원문정보
보안공학연구지원센터(IJSIA)
International Journal of Security and Its Applications
Vol.6 No.4
2012.10
pp.25-32
피인용수 : 0건 (자료제공 : 네이버학술정보)
초록
영어
Cloud computing is a model for enabling service user’s ubiquitous, convenient and on-demand network access to a shared pool of configurable computing resources. The security for Cloud Computing is emerging area for study and this paper provide security topic in terms of cloud computing based on analysis of Cloud Security treats and Technical Components of Cloud Computing.
목차
Abstract
1. Introduction
2. Technical Components of Cloud Computing
3. Threats for Cloud Service Users
3.1 Responsibility Ambiguity
3.2 Loss of Governance
3.2 Loss of Governance
3.4 Service Provider Lock-in
3.5 Unsecure Cloud Service User Access
3.6 Lack of Information/Asset Management
3.7 Data loss and leakage
4. Threats for Cloud Service Providers
4.1 Responsibility Ambiguity
4.2 Protection Inconsistency
4.3 Evolutional Risks
4.4 Business Discontinuity
4.5 Supplier Lock-in
4.5 Supplier Lock-in
4.7 Bylaw Conflict
4.8 Bad Integration
4.9 Unsecure Administration API
4.10 Shared Environment
4.11 Hypervisor Isolation Failure
4.12 Service Unavailability
4.13 Data Unreliability
4.14 Abuse Right of Cloud Service Provider
5. Conclusion
References
1. Introduction
2. Technical Components of Cloud Computing
3. Threats for Cloud Service Users
3.1 Responsibility Ambiguity
3.2 Loss of Governance
3.2 Loss of Governance
3.4 Service Provider Lock-in
3.5 Unsecure Cloud Service User Access
3.6 Lack of Information/Asset Management
3.7 Data loss and leakage
4. Threats for Cloud Service Providers
4.1 Responsibility Ambiguity
4.2 Protection Inconsistency
4.3 Evolutional Risks
4.4 Business Discontinuity
4.5 Supplier Lock-in
4.5 Supplier Lock-in
4.7 Bylaw Conflict
4.8 Bad Integration
4.9 Unsecure Administration API
4.10 Shared Environment
4.11 Hypervisor Isolation Failure
4.12 Service Unavailability
4.13 Data Unreliability
4.14 Abuse Right of Cloud Service Provider
5. Conclusion
References
저자정보
참고문헌
자료제공 : 네이버학술정보
