메뉴 건너뛰기




Volumn 15, Issue 2, 2013, Pages 843-859

Security and privacy in cloud computing

Author keywords

accountability; availability; cloud computing; confidentiality; integrity; privacy; security; trust

Indexed keywords

ACCOUNTABILITY; CONFIDENTIALITY; INTEGRITY; SECURITY; TRUST;

EID: 84877272118     PISSN: None     EISSN: 1553877X     Source Type: Journal    
DOI: 10.1109/SURV.2012.060912.00182     Document Type: Article
Times cited : (492)

References (134)
  • 2
    • 78349232676 scopus 로고    scopus 로고
    • Virtual-ization August 2008. Electronic Mag., article
    • J. Geelan. "Twenty one experts define cloud computing, " Virtual-ization, August 2008. Electronic Mag., article available at http://virtualization.sys-con.com/node/612375.
    • Twenty One Experts Define Cloud Computing
    • Geelan, J.1
  • 3
    • 77951712094 scopus 로고    scopus 로고
    • Market-oriented cloud computing: Vision, hype, and reality for delivering it services as computing utilities
    • R. Buyya, C. S. Yeo, and S. Venugopal. "Market-oriented cloud computing: Vision, hype, and reality for delivering it services as computing utilities, " CoRR, (abs/0808.3558), 2008.
    • (2008) CoRR, (abs/0808.3558)
    • Buyya, R.1    Yeo, C.S.2    Venugopal., S.3
  • 4
    • 79751493181 scopus 로고    scopus 로고
    • Locking the sky: A survey on iaas cloud security
    • DOI:10.1007/s00607-010-0140-x
    • Luis M. Vaquero, Luis Rodero-Merino and Daniel Morán, "Locking the sky: a survey on IaaS cloud security, " Computing, 2010, DOI:10.1007/s00607-010-0140-x.
    • (2010) Computing
    • Luis, M.1    Luis Rodero-Merino, V.2    Morán, D.3
  • 7
    • 79952065844 scopus 로고    scopus 로고
    • Cloud Security Alliance (CSA) released March 2010
    • Cloud Security Alliance (CSA). "Top Threats to Cloud Computing V 1.0, " released March 2010.
    • Top Threats to Cloud Computing v 1.0
  • 12
    • 74049103479 scopus 로고    scopus 로고
    • PORs: Proofs of retrievability for large files
    • A. Juels and B. S. Kaliski, "PORs: Proofs of retrievability for large files, " In ACM CCS, pages 584-597, 2007.
    • (2007) ACM CCS , pp. 584-597
    • Juels, A.1    Kaliski, B.S.2
  • 13
    • 78650345904 scopus 로고    scopus 로고
    • Proofs of retrievability via hardness amplication
    • Y. Dodis, S. Vadhan, and D. Wichs, "Proofs of retrievability via hardness amplication, " In TCC, 2009.
    • (2009) TCC
    • Dodis, Y.1    Vadhan, S.2    Wichs, D.3
  • 21
  • 26
  • 30
    • 48649085344 scopus 로고    scopus 로고
    • Secure and flexible monitoring of virtual machines
    • B. D. Payne, M. Carbone, and W. Lee, "Secure and Flexible Monitoring of Virtual Machines, " In Proc. ACSAC'07, 2007.
    • (2007) Proc. ACSAC'07
    • Payne, B.D.1    Carbone, M.2    Lee, W.3
  • 32
    • 77957955892 scopus 로고    scopus 로고
    • Attack surfaces: A taxonomy for attacks on cloud services
    • 2010 IEEE 3rd International Conference on Cloud Computing
    • N. Gruschka, M. Jensen, "Attack Surfaces: A Taxonomy for Attacks on Cloud Services, " Cloud Computing, IEEE International Conference on, pp. 276-279, 2010 IEEE 3rd International Conference on Cloud Computing, 2010.
    • (2010) Cloud Computing IEEE International Conference on , pp. 276-279
    • Gruschka, N.1    Jensen, M.2
  • 33
    • 77957948993 scopus 로고    scopus 로고
    • QUIRC: A quantitative impact and risk assessment framework for cloud security
    • 2010 IEEE 3rd International Conference on Cloud Computing
    • P. Saripalli, B. Walters, "QUIRC: A Quantitative Impact and Risk Assessment Framework for Cloud Security, " Cloud Computing, IEEE International Conference on, pp. 280-288, 2010 IEEE 3rd International Conference on Cloud Computing, 2010.
    • (2010) Cloud Computing IEEE International Conference on , pp. 280-288
    • Saripalli, P.1    Walters, B.2
  • 39
    • 78649322624 scopus 로고    scopus 로고
    • A survey on security issues in service delivery models of cloud computing
    • Jan.
    • S. Subashini and V. Kavitha, "A survey on security issues in service delivery models of cloud computing, " J. Network and Computer Applications, vol. 34, Jan. 2011, pp. 1-11.
    • (2011) J. Network and Computer Applications , vol.34
    • Subashini, S.1    Kavitha, V.2
  • 42
    • 71749102261 scopus 로고    scopus 로고
    • A privacy manager for cloud computing
    • S. Pearson, Y. Shen, and M. Mowbray, "A privacy manager for cloud computing, " Cloud Computing, 2009, pp. 90-106.
    • (2009) Cloud Computing , pp. 90-106
    • Pearson, S.1    Shen, Y.2    Mowbray, M.3
  • 45
    • 77953295132 scopus 로고    scopus 로고
    • Privacy-preserving public auditing for data storage security in cloud computing
    • San Diego, CA, March
    • C. Wang, Q. Wang, K. Ren, and W. Lou, "Privacy-preserving public auditing for data storage security in cloud computing, " IEEE INFO-COM 2010, San Diego, CA, March 2010.
    • (2010) IEEE INFO-COM 2010
    • Wang, C.1    Wang, Q.2    Ren, K.3    Lou, W.4
  • 46
    • 70350389843 scopus 로고    scopus 로고
    • Enabling public ver-ifiability and data dynamics for storage security in cloud computing
    • Saint Malo, France, Sep.
    • Q. Wang, C. Wang, J. Li, K. Ren, and W. Lou, "Enabling public ver-ifiability and data dynamics for storage security in cloud computing, " in Proc. ESORICS'09, Saint Malo, France, Sep. 2009.
    • (2009) Proc. ESORICS'09
    • Wang, Q.1    Wang, C.2    Li, J.3    Ren, K.4    Lou, W.5
  • 52
    • 71749090060 scopus 로고    scopus 로고
    • Accountability as a way forward for privacy protection in the cloud
    • Beijing, China: Springer-Verlag
    • S. Pearson and A. Charlesworth, "Accountability as a Way Forward for Privacy Protection in the Cloud, " Proc. 1st International Conference on Cloud Computing, Beijing, China: Springer-Verlag, 2009, pp. 131-144.
    • (2009) Proc. 1st International Conference on Cloud Computing , pp. 131-144
    • Pearson, S.1    Charlesworth, A.2
  • 55
    • 0001038609 scopus 로고    scopus 로고
    • Practical byzantine fault tolerance
    • M. Castro and B. Liskov, "Practical Byzantine fault tolerance, " Operating Systems Review, vol. 33, 1998, pp. 173-186.
    • (1998) Operating Systems Review , vol.33 , pp. 173-186
    • Castro, M.1    Liskov, B.2
  • 62
    • 47849089563 scopus 로고    scopus 로고
    • Demon-strating data possession and uncheatable data transfer
    • Report 2006/150
    • D. L. G. Filho and P. S. L. M. Baretto, "Demon-strating data possession and uncheatable data transfer, " IACR ePrint archive, 2006, Report 2006/150, http://eprint.iacr.org/2006/150.
    • (2006) IACR EPrint Archive
    • Filho, D.L.G.1    Baretto, P.S.L.M.2
  • 63
    • 84864718332 scopus 로고    scopus 로고
    • On the impossibility of cryptography alone for privacy-preserving cloud computing
    • M. Van Dijk and A. Juels, "On the Impossibility of Cryptography Alone for Privacy-Preserving Cloud Computing, " IACR ePrint 2010, vol. 305.
    • (2010) IACR EPrint , vol.305
    • Van Dijk, M.1    Juels, A.2
  • 64
    • 70350642087 scopus 로고    scopus 로고
    • Fully homomorphic encryption using ideal lattices
    • C. Gentry, "Fully homomorphic encryption using ideal lattices, " In STOC, pages 169-178, 2009.
    • (2009) STOC , pp. 169-178
    • Gentry, C.1
  • 70
    • 79953657305 scopus 로고    scopus 로고
    • Understanding cloud computing vulnerabilities
    • B. Grobauer, T. Walloschek, and E. Stocker, "Understanding cloud computing vulnerabilities, " Security and Privacy, IEEE, vol. 9, no. 2, pp. 50-57, 2011.
    • (2011) Security and Privacy IEEE , vol.9 , Issue.2 , pp. 50-57
    • Grobauer, B.1    Walloschek, T.2    Stocker, E.3
  • 75
    • 35348816106 scopus 로고    scopus 로고
    • New cache designs for thwarting software cache-based side channel attacks
    • June
    • Z. Wang and R. B. Lee, "New cache designs for thwarting software cache-based side channel attacks, " In 34th International Symposium on Computer Architecture, pages 494-505, June 2007.
    • (2007) 34th International Symposium on Computer Architecture , pp. 494-505
    • Wang, Z.1    Lee, R.B.2
  • 85
    • 79960862322 scopus 로고    scopus 로고
    • Secure and practical outsourcing of linear programming in cloud computing
    • April 10-15
    • C. Wang, K. Ren, J. Wang, "Secure and Practical Outsourcing of Linear Programming in Cloud Computing, " In IEEE Trans. Cloud Computing April 10-15, 2011.
    • (2011) IEEE Trans. Cloud Computing
    • Wang, C.1    Ren, K.2    Wang, J.3
  • 90
    • 77954521120 scopus 로고    scopus 로고
    • Securely outsourcing linear algebra computations
    • M. J. Atallah and K. B. Frikken, "Securely outsourcing linear algebra computations, " In ASIACCS, 2010.
    • (2010) ASIACCS
    • Atallah, M.J.1    Frikken, K.B.2
  • 93
    • 0024611659 scopus 로고
    • The knowledge complexity of interactive proof systems
    • S. Goldwasser, S. Micali, and C. Rackoff, "The knowledge complexity of interactive proof systems, " SIAM Journal on Comp., 18(1):186-208, 1989.
    • (1989) SIAM Journal on Comp. , vol.18 , Issue.1 , pp. 186-208
    • Goldwasser, S.1    Micali, S.2    Rackoff, C.3
  • 94
    • 0032058198 scopus 로고    scopus 로고
    • Proof verification and the hardness of approximation problems
    • May
    • S. Arora, C. Lund, R. Motwani, M. Sudan, and M. Szegedy, "Proof verification and the hardness of approximation problems, " J. ACM, 45(3):501-555, May 1998.
    • (1998) J. ACM , vol.45 , Issue.3 , pp. 501-555
    • Arora, S.1    Lund, C.2    Motwani, R.3    Sudan, M.4    Szegedy, M.5
  • 99
    • 84857204654 scopus 로고    scopus 로고
    • Is that you? authentication in a network without identities
    • T. Choi, H.B. Acharya, and M. G. Gouda, "Is that you? Authentication in a network without identities, " International J. Security and Networks, Vol. 6, No. 4, 2011, pp. 181-190.
    • (2011) International J. Security and Networks , vol.6 , Issue.4 , pp. 181-190
    • Choi, T.1    Acharya, H.B.2    Gouda, M.G.3
  • 100
    • 84857202234 scopus 로고    scopus 로고
    • On the (in) security of two joint encryption and error correction schemes
    • Q. Chai and G. Gong, "On the (in) security of two Joint Encryption and Error Correction schemes, " International J. Security and Networks, Vol. 6, No. 4, 2011, pp. 191-200.
    • (2011) International J. Security and Networks , vol.6 , Issue.4 , pp. 191-200
    • Chai, Q.1    Gong, G.2
  • 101
    • 84863170280 scopus 로고    scopus 로고
    • An epidemic model with adaptive virus spread control for wireless sensor networks
    • S. Tang and W. Li, "An epidemic model with adaptive virus spread control for Wireless Sensor Networks, " International J. Security and Networks, Vol. 6, No. 4, 2011, pp. 201-210.
    • (2011) International J. Security and Networks , vol.6 , Issue.4 , pp. 201-210
    • Tang, S.1    Li, W.2
  • 103
    • 84863150088 scopus 로고    scopus 로고
    • Friendship-based location privacy in mobile social networks
    • W. Chang, J. Wu, and C. C. Tan, "Friendship-based location privacy in Mobile Social Networks, " International J. Security and Networks, Vol. 6, No. 4, 2011, pp. 226-236.
    • (2011) International J. Security and Networks , vol.6 , Issue.4 , pp. 226-236
    • Chang, W.1    Wu, J.2    Tan, C.C.3
  • 104
    • 84863152158 scopus 로고    scopus 로고
    • Authenticating strangers in online social networks
    • X. Zhao, L. Li, and G. Xue, "Authenticating strangers in Online Social Networks, " International J. Security and Networks, Vol. 6, No. 4, 2011, pp. 237-248.
    • (2011) International J. Security and Networks , vol.6 , Issue.4 , pp. 237-248
    • Zhao, X.1    Li, L.2    Xue, G.3
  • 105
    • 84857163085 scopus 로고    scopus 로고
    • Partial iris recognition as a viable biometric scheme
    • D. Walker and S. Latifi, "Partial Iris Recognition as a Viable Biometric Scheme, " International J. Security and Networks, Vol. 6 Nos. 2-3, 2011, pp. 147-152.
    • (2011) International J. Security and Networks , vol.6 , Issue.2-3 , pp. 147-152
    • Walker, D.1    Latifi, S.2
  • 106
    • 84857177856 scopus 로고    scopus 로고
    • Edustega: An education-centric steganography methodology
    • A. Desoky, "Edustega: An Education-Centric Steganography Methodology, " International J. Security and Networks, Vol. 6 Nos. 2-3, 2011, pp. 153-173.
    • (2011) International J. Security and Networks , vol.6 , Issue.2-3 , pp. 153-173
    • Desoky, A.1
  • 107
    • 84857176805 scopus 로고    scopus 로고
    • An intrusion detection technique based on continuous binary communication channels
    • N. Ampah, C. Akujuobi, S. Alam, and M. Sadiku, "An intrusion detection technique based on continuous binary communication channels, " International J. Security and Networks, Vol. 6 Nos. 2-3, 2011, pp. 174-180.
    • (2011) International J. Security and Networks , vol.6 , Issue.2-3 , pp. 174-180
    • Ampah, N.1    Akujuobi, C.2    Alam, S.3    Sadiku, M.4
  • 109
    • 84857178198 scopus 로고    scopus 로고
    • ESPAC: Enabling security and patient-centric access control for ehealth in cloud computing
    • M. Barua, X. Liang, R. Lu, X. Shen, "ESPAC: Enabling Security and Patient-centric Access Control for eHealth in cloud computing, " International J. Security and Networks, Vol. 6 Nos. 2/3, 2011, pp. 67-76.
    • (2011) International J. Security and Networks , vol.6 , Issue.2-3 , pp. 67-76
    • Barua, M.1    Liang, X.2    Lu, R.3    Shen, X.4
  • 111
    • 84857155268 scopus 로고    scopus 로고
    • Improved ip multimedia subsystem authentication mechanism for 3g-wlan networks
    • M. J. Sharma and V. C. M. Leung, "Improved IP Multimedia Subsystem Authentication Mechanism for 3G-WLAN Networks, " International J. Security and Networks, Vol. 6 Nos. 2/3, 2011, pp. 90-100.
    • (2011) International J. Security and Networks , vol.6 , Issue.2-3 , pp. 90-100
    • Sharma, M.J.1    Leung, V.C.M.2
  • 112
    • 84857145254 scopus 로고    scopus 로고
    • Rendezvous based trust propagation to enhance distributed network security
    • N. Cheng, K. Govindan, and P. Mohapatra, "Rendezvous Based Trust Propagation to Enhance Distributed Network Security, " International J. Security and Networks, Vol. 6 Nos. 2/3, 2011, pp. 101-111.
    • (2011) International J. Security and Networks , vol.6 , Issue.2-3 , pp. 101-111
    • Cheng, N.1    Govindan, K.2    Mohapatra, P.3
  • 113
    • 84857173760 scopus 로고    scopus 로고
    • A source authentication scheme using network coding
    • A. Fathy, T. ElBatt, and M. Youssef, "A Source Authentication Scheme Using Network Coding, " International J. Security and Networks, Vol. 6 Nos. 2/3, 2011, pp. 112-122.
    • (2011) International J. Security and Networks , vol.6 , Issue.2-3 , pp. 112-122
    • Fathy, A.1    Elbatt, T.2    Youssef, M.3
  • 115
  • 117
    • 77949837905 scopus 로고    scopus 로고
    • A backpressure technique for filtering spoofed traffic at upstream routers
    • S. Malliga and A. Tamilarasi, "A backpressure technique for filtering spoofed traffic at upstream routers, " International J. Security and Networks, Vol. 5, No.1 pp. 3-14, 2010.
    • (2010) International J. Security and Networks , vol.5 , Issue.1 , pp. 3-14
    • Malliga, S.1    Tamilarasi, A.2
  • 118
    • 77949801623 scopus 로고    scopus 로고
    • Authentication and secret search mechanisms for rfid-aware wireless sensor networks
    • S. Huang and S. Shieh, "Authentication and secret search mechanisms for RFID-aware wireless sensor networks, " International J. Security and Networks, Vol. 5, No.1 pp. 15-25, 2010.
    • (2010) International J. Security and Networks , vol.5 , Issue.1 , pp. 15-25
    • Huang, S.1    Shieh, S.2
  • 119
    • 77949844099 scopus 로고    scopus 로고
    • An efficient secure data dissemination scheme for grid structure wireless sensor networks
    • Y. Hsiao and R. Hwang, "An efficient secure data dissemination scheme for grid structure Wireless Sensor Networks, " International J. Security and Networks, Vol. 5, No.1 pp. 26-34, 2010.
    • (2010) International J. Security and Networks , vol.5 , Issue.1 , pp. 26-34
    • Hsiao, Y.1    Hwang, R.2
  • 120
    • 77949835881 scopus 로고    scopus 로고
    • Bloom filter based secure and anonymous dsr protocol in wireless ad hoc networks
    • L. Xu, S. Chen, X. Huang, and Y. Mu, "Bloom filter based secure and anonymous DSR protocol in wireless ad hoc networks, " International J. Security and Networks, Vol. 5, No.1 pp. 35-44, 2010.
    • (2010) International J. Security and Networks , vol.5 , Issue.1 , pp. 35-44
    • Xu, L.1    Chen, S.2    Huang, X.3    Mu, Y.4
  • 121
    • 77949817850 scopus 로고    scopus 로고
    • Mutual anonymity protocol with integrity protection for mobile peer-to-peer networks
    • K. Tsai, C. Hsu, and T. Wu, "Mutual anonymity protocol with integrity protection for mobile peer-to-peer networks, " International J. Security and Networks, Vol. 5, No.1 pp. 45-52, 2010.
    • (2010) International J. Security and Networks , vol.5 , Issue.1 , pp. 45-52
    • Tsai, K.1    Hsu, C.2    Wu, T.3
  • 122
    • 77949864345 scopus 로고    scopus 로고
    • Lightweight authentication protocol for mobile rfid networks
    • M. Yang, "Lightweight authentication protocol for mobile RFID networks, " International J. Security and Networks, Vol. 5, No.1 pp. 53-62, 2010.
    • (2010) International J. Security and Networks , vol.5 , Issue.1 , pp. 53-62
    • Yang, M.1
  • 123
    • 77949830969 scopus 로고    scopus 로고
    • A cross-layer authentication design for secure video transportation in wireless sensor network
    • J. Wang and G.L. Smith, "A cross-layer authentication design for secure video transportation in wireless sensor network, " International J. Security and Networks, Vol. 5, No.1 pp. 63-76, 2010.
    • (2010) International J. Security and Networks , vol.5 , Issue.1 , pp. 63-76
    • Wang, J.1    Smith, G.L.2
  • 125
    • 70350060199 scopus 로고    scopus 로고
    • Flow-net methodology for accountability in wireless networks
    • Sept/Oct
    • Y. Xiao, "Flow-Net Methodology for Accountability in Wireless Networks, " IEEE Network, Vol. 23, No. 5, Sept./Oct. 2009, pp. 30-37.
    • (2009) IEEE Network , vol.23 , Issue.5 , pp. 30-37
    • Xiao, Y.1
  • 126
    • 84855641355 scopus 로고    scopus 로고
    • Temporal accountability and anonymity in medical sensor networks
    • Dec
    • J. Liu, and Y. Xiao, "Temporal Accountability and Anonymity in Medical Sensor Networks, " ACM/Springer Mobile Networks and Applications (MONET), Vol. 16, No. 6, pp. 695-712, Dec. 2011.
    • (2011) ACM/Springer Mobile Networks and Applications (MONET) , vol.16 , Issue.6 , pp. 695-712
    • Liu, J.1    Xiao, Y.2
  • 127
    • 84255195594 scopus 로고    scopus 로고
    • Accountability using flow-net: Design, implementation, and performance evaluation
    • Jan.
    • Y. Xiao, K. Meng, and D. Takahashi, "Accountability using Flow-net: Design, Implementation, and Performance Evaluation, " (Wiley Journal of) Security and Communication Networks, Vol.5, No. 1, pp. 29-49, Jan. 2012.
    • (2012) (Wiley Journal Of) Security and Communication Networks , vol.5 , Issue.1 , pp. 29-49
    • Xiao, Y.1    Meng, K.2    Takahashi, D.3
  • 128
    • 84911896278 scopus 로고    scopus 로고
    • GlobalView: Building global view with log files in a distributed/ networked system for accountability
    • DOI: 10.1002/sec.374
    • Y. Xiao, S. Yue, B. Fu, and S. Ozdemir, "GlobalView: Building Global View with Log Files in a Distributed/Networked System for Accountability, " (Wiley Journal of) Security and Communication Networks, DOI: 10.1002/sec.374.
    • (Wiley Journal Of) Security and Communication Networks
    • Xiao, Y.1    Yue, S.2    Fu, B.3    Ozdemir, S.4
  • 130
    • 84865251659 scopus 로고    scopus 로고
    • PeerReview re-evaluation for accountability in distributed systems or networks
    • in press
    • Z. Xiao and Y. Xiao, "PeerReview Re-evaluation for Accountability in Distributed Systems or Networks, " International J. Security and Networks (IJSN), 2010, Vo. 7. No. 1, in press.
    • (2010) International J. Security and Networks (IJSN) , Issue.1 , pp. 7
    • Xiao, Z.1    Xiao, Y.2
  • 132
    • 84893572193 scopus 로고    scopus 로고
    • Cyber security and privacy issues in smart grids
    • DOI: 10.1109/SURV.2011.122111.00145, in press
    • J. Liu, Y. Xiao, S. Li, W. Liang, C. L. P. Chen, "Cyber Security and Privacy Issues in Smart Grids, " IEEE Commun. Surveys Tuts., DOI: 10.1109/SURV.2011.122111.00145, in press.
    • IEEE Commun. Surveys Tuts
    • Liu, J.1    Xiao, Y.2    Li, S.3    Liang, W.4    Chen, C.L.P.5
  • 133
    • 33646943487 scopus 로고    scopus 로고
    • Security and privacy in rfid and applications in telemedicine
    • Apr
    • Y. Xiao, X. Shen, B. Sun, and L. Cai, "Security and Privacy in RFID and Applications in Telemedicine, " IEEE Commun. Mag., Vol. 44. No. 4, Apr. 2006, pp. 64-72.
    • (2006) IEEE Commun. Mag. , vol.44 , Issue.4 , pp. 64-72
    • Xiao, Y.1    Shen, X.2    Sun, B.3    Cai, L.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.