원문정보
초록
영어
Cloud computing is rapidly increasing for achieving comfortable computing. Cloud computing has essentially security vulnerability of software and hardware. For achieving secure cloud computing, the vulnerabilities of cloud computing could be analyzed in a various and systematic approach from perspective of the service designer, service operator, the designer of cloud security and certifiers of cloud systems. The paper investigates the vulnerabilities and security controls from the perspective of administration, and systems. For achieving the secure operation of cloud computing, this paper analyzes technological security vulnerability, operational weakness and the security issues in an enterprise. Based on analysis, the paper suggests secure establishments for cloud computing.
목차
1. Introduction
2. The Features and the Advantages of Cloud Service
2.1 The Feature of Cloud Computing Services
2.2 The Advantages of Cloud Computing
3. The Security Threats of Cloud Service
3.1 The Risk of Cloud Service
3.2 The Vulnerabilities of Cloud Service
4. Security Threats in the Operation of the Cloud System
4.1 Security Risk Embedded in Cloud Technology
4.2 Cryptography Policy of Cloud Computing
4.3 Cloud Operation Management
5. Case Study for Cloud Computing in K Cooperation
5.1 The Economics Evaluation for Cloud System
5.2 Advantages/Shortcomings After Introducinga Cloud System
5.3 Cyber Terrorism and Security Issues
5.4 The Issues of Physical Devices
6. Conclusion and Implications
References