최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기정보처리학회지 = Korea information processing society review, v.23 no.4, 2016년, pp.27 - 35
황우민 (국가보안기술연구소) , 김성진 (국가보안기술연구소) , 김형천 (국가보안기술연구소)
초록이 없습니다.
* AI 자동 식별 결과로 적합하지 않은 문장이 있을 수 있으니, 이용에 유의하시기 바랍니다.
핵심어 | 질문 | 논문에서 추출한 답변 |
---|---|---|
클라우드 스토리지의 장점은 무엇인가? | 클라우드 컴퓨팅은 주문형 셀프 서비스, 광대역 네트워크 접근, 자원 공동관리, 빠른 탄력성, 측정 가능한 서비스의 특성을 갖는 차세대 컴퓨팅 구조[58]로서가용성, 유연한확장성, 높은접근성등의 장점을 앞세워 빠르게 확산되고 있다. 사용자들은 클라우드에 저장된 자신의 데이터를 위치에 구애 받지 않고 클라우드로의 네트워크 연결만으로 접근할수있으며스토리지관리부담을줄일수있고필요한 만큼 사용하고 그에 대한 비용만을 지불할 수있기때문에비용절감효과를얻을수있는장점이있다. 하지만클라우드환경에서는다수의사용자가 중앙 집중화된 컴퓨팅 환경을 공유하기 때문에 저장된 데이터를 보호하기 위한 기본적인 데이터 안전성 확보와 자료 유출 방지, 복구, 모니터링 및통합인증, 접근권한관리기술등다양한 보안 요구사항을 만족시킬 수 있는 확장성 있는 저장기술이필요하다. | |
클라우드 스토리지에 사용되는 기술에는 무엇이 있는가? | 클라우드 스토리지는 클라우드 환경에서 데이터가 저장되는 논리적 스토리지 연합체로써 다수의 분산된 저장 장치를 연결하여 저장 공간을 생성함으로써 클라우드 사용자로 하여금 데이터를 저장하고 접근할 수 있도록 관리하는 스토리지로 정의된다. 이러한 클라우드 스토리지에 사용되는 기술의 주요 예로써 HDFS, Swift, Glory-FS, OwFS, GlusterFS, NFS/CIFS, 상용서비스의 예로써 Google Cloud Storage, Amazon S3 등이 있다. | |
클라우드 스토리지란 무엇인가? | 클라우드 스토리지는 클라우드 환경에서 데이터가 저장되는 논리적 스토리지 연합체로써 다수의 분산된 저장 장치를 연결하여 저장 공간을 생성함으로써 클라우드 사용자로 하여금 데이터를 저장하고 접근할 수 있도록 관리하는 스토리지로 정의된다. 이러한 클라우드 스토리지에 사용되는 기술의 주요 예로써 HDFS, Swift, Glory-FS, OwFS, GlusterFS, NFS/CIFS, 상용서비스의 예로써 Google Cloud Storage, Amazon S3 등이 있다. |
CSA Top Threats Working Group, "The Treacherous 12: Cloud Computing Top Threats in 2016," Cloud Security Alliance (CSA), Feb 2016.
클라우드컴퓨팅 연구조합, 차세대컴퓨팅학회, "2015 클라우드 컴퓨팅 기술 스택," 2016.01
정성재, 배유미, "클라우드 보안 위협요소와 기술 동향 분석," 보안공학연구논문지, 2013.04
Google Compute Engine Incident #15056, https://status.cloud.google.com/incident/compute/15056#5719570367119360, (2016.07.06)
Dave Barth, "Google Cloud Storage now provides server-side encruption," https://cloudplatform.googleblog.com/2013/08/googlecloud-storage-now-provides.html, Google Cloud Platform Blog (2016.07.06)
주정호 외, "클라우드 컴퓨팅 보안 위협에 대처한 저장장치 가상화 시스템 보안 요구 사항 제안," 보안공학연구논문지 Vol.11, No.6, 2014
ITU-T Study Group 17, "Recommendation ITU-T X.1601 Security framework for cloud computing," 2015.10, available on http://handle.itu.int/11.1002/1000/12613
ENISA, "ENISA threat Landscape 2015 (ETL 2015)," 2016.01, available on https://www.enisa.europa.eu/publications/etl2015
김홍연 외, "GLORY-FS: 대규모 인터넷 서비스를 위한 분산 파일 시스템." The Journal of The Korean Institute of Communication Sciences, 30.4 (2013.3): 16-22.
Hadoop Project, http://hadoop.apache.org
K. Shvachko et al., "The Hadoop Distributed File System." In Proceedings of the 2010 IEEE 26th Symposium on Mass Storage Systems and Technologies (MSST) (MSST '10). IEEE Computer Society, Washington, DC, USA, 1-10.
OpenStack Swift, http://www.openstack.org
GlusterFS, "Open source, distributed file system," http://www.gluster.org, March 2013.
IETF, RFC5661, Network File System (NFS) Version 4 Minor Version 1 Protocol, Jan. 2010
K Scarfone et al., "Guide to Storage Encryption Technologies for End User Devices," NIST Special Publication 800-111, Nov. 2007.
Xuxian Jiang et al., "Stealthy malware detection and monitoring through VMM-based "out-of-the-box" semantic view reconstruction," ACM Trans. Inf. Syst. Secur.13, 2, Article 12 (March 2010), 28 pages.
C. Benninger et al., "Maitland: Lighter-weight VM introspection to support cyber-security in the cloud," CLOUD'12, pages 471-478, June 2012.
Wolfgang Richter, "Agentless cloud-wide monitoring of virtual disk state," In Proceedings of the 2014 workshop on PhD forum (PhD forum '14). ACM, New York, NY, USA, 15-16.
W. Richter et al., "Agentless Cloud-Wide Streaming of Guest File System Updates," IC2'14, IEEE Computer Society, Washington, DC, USA.
P. Puzio et al., "ClouDedup: Secure Deduplication with Encrypted Data for Cloud Storage." 2013 IEEE 5th International Conference on Cloud Computing Technology and Science, Bristol, 2013, pp. 363-370.
J. Stanek et al., "A secure data deduplication scheme for cloud storage." International Conference on Financial Cryptography and Data Security. Springer Berlin Heidelberg, 2014.
N. Kaaniche and M. Laurent, "A Secure Client Side Deduplication Scheme in Cloud Storage Environments," 2014 6th International Conference on New Technologies, Mobility and Security (NTMS), Dubai, 2014, pp. 1-7.
Mark W. Storer et al., "Secure data deduplication," In Proceedings of the 4th ACM international workshop on Storage security and survivability (StorageSS '08). ACM, New York, NY, USA, 1-10.
Man-Ki Yoon et al., "PIFT: Predictive Information-Flow Tracking," In Proceedings of the Twenty-First International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS '16). ACM, New York, NY, USA, 713-725.
C. Wang and Shiuhpyng Winston Shieh. "SWIFT: Decoupled System-Wide Information Flow Tracking and its Optimizations." Journal of Information Science and Engineering 31.4 (2015): 1413-1429.
Christos Gkantsidis et al., "Rhea: automatic filtering for unstructured cloud storage," In Proceedings of the 10th USENIX conference on Networked Systems Design and Implementation (nsdi'13), USENIX Association, Berkeley, CA, USA, 343-356.
Dongyoung Koo et al., "Secure and efficient data retrieval over encrypted data using attribute-based encryption in cloud storage," Comput. Electr. Eng. 39, 1 (January 2013), 34-46.
허의남, "퍼스널 클라우드 보안 기술과 프라이버시," TTA 저널 no.139, 2012, 65-69.
IEEE Security in Storage Working Group, "IEEE P1619/D16 Standard for Cryptographic Protection of Data on Block-Oriented Storage Devices," IEEE Computer Society Committee, May 2007.
E. Casey and Gerasimos J. Stellatos, "The impact of full disk encryption on digital forensics." ACM SIGOPS Operating Systems Review42.3 (2008): 93-98.
E. Casey et al. "The growing impact of full disk encryption on digital forensics," Digital Investigation 8.2 (2011): 129-134.
A. Bacs et al., "Slick: an intrusion detection system for virtualized storage devices," In Proceedings of the 31st Annual ACM Symposium on Applied Computing (SAC '16). ACM, New York, NY, USA, 2033-2040.
Adam G. Pennington et al., "Storage-Based Intrusion Detection," ACM Trans. Inf. Syst. Secur. 13, 4, Article 30 (December 2010), 27 pages.
Anjo Vahldiek-Oberwagner et al., "Guardat: enforcing data policies at the storage layer," In Proceedings of the Tenth European Conference on Computer Systems (EuroSys '15). ACM, New York, NY, USA, , Article 13, 16 pages.
은하수 외, "Outsourced Storage Auditing Scheme using Coefficient Matrix." 정보처리학회논문지 2.11 (2013): 483-488.
Amazon S3, "Protecting Data Using Encryption," http://docs.aws.amazon.com/AmazonS3/latest/dev/UsingEncryption.html (2016,07,06)
신재복 외, "클라우드 스토리지 서비스를 위한 ARM TrustZone 기반의 안전한 데이터 관리 기법," 대한임베디드공학회 추계학술대회, 2012. 11. 85-88.
백목련 외, "안전한 클라우드 스토리지를 위한 프라이버시 보장 자체 인증 공공 감사," 정보과학회논문지, 43(4), 497-508.
권오민, 윤현수, "클라우드 데이터 무결성 검증방법 조사," 한국정보과학회 학술발표논문집, 2013.6, 689-691.
C. Wang et al., "Privacy-Preserving Public Auditing for Secure Cloud Storage," in IEEE Transactions on Computers, vol. 62, no. 2, pp. 362-375, Feb. 2013.
M. Bakhtiari et al., "Secure Search Over Encrypted Data in Cloud Computing," Advanced Computer Science Applications and Technologies (ACSAT), 2013 International Conference on, Kuching, 2013, pp. 290-295.
C. Liu et al., "Efficient Searchable Symmetric Encryption for Storing Multiple Source Data on Cloud," Trustcom/BigDataSE/ISPA, 2015 IEEE, Helsinki, 2015, pp. 451-458.
K. Beer and R. Holland, "Securing Data at Rest with Encryption," Amazon Web Services, Nov. 2013.
S. Alneyadi et al., "A survey on data leakage prevention systems," Journal of Network and Computer Applications 62, 2016, 137-152.
D. Harnik et al, "Side channels in cloud services: Deduplication in cloud storage." IEEE S&P, 8(6) 2010, 40-47
S. Keelveedhi et al., "DupLESS: server-aided encryption for deduplicated storage." 22nd USENIX Security Symposium (USENIX Security 13). 2013.
S. Matsuda and S. Moriai, "Lightweight Cryptography for the Cloud: Exploit the Power of Bitslice Implementation," Cryptographic Hardware and Embedded Systems (CHES), 2012, 408-425
S. Belguith et al., "Enhancing Data Security in Cloud Computing Using a Lightweight Cryptographic Algorithm," Eleventh International Conference on Autonomic and Autonomous Systems, 2015.
Y. Chou et al., "Enforcing confidentiality in a SaaS cloud environment," Telecommunications Forum (TELFOR), 2011, 90-93.
S. Rehman and R. Gautam, "Research on ACcess Control Techniques in SaaS of Cloud Computing," Security in Computing and Communications, Springer, 2014, 92-100.
R. Wilkins and B. Richardson, "UEFI Secure Boot in Modern Computer Security Solutions," UEFI Forum, Sep. 2013.
O. Khan et al., "Rethinking Erasure Codes for Cloud File Systems: Minimizing I/O for Recovery and Degraded Reads," USENIX FAST, 2012.
P. Mell and T. Grance, "The NIST Definition of Cloud Computing," 2011, http://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-145.pdf
Xingjie Yu et al., "Remotely wiping sensitive data on stolen smartphones," In Proceedings of the 9th ACM symposium on Information, computer and communications security (ASIA CCS '14). ACM, New York, NY, USA, 537-542.
D. Birk and C. Wegener, "Technical Issues of Forensic Investigations in Cloud Computing Environments," Systematic Approaches to Digital Forensic Engineering (SADFE), 2011 IEEE Sixth International Workshop on, Oakland, CA, 2011, pp. 1-10.
S. Alqahtany et al., "Cloud Forensics: A Review of Challenges, Solutions and Open Problems," Cloud Computing (ICCC), 2015 International Conference on, Riyadh, 2015, pp. 1-9.
S. Zawoad et al., "Towards Building Forensics Enabled Cloud Through Secure Logging-as-a-Service," in IEEE Transactions on Dependable and Secure Computing, vol. 13, no. 2, pp. 148-162, March-April 1 2016.
T. Sang, "A Log Based Approach to Make Digital Forensics Easier on Cloud Computing," Intelligent System Design and Engineering Applications (ISDEA), 2013 Third International Conference on, Hong Kong, 2013, pp. 91-94.
A. K. Mishra et al., "Cloud Forensics: State-of-the-Art and Research Challenges," Cloud and Services Computing (ISCOS), 2012 International Symposium on, Mangalore, 2012, pp. 164-170.
S. Almulla et al., "A Distributed Snapshot Framework for Digital Forensics Evidence Extraction and Event Reconstruction from Cloud Environment," 2013 IEEE 5th International Conference on Cloud Computing Technology and Science, Bristol, 2013, pp. 699-704.
V. M. Katilu et al., "Challenges of Data Provenance for Cloud Forensic Investigations," Availability, Reliability and Security (ARES), 2015 10th International Conference on, Toulouse, 2015, pp. 312-317.
S. Khan et al., "Cloud Log Forensics: Foundations, State of the Art, and Future Directions," ACM Computing Syrveys 49(1), Feb. 2016.
NIST Cloud Computing Forensic Science Working Group IT Laboratory, "Draft NISTIR 8006, NIST Cloud Computing Forensic Science Challenges," NIST, 2014.
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.