2014³â Ãá°èÇмú´ëȸ
Current Result Document :
ÇѱÛÁ¦¸ñ(Korean Title) |
Ŭ¶ó¿ìµå ÄÄÇ»Æà : °ü¸®Àû Ãø¸é¿¡¼ÀÇ º¸¾È Ãë¾àÁ¡ ºÐ¼® |
¿µ¹®Á¦¸ñ(English Title) |
Cloud Computing : An Analysis of Security Vulnerabilities in managerial aspect |
ÀúÀÚ(Author) |
ÃÖâȣ
ÀÌ¿µ½Ç
ÀÌÈÆÀç
Chang-Ho Choi
Young Sil Lee
Hoon Jae Lee
|
¿ø¹®¼ö·Ïó(Citation) |
VOL 18 NO. 01 PP. 0291 ~ 0294 (2014. 05) |
Çѱ۳»¿ë (Korean Abstract) |
ÃÖ±Ù ¸¹Àº ±â¾÷µéÀÌ ºòµ¥ÀÌÅ͸¦ È°¿ëÇÒ ¼ö Àִ ȯ°æÀ» ±¸ÃàÇÏ¸é¼ Å¬¶ó¿ìµå ÄÄÇ»Æà ±â¼ú¿¡ ´ëÇÑ°ü½ÉÀÌ ³ô¾ÆÁö°í ÀÖ´Ù. Ŭ¶ó¿ìµå ȯ°æÀº ±âÁ¸ °¡»óÈ È¯°æ¿¡¼ ¹ßÀüÇßÀ¸³ª ±× °úÁ¤¿¡¼ °ü¸®, °¡»ó¸Ó½Å, ÇÏÀÌÆÛ¹ÙÀÌÀú, Çϵå¿þ¾î µî ´Ù¾çÇÑ ¿µ¿ª¿¡¼ º¸¾ÈÀûÀ¸·Î Ãë¾àÁ¡À» µé¾î³»°í ÀÖ´Ù. ÀÌ Áß Å¬¶ó¿ìµå ȯ°æÀÇ °ü¸®Àû Ãø¸é¿¡¼ÀÇ º¸¾È ±â¹ýÀº º¸¾È À§ÇùÀ» ½Äº° ¹× ÅëÁ¦ÇÔÀ¸·Î½á ¾ÈÀüÇÏ°Ô µ¥ÀÌÅ͸¦ÀúÀåÇÒ ¼ö Àִ ȯ°æÀ» Á¦°øÇÑ´Ù. º» ³í¹®¿¡¼´Â ¸ÕÀú, Ŭ¶ó¿ìµå ¼ºñ½º¸¦ Á¦°øÇÏ´Â ±â¾÷°ú Á¦°øµÇ´Â ¼ºñ½ºÀÇ Á¾·ù¸¦ Á¶»çÇÏ°í, Ŭ¶ó¿ìµå ȯ°æÀÇ °ü¸®Àû Ãø¸é¿¡¼ Á¸ÀçÇÏ´Â º¸¾È À§Çù ¿ä¼Ò¿¡ ´ëÇؼºÐ¼®ÇÑ´Ù. ´õºÒ¾î ÃÖ±Ù ¹ß»ýÇÑ º¸¾È »ç°Ç¡¤»ç°íµéÀÇ »ç·ÊµéÀ» Á¶»çÇÏ¿© À̸¦ ÅëÇØ ¾ÕÀ¸·ÎÀÇ °³¼± ¹æÇâÀ» Á¦½ÃÇÑ´Ù. |
¿µ¹®³»¿ë (English Abstract) |
By building an environment that can utilize big data, many companies are interested in the cloud computing technology that has increased its popularity recently. By developing cloud environments from existing virtual environments, in the process, we discovered a variety of security vulnerabilities such as management, virtual machines, hypervisors, hardware etc. The security techniques from administrative aspects in the cloud environment provide the environment which can securely store data by the identification and control of security threats. In this paper, we investigate a list of companies which supports the cloud services and the types of services, and analyze the security threats according to the administrative aspects in the cloud environment. In addition, we suggest the direction for future improvements by investigating accidents or incidents which occurred recently |
Å°¿öµå(Keyword) |
Ŭ¶ó¿ìµå ÄÄÇ»ÆÃ
ºòµ¥ÀÌÅÍ
Ŭ¶ó¿ìµå º¸¾È
°ü¸®Àû ±â¹ý
|
ÆÄÀÏ÷ºÎ |
PDF ´Ù¿î·Îµå
|