메뉴 건너뛰기




Volumn 63, Issue 2, 2013, Pages 561-592

A survey on security issues and solutions at different layers of Cloud computing

Author keywords

Cloud computing; Privacy; Security; Virtualization; Vulnerabilities

Indexed keywords

CLOUD ENVIRONMENTS; DIFFERENT LAYERS; INFRASTRUCTURE INVESTMENT; ON-DEMAND SERVICES; SECURITY; SECURITY AND PRIVACY; VIRTUALIZATIONS; VULNERABILITIES;

EID: 84886723209     PISSN: 09208542     EISSN: 15730484     Source Type: Journal    
DOI: 10.1007/s11227-012-0831-5     Document Type: Article
Times cited : (327)

References (72)
  • 2
    • 84886729827 scopus 로고    scopus 로고
    • Aws management console. Amazon web services
    • Aws management console. Amazon web services. http://aws.amazon.com/ console/
  • 7
    • 77955905901 scopus 로고    scopus 로고
    • Security and cloud computing: Intercloud identity management infrastructure
    • Celesti A, Tusa F, Villari M, Puliafito A (2010) Security and cloud computing: intercloud identity management infrastructure. In: WETICE, pp 263-265
    • (2010) WETICE , pp. 263-265
    • Celesti, A.1    Tusa, F.2    Villari, M.3    Puliafito, A.4
  • 8
    • 80054985773 scopus 로고    scopus 로고
    • State of security readiness
    • Chandramouli R, Mell P (2010) State of security readiness. Crossroads 16(3):23-25
    • (2010) Crossroads , vol.16 , Issue.3 , pp. 23-25
    • Chandramouli, R.1    Mell, P.2
  • 9
    • 84871166107 scopus 로고    scopus 로고
    • Web hosting unleashed
    • Cloud computing comparison guide. Web hosting unleashed. http://www.webhostingunleashed.com/whitepaper/cloud-computing-comparison/
    • Cloud Computing Comparison Guide
  • 10
    • 84886727566 scopus 로고    scopus 로고
    • Focus research
    • Comparison guide: Cloud computing. Focus research. http://www.focus.com/ research/comparison-guide-cloud-computing/
    • Comparison Guide: Cloud Computing
  • 11
    • 84886726217 scopus 로고    scopus 로고
    • Compliance home. Website
    • Compliance home. Website (2011) http://www.compliancehome.com/
    • (2011)
  • 14
    • 77951857765 scopus 로고    scopus 로고
    • Why cloud computing will never be free
    • 10.1145/1735223.1735242
    • Durkee D (2010) Why cloud computing will never be free. Commun ACM 53(5):62-69
    • (2010) Commun ACM , vol.53 , Issue.5 , pp. 62-69
    • Durkee, D.1
  • 15
    • 78649863750 scopus 로고    scopus 로고
    • Permission management system: Permission as a service in cloud computing
    • Echeverría V, Liebrock LM, Shin D (2010) Permission management system: permission as a service in cloud computing. In: COMPSAC workshops, pp 371-375
    • (2010) COMPSAC Workshops , pp. 371-375
    • Echeverría, V.1    Liebrock, L.M.2    Shin, D.3
  • 39
    • 80053009214 scopus 로고    scopus 로고
    • Enhancing data privacy and integrity in the cloud
    • Naruchitparames J, Günes MH (2011) Enhancing data privacy and integrity in the cloud. In: HPCS, pp 427-434
    • (2011) HPCS , pp. 427-434
    • Naruchitparames, J.1    Günes, M.H.2
  • 40
    • 84886729432 scopus 로고    scopus 로고
    • National vulnerability database version 2.2. NIST
    • National vulnerability database version 2.2. NIST. http://web.nvd.nist. gov/view/vuln/search-results?query=virtual&search%-type=all&cves=on
  • 42
    • 84862666499 scopus 로고    scopus 로고
    • Ponemon
    • Ponemon (2011) Security of cloud computing providers study. http://www.ca.com/~/media/Files/IndustryResearch/security-of-cloud-computing- providers-final-april-2011.pdf
    • (2011) Security of Cloud Computing Providers Study
  • 46
    • 55549097262 scopus 로고    scopus 로고
    • Subverting vistatm kernel for fun and profit
    • Rutkowska J (2006) Subverting vistatm kernel for fun and profit. In: BlackHat conference
    • (2006) BlackHat Conference
    • Rutkowska, J.1
  • 49
    • 84870354202 scopus 로고    scopus 로고
    • Economic denial of sustainability (edos) in cloud services using http and xml based ddos attacks
    • Sandar SV, Shenai S (2012) Economic denial of sustainability (edos) in cloud services using http and xml based ddos attacks. Int J Comput Appl 41(20):11-16
    • (2012) Int J Comput Appl , vol.41 , Issue.20 , pp. 11-16
    • Sandar, S.V.1    Shenai, S.2
  • 52
    • 84886725748 scopus 로고    scopus 로고
    • Security threats. Microsoft
    • Security threats. Microsoft. http://technet.microsoft.com/en-us/library/ cc723507.aspx
  • 54
    • 84886729524 scopus 로고    scopus 로고
    • Software as a service-Wikipedia. Wikipedia
    • Software as a service-Wikipedia. Wikipedia. http://en.wikipedia.org/wiki/ Software-as-a-service
  • 59
    • 78649322624 scopus 로고    scopus 로고
    • A survey on security issues in service delivery models of cloud computing
    • 10.1016/j.jnca.2010.07.006
    • Subashini S, Kavitha V (2011) A survey on security issues in service delivery models of cloud computing. J Netw Comput Appl 34:1-11
    • (2011) J Netw Comput Appl , vol.34 , pp. 1-11
    • Subashini, S.1    Kavitha, V.2
  • 60
    • 74349107924 scopus 로고    scopus 로고
    • Dsp reencryption: A flexible mechanism for access control enforcement management in daas
    • Tian X, Wang X, Zhou A (2009) Dsp reencryption: a flexible mechanism for access control enforcement management in daas. In: Proc CLOUD'09, SACMAT'10, pp 25-32
    • (2009) Proc CLOUD'09, SACMAT'10 , pp. 25-32
    • Tian, X.1    Wang, X.2    Zhou, A.3
  • 61
    • 84886726557 scopus 로고    scopus 로고
    • Top 7 threats to cloud computing. HELP NET SECURITY
    • Top 7 threats to cloud computing. HELP NET SECURITY. http://www.net- security.org/secworld.php?id=8943
  • 63
    • 84886726705 scopus 로고    scopus 로고
    • Vulnerability in windows server 2008 hyper-v could allow denial of service (977894)
    • Vulnerability in windows server 2008 hyper-v could allow denial of service (977894). Microsoft security bulletin MS10-010 - Important (2010) http://www.microsoft.com/technet/security/bulletin/ms11-047.mspx
    • (2010) Microsoft Security Bulletin MS10-010 - Important
  • 65
    • 70449569012 scopus 로고    scopus 로고
    • Low: Ensuring data storage security in cloud computing
    • Wang Q, Wang K, Ren W (2009) Low: ensuring data storage security in cloud computing. In: Proc of IWQoS 2009
    • (2009) Proc of IWQoS 2009
    • Wang, Q.1    Wang, K.2    Ren, W.3
  • 67
    • 84866761388 scopus 로고    scopus 로고
    • Oruta: Privacy-preserving public auditing for shared data in the cloud
    • Wang B, Li B, Li H (2012) Oruta: Privacy-preserving public auditing for shared data in the cloud. In: IEEE CLOUD
    • (2012) IEEE CLOUD
    • Wang, B.1    Li, B.2    Li, H.3
  • 69
    • 84877950132 scopus 로고    scopus 로고
    • InfoWorld
    • What cloud computing really means. InfoWorld. http://www.infoworld.com/d/ cloud-computing/what-cloud-computing-really-means-031?page=0,0
    • What Cloud Computing Really Means
  • 70
    • 84886721286 scopus 로고    scopus 로고
    • Xarp 2.2.2. filecluster
    • Xarp 2.2.2. filecluster. http://www.filecluster.com/Network-Tools/ Network-Monitoring/Download-XArp.html
  • 71
    • 71749086537 scopus 로고    scopus 로고
    • Strengthen cloud computing security with federal identity management using hierarchical identity-based cryptography
    • CloudCom'09
    • Yan L, Rong C, Zhao G (2009) Strengthen cloud computing security with federal identity management using hierarchical identity-based cryptography. In: Proceedings of the 1st international conference on cloud computing, CloudCom'09, pp 167-177
    • (2009) Proceedings of the 1st International Conference on Cloud Computing , pp. 167-177
    • Yan, L.1    Rong, C.2    Zhao, G.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.