µ¥ÀÌÅͺ£À̽º ¿¬±¸È¸Áö(SIGDB)
Current Result Document :
ÇѱÛÁ¦¸ñ(Korean Title) |
Ŭ¶ó¿ìµå ÄÄÇ»Æÿ¡¼ µ¥ÀÌÅÍ ¾ÏÈ£È ¹× »ç¿ëÀÚ ÀÎÁõ ±â¹ý¿¡ °üÇÑ °íÂû |
¿µ¹®Á¦¸ñ(English Title) |
Survey on Data Encryption and User Authentication Techniques in Cloud Computing |
ÀúÀÚ(Author) |
È«½ÂÅÂ
ÀåÀç¿ì
Seung-Tae Hong
Jae-Woo Chang
|
¿ø¹®¼ö·Ïó(Citation) |
VOL 28 NO. 02 PP. 0065 ~ 0082 (2012. 08) |
Çѱ۳»¿ë (Korean Abstract) |
ÃÖ±Ù IT ÀÚ¿øµéÀ» ÀÎÅÍ³Ý ±â¹ÝÀÇ ¼ºñ½º ÇüÅ·ΠÁ¦°øÇϴ Ŭ¶ó¿ìµå ÄÄÇ»Æÿ¡ ´ëÇÑ ¿¬±¸°¡ È°¹ßÈ÷ ÁøÇàµÇ°í ÀÖ´Ù. ÇÑÆí, Ŭ¶ó¿ìµå ÄÄÇ»Æà ȯ°æ¿¡¼, »ç¿ëÀÚÀÇ Áß¿äÇÑ µ¥ÀÌÅÍ´Â Á¦ 3ÀÇ ¼ºñ½º Á¦°øÀÚ¿¡°Ô À§Å¹ÇÏ¿© °ü¸®µÇ±â ¶§¹®¿¡, »ç¿ëÀÚ µ¥ÀÌÅ͸¦ º¸È£ÇÏ´Â °ÍÀº Áß¿äÇÑ ¹®Á¦ÀÌ´Ù. µû¶ó¼ Ŭ¶ó¿ìµå ÄÄÇ»Æà ȯ°æÀÇ Æ¯¼ºÀ» °í·ÁÇÑ µ¥ÀÌÅÍ º¸¾È ±â¹ý¿¡ ´ëÇÑ ¿¬±¸°¡ ÇʼöÀûÀÌ´Ù. À̸¦ À§ÇØ º» ³í¹®¿¡¼´Â ù°, Ŭ¶ó¿ìµå ÄÄÇ»Æÿ¡¼ µ¥ÀÌÅÍ º¸¾È ±â¹ýÀÇ ¿ä±¸»çÇ×À» Á¦½ÃÇÑ´Ù. µÑ°, Á¦½ÃµÈ ¿ä±¸»çÇ×À» ¹ÙÅÁÀ¸·Î, ±âÁ¸ µ¥ÀÌÅÍ º¸¾È ±â¹ýÀ» Á¦ÇÑµÈ ½Ã½ºÅÛ ÀÚ¿øÀ» °í·ÁÇÑ °æ·®ÈµÈ ¾ÏÈ£È ¾Ë°í¸®Áò ¹× »ç¿ëÀÚ Á¢±Ù ±ÇÇÑ º¸È£¸¦ À§ÇÑ »ç¿ëÀÚ ÀÎÁõ ¾Ë°í¸®Áò¿¡ ´ëÇÑ ¿¬±¸·Î ºÐ·ùÇÑ´Ù. ¸¶Áö¸·À¸·Î Ŭ¶ó¿ìµå ÄÄÇ»Æÿ¡¼ µ¥ÀÌÅÍ º¸¾È ±â¹ýÀ» ºÐ¼®ÇÏ°í ÇâÈÄ ¿¬±¸¹æÇâÀ» Á¦½ÃÇÑ´Ù.
|
¿µ¹®³»¿ë (English Abstract) |
Recently, cloud computing which provide IT resources as internet?based service has received much interest. Meanwhile, in the cloud computing environment, because usersʹ sensitive data is entrusted by third?party service provider, how to protect the usersʹ data is an important issue. Therefore, it is essential to study on data security techniques which consider the characteristic of cloud computing environment. For this, we, in this paper, first present data security requirements. Secondly, based on the presented requirements, we classify the existing data security techniques into two major algorithms; lightweight encryption algorithms considering limited system resources and user authentication algorithm for the protection of user access rights. Finally, we analyze the existing data security techniques in cloud computing and provide their research directions.
|
Å°¿öµå(Keyword) |
Ŭ¶ó¿ìµå ÄÄÇ»ÆÃ
µ¥ÀÌÅÍ º¸¾È ±â¹ý
¾ÏÈ£È ¾Ë°í¸®Áò
»ç¿ëÀÚ ÀÎÁõ ¾Ë°í¸®Áò
Cloud Computing Data Security Technique
Encryption Algorithm
User Authentication Algorithm
|
ÆÄÀÏ÷ºÎ |
PDF ´Ù¿î·Îµå
|