A survey on security threats and security technology analysis for secured cloud services
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Lee, C. | - |
dc.contributor.author | Jung, D. | - |
dc.contributor.author | Lee, K. | - |
dc.date.available | 2018-05-10T04:57:31Z | - |
dc.date.created | 2018-04-17 | - |
dc.date.issued | 2013 | - |
dc.identifier.issn | 1738-9976 | - |
dc.identifier.uri | http://scholarworks.bwise.kr/ssu/handle/2018.sw.ssu/12230 | - |
dc.description.abstract | In recent, various types of cloud services such as Web-based cloud and mobile cloud that can store and access documents and multimedia files from a wide variety of client environment are getting rapidly increased. However, the problem is that if a network failure or a security failure occurs due to an intended or unintended accident, we would experience considerable damages. Since cloud services have high portion of virtualization that implies one of the physical hypervisor platforms operating on more than two organizational data, the risks are always present in cloud services at the aspect of security issues. In this paper, we analyze the security threats and security technologies for secured cloud services. We also provide the security requirements for cloud services which help to make a research direction to the new types of security threats. © 2013 SERSC. | - |
dc.relation.isPartOf | International Journal of Security and its Applications | - |
dc.subject | Cloud computing services | - |
dc.subject | Cloud securities | - |
dc.subject | Multimedia files | - |
dc.subject | Security failure | - |
dc.subject | Security requirements | - |
dc.subject | Security technology | - |
dc.subject | Security threats | - |
dc.subject | Virtualizations | - |
dc.subject | Distributed database systems | - |
dc.subject | Security of data | - |
dc.subject | Security systems | - |
dc.subject | Virtual reality | - |
dc.subject | Web services | - |
dc.subject | Network security | - |
dc.title | A survey on security threats and security technology analysis for secured cloud services | - |
dc.type | Article | - |
dc.identifier.doi | 10.14257/ijsia.2013.7.6.03 | - |
dc.type.rims | ART | - |
dc.identifier.bibliographicCitation | International Journal of Security and its Applications, v.7, no.6, pp.21 - 30 | - |
dc.description.journalClass | 1 | - |
dc.identifier.scopusid | 2-s2.0-84891798715 | - |
dc.citation.endPage | 30 | - |
dc.citation.number | 6 | - |
dc.citation.startPage | 21 | - |
dc.citation.title | International Journal of Security and its Applications | - |
dc.citation.volume | 7 | - |
dc.contributor.affiliatedAuthor | Lee, C. | - |
dc.type.docType | Article | - |
dc.subject.keywordAuthor | Cloud computing service | - |
dc.subject.keywordAuthor | Cloud security analysis | - |
dc.subject.keywordAuthor | Information security | - |
dc.subject.keywordAuthor | Network security | - |
dc.subject.keywordAuthor | Virtualization | - |
dc.description.journalRegisteredClass | scopus | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
Soongsil University Library 369 Sangdo-Ro, Dongjak-Gu, Seoul, Korea (06978)02-820-0733
COPYRIGHT ⓒ SOONGSIL UNIVERSITY, ALL RIGHTS RESERVED.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.