$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Cloud Security Threats and Techniques to Strengthen Cloud Computing Adoption Framework :

International journal of information technology and web engineering : an official publication of the Information Resources Management Association, v.11 no.3, 2016년, pp.50 - 64  

Khan, Nabeel ,  Al-Yasiri, Adil

초록이 없습니다.

참고문헌 (74)

  1. Al-Ayyoub. M., Jararweh. Y., Benkhelifa. E., Vouk. M., & Rindos. A. (2015). SDSecurity: a software defined security experimental framework. Proceedings of the 2015 IEEE International Conference onCommunication Workshop (ICCW) (pp. 1871-1876). IEEE. 

  2. Almulla, S. A., & Yeun, C. Y. (2010). Cloud Computing Security Management, Engineering Systems Management and Its Applications (ICESMA. Proceedings of the2010 Second International Conference on Cloud Security. 

  3. Anne Thomas, M. (2008, December 5). Cloud Computing: the Gap between Hype and Reality (Presentation). Proceedings of the Burton Group ECAR Symposium, Boca Raton, FL, USA. 

  4. 10.1147/JRD.2009.5429060 Berger, S., Cáceres, R., Goldman, K., Pendarakis, D., Perez, R., Rao, JR., Rom, E., Sailer, R.., Schildhauer, W., Srinivasan, D., Tal, S., & Valdez, E. (2009). Security for the Cloud infrastructure: trusted virtual data center implementation. IBM J. Res. Dev., 53(4), 560-571. 

  5. G.Blokdijk 2009 Cloud Computing - the Complete Cornerstone Guide to Cloud Computing Best Practices: Concepts, Terms, and Techniques for Successfully Planning 

  6. Carlin, Sean, Curran, Kevin. Cloud Computing Security :. International journal of ambient computing and intelligence, vol.3, no.1, 14-19.

  7. Centre for the Protection of National Infrastructure. (2010). Information Security Briefing 01/2010 Cloud Computing. 

  8. 10.1016/j.ijinfomgt.2013.01.005 Chang, V., Walters, R.J., & Will, G. (2013) The development that leads to the Cloud Computing Business Framework. International Journal of Information Management, 33(3). 

  9. Cloud Security Alliance. (2010). Top Threats to Cloud Computing V1.0. 

  10. Cloud Security Alliance. (2011). Security guidance for critical areas of focus in Cloud Computing V3.0. 

  11. Cloud Security Alliance. (2012). SecaaS implementation guidance, category 1: identity and Access management. 

  12. 10.1109/NGMAST.2015.25 

  13. Dawoud, W., Takouna, I., & Meinel, C. (2010). Infrastructure as a service security: Challenges and solutions. Proceedings of the 7th International Conference on Informatics and Systems (INFOS), Potsdam, Germany (pp 1-8). 

  14. ENISA. (2009). Cloud Computing: benefits, risks and recommendations for information Security. 

  15. Security challenges in Cloud Computing L.Ertaul 2010 36 Proceedings of the 2010 International conference on Security and Management SAM’10 

  16. 10.1109/HICSS.2007.611 

  17. Garfinkel, T., & Rosenblum, M. (2005). When virtual is harder than real: Security challenges in virtual machine based computing environments, Proceedings of the 10th conference on Hot Topics in Operating Systems, Santa Fe, NM, USA (Vol. 10, pp 227-229). USENIX Association Berkeley, CA, USA. 

  18. 10.1109/UCC.2011.36 

  19. S.Gautam 2010 Enterprise Cloud Computing: Technology, Architecture, Applications 

  20. 10.1007/978-3-642-10665-1 GiljeJaatun, M. (2009, December 1-4). Cloud Computing: First International Conference. Proceedings of CloudCom ‘09, Beijing, China. Springer. 

  21. L.Gillam 2010 Cloud Computing: Principles, Systems and Applications 

  22. Grobauer, B, Walloschek, T, Stocker, E. Understanding Cloud Computing Vulnerabilities. IEEE security & privacy, vol.9, no.2, 50-57.

  23. 10.21236/ADA545053 Hamlen, K., Kantarcioglu, M., Khan, L., & Thuraisingham, B. (2010, February). Security issues for cloud computing (Technical report UTDCS-02-10). The University of Dallas. 

  24. 10.1109/ICCASM.2010.5622643 

  25. Harnik, Danny, Pinkas, Benny, Shulman-Peleg, Alexandra. Side Channels in Cloud Services: Deduplication in Cloud Storage. IEEE security & privacy, vol.8, no.6, 40-47.

  26. 10.1109/CLOUD.2015.157 

  27. Himmel, M.A. (2012). Qualitative Analysis of Cloud Computing Risks and Framework for the Rationalization and Mitigation of Cloud Risks. ETD Collection for Pace University. 

  28. IBM. (2010). Defining a framework for cloud adoption (Technical paper). 

  29. 10.1109/HICSS.2011.103 

  30. Jararweh, Y., Al-Ayyoub, M., Darabseh, A., Benkhelifa, E., Vouk, M., Rindos, A.. Software defined cloud: Survey, system and evaluation. Future generation computer systems : FGCS, vol.58, 56-74.

  31. 10.1109/CCST.2010.5678682 Jasti, A., Shah, P., Nagaraj, R., & Pendse, R. (2010). Security in multi-tenancy cloud. Proceedings of theIEEE International Carnahan Conference on Security Technology (ICCST), KS, USA (pp. 35-41). IEEE Computer Society, Washington, DC, USA. 

  32. G.Jung 2013 Cloud Advisor: a recommendation-as-a-service platform for Cloud configuration and pricing. Proceedings of the IEEE ninth world congress on service 

  33. 10.1109/ICSAP.2010.78 

  34. 10.5121/ijccsa.2015.5601 Khan, N., & Yasiri, A.A. (2015, December). Framework for Cloud Computing Adoption: A RoadMap for SMEs to Cloud Migration. International Journal on Cloud Computing: Services and Architecture, 5(5/6). 

  35. Li, W., Ping, L.. Trust Model to Enhance Security and Interoperability of Cloud Environment. Lecture notes in computer science, vol.5931, 69-79.

  36. Marinos, A., Briscoe, G.. Community Cloud Computing. Lecture notes in computer science, vol.5931, 472-484.

  37. Martens, Benedikt, Teuteberg, Frank. Decision-making in cloud computing environments: A cost and risk based approach. Information systems frontiers, vol.14, no.4, 871-893.

  38. T.Mather 2009 Cloud Security and Privacy 

  39. 10.6028/NIST.SP.800-145 Mell. P., & Grance, T. (2011). The NIST definition of cloud computing. NIST special publication 800-145. 

  40. 10.1145/2187836.2187967 

  41. Morsy, M.A. Grundy, J., & Müller, I. (2010). An analysis of the Cloud Computing Security problem. Proceedings of APSEC 2010 Cloud Workshop, Sydney, Australia. 

  42. 10.1145/2046660.2046682 

  43. S.Nedev 2014 Exploring the Factors Influencing the Adoption of Cloud Computing and the Challenges Faced by the Business 

  44. OWASP. (2010). The Ten most critical Web application Security risks. 

  45. 10.1109/CloudCom.2014.105 

  46. Reuben, J. S. (2007, October). A survey on virtual machine Security. Seminar on Network Security (Technical report). Helsinki University of Technology. 

  47. 10.1145/1653662.1653687 

  48. J. W.Rittinghouse 2007 Security in the Cloud, Cloud Computing. Implementation, Management, and Security 

  49. J. W.Rittinghouse 2009 Security in the Cloud, Cloud Computing. Implementation, Management, and Security 

  50. Santos, N., Gummadi, K. P., & Rodrigues, R. (2009). Towards Trusted Cloud Computing, Proceedings of the 2009 conference on Hot topics in cloud computing, San Diego, California. 

  51. Singh, L.V., Bole, A.V., & Yadav, S.K. (2015, January). Security Issues of Cloud Computing- A Survey. International Journal of Advance Research in Computer Science and Management Studies, 3(1). 

  52. 10.1109/PDGC.2010.5679895 

  53. A Survey on Data Storage and Security in Cloud Computing V.Spoorthy 2014 306 6 International Journal of Computer Science and Mobile Computing IJCSMC 3 

  54. M.Tebaa 2012 86 Homomorphic encryption method applied to Cloud Computing. Proceedings of the National Days of Network Security and Systems (JNS2) 

  55. Tian, H., Chen, Y., Chang, C.C., Jiang, H., Huang, Y., Chen, Y., & Liu, J. (2015). Dynamic-Hash-Table Based Public Auditing for Secure Cloud Storage. IEEE Transactions on Services Computing, 99(99). 

  56. Study of Security Issues in Cloud Computing A.Varsha Wadhwa 2015 230 6 International Journal of Computer Science and Mobile Computing IJCSMC 4 

  57. Viega, J.. Cloud Computing and the Common Man. Computer, vol.42, no.8, 106-108.

  58. Walliman, N. (2012). Your Undergraduate Dissertation: The Essential Guide for Success (2nd ed.). London: Sage Publications. 

  59. 10.1109/IWQoS.2009.5201385 

  60. 10.1109/SP.2010.30 

  61. 10.1145/1655008.1655021 

  62. 10.1007/s12599-009-0071-2 Weinhardt, C., Anandasivam, A., Blau, B., Borissov, N., Meinl, T., Michalk, W., & Stober, J. (2009). Cloud Computing - A Classification, Business Models, and Research Directions. Journal of Business and Information Systems Engineering. 

  63. V.Winkler 2011 Securing the Cloud: Cloud computer Security techniques and tactics 

  64. Wu, H., Ding, Y., Winer, C., & Yao, L. (2010). Network Security for virtual machine in Cloud Computing. Proceedings of the 5th International conference on computer sciences and convergence information technology (ICCIT) (pp. 18-21). 

  65. Wu, H., Ding, Y., Winer, C., & Yao, L. (2010). Network Security for virtual machine in Cloud Computing. Proceedings of the 5th International conference on computer sciences and convergence information technology (ICCIT) (pp. 18-21). 

  66. J.Wylie 2015 Selecting the right data distribution scheme for a survivable Storage system 

  67. 10.1109/MDM.2010.73 

  68. G.Xiaopeng 2010 395 VNSS: a Network Security sandbox for virtual Computing environment. Proceedings of the IEEE youth conference on information Computing and telecommunications (YC-ICT) 

  69. 10.1002/sec.1405 Yaseen, Q., Althebyan. Q., Panda. B., & Jararweh. Y. (2016). Mitigating insider threat in cloud relational databases. Security and Communication Networks, 9(10), 1132-1145. 

  70. 10.1109/APTC.2008.15 Zhang, F., Huang, Y., Wang, H., Chen, H., & Zang, B. (2008). PALM: Security Preserving VM Live Migration for Systems with VMM-enforced Protection. Proceedings of the Third Asia- Pacific Trusted Infrastructure Technologies Conference APTC’08 (pp. 9-18). IEEE Computer Society, Washington, DC, USA. 

  71. 10.1109/ICFN.2010.58 

  72. 10.1109/ICACT.2014.6779008 

  73. Zhao, G., Liu, J., Tang, Y., Sun, W., Zhang, F., Ye, X., Tang, N.. Cloud Computing: A Statistics Aspect of Users. Lecture notes in computer science, vol.5931, 347-358.

  74. Zissis, D., Lekkas, D.. Addressing cloud computing security issues. Future generation computer systems : FGCS, vol.28, no.3, 583-592.

섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로