DOI QR코드

DOI QR Code

A Study on the Virtualization and Security Technology for the Operation of Novel Reliable Networks

새로운 신뢰 망 운영을 위한 가상화 및 보안 기술에 관한 연구

  • Jang, Jung-Sook (The School of IT Engineering, Catholic University of Daegu) ;
  • Jeon, Yong-Hee (The School of IT Engineering, Catholic University of Daegu)
  • Received : 2014.08.19
  • Accepted : 2014.12.23
  • Published : 2015.02.28

Abstract

In this paper, we analyze the research trend and problems of the existing virtualization technology and present the most applicable virtualization technology in order to apply the technology to the operation of novel reliable networks. By using the virtualization technology, there is advantage in that the utilization of resource becomes higher and maintenance cost goes down. While, from the security perspective, there exist advantage in using the virtualization, it also introduces new vulnerabilities due to the adoption. Thus it is necessary to analyze the problem and establish the strategy to solve it. Therefore we derive threat elements to the virtualized system, analyze and describe the virtualization security policy.

본 논문에서는 새로운 신뢰 망 운용에 가상화 기술을 적용하기 위하여 기존 가상화 기술 연구동향 및 문제점을 분석하고, 가장 적합한 가상화 기술을 제시하고자 한다. 가상화 기술을 통하여 자원의 활용률을 높이고 관리비용을 절감할 수 있는 장점이 있다. 한편 보안 측면에서는 가상화를 통한 보안의 장점도 있는 반면에, 가상화의 도입으로 인한 새로운 취약성이 발생하여 이 문제에 대한 분석 및 대책이 필요하다. 따라서 가상화 시스템의 보안 위협 요소들을 도출하고, 가상화 보안 정책에 대하여 분석하고 살펴본다.

Keywords

References

  1. J.T. Song, H.S. Park, J.D. Park, S.K. KIM, "Safe Network Technologies", Electronics and Telecommunications Trends, ETRI, Vol. 28, No. 6, pp.28-36, 2013.
  2. IBM Virtualization White Paper, IBM, 2006.
  3. Future Internet: Terminology, TTAK.KO-01.0142, November 2011.
  4. Seonho Kang, Hwangkyu Choi, "Design and Implementation of Scalable Webhard API Based on Storage Virtualization for Groupware Systems", Journal of Digital Contents Society, Vol. 15, No. 3, pp.395-403, Jun. 2014. https://doi.org/10.9728/dcs.2014.15.3.395
  5. Guidelines for the administration cloud construction and office environment, Ministry of Security and Public Administration, September 2012.
  6. S.J. Jung, M.G. Sin, H.J. Kim, "Development trends of network virtualization standard techniques for the future Internet", TTA Journal No. 132, 2012.
  7. S.J. Jung, M.G. Sin, H.J. Kim, "Development trends of network virtualization standard techniques for the future Internet", TTA Journal No. 132, 2012.
  8. NIST, Guide to Security for Full Virtualization Technologies, Jan. 2011.
  9. C.S. Kim, B.I. Jang, H.K. Jung, "A Study on the Security Technology for Introduction the Secure Cloud Computing Service", Journal of Security Engineering, Vol, No.5, pp.568-579, 2013.
  10. J. Archer, D. Culliname, N. Puhlmann, A. Boehme, P. Kurtz, and J. Reavis, "Security Guidance for critical areas of focus in cloud computing v2.1", Cloud Security Alliance, Dec. 2009.
  11. Md. Tanzim Khorshed, A.B.M. Shawkat Ali, Saleh A. Wasimi, "A survey on gaps, threat remediation challenges and some thoughts for proactive attackdetectgion in cloud computing", Future Generation Computer System, vol. 28, no. 6, June.2012.
  12. J.H. Jeon, "A study on the vulnerability and corresponding technique trends of the cloud computing service", Journal of Korea Convergence Security Association, Vol 13, No 6, Dec. 2013.
  13. S.J. Jung, Y.M. Bae, "Trend analysis of Threats and Technologies for Cloud Security", Journal of Security Engineering, Vol. 10, No. 2, pp.199-212, 2013(in Korea).
  14. NIST, Guide to Security for Full Virtualization Technologies, Jan. 2011.
  15. Security Guidance for Critical Areas of focus in Cloud Computing v3.0, CSA, 2011.
  16. A guide to information security for cloud services, KISA, October 2011.

Cited by

  1. A Study on the Highly Trust Network for Personal Information Protection of IoT Environment vol.21, pp.3, 2015, https://doi.org/10.9728/dcs.2020.21.3.609