메뉴 건너뛰기




Volumn 4, Issue 1, 2013, Pages 1-13

An analysis of security issues for cloud computing

Author keywords

Cloud computing; Countermeasures; Security; SPI model; Threats; Vulnerabilities

Indexed keywords

CLOUD COMPUTING; COST EFFECTIVENESS; RADAR COUNTERMEASURES;

EID: 84887724123     PISSN: 18674828     EISSN: 18690238     Source Type: Journal    
DOI: 10.1186/1869-0238-4-5     Document Type: Article
Times cited : (567)

References (79)
  • 6
    • 78249290665 scopus 로고    scopus 로고
    • Centre for the Protection of National Infrastructure, Available
    • Centre for the Protection of National Infrastructure (2010) Information Security Briefing 01/2010 Cloud Computing. Available: http://www.cpni.gov.uk/Documents/Publications/2010/2010007-ISB_cloud_computing.pdf
    • (2010) Information Security Briefing 01/2010 Cloud Computing
  • 11
    • 71749098580 scopus 로고    scopus 로고
    • Trust model to enhance Security and interoperability of Cloud environment
    • Springer Berlin Heidelberg, Beijing, China
    • Li W, Ping L (2009) Trust model to enhance Security and interoperability of Cloud environment. In: Proceedings of the 1st International conference on Cloud Computing. Springer Berlin Heidelberg, Beijing, China, pp 69-79
    • (2009) Proceedings of the 1st International Conference On Cloud Computing , pp. 69-79
    • Li, W.1    Ping, L.2
  • 13
    • 27644567603 scopus 로고    scopus 로고
    • Department of Computer Scinece Keele University, United Kingdom and Empirical Software Engineering, National ICT Australia Ltd, Australia. TR/SE-0401
    • Kitchenham B (2004) Procedures for perfoming systematic review, software engineering group. Department of Computer Scinece Keele University, United Kingdom and Empirical Software Engineering, National ICT Australia Ltd, Australia. TR/SE-0401
    • (2004) Procedures For Perfoming Systematic Review, Software Engineering Group
    • Kitchenham, B.1
  • 14
    • 44649122227 scopus 로고    scopus 로고
    • Version 2.3 University of keele (software engineering group, school of computer science and mathematics) and Durham. Department of Conputer Science, UK
    • Kitchenham B, Charters S (2007) Guidelines for performing systematic literature reviews in software engineering. Version 2.3 University of keele (software engineering group, school of computer science and mathematics) and Durham. Department of Conputer Science, UK
    • (2007) Guidelines For Performing Systematic Literature Reviews In Software Engineering
    • Kitchenham, B.1    Charters, S.2
  • 15
    • 33847286844 scopus 로고    scopus 로고
    • Lessons from applying the systematic literature review process within the software engineering domain
    • Brereton P, Kitchenham BA, Budgen D, Turner M, Khalil M (2007) Lessons from applying the systematic literature review process within the software engineering domain. J Syst Softw 80(4):571-583
    • (2007) J Syst Softw , vol.80 , Issue.4 , pp. 571-583
    • Brereton, P.1    Kitchenham, B.A.2    Budgen, D.3    Turner, M.4    Khalil, M.5
  • 16
    • 79952065844 scopus 로고    scopus 로고
    • Cloud Security Alliance, Available
    • Cloud Security Alliance (2010) Top Threats to Cloud Computing V1.0. Available: https://cloudsecurityalliance.org/research/top-threats
    • (2010) Top Threats to Cloud Computing V1.0
  • 21
    • 78649322624 scopus 로고    scopus 로고
    • A survey on Security issues in service delivery models of Cloud Computing
    • Subashini S, Kavitha V (2011) A survey on Security issues in service delivery models of Cloud Computing. J Netw Comput Appl 34(1):1-11
    • (2011) J Netw Comput Appl , vol.34 , Issue.1 , pp. 1-11
    • Subashini, S.1    Kavitha, V.2
  • 23
    • 84870184014 scopus 로고    scopus 로고
    • Security issues to Cloud Computing
    • In: Antonopoulos N, Gillam L (ed), 2010, Springer-Verlag
    • Onwubiko C (2010) Security issues to Cloud Computing. In: Antonopoulos N, Gillam L (ed) Cloud Computing: principles, systems & applications. 2010, Springer-Verlag
    • (2010) Cloud Computing: Principles, Systems & Applications
    • Onwubiko, C.1
  • 24
    • 84937420058 scopus 로고    scopus 로고
    • An analysis of the Cloud Computing Security problem
    • Cloud Workshop. APSEC, Sydney, Australia
    • Morsy MA, Grundy J, Müller I (2010) An analysis of the Cloud Computing Security problem. In: Proceedings of APSEC 2010 Cloud Workshop. APSEC, Sydney, Australia
    • (2010) Proceedings of APSEC , pp. 2010
    • Morsy, M.A.1    Grundy, J.2    Müller, I.3
  • 25
    • 79952952264 scopus 로고    scopus 로고
    • Cloud Hooks: Security and Privacy Issues in Cloud Computing
    • Koloa, Kauai, HI. IEEE Computer Society, Washington, DC, USA
    • Jansen WA (2011) Cloud Hooks: Security and Privacy Issues in Cloud Computing. In: Proceedings of the 44th Hawaii International Conference on System Sciences, Koloa, Kauai, HI. IEEE Computer Society, Washington, DC, USA, pp 1-10
    • (2011) Proceedings of the 44th Hawaii International Conference On System Sciences , pp. 1-10
    • Jansen, W.A.1
  • 26
    • 79959557055 scopus 로고    scopus 로고
    • Addressing Cloud Computing Security issues
    • Zissis D, Lekkas D (2012) Addressing Cloud Computing Security issues. Futur Gener Comput Syst 28(3):583-592
    • (2012) Futur Gener Comput Syst , vol.28 , Issue.3 , pp. 583-592
    • Zissis, D.1    Lekkas, D.2
  • 31
    • 77953221164 scopus 로고    scopus 로고
    • Securing elasticity in the Cloud
    • Owens D (2010) Securing elasticity in the Cloud. Commun ACM 53(6):46-51
    • (2010) Commun ACM , vol.53 , Issue.6 , pp. 46-51
    • Owens, D.1
  • 33
    • 77949587716 scopus 로고    scopus 로고
    • Towards high level SaaS maturity model: Methods and case study
    • APSCC, IEEE Asia-Pacific
    • Zhang Y, Liu S, Meng X (2009) Towards high level SaaS maturity model: methods and case study. In: Services Computing conference. APSCC, IEEE Asia-Pacific, pp 273-278
    • (2009) Services Computing Conference , pp. 273-278
    • Zhang, Y.1    Liu, S.2    Meng, X.3
  • 36
    • 69349098776 scopus 로고    scopus 로고
    • Cloud Computing and the common Man
    • Viega J (2009) Cloud Computing and the common Man. Computer 42 (8):106-108
    • (2009) Computer , vol.42 , Issue.8 , pp. 106-108
    • Viega, J.1
  • 37
    • 84897395854 scopus 로고    scopus 로고
    • Cloud Security Alliance, Available
    • Cloud Security Alliance (2012) Security guidance for critical areas of Mobile Computing. Available: https://downloads.cloudsecurityalliance.org/initiatives/mobile/Mobile_Guidance_v1.pdf
    • (2012) Security Guidance For Critical Areas of Mobile Computing
  • 38
    • 84897456946 scopus 로고    scopus 로고
    • Online. Available, Accessed: 16-Jul-2011
    • Keene C (2009) The Keene View on Cloud Computing. Online. Available: http://www.keeneview.com/2009/03/what-is-platform-as-service-paas.html. Accessed: 16-Jul-2011
    • (2009) The Keene View On Cloud Computing
    • Keene, C.1
  • 40
    • 80054985773 scopus 로고    scopus 로고
    • State of Security readiness
    • Chandramouli R, Mell P (2010) State of Security readiness. Crossroads 16 (3):23-25
    • (2010) Crossroads , vol.16 , Issue.3 , pp. 23-25
    • Chandramouli, R.1    Mell, P.2
  • 41
    • 77249130262 scopus 로고    scopus 로고
    • Outlook: Cloudy with a chance of Security challenges and improvements
    • Jaeger T, Schiffman J (2010) Outlook: cloudy with a chance of Security challenges and improvements. IEEE Security Privacy 8(1):77-80
    • (2010) IEEE Security Privacy , vol.8 , Issue.1 , pp. 77-80
    • Jaeger, T.1    Schiffman, J.2
  • 44
    • 84944386303 scopus 로고    scopus 로고
    • When virtual is harder than real: Security challenges in virtual machine based computing environments
    • USENIX Association Berkeley, CA, USA
    • Garfinkel T, Rosenblum M (2005) When virtual is harder than real: Security challenges in virtual machine based computing environments. In: Proceedings of the 10th conference on Hot Topics in Operating Systems, Santa Fe, NM. volume 10. USENIX Association Berkeley, CA, USA, pp 227-229
    • (2005) Proceedings of the 10th Conference On Hot Topics In Operating Systems, Santa Fe, NM , vol.10 , pp. 227-229
    • Garfinkel, T.1    Rosenblum, M.2
  • 45
    • 78249258944 scopus 로고    scopus 로고
    • Seminar on Network Security, Technical report, Helsinki University of Technology, October 2007
    • Reuben JS (2007) A survey on virtual machine Security. Seminar on Network Security. http://www.tml.tkk.fi/Publications/C/25/papers/Reuben_final.pdf. Technical report, Helsinki University of Technology, October 2007
    • (2007) A Survey On Virtual Machine Security
    • Reuben, J.S.1
  • 47
    • 84944043395 scopus 로고    scopus 로고
    • Technical report, Dept. of Computer Science, University of California, Santa Barbara
    • Venkatesha S, Sadhu S, Kintali S (2009) Survey of virtual machine migration techniques., Technical report, Dept. of Computer Science, University of California, Santa Barbara. http://www.academia.edu/760613/Survey_of_Virtual_Machine_Migration_Techniques
    • (2009) Survey of Virtual Machine Migration Techniques
    • Venkatesha, S.1    Sadhu, S.2    Kintali, S.3
  • 50
    • 79960882999 scopus 로고    scopus 로고
    • Securing virtual compute infrastructure in the Cloud
    • Available
    • Owens K., Securing virtual compute infrastructure in the Cloud. SAVVIS. Available: http://www.savvis.com/en-us/info_center/documents/hos-whitepaper-securingvirutalcomputeinfrastructureinthecloud.pdf
    • SAVVIS
    • Owens, K.1
  • 53
    • 77956353411 scopus 로고    scopus 로고
    • Cloud Computing Security issues and challenges
    • IEEE Computer Society Washington DC, USA
    • Popovic K, Hocenski Z (2010) Cloud Computing Security issues and challenges. In: Proceedings of the 33rd International convention MIPRO. IEEE Computer Society Washington DC, USA, pp 344-349
    • (2010) Proceedings of the 33rd International Convention MIPRO , pp. 344-349
    • Popovic, K.1    Hocenski, Z.2
  • 69
    • 78650053109 scopus 로고    scopus 로고
    • Side channels in Cloud services: Deduplication in Cloud Storage
    • Harnik D, Pinkas B, Shulman-Peleg A (2010) Side channels in Cloud services: deduplication in Cloud Storage. IEEE Security Privacy 8(6):40-47
    • (2010) IEEE Security Privacy , vol.8 , Issue.6 , pp. 40-47
    • Harnik, D.1    Pinkas, B.2    Shulman-Peleg, A.3
  • 72
    • 78651061305 scopus 로고    scopus 로고
    • The Register, 08-Jun-2009. [Online]. Available, Accessed: 02-Aug-2011
    • Goodin D (2009) Webhost hack wipes out data for 100,000 sites. The Register, 08-Jun-2009. [Online]. Available: http://www.theregister.co.uk/2009/06/08/webhost_attack/. Accessed: 02-Aug-2011
    • (2009) Webhost Hack Wipes Out Data For 100,000 Sites
    • Goodin, D.1
  • 75
    • 77955866244 scopus 로고    scopus 로고
    • An empirical study into the Security exposure to hosts of hostile virtualized environments
    • Vancouver
    • Ormandy T (2007) An empirical study into the Security exposure to hosts of hostile virtualized environments. In: CanSecWest applied Security conference., Vancouver. http://taviso.decsystem.org/virtsec.pdf
    • (2007) CanSecWest Applied Security Conference
    • Ormandy, T.1
  • 76
    • 70849107663 scopus 로고    scopus 로고
    • Empirical exploitation of Live virtual machine migration
    • Washington, DC
    • Oberheide J, Cooke E, Jahanian F (2008) Empirical exploitation of Live virtual machine migration. In: Proceedings of Black Hat Security Conference, Washington, DC. http://www.eecs.umich.edu/fjgroup/pubs/blackhat08-migration.pdf
    • (2008) Proceedings of Black Hat Security Conference
    • Oberheide, J.1    Cooke, E.2    Jahanian, F.3
  • 78
    • 78649567184 scopus 로고    scopus 로고
    • An improved trusted cloud computing platform model based on DAA and privacy CA scheme
    • IEEE Computer, Society, Washington, DC, USA
    • Han-zhang W, Liu-sheng H (2010) An improved trusted cloud computing platform model based on DAA and privacy CA scheme. In: International Conference on Computer Application and System Modeling (ICCASM), vol. 13, V13-39. IEEE Computer, Society, Washington, DC, USA, pp V13-33
    • (2010) International Conference On Computer Application and System Modeling (ICCASM) , vol.13 , pp. 13-39
    • Han-Zhang, W.1    Liu-sheng, H.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.