TY - GEN
T1 - Security considerations in cloud computing virtualization environment
AU - Yeo, Sang Soo
AU - Park, Jong Hyuk
PY - 2013
Y1 - 2013
N2 - Almost cloud service providers are having their own architectures for providing a variety of cloud services to their customers, cloud service clients. These various architectures and services increase the complexity of security management policies, frameworks, and systems, because they would require different aspects of security solutions for their own architectures and services. Consequently, such compatibility issues make us difficult to design a common security framework, security management system, or security evaluation system. Recognizing the need to solve such issues, we analyze common security elements to be required for cloud computing virtualization, and identify requirements for information protection in this paper. We also identify possible threats that may occur depending on different functions and roles over the cloud virtualization environments, and define security elements and requirements to deal with those issues. We show a set of common directions or approaches to prevent any possible treats to cloud computing, and provide more efficient and systematic method of managing and operating cloud computing system.
AB - Almost cloud service providers are having their own architectures for providing a variety of cloud services to their customers, cloud service clients. These various architectures and services increase the complexity of security management policies, frameworks, and systems, because they would require different aspects of security solutions for their own architectures and services. Consequently, such compatibility issues make us difficult to design a common security framework, security management system, or security evaluation system. Recognizing the need to solve such issues, we analyze common security elements to be required for cloud computing virtualization, and identify requirements for information protection in this paper. We also identify possible threats that may occur depending on different functions and roles over the cloud virtualization environments, and define security elements and requirements to deal with those issues. We show a set of common directions or approaches to prevent any possible treats to cloud computing, and provide more efficient and systematic method of managing and operating cloud computing system.
KW - Cloud Computing Architecture
KW - Cloud Computing Services
KW - Security Requirement
KW - Virtualization Security Layer
UR - http://www.scopus.com/inward/record.url?scp=84883355108&partnerID=8YFLogxK
U2 - 10.1007/978-3-642-38027-3_22
DO - 10.1007/978-3-642-38027-3_22
M3 - Conference contribution
AN - SCOPUS:84883355108
SN - 9783642380266
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 208
EP - 215
BT - Grid and Pervasive Computing - 8th International Conference, GPC 2013 and Colocated Workshops, Proceedings
T2 - 8th International Conference on Grid and Pervasive Computing, GPC 2013
Y2 - 9 May 2013 through 11 May 2013
ER -