Cloud computing is a new computing paradigm that attracted many computer users, business, and government agencies. Cloud computing brought a lot of advantages especially in ubiquitous services where everybody can access computer services through internet. With cloud computing, there is no need of physical hardware or servers that will support the company’s computer system, internet services and networks. It will basically cut down the expenses of the company allotted for the maintenance of the computer system. Along with the good benefits of Cloud Computing has to offer, there are security problems which make users anxious about the safety, reliability and efficiency of migrating to cloud computing. In this paper, the authors tried to study the threats and attacks that possibly launch in cloud computing and the possible solutions to mitigate these attacks. Aside of having network and application securities being adopted, there must be a security that authenticate the user when accessing the cloud services that is bound to the rules between the cloud computing provider and the client side.
목차
Abstract 1. Introduction 2. Cloud Computing Models 3. Layers of Cloud computing model 4. Cloud Computing Attacks 5 Security Requirements 6. Access Control 7. Authentications and ID Management 8. Conclusion and Future Works References
키워드
Cloud ComputingAccess ControlDigital ID’s
저자
Young-Gi Min [ 153-803 Digital Empire Bldg., 685, Gasan-dong, Geumcheon-gu, Seoul, Korea, Director of KCSA. ]
Hyo-Jin Shin [ 150-742 Korea Teachers Pension. 2and Floor, Yeouido-dong, Yeongdeungpo-gu, Seoul, Korea. ]
Young-Hwan Bang [ Korea Institute of Industrial Technology, Korea, Senior Researcher. ]
Corresponding author
1. 보안공학에 대한 각종 조사 및 연구
2. 보안공학에 대한 응용기술 연구 및 발표
3. 보안공학에 관한 각종 학술 발표회 및 전시회 개최
4. 보안공학 기술의 상호 협조 및 정보교환
5. 보안공학에 관한 표준화 사업 및 규격의 제정
6. 보안공학에 관한 산학연 협동의 증진
7. 국제적 학술 교류 및 기술 협력
8. 보안공학에 관한 논문지 발간
9. 기타 본 회 목적 달성에 필요한 사업