARK, Jae-Kyung; LEE, Won Joo; LEE, Kang-Ho. A Study on the Isolated Cloud Security Using Next Generation Network. Journal of The Korea Society of Computer and Information, Vol. 22, No. 11, pp. 9-16, 2017. https://doi.org/10.9708/jksci.2017.22.01.009