Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

A survey on security threats and security technology analysis for secured cloud services

Full metadata record
DC Field Value Language
dc.contributor.authorLee, C.-
dc.contributor.authorJung, D.-
dc.contributor.authorLee, K.-
dc.date.available2018-05-10T04:57:31Z-
dc.date.created2018-04-17-
dc.date.issued2013-
dc.identifier.issn1738-9976-
dc.identifier.urihttp://scholarworks.bwise.kr/ssu/handle/2018.sw.ssu/12230-
dc.description.abstractIn recent, various types of cloud services such as Web-based cloud and mobile cloud that can store and access documents and multimedia files from a wide variety of client environment are getting rapidly increased. However, the problem is that if a network failure or a security failure occurs due to an intended or unintended accident, we would experience considerable damages. Since cloud services have high portion of virtualization that implies one of the physical hypervisor platforms operating on more than two organizational data, the risks are always present in cloud services at the aspect of security issues. In this paper, we analyze the security threats and security technologies for secured cloud services. We also provide the security requirements for cloud services which help to make a research direction to the new types of security threats. © 2013 SERSC.-
dc.relation.isPartOfInternational Journal of Security and its Applications-
dc.subjectCloud computing services-
dc.subjectCloud securities-
dc.subjectMultimedia files-
dc.subjectSecurity failure-
dc.subjectSecurity requirements-
dc.subjectSecurity technology-
dc.subjectSecurity threats-
dc.subjectVirtualizations-
dc.subjectDistributed database systems-
dc.subjectSecurity of data-
dc.subjectSecurity systems-
dc.subjectVirtual reality-
dc.subjectWeb services-
dc.subjectNetwork security-
dc.titleA survey on security threats and security technology analysis for secured cloud services-
dc.typeArticle-
dc.identifier.doi10.14257/ijsia.2013.7.6.03-
dc.type.rimsART-
dc.identifier.bibliographicCitationInternational Journal of Security and its Applications, v.7, no.6, pp.21 - 30-
dc.description.journalClass1-
dc.identifier.scopusid2-s2.0-84891798715-
dc.citation.endPage30-
dc.citation.number6-
dc.citation.startPage21-
dc.citation.titleInternational Journal of Security and its Applications-
dc.citation.volume7-
dc.contributor.affiliatedAuthorLee, C.-
dc.type.docTypeArticle-
dc.subject.keywordAuthorCloud computing service-
dc.subject.keywordAuthorCloud security analysis-
dc.subject.keywordAuthorInformation security-
dc.subject.keywordAuthorNetwork security-
dc.subject.keywordAuthorVirtualization-
dc.description.journalRegisteredClassscopus-
Files in This Item
There are no files associated with this item.
Appears in
Collections
College of Natural Sciences > ETC > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Lee, Chang Soo photo

Lee, Chang Soo
College of Natural Sciences (Department of Statistics and Actuarial Science)
Read more

Altmetrics

Total Views & Downloads

BROWSE