Security Technology Trend in Cloud Computing

클라우드 컴퓨팅 보안 기술 동향

  • Published : 2012.01.18

Abstract

Keywords

Acknowledgement

Supported by : 한국연구재단

References

  1. Cloud Computing Use Case Discussion Group, Cloud Computing Use Case White Paper Version 4.0, July, 2010
  2. D. Zissis, and D. Lekkas, Addressing cloud computing security issues, Future Generation Computer Systems, Vol. 28(3), March, 2012
  3. Cloud Security Alliance, Security Guidance for Critical Areas of Focus in Cloud Computing V2.1, December, 2009
  4. W. Jansen, and T. Grance, Guidelines on Security and Privacy in Public Cloud Computing, January, 2011
  5. 김태형, 김인혁, 김정한, 민창우, 김지홍, 엄영익, 클라우드 컴퓨팅 환경에서 보안성 향상을 위한 로컬 프로세스 실행기술, 정보보호학회논문지, 제20권, 제5호, 2010, 10월
  6. Cloud Security Alliance, Top Threats to Cloud Computing V1.0, March, 2010
  7. M. Mulazzani, S. Schrittwieser, M. Leithner, M. Huber, E. Weippl, Dark Clouds on the Horizon: Using Cloud Storage as Attack Vector and Online Slack Space, Proc. of the USENIX Security Symposium, August, 2011
  8. S. T. King, Y. M. Wang, C. Verbowski, H. J. Wang, J. R. Lorch, Subvirt: Implementing malware with virtual machines, Proc. of the 2006 IEEE Symposium on Security and Privacy, 2006
  9. J. Rutkowska, Subverting Vista Kernel For Fun And Profit, Black Hat Briefings, August, 2006
  10. K. Kortchinsky, CLOUDBURST: A VMware Guest to Host Escape Story, BlackHat USA, 2009
  11. C. Wang, Q. Wang, K. Ren, and W. Lou, Privacy-pre-serving public auditing for data storage security in cloud computing, Proc. of the 29th conference on Information communications, pp.525-533, 2010
  12. G. Ateniese, R. D. Pietro, L. V. Mancini, and G. Tsudik, Scalable and efficient provable data possesion, Proc. of SecureComm, 2008
  13. G. Ateniese, R. Bums, R. Curtmola, J. Herring, O. Khan, L. Kissner, Z. Peterson, D. Song, Remote data checking using provable data possession, ACM Transactions on Information and System Security, Vol. 14(1), May, 2011
  14. M. A. Shah, M. Baker, J. C. Mogul, and R. Swaminathan, Auditing to keep online storage services honest Proc. of HotOS, 2007
  15. T. Ristenpart, E. Tromer, H. Shacham, and S. Savage, Hey, You, Get Off My Cloud! Exploring Information Leakage in Third- Party Compute Clouds, Proc. of the 16th ACM conference on Computer and Communications Security, 2009
  16. K. D. Bowers, A. Juels, and A. Oprea, HAIL: A High-Availability and Integrity Layer for Cloud Storage, Proc. of the 16th ACM conference on Computer and Communications Security, 2009
  17. K. Zhang, X. Zhou, Y. Chen, X. Wang, and Y. Ruan, Sedic: Privacy-Aware Data Intensive Computing on Hybrid Cloud, Proc. of the 18th ACM conference on Computer and Communications Security, 2011
  18. C. Erway, A. Kupcu, C. Papamanthou, and R. Tamassia, Dynamic Provable Data Possession, Proc. of the 16th ACM conference on Computer and Communications Security, 2009
  19. K. D. Bower, M. V. Dijk, A. Juels, A. Oprea, and R. L. Rivest, How to Tell if Your Cloud Files Are Vulnerable to Drive Crashes, Proc. ofthe 18th ACM conference on Computer and Communications Security, 2011
  20. L. Alvisi, A. Clement, M. Dahlin, S. Lee, P. Mahajan, S. Setty, and M. Walfish, Depot: Cloud storage with minimal trust, USENIX Symposium on Operating Systems Design and Implementation, October 2010
  21. A. Bessani, M. Correia, B. Quaresma, F. Andre, and P. Sousa, DEPSKY: Dependable and Secure Storage in a Cloud-of-Clouds, Proc. of the 6th ACM SIGOPS/EuroSysEuropean Systems Conference, April, 2011
  22. B. parno, J. M. McCune, and A. Perrig, Bootstrapping Trust in Commodity Computers, Proc. of IEEE Symposium on Security and Privacy, 2010
  23. M. Mannan, B. H. Kim, A. Ganjali, and D. Lie, Unicorn:Two-Factor Attestation for Data Security, Proc. of the 18th ACM conference on Computer and Communications Security, 2011
  24. E. G. Sier, W. Bruijn, P. Reynolds, A. Shieh, K. Walsh, D. Williams, and F. B. Schneider, Logical Attestation: An Authorization Architecture for Trustworthy Computing, Proc. of 23rd ACM Symposium on Operating Systems Principles, 2011
  25. J. M. McCune, B. Parno, A. Perrig, M. K. Reiter, and H. Isozaki, Flicker: An execution infrastructure for TCB Minimization, Proc. of the European Conference on Computer Systems, April, 2008
  26. J. M. McCune, Y. Li, N. Qu, Z. Zhou, A. Datta, V. Gligor, and A. Perrigo TrustVisor: Efficient TCB reduction and attestation, Proc of IEEE Symposium on Security and Privacy, May, 2010
  27. X. Chen, T. Garfinkel, E. C. Lewis, P. Subrahmanyam, C. A. Waldspurger, D. Boneh, J. Dwoskin, and D. R. K. Ports, Overshadow: a virtualization-based approach to retrofitting protection in commodity operating systems, Proc. of the 13th international conference on Architectural support for programming languages and operating systems, 2008
  28. S. B. Suh, Secure architecture and implementation ofxen on arm for mobile devices, 4th Xen Summit, 2007
  29. F. Zhang, J. Chen, H. chen, and B. Zang, CloudVisor: Retrofitting Protection of Virtual Machines in Multi-tenant Cloud with Nested Virtualization, Proc. of 23rd ACM Symposium on Operating Systems Principles, 2011