메뉴 건너뛰기




Volumn 13, Issue 2, 2014, Pages 113-170

Security issues in cloud environments: A survey

Author keywords

Cloud computing; Clouds; Issues; Security; Survey

Indexed keywords

CLOUD COMPUTING; CLOUDS; INTERNET; SURVEYING;

EID: 84897106892     PISSN: 16155262     EISSN: 16155270     Source Type: Journal    
DOI: 10.1007/s10207-013-0208-7     Document Type: Article
Times cited : (388)

References (313)
  • 1
    • 84897073739 scopus 로고    scopus 로고
    • 57un Blog: A BIG Password Cracking Wordlist, Accessed May 2013
    • 57un Blog: A BIG Password Cracking Wordlist. https://57un. wordpress. com/2013/03/09/a-big-password-cracking-wordlist/. Accessed May 2013 (2013).
    • (2013)
  • 3
    • 84880085599 scopus 로고    scopus 로고
    • A survey of the state of cloud security
    • doi:10.5539/nct.v1n2p66
    • Ahuja, S. P., Komathukattil, D.: A survey of the state of cloud security. Netw. Commun. Technol. 1(2), 66-75 (2012). doi: 10. 5539/nct. v1n2p66.
    • (2012) Netw. Commun. Technol. , vol.1 , Issue.2 , pp. 66-75
    • Ahuja, S.P.1    Komathukattil, D.2
  • 4
    • 84867270431 scopus 로고    scopus 로고
    • Latencies of service invocation and processing of the REST and SOAP web service interfaces
    • Honolulu, HI, USA (2012). doi: 10. 1109/SERVICES. 2012. 55
    • Aihkisalo, T., Paaso, T.: Latencies of service invocation and processing of the REST and SOAP web service interfaces. In: IEEE 8th World Congress on Services (SERVICES), pp. 100-107. Honolulu, HI, USA (2012). doi: 10. 1109/SERVICES. 2012. 55.
    • IEEE 8th World Congress on Services (SERVICES) , pp. 100-107
    • Aihkisalo, T.1    Paaso, T.2
  • 6
    • 84897101048 scopus 로고    scopus 로고
    • Alert Logic: State of Cloud Security Report: Targeted Attacks and Opportunistic Hacks, Accessed Apr. 2013
    • Alert Logic: State of Cloud Security Report: Targeted Attacks and Opportunistic Hacks. http://www. alertlogic. com/resources/security-intelligence-newsletter/download-cloud-security-report-spring2013/ (2013). Accessed Apr. 2013.
    • (2013)
  • 8
    • 84897032433 scopus 로고    scopus 로고
    • AlienVault: OSSIM Website, Accessed May 2013
    • AlienVault: OSSIM Website. https://aws. amazon. com/marketplace/pp/B00BIUQRGC/ (2013). Accessed May 2013.
    • (2013)
  • 9
    • 84897037560 scopus 로고    scopus 로고
    • Amazon: Amazon Web Services: Overview of Security Processes, White Paper. Accessed Sept. 2012
    • Amazon: Amazon Web Services: Overview of Security Processes. http://s3. amazonaws. com/aws_blog/AWS_Security_Whitepaper_2008_09. pdf (2011). White Paper. Accessed Sept. 2012.
    • (2011)
  • 10
    • 84897085551 scopus 로고    scopus 로고
    • Amazon: Amazon Elastic Compute Cloud (Amazon EC2), Accessed Apr. 2013
    • Amazon: Amazon Elastic Compute Cloud (Amazon EC2). https://aws. amazon. com/ec2/ (2012). Accessed Apr. 2013.
    • (2012)
  • 11
    • 84897079711 scopus 로고    scopus 로고
    • Amazon: Amazon Virtual Private Cloud (Amazon VPC), Accessed Sept. 2012
    • Amazon: Amazon Virtual Private Cloud (Amazon VPC). http://aws. amazon. com/vpc/ (2012). Accessed Sept. 2012.
    • (2012)
  • 12
    • 84897039190 scopus 로고    scopus 로고
    • Amazon Web Services Discussion Forums: Low Entropy on EC2 Instances- Problem for Anything Related to Security,. Accessed Apr. 2013
    • Amazon Web Services Discussion Forums: Low Entropy on EC2 Instances- Problem for Anything Related to Security. https://forums. aws. amazon. com/thread. jspa?messageID=249079 (2011). Accessed Apr. 2013.
    • (2011)
  • 13
    • 84873358477 scopus 로고    scopus 로고
    • From the enterprise perimeter to a mobility-enabled secure cloud
    • doi:10.1109/MSP.2013.8
    • Amoroso, E.: From the enterprise perimeter to a mobility-enabled secure cloud. IEEE Secur. Priv. 11(1), 23-31 (2013). doi: 10. 1109/MSP. 2013. 8.
    • (2013) IEEE Secur. Priv. , vol.11 , Issue.1 , pp. 23-31
    • Amoroso, E.1
  • 14
    • 84897075466 scopus 로고    scopus 로고
    • Accessed Apr. 2013
    • Anstee, D.: Q1 Key Findings from ATLAS. http://www. arbornetworks. com/corporate/blog/4855-q1-key-findings-from-atlas (2013). Accessed Apr. 2013.
    • (2013) Q1 Key Findings from ATLAS
    • Anstee, D.1
  • 15
    • 84897030126 scopus 로고    scopus 로고
    • Apache: CloudStack Website, Accessed May 2013
    • Apache: CloudStack Website. https://cloudstack. apache. org/ (2013). Accessed May 2013.
    • (2013)
  • 16
    • 84897064785 scopus 로고    scopus 로고
    • Apprenda: Apprenda Website, Accessed Apr. 2013
    • Apprenda: Apprenda Website. http://apprenda. com (2013). Accessed Apr. 2013.
    • (2013)
  • 21
    • 84866674580 scopus 로고    scopus 로고
    • Virtual machine monitor-based lightweight intrusion detection
    • doi:10.1145/2007183.2007189
    • Azmandian, F., Moffie, M., Alshawabkeh, M., Dy, J., Aslam, J., Kaeli, D.: Virtual machine monitor-based lightweight intrusion detection. SIGOPS Oper. Syst. Rev. 45(2), 38-53 (2011). doi: 10. 1145/2007183. 2007189.
    • (2011) SIGOPS Oper. Syst. Rev. , vol.45 , Issue.2 , pp. 38-53
    • Azmandian, F.1    Moffie, M.2    Alshawabkeh, M.3    Dy, J.4    Aslam, J.5    Kaeli, D.6
  • 22
    • 33745413400 scopus 로고    scopus 로고
    • The KaffeOS Java runtime system
    • doi:10.1145/1075382.1075383
    • Back, G., Hsieh, W. C.: The KaffeOS Java runtime system. ACM Trans. Program. Lang. Syst. 27(4), 583-630 (2005). doi: 10. 1145/1075382. 1075383.
    • (2005) ACM Trans. Program. Lang. Syst. , vol.27 , Issue.4 , pp. 583-630
    • Back, G.1    Hsieh, W.C.2
  • 23
    • 35348848696 scopus 로고    scopus 로고
    • Wherefore art thou R3579X?: anonymized social networks, hidden patterns, and structural steganography
    • ACM, New York, NY, USA, doi: 10. 1145/1242572. 1242598
    • Backstrom, L., Dwork, C., Kleinberg, J.: Wherefore art thou R3579X?: anonymized social networks, hidden patterns, and structural steganography. In: Proceedings of the 16th International Conference on World Wide Web, pp. 181-190. ACM, New York, NY, USA (2007). doi: 10. 1145/1242572. 1242598.
    • (2007) Proceedings of the 16th International Conference on World Wide Web , pp. 181-190
    • Backstrom, L.1    Dwork, C.2    Kleinberg, J.3
  • 24
  • 26
    • 78650746425 scopus 로고    scopus 로고
    • Virtualizing networking and security in the cloud
    • doi:10.1145/1899928.1899939
    • Basak, D., Toshniwal, R., Maskalik, S., Sequeira, A.: Virtualizing networking and security in the cloud. SIGOPS Oper. Syst. Rev. 44(4), 86-94 (2010). doi: 10. 1145/1899928. 1899939.
    • (2010) SIGOPS Oper. Syst. Rev. , vol.44 , Issue.4 , pp. 86-94
    • Basak, D.1    Toshniwal, R.2    Maskalik, S.3    Sequeira, A.4
  • 28
    • 84857170570 scopus 로고    scopus 로고
    • Emerging security challenges in cloud computing: an insight to cloud security challenges and their mitigation
    • IEEE, doi: 10. 1109/WICT. 2011. 6141247
    • Behl, A.: Emerging security challenges in cloud computing: an insight to cloud security challenges and their mitigation. In: World Congress on Information and Communication Technologies, pp. 217-222. IEEE (2011). doi: 10. 1109/WICT. 2011. 6141247.
    • (2011) World Congress on Information and Communication Technologies , pp. 217-222
    • Behl, A.1
  • 29
    • 84867370517 scopus 로고    scopus 로고
    • Security paradigms for cloud computing
    • Communication Systems and Networks, IEEE, doi: 10. 1109/CICSyN. 2012. 45
    • Behl, A., Behl, K.: Security paradigms for cloud computing. In: 4th International Conference on Computational Intelligence, Communication Systems and Networks, pp. 200-205. IEEE (2012). doi: 10. 1109/CICSyN. 2012. 45.
    • (2012) 4th International Conference on Computational Intelligence , pp. 200-205
    • Behl, A.1    Behl, K.2
  • 30
    • 84864910559 scopus 로고    scopus 로고
    • SOAP-based vs. RESTful web services: a case study for multimedia
    • doi:10.1109/MIC.2012.62
    • Belqasmi, F., Singh, J., Glitho, R.: SOAP-based vs. RESTful web services: a case study for multimedia. IEEE Internet Comput. 16(4), 54-63 (2012). doi: 10. 1109/MIC. 2012. 62.
    • (2012) IEEE Internet Comput. , vol.16 , Issue.4 , pp. 54-63
    • Belqasmi, F.1    Singh, J.2    Glitho, R.3
  • 36
    • 84897090994 scopus 로고    scopus 로고
    • Box: Box Website, Accessed Apr. 2013
    • Box: Box Website. https://www. box. com/ (2013). Accessed Apr. 2013.
    • (2013)
  • 37
    • 85058721464 scopus 로고    scopus 로고
    • Shadows in the cloud: Chinese involvement in advanced persistent threats
    • doi:10.1016/S1353-4858(10)70058-1
    • Bradbury, D.: Shadows in the cloud: Chinese involvement in advanced persistent threats. Netw. Secur. 2010(5), 16-19 (2010). doi: 10. 1016/S1353-4858(10)70058-1.
    • (2010) Netw. Secur. , vol.2010 , Issue.5 , pp. 16-19
    • Bradbury, D.1
  • 38
    • 84897086714 scopus 로고    scopus 로고
    • Pentagon Creating "Rules of Engagement" for Responding to Advanced Attackers
    • Brito, H.: Pentagon Creating "Rules of Engagement" for Responding to Advanced Attackers. Mandiant M-Unition (2013).
    • (2013) Mandiant M-Unition
    • Brito, H.1
  • 40
    • 84897041890 scopus 로고    scopus 로고
    • Accessed May 2013
    • Carriço, P.: Low entropy on VMs. http://blog. pedrocarrico. net/post/17026199379/low-entropy-on-vms (2012). Accessed May 2013.
    • (2012) Low entropy on VMs
    • Carriço, P.1
  • 41
    • 80052599662 scopus 로고    scopus 로고
    • Secure virtualization-benefits, risks and controls
    • In: Leymann, F., Ivanov, I., van Sinderen, M., Shishkov, B. (eds.), SciTePress
    • Carroll, M., Kotzé, P., van der Merwe, A. (2011). Secure virtualization-benefits, risks and controls. In: Leymann, F., Ivanov, I., van Sinderen, M., Shishkov, B. (eds.) CLOSER, pp. 15-23. SciTePress.
    • (2011) CLOSER , pp. 15-23
    • Carroll, M.1    Kotzé, P.2    van der Merwe, A.3
  • 42
    • 84897067732 scopus 로고    scopus 로고
    • The Dangers of Recycling in the Cloud
    • Casale, A.: The Dangers of Recycling in the Cloud. TheMakegood (2013).
    • (2013) TheMakegood
    • Casale, A.1
  • 44
    • 84861072527 scopus 로고    scopus 로고
    • Data security and privacy protection issues in cloud computing
    • IEEE, doi: 10. 1109/ICCSEE. 2012. 193
    • Chen, D., Zhao, H.: Data security and privacy protection issues in cloud computing. In: International Conference on Computer Science and Electronics Engineering, vol. 1, pp. 647-651. IEEE (2012). doi: 10. 1109/ICCSEE. 2012. 193.
    • (2012) International Conference on Computer Science and Electronics Engineering , vol.1 , pp. 647-651
    • Chen, D.1    Zhao, H.2
  • 47
    • 77954327465 scopus 로고    scopus 로고
    • Technical Report UCB/EECS-2010-5. EECS Department, University of California, Berkeley
    • Chen, Y., Paxson, V., Katz, R. H.: What's New About Cloud Computing Security? Technical Report UCB/EECS-2010-5. EECS Department, University of California, Berkeley (2010). http://www. eecs. berkeley. edu/Pubs/TechRpts/2010/EECS-2010-5. html.
    • (2010) What's New About Cloud Computing Security?
    • Chen, Y.1    Paxson, V.2    Katz, R.H.3
  • 48
    • 79956153885 scopus 로고    scopus 로고
    • Cloud security defence to protect cloud computing against HTTP-DoS and XML-DoS attacks
    • doi:10.1016/j.jnca.2010.06.004
    • Chonka, A., Xiang, Y., Zhou, W., Bonti, A.: Cloud security defence to protect cloud computing against HTTP-DoS and XML-DoS attacks. J. Netw. Comput. Appli. 34(4), 1097-1107 (2011). doi: 10. 1016/j. jnca. 2010. 06. 004.
    • (2011) J. Netw. Comput. Appli. , vol.34 , Issue.4 , pp. 1097-1107
    • Chonka, A.1    Xiang, Y.2    Zhou, W.3    Bonti, A.4
  • 49
    • 39749159337 scopus 로고    scopus 로고
    • Software as a service: implications for investment in software development
    • IEEE Computer Society, Washington, DC, USA, doi: 10. 1109/HICSS. 2007. 493
    • Choudhary, V.: Software as a service: implications for investment in software development. In: 40th Annual Hawaii International Conference on System Sciences, p. 209a. IEEE Computer Society, Washington, DC, USA (2007). doi: 10. 1109/HICSS. 2007. 493.
    • (2007) 40th Annual Hawaii International Conference on System Sciences , pp. 209
    • Choudhary, V.1
  • 52
    • 84870254680 scopus 로고    scopus 로고
    • Digital forensic investigation of cloud storage services
    • doi: 10. 1016/j. diin. 2012. 05. 015. Available online on 23 Jun. 2012
    • Chung, H., Park, J., Lee, S., Kang, C.: Digital forensic investigation of cloud storage services. Digit. Investig. (2012). doi: 10. 1016/j. diin. 2012. 05. 015. Available online on 23 Jun. 2012.
    • (2012) Digit. Investig.
    • Chung, H.1    Park, J.2    Lee, S.3    Kang, C.4
  • 53
    • 84897053383 scopus 로고    scopus 로고
    • Cisco: Cisco Data Center Infrastructure 2. 5 Design Guide, Accessed Oct. 2012
    • Cisco: Cisco Data Center Infrastructure 2. 5 Design Guide. http://www. cisco. com/univercd/cc/td/doc/solution/dcidg21. pdf (2007). Accessed Oct. 2012.
    • (2007)
  • 54
    • 84897052151 scopus 로고    scopus 로고
    • Ctxco: Data Center Power and Cooling, White Paper. Accessed Sept. 2012
    • Cisco: Data Center Power and Cooling. http://www. cisco. com/en/US/solutions/collateral/ns340/ns517/ns224/ns944/white_paper_c11-680202. pdf (2011). White Paper. Accessed Sept. 2012.
    • (2011)
  • 55
    • 84897100514 scopus 로고    scopus 로고
    • Cisco: Cisco Global Cloud Index: Forecast and Methodology, 2011-2016, White Paper. Accessed Apr. 2013
    • Cisco: Cisco Global Cloud Index: Forecast and Methodology, 2011-2016. http://www. cisco. com/en/US/solutions/collateral/ns341/ns525/ns537/ns705/ns1175/Cloud_Index_White_Paper. pdf (2012). White Paper. Accessed Apr. 2013.
    • (2012)
  • 56
    • 84897106358 scopus 로고    scopus 로고
    • Cisco: 2013 Cisco Annual Security Report, Accessed Apr. 2013
    • Cisco: 2013 Cisco Annual Security Report. http://www. cisco. com/en/US/prod/vpndevc/annual_security_report. html (2013). Accessed Apr. 2013.
    • (2013)
  • 57
    • 84897104890 scopus 로고    scopus 로고
    • Cisco: Cisco Cloud Services Router 1000V Series, Accessed Jul. 2013
    • Cisco: Cisco Cloud Services Router 1000V Series. http://www. cisco. com/en/US/products/ps12559/index. html (2013). Accessed Jul. 2013.
    • (2013)
  • 58
    • 84897073612 scopus 로고    scopus 로고
    • Citrix: Citrix Website, Accessed Jun. 2013
    • Citrix: Citrix Website. https://www. citrix. com/products. html?ntref=hp_nav_us (2013). Accessed Jun. 2013.
    • (2013)
  • 59
    • 84897068876 scopus 로고    scopus 로고
    • CloudBees: CloudBees Website, Accessed Apr. 2013
    • CloudBees: CloudBees Website. http://www. cloudbees. com/ (2013). Accessed Apr. 2013.
    • (2013)
  • 61
    • 84897095085 scopus 로고    scopus 로고
    • Blackhole Exploit Kit Leverages Margaret Thatcher's Death
    • Coronado, C.: Blackhole Exploit Kit Leverages Margaret Thatcher's Death. Trend Micro (2013).
    • (2013) Trend Micro
    • Coronado, C.1
  • 62
    • 84897051223 scopus 로고    scopus 로고
    • CSA: Top Threats to Cloud Computing, Accessed Sept. 2012
    • CSA: Top Threats to Cloud Computing. https://cloudsecurityalliance. org/topthreats/csathreats. v1. 0. pdf (2010). Accessed Sept. 2012.
    • (2010)
  • 63
    • 84897038280 scopus 로고    scopus 로고
    • CSA: Security Guidance for Critical Areas of Focus in Cloud Computing v3. 0, Accessed Sept. 2012
    • CSA: Security Guidance for Critical Areas of Focus in Cloud Computing v3. 0. https://cloudsecurityalliance. org/guidance/csaguide. v3. 0. pdf (2011). Accessed Sept. 2012.
    • (2011)
  • 64
    • 84897091325 scopus 로고    scopus 로고
    • CSA: The Notorious Nine Cloud Computing Top Threats in 2013, Accessed Jul. 2013
    • CSA: The Notorious Nine Cloud Computing Top Threats in 2013. https://downloads. cloudsecurityalliance. org/initiatives/top_threats/The_Notorious_Nine_Cloud_Computing_Top_Threats_in_2013. pdf (2013). Accessed Jul. 2013.
    • (2013)
  • 65
    • 84897068889 scopus 로고    scopus 로고
    • Cuckoo Website: Cuckoo, Accessed Apr. 2013
    • Cuckoo Website: Cuckoo. http://www. cuckoosandbox. org/ (2013). Accessed Apr. 2013.
    • (2013)
  • 66
    • 84869023231 scopus 로고    scopus 로고
    • Man in the browser attacks
    • doi:10.4018/jaci.2012010103
    • Curran, K., Dougan, T.: Man in the browser attacks. Int. J. Ambient Comput. Intell. 4(1), 29-39 (2012). doi: 10. 4018/jaci. 2012010103.
    • (2012) Int. J. Ambient Comput. Intell. , vol.4 , Issue.1 , pp. 29-39
    • Curran, K.1    Dougan, T.2
  • 67
    • 84994288579 scopus 로고    scopus 로고
    • Multitasking without compromise: a virtual machine evolution
    • doi:10.1145/2442776.2442785
    • Czajkowski, G., Daynàs, L.: Multitasking without compromise: a virtual machine evolution. ACM SIGPLAN Not. 47(4a), 60-73 (2012). doi: 10. 1145/2442776. 2442785.
    • (2012) ACM SIGPLAN Not. , vol.47 , Issue.4 a , pp. 60-73
    • Czajkowski, G.1    Daynàs, L.2
  • 68
    • 84864876206 scopus 로고    scopus 로고
    • One-time cookies: preventing session hijacking attacks with stateless authentication tokens
    • doi:10.1145/2220352.2220353
    • Dacosta, I., Chakradeo, S., Ahamad, M., Traynor, P.: One-time cookies: preventing session hijacking attacks with stateless authentication tokens. ACM Trans. Internet Technol. 12(1), 1: 1-1: 24 (2012). doi: 10. 1145/2220352. 2220353.
    • (2012) ACM Trans. Internet Technol. , vol.12 , Issue.1 , pp. 1-24
    • Dacosta, I.1    Chakradeo, S.2    Ahamad, M.3    Traynor, P.4
  • 70
    • 84897047834 scopus 로고    scopus 로고
    • What We'll See in 2013 in Cloud Computing
    • Darrow, B., Higginbothamm, S.: What We'll See in 2013 in Cloud Computing. GigaOM (2012).
    • (2012) GigaOM
    • Darrow, B.1    Higginbothamm, S.2
  • 71
    • 84897087030 scopus 로고    scopus 로고
    • Nebula One Seeks To Reinvent Cloud Computing
    • de Borja, F.: Nebula One Seeks To Reinvent Cloud Computing. CloudTimes (2013).
    • (2013) CloudTimes
    • de Borja, F.1
  • 74
    • 84863119286 scopus 로고    scopus 로고
    • De-anonymizing dynamic social networks
    • IEEE, doi: 10. 1109/GLOCOM. 2011. 6133607
    • Ding, X., Zhang, L., Wan, Z., Gu, M.: De-anonymizing dynamic social networks. In: IEEE Global Telecommunications Conference, pp. 1-6. IEEE (2011). doi: 10. 1109/GLOCOM. 2011. 6133607.
    • (2011) IEEE Global Telecommunications Conference , pp. 1-6
    • Ding, X.1    Zhang, L.2    Wan, Z.3    Gu, M.4
  • 75
    • 84897035137 scopus 로고    scopus 로고
    • Scary Logins: Worst Passwords of 2012 and How to Fix Them
    • Doel, K.: Scary Logins: Worst Passwords of 2012 and How to Fix Them. SplashData (2012).
    • (2012) SplashData
    • Doel, K.1
  • 76
    • 84897051342 scopus 로고    scopus 로고
    • Android
    • Accessed Apr. 2013
    • Dong, T.: Android. Dropdialer. https://www. symantec. com/security_response/writeup. jsp?docid=2012-070909--0726-99 (2012). Accessed Apr. 2013.
    • (2012) Dropdialer
    • Dong, T.1
  • 80
    • 84864596423 scopus 로고    scopus 로고
    • Acquiring forensic evidence from infrastructure-as-a-service cloud computing: exploring and evaluating tools, trust, and techniques
    • doi: 10. 1016/j. diin. 2012. 05. 001
    • Dykstra, J., Sherman, A. T.: Acquiring forensic evidence from infrastructure-as-a-service cloud computing: exploring and evaluating tools, trust, and techniques. Digit. Investig. 9, Supplement(0), S90-S98 (2012). doi: 10. 1016/j. diin. 2012. 05. 001.
    • (2012) Digit. Investig. , vol.9 , Issue.SUPPL.
    • Dykstra, J.1    Sherman, A.T.2
  • 81
    • 84897072370 scopus 로고    scopus 로고
    • Electronic Frontier Foundation: HTTPS Everywhere Website, Accessed Apr. 2013
    • Electronic Frontier Foundation: HTTPS Everywhere Website. https://www. eff. org/https-everywhere (2013). Accessed Apr. 2013.
    • (2013)
  • 82
    • 84897074422 scopus 로고    scopus 로고
    • ENISA: Cloud Computing: Benefits, Risks and Recommendations for Infomarion Security, Accessed Sept. 2012
    • ENISA: Cloud Computing: Benefits, Risks and Recommendations for Infomarion Security. http://www. enisa. europa. eu/activities/risk-management/files/deliverables/cloud-computing-risk-assessment (2009). Accessed Sept. 2012.
    • (2009)
  • 84
    • 84897102799 scopus 로고    scopus 로고
    • FireEye: FireEye Advanced Threat Report-2H 2012, Accessed Apr. 2013
    • FireEye: FireEye Advanced Threat Report-2H 2012. http://www2. fireeye. com/rs/fireye/images/fireeye-advanced-threat-report-2h2012. pdf (2013). Accessed Apr. 2013.
    • (2013)
  • 85
    • 62949225623 scopus 로고    scopus 로고
    • Cloud computing and grid computing 360-degree compared
    • IEEE, doi: 10. 1109/GCE. 2008. 4738445
    • Foster, I., Zhao, Y., Raicu, I., Lu, S.: Cloud computing and grid computing 360-degree compared. In: Grid Computing Environments Workshop, pp. 1-10. IEEE (2008). doi: 10. 1109/GCE. 2008. 4738445.
    • (2008) Grid Computing Environments Workshop , pp. 1-10
    • Foster, I.1    Zhao, Y.2    Raicu, I.3    Lu, S.4
  • 86
    • 84944386303 scopus 로고    scopus 로고
    • When virtual is harder than real: security challenges in virtual machine based computing environments
    • USENIX Association, Berkeley, CA, USA
    • Garfinkel, T., Rosenblum, M.: When virtual is harder than real: security challenges in virtual machine based computing environments. In: Proceedings of the 10th Conference on Hot Topics in Operating Systems, vol. 10, pp. 20-20. USENIX Association, Berkeley, CA, USA (2005).
    • (2005) Proceedings of the 10th Conference on Hot Topics in Operating Systems , vol.10 , pp. 20
    • Garfinkel, T.1    Rosenblum, M.2
  • 87
    • 84897061967 scopus 로고    scopus 로고
    • Gartner: Assessing the Security Risks of Cloud Computing, White Paper. Accessed Sept. 2012
    • Gartner: Assessing the Security Risks of Cloud Computing. http://cloud. ctrls. in/files/assessing-the-security-risks. pdf (2008). White Paper. Accessed Sept. 2012.
    • (2008)
  • 92
    • 79957872924 scopus 로고    scopus 로고
    • HORNS: a homomorphic encryption scheme for cloud computing using Residue number system
    • Baltimore, MD, USA, doi: 10. 1109/CISS. 2011. 5766176
    • Gomathisankaran, M., Tyagi, A., Namuduri, K.: HORNS: a homomorphic encryption scheme for cloud computing using Residue number system. In: 45th Annual Conference on Information Sciences and Systems (CISS), pp. 1-5. Baltimore, MD, USA (2011). doi: 10. 1109/CISS. 2011. 5766176.
    • (2011) 45th Annual Conference on Information Sciences and Systems (CISS) , pp. 1-5
    • Gomathisankaran, M.1    Tyagi, A.2    Namuduri, K.3
  • 93
  • 95
    • 84897032859 scopus 로고    scopus 로고
    • Why Passwords have Never been Weaker-and Crackers have Never been Stronger
    • Goodin, D.: Why Passwords have Never been Weaker-and Crackers have Never been Stronger. Ars Technica (2012).
    • (2012) Ars Technica
    • Goodin, D.1
  • 97
    • 84897043128 scopus 로고    scopus 로고
    • Google: Google App Engine, Accessed Apr. 2013
    • Google: Google App Engine. https://developers. google. com/appengine/ (2013). Accessed Apr. 2013.
    • (2013)
  • 98
    • 84873338342 scopus 로고    scopus 로고
    • The threat in the cloud
    • doi:10.1109/MSP.2013.20
    • Green, M.: The threat in the cloud. IEEE Secur. Priv. 11(1), 86-89 (2013). doi: 10. 1109/MSP. 2013. 20.
    • (2013) IEEE Secur. Priv. , vol.11 , Issue.1 , pp. 86-89
    • Green, M.1
  • 99
    • 84875493689 scopus 로고    scopus 로고
    • Using smartphones as a proxy for forensic evidence contained in cloud storage services
    • Maui, HI, USA, doi: 10. 1109/HICSS. 2013. 592
    • Grispos, G., Glisson, W. B., Storer, T.: Using smartphones as a proxy for forensic evidence contained in cloud storage services. In: 46th Hawaii International Conference on System Sciences (HICSS), pp. 4910-4919. Maui, HI, USA (2013). doi: 10. 1109/HICSS. 2013. 592.
    • (2013) 46th Hawaii International Conference on System Sciences (HICSS) , pp. 4910-4919
    • Grispos, G.1    Glisson, W.B.2    Storer, T.3
  • 100
    • 79953657305 scopus 로고    scopus 로고
    • Understanding cloud computing vulnerabilities
    • doi:10.1109/MSP.2010.115
    • Grobauer, B., Walloschek, T., Stocker, E.: Understanding cloud computing vulnerabilities. IEEE Secur. Priv. 9(2), 50-57 (2011). doi: 10. 1109/MSP. 2010. 115.
    • (2011) IEEE Secur. Priv. , vol.9 , Issue.2 , pp. 50-57
    • Grobauer, B.1    Walloschek, T.2    Stocker, E.3
  • 101
    • 84873431220 scopus 로고    scopus 로고
    • Authentication at scale
    • doi:10.1109/MSP.2012.162
    • Grosse, E., Upadhyay, M.: Authentication at scale. IEEE Secur. Priv. 11(1), 15-22 (2013). doi: 10. 1109/MSP. 2012. 162.
    • (2013) IEEE Secur. Priv. , vol.11 , Issue.1 , pp. 15-22
    • Grosse, E.1    Upadhyay, M.2
  • 102
    • 70449472667 scopus 로고    scopus 로고
    • Vulnerable cloud: SOAP message security validation revisited
    • IEEE Computer Society, Washington, DC, USA, doi: 10. 1109/ICWS. 2009. 70
    • Gruschka, N., Iacono, L.: Vulnerable cloud: SOAP message security validation revisited. In: IEEE International Conference on Web Services, pp. 625-631. IEEE Computer Society, Washington, DC, USA (2009). doi: 10. 1109/ICWS. 2009. 70.
    • (2009) IEEE International Conference on Web Services , pp. 625-631
    • Gruschka, N.1    Iacono, L.2
  • 105
    • 84897068684 scopus 로고    scopus 로고
    • Accessed May 2013
    • Hale, C.: bcrypt. http://codahale. com/how-to-safely-store-a-password/ (2010). Accessed May 2013.
    • (2010) bcrypt
    • Hale, C.1
  • 106
    • 84897048861 scopus 로고    scopus 로고
    • Japanese One-Click Fraud Campaign Comes to Google Play
    • Hamada, J.: Japanese One-Click Fraud Campaign Comes to Google Play. Symantec Blog (2013).
    • (2013) Symantec Blog
    • Hamada, J.1
  • 107
    • 70949093558 scopus 로고    scopus 로고
    • Remote working: managing the balancing act between network access and data security
    • doi:10.1016/S1361-3723(09)70141-1
    • Hart, J.: Remote working: managing the balancing act between network access and data security. Comput. Fraud Secur. 2009(11), 14-17 (2009). doi: 10. 1016/S1361-3723(09)70141-1.
    • (2009) Comput. Fraud Secur. , vol.2009 , Issue.11 , pp. 14-17
    • Hart, J.1
  • 108
    • 85024260157 scopus 로고    scopus 로고
    • Cloud computing
    • doi:10.1145/1364782.1364786
    • Hayes, B.: Cloud computing. Commun. ACM 51(7), 9-11 (2008). doi: 10. 1145/1364782. 1364786.
    • (2008) Commun. ACM , vol.51 , Issue.7 , pp. 9-11
    • Hayes, B.1
  • 109
    • 84872005774 scopus 로고    scopus 로고
    • Condos and clouds
    • doi:10.1145/2398356.2398374
    • Helland, P.: Condos and clouds. Commun. ACM 56(1), 50-59 (2013). doi: 10. 1145/2398356. 2398374.
    • (2013) Commun. ACM , vol.56 , Issue.1 , pp. 50-59
    • Helland, P.1
  • 110
    • 85076227028 scopus 로고    scopus 로고
    • Minding your Ps and Qs: detection of widespread weak keys in network devices
    • USENIX, Bellevue, WA, USA, doi: 10. 1109/ICCIAutom. 2011. 6183990
    • Heninger, N., Durumeric, Z., Wustrow, E., Halderman, J. A.: Minding your Ps and Qs: detection of widespread weak keys in network devices. In: Proceedings of the 21st USENIX Security Symposium, pp. 205-220. USENIX, Bellevue, WA, USA (2012). doi: 10. 1109/ICCIAutom. 2011. 6183990.
    • (2012) Proceedings of the 21st USENIX Security Symposium , pp. 205-220
    • Heninger, N.1    Durumeric, Z.2    Wustrow, E.3    Halderman, J.A.4
  • 112
    • 84866663678 scopus 로고    scopus 로고
    • How Apple and Amazon Security Flaws Led to My Epic Hacking
    • Honan, M.: How Apple and Amazon Security Flaws Led to My Epic Hacking. Wired (2012).
    • (2012) Wired
    • Honan, M.1
  • 113
    • 84897070533 scopus 로고    scopus 로고
    • HP: HP 2012 Cyber Risk Report, Accessed Apr. 2013
    • HP: HP 2012 Cyber Risk Report. http://www. hpenterprisesecurity. com/collateral/whitepaper/HP2012CyberRiskReport_0213. pdf (2013). Accessed Apr. 2013.
    • (2013)
  • 114
    • 84897069164 scopus 로고    scopus 로고
    • HP: HP ArcSight, Accessed Apr. 2013
    • HP: HP ArcSight. http://www8. hp. com/us/en/software-solutions/software. html?compURI=1340477 (2013). Accessed Apr. 2013.
    • (2013)
  • 115
    • 84863588835 scopus 로고    scopus 로고
    • Barrier: a lightweight hypervisor for protecting kernel integrity via memory isolation
    • ACM, Trento, Italy, doi: 10. 1145/2231936. 2232011
    • Hua, J., Sakurai, K.: Barrier: a lightweight hypervisor for protecting kernel integrity via memory isolation. In: Proceedings of the 27th Annual ACM Symposium on Applied Computing (SAC), pp. 1470-1477. ACM, Trento, Italy (2012). doi: 10. 1145/2231936. 2232011.
    • (2012) Proceedings of the 27th Annual ACM Symposium on Applied Computing (SAC) , pp. 1470-1477
    • Hua, J.1    Sakurai, K.2
  • 117
    • 80053144966 scopus 로고    scopus 로고
    • Exploiting cloud utility models for profit and ruin
    • IEEE Computer Society, Washington, DC, USA
    • Idziorek, J., Tannian, M.: Exploiting cloud utility models for profit and ruin. In: IEEE International Conference on Cloud Computing, pp. 33-40. IEEE Computer Society, Washington, DC, USA (2011).
    • (2011) IEEE International Conference on Cloud Computing , pp. 33-40
    • Idziorek, J.1    Tannian, M.2
  • 119
    • 84897092150 scopus 로고    scopus 로고
    • Infosecurity: Recycled phones retain their previous owners' data
    • Infosecurity: Recycled phones retain their previous owners' data. Infosecurity Magazine (2013).
    • (2013) Infosecurity Magazine
  • 120
    • 84897101595 scopus 로고    scopus 로고
    • Intel: Intel Digital Random Number Generator (DRNG): Software Implementation Guide, Accessed May 2013
    • Intel: Intel Digital Random Number Generator (DRNG): Software Implementation Guide. http://software. intel. com/sites/default/files/m/d/4/1/d/8/441_Intel_R_DRNG_Software_Implementation_Guide_final_Aug7. pdf (2012). Accessed May 2013.
    • (2012)
  • 122
    • 57349089194 scopus 로고    scopus 로고
    • ForceHTTPS: protecting high-security web sites from network attacks
    • ACM, Beijing, China, doi: 10. 1145/1367497. 1367569
    • Jackson, C., Barth, A.: ForceHTTPS: protecting high-security web sites from network attacks. In: Proceedings of the 17th International Conference on World Wide Web (WWW), pp. 525-534. ACM, Beijing, China (2008). doi: 10. 1145/1367497. 1367569.
    • (2008) Proceedings of the 17th International Conference on World Wide Web (WWW) , pp. 525-534
    • Jackson, C.1    Barth, A.2
  • 124
    • 84897031170 scopus 로고    scopus 로고
    • Spamhaus: DDoS Update-March 2013
    • Jenkins, Q.: Spamhaus: DDoS Update-March 2013. Spamhaus (2013).
    • (2013) Spamhaus
    • Jenkins, Q.1
  • 125
    • 70350156792 scopus 로고    scopus 로고
    • A survey of attacks on web services
    • doi:10.1007/s00450-009-0092-6
    • Jensen, M., Gruschka, N., Herkenhöner, R.: A survey of attacks on web services. Comput. Sci. Res. Dev. 24, 185-197 (2009). doi: 10. 1007/s00450-009-0092-6.
    • (2009) Comput. Sci. Res. Dev. , vol.24 , pp. 185-197
    • Jensen, M.1    Gruschka, N.2    Herkenhöner, R.3
  • 127
    • 80055005460 scopus 로고    scopus 로고
    • Expressiveness considerations of XML signatures
    • Workshop, IEEE Computer Society, Washington, DC, USA
    • Jensen, M., Meyer, C.: Expressiveness considerations of XML signatures. In: IEEE 35th Annual Computer Software and Applications Conf. Workshop, pp. 392-397. IEEE Computer Society, Washington, DC, USA (2011).
    • (2011) IEEE 35th Annual Computer Software and Applications Conf , pp. 392-397
    • Jensen, M.1    Meyer, C.2
  • 128
    • 77957961711 scopus 로고    scopus 로고
    • Towards an anonymous access control and accountability scheme for cloud computing
    • IEEE Computer Society, Washington, DC, USA, doi: 10. 1109/CLOUD. 2010. 61
    • Jensen, M., Schäge, S., Schwenk, J.: Towards an anonymous access control and accountability scheme for cloud computing. In: IEEE 3rd International Conference on Cloud Computing, pp. 540-541. IEEE Computer Society, Washington, DC, USA (2010). doi: 10. 1109/CLOUD. 2010. 61.
    • (2010) IEEE 3rd International Conference on Cloud Computing , pp. 540-541
    • Jensen, M.1    Schäge, S.2    Schwenk, J.3
  • 130
    • 74349113474 scopus 로고    scopus 로고
    • On Technical security issues in cloud computing
    • IEEE Computer Society, Washington, DC, USA, doi: 10. 1109/CLOUD. 2009. 60
    • Jensen, M., Schwenk, J., Gruschka, N., Iacono, L.: On Technical security issues in cloud computing. In: IEEE International Conference on Cloud Computing, pp. 109-116. IEEE Computer Society, Washington, DC, USA (2009). doi: 10. 1109/CLOUD. 2009. 60.
    • (2009) IEEE International Conference on Cloud Computing , pp. 109-116
    • Jensen, M.1    Schwenk, J.2    Gruschka, N.3    Iacono, L.4
  • 131
    • 84863142680 scopus 로고    scopus 로고
    • A trust model based on cloud model and Bayesian networks
    • doi:10.1016/j.proenv.2011.12.072
    • Jin, B., Wang, Y., Liu, Z., Xue, J.: A trust model based on cloud model and Bayesian networks. Procedia Environ. Sci. 11, Part A, 452-459 (2011). doi: 10. 1016/j. proenv. 2011. 12. 072.
    • (2011) Procedia Environ. Sci. , vol.11 , Issue.PART A , pp. 452-459
    • Jin, B.1    Wang, Y.2    Liu, Z.3    Xue, J.4
  • 133
    • 70449469756 scopus 로고    scopus 로고
    • Data center evolution: a tutorial on state of the art, issues, and challenges
    • doi:10.1016/j.comnet.2009.10.004
    • Kant, K.: Data center evolution: a tutorial on state of the art, issues, and challenges. Comput. Netw. 53(17), 2939-2965 (2009). doi: 10. 1016/j. comnet. 2009. 10. 004.
    • (2009) Comput. Netw. , vol.53 , Issue.17 , pp. 2939-2965
    • Kant, K.1
  • 134
    • 84897044001 scopus 로고    scopus 로고
    • Crisis for Windows Sneaks onto Virtual Machines
    • Katsuki, T.: Crisis for Windows Sneaks onto Virtual Machines. Symantec Blog (2012).
    • (2012) Symantec Blog
    • Katsuki, T.1
  • 135
    • 70349309706 scopus 로고    scopus 로고
    • Data security in the world of cloud computing
    • Kaufman, L.: Data security in the world of cloud computing. IEEE Secur. Priv. 7(4), 61-64 (2009).
    • (2009) IEEE Secur. Priv. , vol.7 , Issue.4 , pp. 61-64
    • Kaufman, L.1
  • 137
    • 77957700442 scopus 로고    scopus 로고
    • Establishing trust in cloud computing
    • doi:10.1109/MITP.2010.128
    • Khan, K., Malluhi, Q.: Establishing trust in cloud computing. IT Prof. 12(5), 20-27 (2010). doi: 10. 1109/MITP. 2010. 128.
    • (2010) IT Prof. , vol.12 , Issue.5 , pp. 20-27
    • Khan, K.1    Malluhi, Q.2
  • 138
    • 84858158707 scopus 로고    scopus 로고
    • A survey on gaps, threat remediation challenges and some thoughts for proactive attack detection in cloud computing
    • doi:10.1016/j.future.2012.01.006
    • Khorshed, M. T., Ali, A. S., Wasimi, S. A.: A survey on gaps, threat remediation challenges and some thoughts for proactive attack detection in cloud computing. Future Gener. Comput. Syst. 28(6), 833-851 (2012). doi: 10. 1016/j. future. 2012. 01. 006.
    • (2012) Future Gener. Comput. Syst. , vol.28 , Issue.6 , pp. 833-851
    • Khorshed, M.T.1    Ali, A.S.2    Wasimi, S.A.3
  • 139
    • 84897070405 scopus 로고    scopus 로고
    • Accessed May 2013
    • King, C. I.: Intel Rdrand Instruction Revisited. http://smackerelofopinion. blogspot. co. uk/2012/10/intel-rdrand-instruction-revisited. html (2012). Accessed May 2013.
    • (2012) Intel Rdrand Instruction Revisited
    • King, C.I.1
  • 140
    • 33751032041 scopus 로고    scopus 로고
    • SubVirt: implementing malware with virtual machines
    • IEEE Computer Society, Washington, DC, USA, doi: 10. 1109/SP. 2006. 38
    • King, S., Chen, P.: SubVirt: implementing malware with virtual machines. In: IEEE Symposium on Security and Privacy, pp. 14 pp.-327. IEEE Computer Society, Washington, DC, USA (2006). doi: 10. 1109/SP. 2006. 38.
    • (2006) IEEE Symposium on Security and Privacy , pp. 14-327
    • King, S.1    Chen, P.2
  • 142
    • 84873357994 scopus 로고    scopus 로고
    • Security event monitoring in a distributed systems environment
    • doi:10.1109/MSP.2012.61
    • Kufel, L.: Security event monitoring in a distributed systems environment. IEEE Secur. Priv. 11(1), 36-43 (2013). doi: 10. 1109/MSP. 2012. 61.
    • (2013) IEEE Secur. Priv. , vol.11 , Issue.1 , pp. 36-43
    • Kufel, L.1
  • 144
    • 80053942235 scopus 로고    scopus 로고
    • Accessed May 2013
    • Leder, F., Werner, T.: Containing Conficker. http://net. cs. uni-bonn. de/wg/cs/applications/containing-conficker/ (2011). Accessed May 2013.
    • (2011) Containing Conficker
    • Leder, F.1    Werner, T.2
  • 146
    • 84869632972 scopus 로고    scopus 로고
    • Blue Security Folds Under Spammer's Wrath
    • Lemos, R.: Blue Security Folds Under Spammer's Wrath. SecurityFocus (2013).
    • (2013) SecurityFocus
    • Lemos, R.1
  • 149
    • 84855859636 scopus 로고    scopus 로고
    • Evidence of advanced persistent threat: a case study of malware for political espionage
    • Fajardo, PR, USA, doi: 10. 1109/MALWARE. 2011. 6112333
    • Li, F., Lai, A., Ddl, D.: Evidence of advanced persistent threat: a case study of malware for political espionage. In: 6th International Conference on Malicious and Unwanted Software (MALWARE), pp. 102-109. Fajardo, PR, USA (2011). doi: 10. 1109/MALWARE. 2011. 6112333.
    • (2011) 6th International Conference on Malicious and Unwanted Software (MALWARE) , pp. 102-109
    • Li, F.1    Lai, A.2    Ddl, D.3
  • 151
    • 84873374971 scopus 로고    scopus 로고
    • Mobile security: a look ahead
    • doi:10.1109/MSP.2013.15
    • Li, Q., Clark, G.: Mobile security: a look ahead. IEEE Secur. Priv. 11(1), 78-81 (2013). doi: 10. 1109/MSP. 2013. 15.
    • (2013) IEEE Secur. Priv. , vol.11 , Issue.1 , pp. 78-81
    • Li, Q.1    Clark, G.2
  • 152
    • 81255167363 scopus 로고    scopus 로고
    • Mechanisms of polymorphic and metamorphic viruses
    • Berkeley/Oakland, CA, USA, doi: 10. 1109/EISIC. 2011. 77
    • Li, X., Loh, P., Tan, F.: Mechanisms of polymorphic and metamorphic viruses. In: European Intelligence and Security Informatics Conference (EISIC), pp. 149-154. Berkeley/Oakland, CA, USA (2011). doi: 10. 1109/EISIC. 2011. 77.
    • (2011) European Intelligence and Security Informatics Conference (EISIC) , pp. 149-154
    • Li, X.1    Loh, P.2    Tan, F.3
  • 153
    • 64549154025 scopus 로고    scopus 로고
    • The design and application of Xen-based host system firewall and its extension
    • Macau, China, doi: 10. 1109/ICECT. 2009. 83
    • Liu, F., Su, X., Liu, W., Shi, M.: The design and application of Xen-based host system firewall and its extension. In: International Conference on Electronic Computer Technology, pp. 392-395. Macau, China (2009). doi: 10. 1109/ICECT. 2009. 83.
    • (2009) International Conference on Electronic Computer Technology , pp. 392-395
    • Liu, F.1    Su, X.2    Liu, W.3    Shi, M.4
  • 154
    • 78650154288 scopus 로고    scopus 로고
    • A new form of DoS attack in a cloud and its avoidance mechanism
    • ACM, New York, NY, USA, doi: 10. 1145/1866835. 1866849
    • Liu, H.: A new form of DoS attack in a cloud and its avoidance mechanism. In: Proceedings of the ACM Workshop on Cloud Computing Security, pp. 65-76. ACM, New York, NY, USA (2010). doi: 10. 1145/1866835. 1866849.
    • (2010) Proceedings of the ACM Workshop on Cloud Computing Security , pp. 65-76
    • Liu, H.1
  • 155
    • 84897046191 scopus 로고    scopus 로고
    • LivingSocial: LivingSocial Security Notice, Accessed May 2013
    • LivingSocial: LivingSocial Security Notice. https://livingsocial. com/createpassword (2013). Accessed May 2013.
    • (2013)
  • 157
    • 84897070820 scopus 로고    scopus 로고
    • Mandiant: APT1: Exposing One of China's Cyber Espionage Units, Accessed Apr. 2013
    • Mandiant: APT1: Exposing One of China's Cyber Espionage Units. http://intelreport. mandiant. com/Mandiant_APT1_Report. pdf (2013). Accessed Apr. 2013.
    • (2013)
  • 158
    • 57549096898 scopus 로고    scopus 로고
    • Danger in the clouds
    • doi:10.1016/S1353-4858(08)70140-5
    • Mansfield-Devine, S.: Danger in the clouds. Netw. Secur. 2008(12), 9-11 (2008). doi: 10. 1016/S1353-4858(08)70140-5.
    • (2008) Netw. Secur. , vol.2008 , Issue.12 , pp. 9-11
    • Mansfield-Devine, S.1
  • 159
    • 77955317816 scopus 로고    scopus 로고
    • Accessed Apr. 2013
    • Marlinspike, M.: New tricks for defeating SSL in practice. https://www. blackhat. com/presentations/bh-dc-09/Marlinspike/BlackHat-DC-09-Marlinspike-Defeating-SSL. pdf (2009). Accessed Apr. 2013.
    • (2009) New tricks for defeating SSL in practice
    • Marlinspike, M.1
  • 160
    • 78650875543 scopus 로고    scopus 로고
    • Accessed Apr. 2013
    • Marlinspike, M.: sslstrip. http://www. thoughtcrime. org/software/sslstrip/ (2009). Accessed Apr. 2013.
    • (2009) sslstrip
    • Marlinspike, M.1
  • 161
    • 84873358969 scopus 로고    scopus 로고
    • Implementing effective controls in a mobile, agile, cloud-enabled enterprise
    • doi:10.1109/MSP.2013.1
    • Martin, D.: Implementing effective controls in a mobile, agile, cloud-enabled enterprise. IEEE Secur. Priv. 11(1), 13-14 (2013). doi: 10. 1109/MSP. 2013. 1.
    • (2013) IEEE Secur. Priv. , vol.11 , Issue.1 , pp. 13-14
    • Martin, D.1
  • 163
    • 84897036242 scopus 로고    scopus 로고
    • McAfee: McAfee Threats Report-Fourth Quarter 2012, Accessed Apr. 2013
    • McAfee: McAfee Threats Report-Fourth Quarter 2012. http://www. mcafee. com/us/resources/reports/rp-quarterly-threat-q4-2012. pdf (2013). Accessed Apr. 2013.
    • (2013)
  • 165
    • 2342469291 scopus 로고    scopus 로고
    • Software security
    • doi:10.1109/MSECP.2004.1281254
    • McGraw, G.: Software security. IEEE Secur. Priv. 2(2), 80-83 (2004). doi: 10. 1109/MSECP. 2004. 1281254.
    • (2004) IEEE Secur. Priv. , vol.2 , Issue.2 , pp. 80-83
    • McGraw, G.1
  • 166
    • 77954328275 scopus 로고    scopus 로고
    • XML signature element wrapping attacks and countermeasures
    • ACM, New York, NY, USA, doi: 10. 1145/1103022. 1103026
    • McIntosh, M., Austel, P.: XML signature element wrapping attacks and countermeasures. In: Proceedings of the Workshop on Secure Web Services, pp. 20-27. ACM, New York, NY, USA (2005). doi: 10. 1145/1103022. 1103026.
    • (2005) Proceedings of the Workshop on Secure Web Services , pp. 20-27
    • McIntosh, M.1    Austel, P.2
  • 167
    • 84897104792 scopus 로고    scopus 로고
    • 7 Predictions for Cloud Computing in 2013 That Make Perfect Sense
    • McKendrick, J.: 7 Predictions for Cloud Computing in 2013 That Make Perfect Sense. Forbes (2012).
    • (2012) Forbes
    • McKendrick, J.1
  • 168
    • 84897084568 scopus 로고    scopus 로고
    • MEGA: The MEGA API, Accessed Apr. 2013
    • MEGA: The MEGA API. https://mega. co. nz/#developers (2013). Accessed Apr. 2013.
    • (2013)
  • 169
    • 84897074979 scopus 로고    scopus 로고
    • Microsoft: Microsoft Hyper-V Server 2012 Website, Accessed Jun. 2013
    • Microsoft: Microsoft Hyper-V Server 2012 Website. https://www. microsoft. com/en-us/server-cloud/hyper-v-server/ (2013). Accessed Jun. 2013.
    • (2013)
  • 170
    • 84897044608 scopus 로고    scopus 로고
    • Microsoft: Microsoft Security Intelligence Report: Volume 14, Accessed Apr. 2013
    • Microsoft: Microsoft Security Intelligence Report: Volume 14. http://www. microsoft. com/security/sir/default. aspx (2013). Accessed Apr. 2013.
    • (2013)
  • 171
    • 84870696413 scopus 로고    scopus 로고
    • A survey of intrusion detection techniques in cloud
    • doi: 10. 1016/j. jnca. 2012. 05. 003. Available online 2 June 2012
    • Modi, C., Patel, D., Borisaniya, B., Patel, H., Patel, A., Rajarajan, M.: A survey of intrusion detection techniques in cloud. J. Netw. Comput. Appli. (2012). doi: 10. 1016/j. jnca. 2012. 05. 003. Available online 2 June 2012.
    • (2012) J. Netw. Comput. Appli.
    • Modi, C.1    Patel, D.2    Borisaniya, B.3    Patel, H.4    Patel, A.5    Rajarajan, M.6
  • 174
    • 84857187859 scopus 로고    scopus 로고
    • Monitoring intrusions and security breaches in highly distributed cloud environments
    • IEEE Computer Society, Washington, DC, USA, doi: 10. 1109/CloudCom. 2011. 119
    • Monfared, A., Jaatun, M.: Monitoring intrusions and security breaches in highly distributed cloud environments. In: IEEE 3rd International Conference on Cloud Computing Technology and Science, pp. 772-777. IEEE Computer Society, Washington, DC, USA (2011). doi: 10. 1109/CloudCom. 2011. 119.
    • (2011) IEEE 3rd International Conference on Cloud Computing Technology and Science , pp. 772-777
    • Monfared, A.1    Jaatun, M.2
  • 177
    • 84897057238 scopus 로고    scopus 로고
    • MPICH: MPICH Website, Accessed Apr. 2013
    • MPICH: MPICH Website. http://www. mpich. org/ (2013). Accessed Apr. 2013.
    • (2013)
  • 178
    • 84897072400 scopus 로고    scopus 로고
    • DDoS-as-a-Service? You Betcha! It's Cheap, It's Easy, and It's Available to Anyone
    • Musthaler, L.: DDoS-as-a-Service? You Betcha! It's Cheap, It's Easy, and It's Available to Anyone. Security Bistro (2012).
    • (2012) Security Bistro
    • Musthaler, L.1
  • 179
    • 70449632682 scopus 로고    scopus 로고
    • De-anonymizing social networks
    • IEEE Computer Society, Washington, DC, USA, doi: 10. 1109/SP. 2009. 22
    • Narayanan, A., Shmatikov, V.: De-anonymizing social networks. In: 30th IEEE Symposium on Security and Privacy, pp. 173-187. IEEE Computer Society, Washington, DC, USA (2009). doi: 10. 1109/SP. 2009. 22.
    • (2009) 30th IEEE Symposium on Security and Privacy , pp. 173-187
    • Narayanan, A.1    Shmatikov, V.2
  • 180
    • 84897036117 scopus 로고    scopus 로고
    • Cloud Wars-The Fall of Cloud Storage
    • Accessed Apr. 2013
    • Nathoo, N.: Cloud Wars-The Fall of Cloud Storage. CloudTimes (2013). Accessed Apr. 2013.
    • (2013) CloudTimes
    • Nathoo, N.1
  • 181
    • 84897049540 scopus 로고    scopus 로고
    • Nebula: Introducing Nebula One, Accessed Apr. 2013
    • Nebula: Introducing Nebula One. https://www. nebula. com/nebula-one (2013). Accessed Apr. 2013.
    • (2013)
  • 182
    • 84897090277 scopus 로고    scopus 로고
    • Network-Tools: Network-Tools Website, Accessed Apr. 2013
    • Network-Tools: Network-Tools Website. http://network-tools. com/ (2013). Accessed Apr. 2013.
    • (2013)
  • 183
    • 27544498978 scopus 로고    scopus 로고
    • Polygraph: automatically generating signatures for polymorphic worms
    • Athens, Greece, doi: 10. 1109/SP. 2005. 15
    • Newsome, J., Karp, B., Song, D.: Polygraph: automatically generating signatures for polymorphic worms. In: IEEE Symposium on Security and Privacy, pp. 226-241. Athens, Greece (2005). doi: 10. 1109/SP. 2005. 15.
    • (2005) IEEE Symposium on Security and Privacy , pp. 226-241
    • Newsome, J.1    Karp, B.2    Song, D.3
  • 184
    • 84897032720 scopus 로고    scopus 로고
    • NIST: NIST Cloud Computing Reference Architecture, Accessed Jul. 2013
    • NIST: NIST Cloud Computing Reference Architecture. http://www. nist. gov/customcf/get_pdf. cfm?pub_id=909505 (2011). Accessed Jul. 2013.
    • (2011)
  • 185
    • 84897039534 scopus 로고    scopus 로고
    • NIST: The NIST Definition of Cloud Computing, Accessed Sept. 2012
    • NIST: The NIST Definition of Cloud Computing. http://csrc. nist. gov/publications/nistpubs/800-145/SP800-145. pdf (2011). Accessed Sept. 2012.
    • (2011)
  • 186
    • 84897078809 scopus 로고    scopus 로고
    • NIST: NIST Cloud Computing Program, Accessed Sept. 2012
    • NIST: NIST Cloud Computing Program. http://www. nist. gov/itl/cloud/ (2012). Accessed Sept. 2012.
    • (2012)
  • 187
    • 84897095180 scopus 로고    scopus 로고
    • NIST: NIST Cloud Computing Security Reference Architecture, Accessed Jul. 2013
    • NIST: NIST Cloud Computing Security Reference Architecture. http://collaborate. nist. gov/twiki-cloud-computing/pub/CloudComputing/CloudSecurity/NIST_Security_Reference_Architecture_2013. 05. 15_v1. 0. pdf (2013). Accessed Jul. 2013.
    • (2013)
  • 188
    • 70849107663 scopus 로고    scopus 로고
    • Empirical exploitation of live virtual machine migration
    • doi: 10. 1109/ICCIAutom. 2011. 6183990
    • Oberheide, J., Cooke, E., Jahanian, F.: Empirical exploitation of live virtual machine migration. In: Proceedings of the Black Hat Convention (2008). doi: 10. 1109/ICCIAutom. 2011. 6183990.
    • (2008) Proceedings of the Black Hat Convention
    • Oberheide, J.1    Cooke, E.2    Jahanian, F.3
  • 189
    • 84897065636 scopus 로고    scopus 로고
    • OCCI: OCCI Website, Accessed Apr. 2013
    • OCCI: OCCI Website. http://occi-wg. org/ (2013). Accessed Apr. 2013.
    • (2013)
  • 190
    • 77954737019 scopus 로고    scopus 로고
    • Load-based covert channels between Xen virtual machines
    • ACM, New York, NY, USA, doi: 10. 1145/1774088. 1774125
    • Okamura, K., Oyama, Y.: Load-based covert channels between Xen virtual machines. In: Proceedings of the ACM Symposium on Applied Computing, pp. 173-180. ACM, New York, NY, USA (2010). doi: 10. 1145/1774088. 1774125.
    • (2010) Proceedings of the ACM Symposium on Applied Computing , pp. 173-180
    • Okamura, K.1    Oyama, Y.2
  • 191
    • 80053509259 scopus 로고    scopus 로고
    • Obfuscation: the hidden malware
    • doi:10.1109/MSP.2011.98
    • O'Kane, P., Sezer, S., McLaughlin, K.: Obfuscation: the hidden malware. IEEE Secur. Priv. 9(5), 41-47 (2011). doi: 10. 1109/MSP. 2011. 98.
    • (2011) IEEE Secur. Priv. , vol.9 , Issue.5 , pp. 41-47
    • O'Kane, P.1    Sezer, S.2    McLaughlin, K.3
  • 192
    • 85003886714 scopus 로고    scopus 로고
    • Cloud APIs-the Next Battleground for Denial-of-Service Attacks
    • O'Neill, M.: Cloud APIs-the Next Battleground for Denial-of-Service Attacks. CSA Blog (2013).
    • (2013) CSA Blog
    • O'Neill, M.1
  • 193
    • 84897033756 scopus 로고    scopus 로고
    • Open Cloud Initiative (OCI): OCI Website, Accessed May 2013
    • Open Cloud Initiative (OCI): OCI Website. http://www. opencloudinitiative. org/ (2013). Accessed May 2013.
    • (2013)
  • 194
    • 84897065020 scopus 로고    scopus 로고
    • OpenNebula: OpenNebula Website, Accessed Apr. 2013
    • OpenNebula: OpenNebula Website. http://opennebula. org/ (2013). Accessed Apr. 2013.
    • (2013)
  • 195
    • 84897052165 scopus 로고    scopus 로고
    • OpenStack: OpenStack Website, Accessed Apr. 2013
    • OpenStack: OpenStack Website. http://www. openstack. org/ (2013). Accessed Apr. 2013.
    • (2013)
  • 196
    • 84897060577 scopus 로고    scopus 로고
    • Oracle: Oracle Java SE Critical Patch Update Advisory-April 2013, Accessed Apr. 2013
    • Oracle: Oracle Java SE Critical Patch Update Advisory-April 2013. http://www. oracle. com/technetwork/topics/security/javacpuapr2013-1928497. html (2013). Accessed Apr. 2013.
    • (2013)
  • 197
    • 84897099373 scopus 로고    scopus 로고
    • Oracle: VirtualBox Website, Accessed Jun. 2013
    • Oracle: VirtualBox Website. https://www. virtualbox. org/ (2013). Accessed Jun. 2013.
    • (2013)
  • 198
    • 84897068690 scopus 로고    scopus 로고
    • Your Malware Shall Not Fool Us With Those Anti Analysis Tricks
    • Ortega, A.: Your Malware Shall Not Fool Us With Those Anti Analysis Tricks. AlienVault Labs (2012).
    • (2012) AlienVault Labs
    • Ortega, A.1
  • 199
    • 84897095526 scopus 로고    scopus 로고
    • OSVDB: The Open Source Vulnerability Database Website, Accessed Apr. 2013
    • OSVDB: The Open Source Vulnerability Database Website. http://www. osvdb. org/ (2013). Accessed Apr. 2013.
    • (2013)
  • 200
    • 84897074619 scopus 로고    scopus 로고
    • OWASP: The Then Most Critical Web Application Security Risks, Accessed Oct. 2012
    • OWASP: The Then Most Critical Web Application Security Risks. http://owasptop10. googlecode. com/files/OWASP (2010). Accessed Oct. 2012.
    • (2010)
  • 201
    • 84897096712 scopus 로고    scopus 로고
    • OWASP: The Then Most Critical Web Application Security Risks, Accessed Apr. 2013
    • OWASP: The Then Most Critical Web Application Security Risks. https://www. owasp. org/index. php/Top_10_2013 (2013). Accessed Apr. 2013.
    • (2013)
  • 203
    • 85003884156 scopus 로고    scopus 로고
    • Challenges of security issues in cloud computing layers
    • Panah, A., Panah, A., Panah, O., Fallahpour, S.: Challenges of security issues in cloud computing layers. Rep. Opin. 4(10), 25-29 (2012).
    • (2012) Rep. Opin. , vol.4 , Issue.10 , pp. 25-29
    • Panah, A.1    Panah, A.2    Panah, O.3    Fallahpour, S.4
  • 204
    • 84897092707 scopus 로고    scopus 로고
    • Parallels: Oracle VM Server Website., Accessed Jun. 2013
    • Parallels: Oracle VM Server Website. http://www. oracle. com/us/technologies/virtualization/oraclevm/ (2013). Accessed Jun. 2013.
    • (2013)
  • 205
    • 84897031931 scopus 로고    scopus 로고
    • Parallels: Parallels Website, Accessed Jun. 2013
    • Parallels: Parallels Website. http://www. parallels. com/eu/products/ (2013). Accessed Jun. 2013.
    • (2013)
  • 206
    • 84870667876 scopus 로고    scopus 로고
    • An intrusion detection and prevention system in cloud computing: a systematic review
    • doi: 10. 1016/j. jnca. 2012. 08. 007. Available online 31 Aug. 2012
    • Patel, A., Taghavi, M., Bakhtiyari, K., Júnior, J. C.: An intrusion detection and prevention system in cloud computing: a systematic review. J. Netw. Comput. Appli. (2012). doi: 10. 1016/j. jnca. 2012. 08. 007. Available online 31 Aug. 2012.
    • (2012) J. Netw. Comput. Appli.
    • Patel, A.1    Taghavi, M.2    Bakhtiyari, K.3    Júnior, J.C.4
  • 209
    • 84897083925 scopus 로고    scopus 로고
    • PCI Security Standards: PCI SSC Data Security Standards Overview, Accessed Oct. 2012
    • PCI Security Standards: PCI SSC Data Security Standards Overview. https://www. pcisecuritystandards. org/security_standards/index. php (2012). Accessed Oct. 2012.
    • (2012)
  • 210
    • 84875146484 scopus 로고    scopus 로고
    • Virtualization: issues, security threats, and solutions
    • doi:10.1145/2431211.2431216
    • Pearce, M., Zeadally, S., Hunt, R.: Virtualization: issues, security threats, and solutions. ACM Comput. Surv. 45(2), 1: 71-1: 739 (2013). doi: 10. 1145/2431211. 2431216.
    • (2013) ACM Comput. Surv. , vol.45 , Issue.2 , pp. 71-739
    • Pearce, M.1    Zeadally, S.2    Hunt, R.3
  • 211
    • 84863498411 scopus 로고    scopus 로고
    • Privacy, security and trust in cloud computing
    • In: Pearson, S., Yee, G. (eds.), Springer London, doi: 10. 1007/978-1-4471-4189-1_1
    • Pearson, S.: Privacy, security and trust in cloud computing. In: Pearson, S., Yee, G. (eds.) Privacy and Security for Cloud Computing, pp. 3-42. Springer London (2013). doi: 10. 1007/978-1-4471-4189-1_1.
    • (2013) Privacy and Security for Cloud Computing , pp. 3-42
    • Pearson, S.1
  • 214
    • 78650070096 scopus 로고    scopus 로고
    • Splitting the HTTPS stream to attack secure web connections
    • doi:10.1109/MSP.2010.190
    • Prandini, M., Ramilli, M., Cerroni, W., Callegati, F.: Splitting the HTTPS stream to attack secure web connections. IEEE Secur. Priv. 8(6), 80-84 (2010). doi: 10. 1109/MSP. 2010. 190.
    • (2010) IEEE Secur. Priv. , vol.8 , Issue.6 , pp. 80-84
    • Prandini, M.1    Ramilli, M.2    Cerroni, W.3    Callegati, F.4
  • 215
    • 84896479097 scopus 로고    scopus 로고
    • The DDoS That Almost Broke the Internet
    • Prince, M.: The DDoS That Almost Broke the Internet. CloudFlare (2013).
    • (2013) CloudFlare
    • Prince, M.1
  • 216
    • 84896447042 scopus 로고    scopus 로고
    • The DDoS That Knocked Spamhaus Offline (And How We Mitigated It)
    • Prince, M.: The DDoS That Knocked Spamhaus Offline (And How We Mitigated It). CloudFlare (2013).
    • (2013) CloudFlare
    • Prince, M.1
  • 217
    • 84897077080 scopus 로고    scopus 로고
    • Prolexic: Prolexic Quarterly Global DDoS Attack Report Q1 2013, Accessed Apr. 2013
    • Prolexic: Prolexic Quarterly Global DDoS Attack Report Q1 2013. https://www. prolexic. com/knowledge-center-ddos-attack-report-2013-q1. html (2013). Accessed Apr. 2013.
    • (2013)
  • 218
  • 219
    • 78349299500 scopus 로고    scopus 로고
    • The management of security in cloud computing
    • IEEE, doi: 10. 1109/ISSA. 2010. 5588290
    • Ramgovind, S., Eloff, M., Smith, E.: The management of security in cloud computing. In: Information Security for South Africa, pp. 1-7. IEEE (2010). doi: 10. 1109/ISSA. 2010. 5588290.
    • (2010) Information Security for South Africa , pp. 1-7
    • Ramgovind, S.1    Eloff, M.2    Smith, E.3
  • 221
  • 222
    • 84897046358 scopus 로고    scopus 로고
    • RedHat: KVM Website, Accessed Jun. 2013
    • RedHat: KVM Website. http://www. linux-kvm. org/ (2013). Accessed Jun. 2013.
    • (2013)
  • 223
    • 84897050427 scopus 로고    scopus 로고
    • RepoCERT: Botnet Using Plesk Vulnerability and Takedown. Seclists Website
    • RepoCERT: Botnet Using Plesk Vulnerability and Takedown. Seclists Website (2013).
    • (2013)
  • 224
    • 79952440250 scopus 로고    scopus 로고
    • Architectural requirements for cloud computing systems: an enterprise cloud approach
    • doi:10.1007/s10723-010-9171-y
    • Rimal, B. P., Jukan, A., Katsaros, D., Goeleven, Y.: Architectural requirements for cloud computing systems: an enterprise cloud approach. J. Grid Comput. 9(1), 3-26 (2011). doi: 10. 1007/s10723-010-9171-y.
    • (2011) J. Grid Comput. , vol.9 , Issue.1 , pp. 3-26
    • Rimal, B.P.1    Jukan, A.2    Katsaros, D.3    Goeleven, Y.4
  • 225
    • 84897090276 scopus 로고    scopus 로고
    • Ripe, NCC: Database Query, Accessed Apr. 2013
    • Ripe, NCC: Database Query. http://apps. db. ripe. net/search/query. html (2013). Accessed Apr. 2013.
    • (2013)
  • 228
    • 85175129914 scopus 로고    scopus 로고
    • When good randomness goes bad: virtual machine reset vulnerabilities and hedging deployed cryptography
    • The Internet Society, San Diego, CA, USA
    • Ristenpart, T., Yilek, S.: When good randomness goes bad: virtual machine reset vulnerabilities and hedging deployed cryptography. In: Proceedings of Network and Distributed Security Symposium (NDSS), pp. 1-18. The Internet Society, San Diego, CA, USA (2010).
    • (2010) Proceedings of Network and Distributed Security Symposium (NDSS) , pp. 1-18
    • Ristenpart, T.1    Yilek, S.2
  • 229
    • 81455143616 scopus 로고    scopus 로고
    • Who can you trust in the cloud?: a review of security issues within cloud computing
    • ACM, New York, NY, USA, doi: 10. 1145/2047456. 2047458
    • Roberts II, J. C., Al-Hamdani, W.: Who can you trust in the cloud?: a review of security issues within cloud computing. In: Proceedings of the Information Security Curriculum Development Conference, pp. 15-19. ACM, New York, NY, USA (2011). doi: 10. 1145/2047456. 2047458.
    • (2011) Proceedings of the Information Security Curriculum Development Conference , pp. 15-19
    • Roberts II, J.C.1    Al-Hamdani, W.2
  • 230
    • 80052864529 scopus 로고    scopus 로고
    • The final Frontier: confidentiality and privacy in the cloud
    • doi:10.1109/MC.2011.223
    • Rocha, F., Abreu, S., Correia, M.: The final Frontier: confidentiality and privacy in the cloud. Computer 44(9), 44-50 (2011). doi: 10. 1109/MC. 2011. 223.
    • (2011) Computer , vol.44 , Issue.9 , pp. 44-50
    • Rocha, F.1    Abreu, S.2    Correia, M.3
  • 232
    • 84855993467 scopus 로고    scopus 로고
    • Building safe PaaS clouds: a survey on security in multitenant software platforms
    • doi:10.1016/j.cose.2011.10.006
    • Rodero-Merino, L., Vaquero, L. M., Caron, E., Desprez, F., Muresan, A.: Building safe PaaS clouds: a survey on security in multitenant software platforms. Comput. Secur. 31(1), 96-108 (2012). doi: 10. 1016/j. cose. 2011. 10. 006.
    • (2012) Comput. Secur. , vol.31 , Issue.1 , pp. 96-108
    • Rodero-Merino, L.1    Vaquero, L.M.2    Caron, E.3    Desprez, F.4    Muresan, A.5
  • 233
    • 84874108116 scopus 로고    scopus 로고
    • Beyond lightning: a survey on security challenges in cloud computing
    • doi: 10. 1016/j. compeleceng. 2012. 04. 015 Available online 19 May 2012
    • Rong, C., Nguyen, S. T., Jaatun, M. G.: Beyond lightning: a survey on security challenges in cloud computing. Comput. Electr. Eng. (2012). doi: 10. 1016/j. compeleceng. 2012. 04. 015 Available online 19 May 2012.
    • (2012) Comput. Electr. Eng.
    • Rong, C.1    Nguyen, S.T.2    Jaatun, M.G.3
  • 235
    • 84897038179 scopus 로고    scopus 로고
    • RSA: RSA SecurID Website, Accessed Jun. 2013
    • RSA: RSA SecurID Website. http://sweden. emc. com/security/rsa-securid. htm (2013). Accessed Jun. 2013.
    • (2013)
  • 236
    • 84897035633 scopus 로고    scopus 로고
    • RSA FirstWatch: Tales from the Darkside: Another Mule Recruitment Site
    • RSA FirstWatch: Tales from the Darkside: Another Mule Recruitment Site. RSA Blog (2013).
    • (2013) RSA Blog
  • 237
    • 84897071688 scopus 로고    scopus 로고
    • Subverting VistaTM Kernel for fun and profit
    • Rutkowska, J.: Subverting VistaTM Kernel for fun and profit. Black Hat Conv. (2008).
    • (2008) Black Hat Conv
    • Rutkowska, J.1
  • 239
    • 80054028420 scopus 로고    scopus 로고
    • Cluster, grid and cloud computing: a detailed comparison
    • IEEE, doi: 10. 1109/ICCSE. 2011. 6028683
    • Sadashiv, N., Kumar, S.: Cluster, grid and cloud computing: a detailed comparison. In: 6th International Conference on Computer Science Education, pp. 477-482. IEEE (2011). doi: 10. 1109/ICCSE. 2011. 6028683.
    • (2011) 6th International Conference on Computer Science Education , pp. 477-482
    • Sadashiv, N.1    Kumar, S.2
  • 240
    • 84873369523 scopus 로고    scopus 로고
    • Using cloud computing to implement a security overlay network
    • doi:10.1109/MSP.2012.88
    • Salah, K., Alcaraz, Calero J.: Using cloud computing to implement a security overlay network. IEEE Secur. Priv. 11(1), 44-53 (2013). doi: 10. 1109/MSP. 2012. 88.
    • (2013) IEEE Secur. Priv. , vol.11 , Issue.1 , pp. 44-53
    • Salah, K.1    Alcaraz, C.J.2
  • 241
    • 84897054872 scopus 로고    scopus 로고
    • SAML v2. 0: OASIS Website, Accessed Apr. 2013
    • SAML v2. 0: OASIS Website. https://www. oasis-open. org/standards#samlv2. 0 (2005). Accessed Apr. 2013.
    • (2005)
  • 243
    • 84897090588 scopus 로고    scopus 로고
    • Vaccinating Systems Against VM-aware Malware
    • Schloesser, M., Guarnieri, C.: Vaccinating Systems Against VM-aware Malware. Rapid7 Labs (2013).
    • (2013) Rapid7 Labs
    • Schloesser, M.1    Guarnieri, C.2
  • 246
    • 84897075780 scopus 로고    scopus 로고
    • SecurityFocus: Xen CVE-2013-1920 Local Memory Corruption Vulnerability
    • SecurityFocus: Xen CVE-2013-1920 Local Memory Corruption Vulnerability. SecurityFocus (2013).
    • (2013) SecurityFocus
  • 247
    • 80955143538 scopus 로고    scopus 로고
    • Verifiable resource accounting for cloud computing services
    • ACM, New York, NY, USA. doi: 10. 1145/2046660. 2046666
    • Sekar, V., Maniatis, P.: Verifiable resource accounting for cloud computing services. In: Proceedings of the 3rd ACM Workshop on Cloud Computing Security, pp. 21-26. ACM, New York, NY, USA (2011). doi: 10. 1145/2046660. 2046666.
    • (2011) Proceedings of the 3rd ACM Workshop on Cloud Computing Security , pp. 21-26
    • Sekar, V.1    Maniatis, P.2
  • 248
    • 80053414558 scopus 로고    scopus 로고
    • Cloud computing security-trends and research directions
    • IEEE Computer Society, Washington, DC, USA, doi: 10. 1109/SERVICES. 2011. 20
    • Sengupta, S., Kaulgud, V., Sharma, V.: Cloud computing security-trends and research directions. In: IEEE World Congress on Services, pp. 524-531. IEEE Computer Society, Washington, DC, USA (2011). doi: 10. 1109/SERVICES. 2011. 20.
    • (2011) IEEE World Congress on Services , pp. 524-531
    • Sengupta, S.1    Kaulgud, V.2    Sharma, V.3
  • 249
    • 84874562245 scopus 로고    scopus 로고
    • CloudWatcher: network security monitoring using OpenFlow in dynamic cloud networks (or: how to provide security monitoring as a service in clouds?)
    • Austin, TX, USA, doi: 10. 1109/ICNP. 2012. 6459946
    • Shin, S., Gu, G.: CloudWatcher: network security monitoring using OpenFlow in dynamic cloud networks (or: how to provide security monitoring as a service in clouds?). In: 20th IEEE International Conference on Network Protocols (ICNP), pp. 1-6. Austin, TX, USA (2012). doi: 10. 1109/ICNP. 2012. 6459946.
    • (2012) 20th IEEE International Conference on Network Protocols (ICNP) , pp. 1-6
    • Shin, S.1    Gu, G.2
  • 250
    • 84897040416 scopus 로고    scopus 로고
    • Malware Authors Using New Techniques to Evade Automated Threat Analysis Systems
    • Shinotsuka, H.: Malware Authors Using New Techniques to Evade Automated Threat Analysis Systems. Symantec Blog (2012).
    • (2012) Symantec Blog
    • Shinotsuka, H.1
  • 251
    • 84897092598 scopus 로고    scopus 로고
    • Don't Click the Left Mouse Button: Introducing Trojan UpClicker
    • Singh, A.: Don't Click the Left Mouse Button: Introducing Trojan UpClicker. FireEye Blog (2012).
    • (2012) FireEye Blog
    • Singh, A.1
  • 252
    • 68749093007 scopus 로고    scopus 로고
    • Security in a virtualised world
    • doi:10.1016/S1353-4858(09)70077-7
    • Sloan, K.: Security in a virtualised world. Netw. Secur. 2009(8), 15-18 (2009). doi: 10. 1016/S1353-4858(09)70077-7.
    • (2009) Netw. Secur. , vol.2009 , Issue.8 , pp. 15-18
    • Sloan, K.1
  • 253
    • 84897031157 scopus 로고    scopus 로고
    • SNIA: Cloud Data Management Interface (CDMI), Accessed Apr. 2013
    • SNIA: Cloud Data Management Interface (CDMI). http://www. snia. org/cdmi (2013). Accessed Apr. 2013.
    • (2013)
  • 256
    • 84873369793 scopus 로고    scopus 로고
    • Targeted cyberattacks: a superset of advanced persistent threats
    • doi:10.1109/MSP.2012.90
    • Sood, A., Enbody, R.: Targeted cyberattacks: a superset of advanced persistent threats. IEEE Secur. Priv. 11(1), 54-61 (2013). doi: 10. 1109/MSP. 2012. 90.
    • (2013) IEEE Secur. Priv. , vol.11 , Issue.1 , pp. 54-61
    • Sood, A.1    Enbody, R.2
  • 257
    • 84867509247 scopus 로고    scopus 로고
    • A combined approach to ensure data security in cloud computing
    • doi:10.1016/j.jnca.2012.07.007
    • Sood, S. K.: A combined approach to ensure data security in cloud computing. J. Netw. Comput. Appli. 35(6), 1831-1838 (2012). doi: 10. 1016/j. jnca. 2012. 07. 007.
    • (2012) J. Netw. Comput. Appli. , vol.35 , Issue.6 , pp. 1831-1838
    • Sood, S.K.1
  • 258
    • 84897043485 scopus 로고    scopus 로고
    • Spoon Website: Browser Sandbox, Accessed Apr. 2013
    • Spoon Website: Browser Sandbox. http://spoon. net/browsers (2013). Accessed Apr. 2013.
    • (2013)
  • 260
    • 85003807409 scopus 로고    scopus 로고
    • 2013: Cloud Predictions: We'll Finally Get Real About Cloud
    • Staten, J.: 2013 Cloud Predictions: We'll Finally Get Real About Cloud. Forrester Blog (2012).
    • (2012) Forrester Blog
    • Staten, J.1
  • 261
    • 78649322624 scopus 로고    scopus 로고
    • A survey on security issues in service delivery models of cloud computing
    • doi:10.1016/j.jnca.2010.07.006
    • Subashini, S., Kavitha, V.: A survey on security issues in service delivery models of cloud computing. J. Netw. Comput. Appli. 34(1), 1-11 (2011). doi: 10. 1016/j. jnca. 2010. 07. 006.
    • (2011) J. Netw. Comput. Appli. , vol.34 , Issue.1 , pp. 1-11
    • Subashini, S.1    Kavitha, V.2
  • 262
    • 84055200868 scopus 로고    scopus 로고
    • Surveying and analyzing security, privacy and trust issues in cloud computing environments
    • doi:10.1016/j.proeng.2011.08.537
    • Sun, D., Chang, G., Sun, L., Wang, X.: Surveying and analyzing security, privacy and trust issues in cloud computing environments. Procedia Eng. 15, 2852-2856 (2011). doi: 10. 1016/j. proeng. 2011. 08. 537.
    • (2011) Procedia Eng. , vol.15 , pp. 2852-2856
    • Sun, D.1    Chang, G.2    Sun, L.3    Wang, X.4
  • 267
    • 84897079375 scopus 로고    scopus 로고
    • Symantec: Internet Security Threat Report 2013 Accessed Apr. 2013
    • Symantec: Internet Security Threat Report 2013. https://www. symantec. com/security_response/publications/threatreport. jsp (2013). Accessed Apr. 2013.
    • (2013)
  • 268
    • 84897105196 scopus 로고    scopus 로고
    • Symantec Security Response: Internet Explorer Zero-Day Used in Watering Hole Attack: Q &A
    • Symantec Security Response: Internet Explorer Zero-Day Used in Watering Hole Attack: Q &A. Symantec Blog (2012).
    • (2012) Symantec Blog
  • 270
    • 78650065157 scopus 로고    scopus 로고
    • Security and privacy challenges in cloud computing environments
    • Takabi, H., Joshi, J., Ahn, G.: Security and privacy challenges in cloud computing environments. IEEE Secur. Priv. 8(6), 24-31 (2010).
    • (2010) IEEE Secur. Priv. , vol.8 , Issue.6 , pp. 24-31
    • Takabi, H.1    Joshi, J.2    Ahn, G.3
  • 273
    • 80052190504 scopus 로고    scopus 로고
    • Digital randomness
    • doi:10.1109/MSPEC.2011.5995897
    • Taylor, G., Cox, G.: Digital randomness. IEEE Spectr. 48(9), 32-58 (2011). doi: 10. 1109/MSPEC. 2011. 5995897.
    • (2011) IEEE Spectr. , vol.48 , Issue.9 , pp. 32-58
    • Taylor, G.1    Cox, G.2
  • 274
    • 79954589576 scopus 로고    scopus 로고
    • Forensic investigation of cloud computing systems
    • doi:10.1016/S1353-4858(11)70024-1
    • Taylor, M., Haggerty, J., Gresty, D., Lamb, D.: Forensic investigation of cloud computing systems. Netw. Secur. 2011(3), 4-10 (2011). doi: 10. 1016/S1353-4858(11)70024-1.
    • (2011) Netw. Secur. , vol.2011 , Issue.3 , pp. 4-10
    • Taylor, M.1    Haggerty, J.2    Gresty, D.3    Lamb, D.4
  • 275
    • 84897063806 scopus 로고    scopus 로고
    • The Linux Foundation: Xen Website, Accessed Jun. 2013
    • The Linux Foundation: Xen Website. http://http://www. xenproject. org/ (2013). Accessed Jun. 2013.
    • (2013)
  • 276
    • 84873390405 scopus 로고    scopus 로고
    • The human element of information security
    • doi:10.1109/MSP.2012.161
    • Thompson, H.: The human element of information security. IEEE Secur. Priv. 11(1), 32-35 (2013). doi: 10. 1109/MSP. 2012. 161.
    • (2013) IEEE Secur. Priv. , vol.11 , Issue.1 , pp. 32-35
    • Thompson, H.1
  • 277
  • 278
    • 84876129185 scopus 로고    scopus 로고
    • Analysis of Google logs retention policies
    • Toubiana, V., Nissenbaum, H.: Analysis of Google logs retention policies. J. Priv. Confid. 3(1), 3-26 (2011).
    • (2011) J. Priv. Confid. , vol.3 , Issue.1 , pp. 3-26
    • Toubiana, V.1    Nissenbaum, H.2
  • 279
    • 79952498688 scopus 로고    scopus 로고
    • Managing a security program in a cloud computing environment
    • ACM, New York, NY, USA, doi: 10. 1145/1940976. 1941001
    • Townsend, M.: Managing a security program in a cloud computing environment. In: Information Security Curriculum Development Conference, pp. 128-133. ACM, New York, NY, USA (2009). doi: 10. 1145/1940976. 1941001.
    • (2009) Information Security Curriculum Development Conference , pp. 128-133
    • Townsend, M.1
  • 280
    • 84897048420 scopus 로고    scopus 로고
    • GPU Monster Shreds Password Hashes
    • Trader, T.: GPU Monster Shreds Password Hashes. HPCwire (2012).
    • (2012) HPCwire
    • Trader, T.1
  • 282
    • 84863022550 scopus 로고    scopus 로고
    • Threat as a service?: virtualization's impact on cloud security
    • doi:10.1109/MITP.2011.117
    • Tsai, H. Y., Siebenhaar, M., Miede, A., Huang, Y., Steinmetz, R.: Threat as a service?: virtualization's impact on cloud security. IT Prof. 14(1), 32-37 (2012). doi: 10. 1109/MITP. 2011. 117.
    • (2012) IT Prof. , vol.14 , Issue.1 , pp. 32-37
    • Tsai, H.Y.1    Siebenhaar, M.2    Miede, A.3    Huang, Y.4    Steinmetz, R.5
  • 284
    • 79751493181 scopus 로고    scopus 로고
    • Locking the sky: a survey on IaaS cloud security
    • doi:10.1007/s00607-010-0140-x
    • Vaquero, L. M., Rodero-Merino, L., Morán, D.: Locking the sky: a survey on IaaS cloud security. Computing 91(1), 93-118 (2011). doi: 10. 1007/s00607-010-0140-x.
    • (2011) Computing , vol.91 , Issue.1 , pp. 93-118
    • Vaquero, L.M.1    Rodero-Merino, L.2    Morán, D.3
  • 285
    • 69349098776 scopus 로고    scopus 로고
    • Cloud computing and the common man
    • doi:10.1109/MC.2009.252
    • Viega, J.: Cloud computing and the common man. Computer 42(8), 106-108 (2009). doi: 10. 1109/MC. 2009. 252.
    • (2009) Computer , vol.42 , Issue.8 , pp. 106-108
    • Viega, J.1
  • 286
    • 84897067982 scopus 로고    scopus 로고
    • VMware: VMware vSphere, Accessed Apr. 2013
    • VMware: VMware vSphere. https://www. vmware. com/support/product-support/vsphere/ (2013). Accessed Apr. 2013.
    • (2013)
  • 287
    • 84897092357 scopus 로고    scopus 로고
    • VMware: VMware Website, Accessed Jun. 2013
    • VMware: VMware Website. https://www. vmware. com/products/ (2013). Accessed Jun. 2013.
    • (2013)
  • 288
    • 84897042908 scopus 로고    scopus 로고
    • Accessed Apr. 2013
    • VMware: What is OVF? https://www. vmware. com/technical-resources/virtualization-topics/virtual-appliances/ovf. html (2013). Accessed Apr. 2013.
    • (2013) VMware: What is OVF?
  • 289
    • 84897034695 scopus 로고    scopus 로고
    • VMware Community Forums: Low/proc/sys/kernel/random/entr opy_avail causes exim to stop sending mail, Accessed May 2013
    • VMware Community Forums: Low/proc/sys/kernel/random/entr opy_avail causes exim to stop sending mail. http://communities. vmware. com/message/530909 (2006). Accessed May 2013.
    • (2006)
  • 291
    • 77954843911 scopus 로고    scopus 로고
    • Toward publicly auditable secure cloud data storage services
    • doi:10.1109/MNET.2010.5510914
    • Wang, C., Ren, K., Lou, W., Li, J.: Toward publicly auditable secure cloud data storage services. IEEE Netw. 24(4), 19-24 (2010). doi: 10. 1109/MNET. 2010. 5510914.
    • (2010) IEEE Netw. , vol.24 , Issue.4 , pp. 19-24
    • Wang, C.1    Ren, K.2    Lou, W.3    Li, J.4
  • 292
    • 70449569012 scopus 로고    scopus 로고
    • Ensuring data storage security in cloud computing
    • IEEE, doi: 10. 1109/IWQoS. 2009. 5201385
    • Wang, C., Wang, Q., Ren, K., Lou, W.: Ensuring data storage security in cloud computing. In: 17th International Workshop on Quality of Service, pp. 1-9. IEEE (2009). doi: 10. 1109/IWQoS. 2009. 5201385.
    • (2009) 17th International Workshop on Quality of Service , pp. 1-9
    • Wang, C.1    Wang, Q.2    Ren, K.3    Lou, W.4
  • 293
    • 77953302052 scopus 로고    scopus 로고
    • The impact of virtualization on network performance of Amazon EC2 data center
    • Sand Diego, CA, USA, doi: 10. 1109/INFCOM. 2010. 5461931
    • Wang, G., Ng, T.: The impact of virtualization on network performance of Amazon EC2 data center. In: Proceedings of the IEEE INFOCOM, pp. 1-9. Sand Diego, CA, USA (2010). doi: 10. 1109/INFCOM. 2010. 5461931.
    • (2010) Proceedings of the IEEE INFOCOM , pp. 1-9
    • Wang, G.1    Ng, T.2
  • 294
    • 84897072385 scopus 로고    scopus 로고
    • Facebook Users Suffer Viral Surge
    • Ward, M.: Facebook Users Suffer Viral Surge. BBC News (2009).
    • (2009) BBC News
    • Ward, M.1
  • 295
    • 84897077914 scopus 로고    scopus 로고
    • Websense: 2013 Threat Report, Accessed Apr. 2013
    • Websense: 2013 Threat Report. https://www. websense. com/content/websense-2013-threat-report. aspx (2013). Accessed Apr. 2013.
    • (2013)
  • 296
    • 74049145625 scopus 로고    scopus 로고
    • Managing security of virtual machine images in a cloud environment
    • ACM, New York, NY, USA, doi: 10. 1145/1655008. 1655021
    • Wei, J., Zhang, X., Ammons, G., Bala, V., Ning, P.: Managing security of virtual machine images in a cloud environment. In: Proceedings of the ACM Workshop on Cloud Computing Security, pp. 91-96. ACM, New York, NY, USA (2009). doi: 10. 1145/1655008. 1655021.
    • (2009) Proceedings of the ACM Workshop on Cloud Computing Security , pp. 91-96
    • Wei, J.1    Zhang, X.2    Ammons, G.3    Bala, V.4    Ning, P.5
  • 299
    • 84897048190 scopus 로고    scopus 로고
    • Mobile Scam: Winning Without Playing
    • Wueest, C.: Mobile Scam: Winning Without Playing. Symantec Blog (2013).
    • (2013) Symantec Blog
    • Wueest, C.1
  • 300
    • 84877272118 scopus 로고    scopus 로고
    • Security and privacy in cloud computing
    • doi: 10. 1109/SURV. 2012. 060912. 00182
    • Xiao, Z., Xiao, Y.: Security and privacy in cloud computing. IEEE Commun. Surv. Tuts. 15(2), 843-859 (2013). doi: 10. 1109/SURV. 2012. 060912. 00182.
    • (2013) IEEE Commun. Surv. Tuts. , vol.15 , Issue.2 , pp. 843-859
    • Xiao, Z.1    Xiao, Y.2
  • 303
    • 84873465426 scopus 로고    scopus 로고
    • Help! Is There a Trustworthy-Systems Doctor in the House?
    • doi:10.1109/MSP.2013.10
    • Yasinsac, A., Irvine, C.: Help! Is There a Trustworthy-Systems Doctor in the House? IEEE Secur. Priv. 11(1), 73-77 (2013). doi: 10. 1109/MSP. 2013. 10.
    • (2013) IEEE Secur. Priv. , vol.11 , Issue.1 , pp. 73-77
    • Yasinsac, A.1    Irvine, C.2
  • 304
    • 77952062919 scopus 로고    scopus 로고
    • Resettable public-key encryption: how to encrypt on a virtual machine
    • Springer-Verlag, San Francisco, CA, USA, doi: 10. 1007/978-3-642-11925-5_4
    • Yilek, S.: Resettable public-key encryption: how to encrypt on a virtual machine. In: Proceedings of the International Conference on Topics in Cryptology, CT-RSA'10, pp. 41-56. Springer-Verlag, San Francisco, CA, USA (2010). doi: 10. 1007/978-3-642-11925-5_4.
    • (2010) Proceedings of the International Conference on Topics in Cryptology, CT-RSA'10 , pp. 41-56
    • Yilek, S.1
  • 308
    • 58049137106 scopus 로고    scopus 로고
    • PALM: security preserving VM live migration for systems with VMM-enforced protection
    • IEEE Computer Society, Washington, DC, USA, doi: 10. 1109/APTC. 2008. 15
    • Zhang, F., Huang, Y., Wang, H., Chen, H., Zang, B.: PALM: security preserving VM live migration for systems with VMM-enforced protection. In: 3rd Asia-Pacific Trusted Infrastructure Technologies Conference, pp. 9-18. IEEE Computer Society, Washington, DC, USA (2008). doi: 10. 1109/APTC. 2008. 15.
    • (2008) 3rd Asia-Pacific Trusted Infrastructure Technologies Conference , pp. 9-18
    • Zhang, F.1    Huang, Y.2    Wang, H.3    Chen, H.4    Zang, B.5
  • 311
    • 84897094861 scopus 로고    scopus 로고
    • Separating fact from fiction in cloud computing
    • Zieg, M.: Separating fact from fiction in cloud computing. Data Center J. (2012).
    • (2012) Data Center J.
    • Zieg, M.1
  • 312
    • 79959557055 scopus 로고    scopus 로고
    • Addressing cloud computing security issues
    • doi:10.1016/j.future.2010.12.006
    • Zissis, D., Lekkas, D.: Addressing cloud computing security issues. Future Gener. Comput. Syst. 28(3), 583-592 (2010). doi: 10. 1016/j. future. 2010. 12. 006.
    • (2010) Future Gener. Comput. Syst. , vol.28 , Issue.3 , pp. 583-592
    • Zissis, D.1    Lekkas, D.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.