{"id":2396,"date":"2016-09-27T17:28:52","date_gmt":"2016-09-27T17:28:51","guid":{"rendered":"https:\/\/www.couchbase.com\/blog\/?p=2396"},"modified":"2023-08-10T23:00:11","modified_gmt":"2023-08-11T06:00:11","slug":"addressing-data-security-concerns-with-couchbase","status":"publish","type":"post","link":"https:\/\/www.couchbase.com\/blog\/ko\/addressing-data-security-concerns-with-couchbase\/","title":{"rendered":"\uce74\uc6b0\uce58\ubca0\uc774\uc2a4 \ubaa8\ubc14\uc77c\ub85c \ubd84\uc0b0\ud615 \ub370\uc774\ud130 \ubcf4\uc548 \ubb38\uc81c \ud574\uacb0"},"content":{"rendered":"<p>\uc624\ub298\ub0a0\uc758 \ubaa8\ubc14\uc77c \uc911\uc2ec \uc138\uc0c1\uc5d0\uc11c\ub294 \uc778\ud130\ub137 \uc5f0\uacb0 \uc5ec\ubd80\uc640 \uad00\uacc4\uc5c6\uc774 \uc571\uc774 \ud56d\uc0c1 \uc791\ub3d9\ud574\uc57c \ud55c\ub2e4\ub294 \uae30\ub300\uac00 \uc788\uc2b5\ub2c8\ub2e4. \uc774\ub7ec\ud55c \uae30\ub300\uc5d0 \ubd80\uc751\ud558\ub824\uba74 \ub514\ubc14\uc774\uc2a4\uc5d0\uc11c \uc9c1\uc811 \ubd84\uc0b0\ub41c \ub370\uc774\ud130\uc5d0 \uc561\uc138\uc2a4\ud558\uace0 \uc800\uc7a5\ud560 \uc218 \uc788\uc5b4\uc57c \ud569\ub2c8\ub2e4. \uc774\ub294 \ub300\ubd80\ubd84\uc758 \ub370\uc774\ud130\uac00 \ud074\ub77c\uc6b0\ub4dc\uc5d0 \uc911\uc559 \uc9d1\uc911\uc2dd\uc73c\ub85c \uc800\uc7a5\ub418\ub358 \ubd88\uacfc \uba87 \ub144 \uc804\uacfc\ub294 \ub9e4\uc6b0 \ub2e4\ub978 \uc0c1\ud669\uc785\ub2c8\ub2e4.<\/p>\n<p>\ubd84\uc0b0\ub41c \ub370\uc774\ud130\ub97c \uad00\ub9ac\ud558\uba74 \uad00\ub9ac\uac00 \uc911\uc694\ud55c \uc5ec\ub7ec \uac00\uc9c0 \ubcf4\uc548 \uc704\ud5d8\uc774 \ubc1c\uc0dd\ud569\ub2c8\ub2e4. \uc774\ub7ec\ud55c \uc704\ud5d8\uc744 \ud574\uacb0\ud558\ub294 \uac83\uc740 \uc5b4\ub824\uc6b8 \uc218 \uc788\uc9c0\ub9cc, \uc774\ub97c \ud574\uacb0\ud558\uc9c0 \uc54a\uc73c\uba74 \ubaa8\ubc14\uc77c \uc0ac\uc6a9\uc790\uc640 \ub370\uc774\ud130\uac00 \uc704\ud5d8\uc5d0 \ucc98\ud558\uac8c \ub429\ub2c8\ub2e4.<\/p>\n<p>\ud2b9\ud788 \ub370\uc774\ud130 \uc800\uc7a5 \ubc0f \uc804\uc1a1 \uc791\uc5c5 \uc2dc\uc5d0\ub294 5\uac00\uc9c0 \uc8fc\uc694 \ubcf4\uc548 \ubb38\uc81c\uac00 \uc788\uc2b5\ub2c8\ub2e4:<\/p>\n<ul>\n<li>\uc0ac\uc6a9\uc790 \uc778\uc99d<\/li>\n<li>\ub370\uc774\ud130 \uc77d\uae30\/\uc4f0\uae30 \uc561\uc138\uc2a4<\/li>\n<li>\uc720\uc120 \ub370\uc774\ud130 \uc804\uc1a1<\/li>\n<li>\ub514\ubc14\uc774\uc2a4\uc758 \ub370\uc774\ud130 \uc800\uc7a5\uc18c<\/li>\n<li>\ud074\ub77c\uc6b0\ub4dc\uc758 \ub370\uc774\ud130 \uc2a4\ud1a0\ub9ac\uc9c0<\/li>\n<\/ul>\n<p>\uce74\uc6b0\uce58\ubca0\uc774\uc2a4 \ubaa8\ubc14\uc77c\uc740 \uc774\ub7ec\ud55c \ubb38\uc81c\ub97c \ud574\uacb0\ud569\ub2c8\ub2e4.<\/p>\n<p>For <strong>\uc0ac\uc6a9\uc790 \uc778\uc99d <\/strong>\ud50c\ub7ec\uadf8\uc778 \uc778\uc99d\uc744 \uc9c0\uc6d0\ud569\ub2c8\ub2e4. \uae30\ubcf8\uc801\uc73c\ub85c Facebook\uacfc \uac19\uc740 \uc778\uae30 \uc788\ub294 \uacf5\uac1c \ub85c\uadf8\uc778 \uacf5\uae09\uc5c5\uccb4\uc640 \ud45c\uc900 OIDC(OpenID Connect) \uacf5\uae09\uc5c5\uccb4\ub97c \uc9c0\uc6d0\ud558\uba70, \uc0ac\uc6a9\uc790 \uc9c0\uc815 \uacf5\uae09\uc5c5\uccb4\ub97c \uc9c1\uc811 \uc791\uc131\ud560 \uc218\ub3c4 \uc788\uc2b5\ub2c8\ub2e4. \ub610\ud55c \uc778\uc99d\uc5d0 \uc131\uacf5\ud55c \uc0ac\uc6a9\uc790\ub9cc \uc2dc\uc2a4\ud15c\uc5d0 \uc561\uc138\uc2a4\ud560 \uc218 \uc788\ub3c4\ub85d \uc81c\ud55c\ud558\uac70\ub098 \uc120\ud0dd\uc801\uc73c\ub85c \uc775\uba85 \uc0ac\uc6a9\uc790\ub97c \ud5c8\uc6a9\ud560 \uc218\ub3c4 \uc788\uc2b5\ub2c8\ub2e4.<\/p>\n<p>For <strong>\ub370\uc774\ud130 \uc77d\uae30\/\uc4f0\uae30 \uc561\uc138\uc2a4<\/strong> \uac1c\ubcc4 \uc0ac\uc6a9\uc790 \ubc0f \uc5ed\ud560\uc5d0 \ub300\ud55c \ub370\uc774\ud130 \uc561\uc138\uc2a4\ub97c \uc81c\uc5b4\ud560 \uc218 \uc788\ub294 \uc138\ubd84\ud654\ub41c \uc815\ucc45 \ub3c4\uad6c\uac00 \uc788\uc2b5\ub2c8\ub2e4. \uc77d\uae30 \uad8c\ud55c\uc740 \ubb38\uc11c \uc218\uc900\uc5d0\uc11c, \uc4f0\uae30 \uad8c\ud55c\uc740 \ud544\ub4dc \uc218\uc900\uc5d0\uc11c \uc81c\uc5b4\ud560 \uc218 \uc788\uc2b5\ub2c8\ub2e4.<\/p>\n<p><strong>\uc720\uc120 \ub370\uc774\ud130 \uc804\uc1a1<\/strong>\ub294 \uc774\ub3d9 \uc911\uc778 \ub370\uc774\ud130\uc758 \uacbd\uc6b0 TLS\ub97c \uc0ac\uc6a9\ud569\ub2c8\ub2e4.<\/p>\n<p><strong>\ub514\ubc14\uc774\uc2a4\uc758 \ub370\uc774\ud130 \uc800\uc7a5\uc18c<\/strong>\ub294 \uae30\uae30\uc5d0 \uc800\uc7a5\ub41c \ub370\uc774\ud130\uc5d0 \ub300\ud574 \uae30\uae30\uc5d0 \ub0b4\uc7a5\ub41c \ud30c\uc77c \uc2dc\uc2a4\ud15c \uc554\ud638\ud654\uc640 256\ube44\ud2b8 AES \uc804\uccb4 \ub370\uc774\ud130\ubca0\uc774\uc2a4 \uc554\ud638\ud654\ub97c \uc0ac\uc6a9\ud569\ub2c8\ub2e4.<\/p>\n<p><strong>\ud074\ub77c\uc6b0\ub4dc\uc758 \ub370\uc774\ud130 \uc2a4\ud1a0\ub9ac\uc9c0<\/strong>\ub97c \uc0ac\uc6a9\ud558\uc5ec \ud074\ub77c\uc6b0\ub4dc\uc5d0 \uc800\uc7a5\ub41c \ub370\uc774\ud130\uc5d0 \ub300\ud574 \ud30c\uc77c \uc2dc\uc2a4\ud15c \uc554\ud638\ud654\ub97c \uc0ac\uc6a9\ud558\ub3c4\ub85d Couchbase Server\ub97c \uad6c\uc131\ud560 \uc218 \uc788\uc2b5\ub2c8\ub2e4.<\/p>\n<p>\uce74\uc6b0\uce58\ubca0\uc774\uc2a4 \ubaa8\ubc14\uc77c\uc744 \uc0ac\uc6a9\ud558\uba74 \uc804\uccb4 \ub124\ud2b8\uc6cc\ud06c \ubc0f \uc560\ud50c\ub9ac\ucf00\uc774\uc158 \uc2a4\ud0dd\uc5d0\uc11c \ub370\uc774\ud130\ub97c \uc190\uc27d\uac8c \uad00\ub9ac\ud560 \uc218 \uc788\uc2b5\ub2c8\ub2e4. \uc5ec\uae30\uc5d0\ub294 \ud074\ub77c\uc6b0\ub4dc, \ud734\ub300\ud3f0, \ud0dc\ube14\ub9bf, \uc6f9, TV, \uc790\ub3d9\ucc28 \ub4f1 \ubaa8\ub4e0 \uacf3\uc5d0\uc11c\uc758 \uc800\uc7a5, \uc561\uc138\uc2a4, \ub3d9\uae30\ud654, \ubcf4\uc548\uc774 \ud3ec\ud568\ub429\ub2c8\ub2e4.<\/p>\n<p>\ub2e4\uc74c\uc5d0\uc11c \uc790\uc138\ud788 \uc54c\uc544\ubcf4\uace0 Couchbase Mobile\uc744 \uc2dc\uc791\ud560 \uc218 \uc788\uc2b5\ub2c8\ub2e4. <a href=\"https:\/\/www.couchbase.com\/blog\/ko\/developers\/mobile\/\">www.couchbase.com\/developers\/mobile\/<\/a>.<\/p>","protected":false},"excerpt":{"rendered":"<p>In today\u2019s mobile-driven world, there\u2019s an expectation that apps should always work &#8211; with and without an internet connection. Delivering on this expectation requires access and storage of decentralized data directly on device. This is very different from just a [&hellip;]<\/p>","protected":false},"author":46,"featured_media":13873,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[1810],"tags":[],"ppma_author":[8926],"class_list":["post-2396","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-couchbase-mobile"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.2 (Yoast SEO v26.2) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Manage decentralized data risks with Couchbase Mobile<\/title>\n<meta name=\"description\" content=\"Learn how to manage decentralized data security concerns that are critical to manage and how to address them using Couchbase Mobile.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.couchbase.com\/blog\/ko\/addressing-data-security-concerns-with-couchbase\/\" \/>\n<meta property=\"og:locale\" content=\"ko_KR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Addressing decentralized data security concerns with Couchbase Mobile\" \/>\n<meta property=\"og:description\" content=\"Learn how to manage decentralized data security concerns that are critical to manage and how to address them using Couchbase Mobile.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.couchbase.com\/blog\/ko\/addressing-data-security-concerns-with-couchbase\/\" \/>\n<meta property=\"og:site_name\" content=\"The Couchbase Blog\" \/>\n<meta property=\"article:published_time\" content=\"2016-09-27T17:28:51+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-08-11T06:00:11+00:00\" \/>\n<meta name=\"author\" content=\"Wayne Carter\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Wayne Carter\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2\ubd84\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.couchbase.com\/blog\/addressing-data-security-concerns-with-couchbase\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.couchbase.com\/blog\/addressing-data-security-concerns-with-couchbase\/\"},\"author\":{\"name\":\"Wayne Carter\",\"@id\":\"https:\/\/www.couchbase.com\/blog\/#\/schema\/person\/a1225e506b1304ff54498d69221cb4a6\"},\"headline\":\"Addressing decentralized data security concerns with Couchbase Mobile\",\"datePublished\":\"2016-09-27T17:28:51+00:00\",\"dateModified\":\"2023-08-11T06:00:11+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.couchbase.com\/blog\/addressing-data-security-concerns-with-couchbase\/\"},\"wordCount\":341,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.couchbase.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.couchbase.com\/blog\/addressing-data-security-concerns-with-couchbase\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2022\/11\/couchbase-nosql-dbaas.png\",\"articleSection\":[\"Couchbase Mobile\"],\"inLanguage\":\"ko-KR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.couchbase.com\/blog\/addressing-data-security-concerns-with-couchbase\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.couchbase.com\/blog\/addressing-data-security-concerns-with-couchbase\/\",\"url\":\"https:\/\/www.couchbase.com\/blog\/addressing-data-security-concerns-with-couchbase\/\",\"name\":\"Manage decentralized data risks with Couchbase Mobile\",\"isPartOf\":{\"@id\":\"https:\/\/www.couchbase.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.couchbase.com\/blog\/addressing-data-security-concerns-with-couchbase\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.couchbase.com\/blog\/addressing-data-security-concerns-with-couchbase\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2022\/11\/couchbase-nosql-dbaas.png\",\"datePublished\":\"2016-09-27T17:28:51+00:00\",\"dateModified\":\"2023-08-11T06:00:11+00:00\",\"description\":\"Learn how to manage decentralized data security concerns that are critical to manage and how to address them using Couchbase Mobile.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.couchbase.com\/blog\/addressing-data-security-concerns-with-couchbase\/#breadcrumb\"},\"inLanguage\":\"ko-KR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.couchbase.com\/blog\/addressing-data-security-concerns-with-couchbase\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ko-KR\",\"@id\":\"https:\/\/www.couchbase.com\/blog\/addressing-data-security-concerns-with-couchbase\/#primaryimage\",\"url\":\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2022\/11\/couchbase-nosql-dbaas.png\",\"contentUrl\":\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2022\/11\/couchbase-nosql-dbaas.png\",\"width\":1800,\"height\":630},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.couchbase.com\/blog\/addressing-data-security-concerns-with-couchbase\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.couchbase.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Addressing decentralized data security concerns with Couchbase Mobile\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.couchbase.com\/blog\/#website\",\"url\":\"https:\/\/www.couchbase.com\/blog\/\",\"name\":\"The Couchbase Blog\",\"description\":\"Couchbase, the NoSQL Database\",\"publisher\":{\"@id\":\"https:\/\/www.couchbase.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.couchbase.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ko-KR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.couchbase.com\/blog\/#organization\",\"name\":\"The Couchbase Blog\",\"url\":\"https:\/\/www.couchbase.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ko-KR\",\"@id\":\"https:\/\/www.couchbase.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/2023\/04\/admin-logo.png\",\"contentUrl\":\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/2023\/04\/admin-logo.png\",\"width\":218,\"height\":34,\"caption\":\"The Couchbase Blog\"},\"image\":{\"@id\":\"https:\/\/www.couchbase.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.couchbase.com\/blog\/#\/schema\/person\/a1225e506b1304ff54498d69221cb4a6\",\"name\":\"Wayne Carter\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ko-KR\",\"@id\":\"https:\/\/www.couchbase.com\/blog\/#\/schema\/person\/image\/f79f8b1d8e5c0848229fdfdef864713e\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/b94da84aa65383104fad5490bafffd08d0695ab3590039926f11f840c5a8d21b?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/b94da84aa65383104fad5490bafffd08d0695ab3590039926f11f840c5a8d21b?s=96&d=mm&r=g\",\"caption\":\"Wayne Carter\"},\"description\":\"Wayne Carter is Vice President, Engineering at Couchbase, where he is responsible for leading the vision, strategy, and development for the company's mobile, IoT, and edge computing solutions. Before joining Couchbase, Wayne worked as a leader, architect, and engineer at Oracle and Siebel Systems.\",\"url\":\"https:\/\/www.couchbase.com\/blog\/ko\/author\/wayne-carter\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Manage decentralized data risks with Couchbase Mobile","description":"\uad00\ub9ac\uac00 \uc911\uc694\ud55c \ubd84\uc0b0\ud615 \ub370\uc774\ud130 \ubcf4\uc548 \ubb38\uc81c\ub97c \uad00\ub9ac\ud558\ub294 \ubc29\ubc95\uacfc \uce74\uc6b0\uce58\ubca0\uc774\uc2a4 \ubaa8\ubc14\uc77c\uc744 \uc0ac\uc6a9\ud558\uc5ec \uc774\ub97c \ud574\uacb0\ud558\ub294 \ubc29\ubc95\uc744 \uc54c\uc544\ubcf4\uc138\uc694.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.couchbase.com\/blog\/ko\/addressing-data-security-concerns-with-couchbase\/","og_locale":"ko_KR","og_type":"article","og_title":"Addressing decentralized data security concerns with Couchbase Mobile","og_description":"Learn how to manage decentralized data security concerns that are critical to manage and how to address them using Couchbase Mobile.","og_url":"https:\/\/www.couchbase.com\/blog\/ko\/addressing-data-security-concerns-with-couchbase\/","og_site_name":"The Couchbase Blog","article_published_time":"2016-09-27T17:28:51+00:00","article_modified_time":"2023-08-11T06:00:11+00:00","author":"Wayne Carter","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Wayne Carter","Est. reading time":"2\ubd84"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.couchbase.com\/blog\/addressing-data-security-concerns-with-couchbase\/#article","isPartOf":{"@id":"https:\/\/www.couchbase.com\/blog\/addressing-data-security-concerns-with-couchbase\/"},"author":{"name":"Wayne Carter","@id":"https:\/\/www.couchbase.com\/blog\/#\/schema\/person\/a1225e506b1304ff54498d69221cb4a6"},"headline":"Addressing decentralized data security concerns with Couchbase Mobile","datePublished":"2016-09-27T17:28:51+00:00","dateModified":"2023-08-11T06:00:11+00:00","mainEntityOfPage":{"@id":"https:\/\/www.couchbase.com\/blog\/addressing-data-security-concerns-with-couchbase\/"},"wordCount":341,"commentCount":0,"publisher":{"@id":"https:\/\/www.couchbase.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.couchbase.com\/blog\/addressing-data-security-concerns-with-couchbase\/#primaryimage"},"thumbnailUrl":"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2022\/11\/couchbase-nosql-dbaas.png","articleSection":["Couchbase Mobile"],"inLanguage":"ko-KR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.couchbase.com\/blog\/addressing-data-security-concerns-with-couchbase\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.couchbase.com\/blog\/addressing-data-security-concerns-with-couchbase\/","url":"https:\/\/www.couchbase.com\/blog\/addressing-data-security-concerns-with-couchbase\/","name":"Manage decentralized data risks with Couchbase Mobile","isPartOf":{"@id":"https:\/\/www.couchbase.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.couchbase.com\/blog\/addressing-data-security-concerns-with-couchbase\/#primaryimage"},"image":{"@id":"https:\/\/www.couchbase.com\/blog\/addressing-data-security-concerns-with-couchbase\/#primaryimage"},"thumbnailUrl":"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2022\/11\/couchbase-nosql-dbaas.png","datePublished":"2016-09-27T17:28:51+00:00","dateModified":"2023-08-11T06:00:11+00:00","description":"\uad00\ub9ac\uac00 \uc911\uc694\ud55c \ubd84\uc0b0\ud615 \ub370\uc774\ud130 \ubcf4\uc548 \ubb38\uc81c\ub97c \uad00\ub9ac\ud558\ub294 \ubc29\ubc95\uacfc \uce74\uc6b0\uce58\ubca0\uc774\uc2a4 \ubaa8\ubc14\uc77c\uc744 \uc0ac\uc6a9\ud558\uc5ec \uc774\ub97c \ud574\uacb0\ud558\ub294 \ubc29\ubc95\uc744 \uc54c\uc544\ubcf4\uc138\uc694.","breadcrumb":{"@id":"https:\/\/www.couchbase.com\/blog\/addressing-data-security-concerns-with-couchbase\/#breadcrumb"},"inLanguage":"ko-KR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.couchbase.com\/blog\/addressing-data-security-concerns-with-couchbase\/"]}]},{"@type":"ImageObject","inLanguage":"ko-KR","@id":"https:\/\/www.couchbase.com\/blog\/addressing-data-security-concerns-with-couchbase\/#primaryimage","url":"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2022\/11\/couchbase-nosql-dbaas.png","contentUrl":"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2022\/11\/couchbase-nosql-dbaas.png","width":1800,"height":630},{"@type":"BreadcrumbList","@id":"https:\/\/www.couchbase.com\/blog\/addressing-data-security-concerns-with-couchbase\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.couchbase.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Addressing decentralized data security concerns with Couchbase Mobile"}]},{"@type":"WebSite","@id":"https:\/\/www.couchbase.com\/blog\/#website","url":"https:\/\/www.couchbase.com\/blog\/","name":"\uce74\uc6b0\uce58\ubca0\uc774\uc2a4 \ube14\ub85c\uadf8","description":"NoSQL \ub370\uc774\ud130\ubca0\uc774\uc2a4, Couchbase","publisher":{"@id":"https:\/\/www.couchbase.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.couchbase.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ko-KR"},{"@type":"Organization","@id":"https:\/\/www.couchbase.com\/blog\/#organization","name":"\uce74\uc6b0\uce58\ubca0\uc774\uc2a4 \ube14\ub85c\uadf8","url":"https:\/\/www.couchbase.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"ko-KR","@id":"https:\/\/www.couchbase.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/2023\/04\/admin-logo.png","contentUrl":"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/2023\/04\/admin-logo.png","width":218,"height":34,"caption":"The Couchbase Blog"},"image":{"@id":"https:\/\/www.couchbase.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.couchbase.com\/blog\/#\/schema\/person\/a1225e506b1304ff54498d69221cb4a6","name":"\uc6e8\uc778 \uce74\ud130","image":{"@type":"ImageObject","inLanguage":"ko-KR","@id":"https:\/\/www.couchbase.com\/blog\/#\/schema\/person\/image\/f79f8b1d8e5c0848229fdfdef864713e","url":"https:\/\/secure.gravatar.com\/avatar\/b94da84aa65383104fad5490bafffd08d0695ab3590039926f11f840c5a8d21b?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b94da84aa65383104fad5490bafffd08d0695ab3590039926f11f840c5a8d21b?s=96&d=mm&r=g","caption":"Wayne Carter"},"description":"Wayne Carter\ub294 Couchbase\uc758 \uc5d4\uc9c0\ub2c8\uc5b4\ub9c1 \ub2f4\ub2f9 \ubd80\uc0ac\uc7a5\uc73c\ub85c \ud68c\uc0ac\uc758 \ubaa8\ubc14\uc77c, IoT, \uc5e3\uc9c0 \ucef4\ud4e8\ud305 \uc194\ub8e8\uc158\uc758 \ube44\uc804, \uc804\ub7b5, \uac1c\ubc1c\uc744 \uc774\ub04c\uace0 \uc788\uc2b5\ub2c8\ub2e4. Couchbase\uc5d0 \uc785\uc0ac\ud558\uae30 \uc804\uc5d0\ub294 Oracle\uacfc Siebel Systems\uc5d0\uc11c \ub9ac\ub354, \uc544\ud0a4\ud14d\ud2b8, \uc5d4\uc9c0\ub2c8\uc5b4\ub85c \uadfc\ubb34\ud588\uc2b5\ub2c8\ub2e4.","url":"https:\/\/www.couchbase.com\/blog\/ko\/author\/wayne-carter\/"}]}},"authors":[{"term_id":8926,"user_id":46,"is_guest":0,"slug":"wayne-carter","display_name":"Wayne Carter","avatar_url":"https:\/\/secure.gravatar.com\/avatar\/b94da84aa65383104fad5490bafffd08d0695ab3590039926f11f840c5a8d21b?s=96&d=mm&r=g","author_category":"","last_name":"Carter","first_name":"Wayne","job_title":"","user_url":"","description":"Wayne Carter\ub294 Couchbase\uc758 \uc5d4\uc9c0\ub2c8\uc5b4\ub9c1 \ub2f4\ub2f9 \ubd80\uc0ac\uc7a5\uc73c\ub85c \ud68c\uc0ac\uc758 \ubaa8\ubc14\uc77c, IoT, \uc5e3\uc9c0 \ucef4\ud4e8\ud305 \uc194\ub8e8\uc158\uc758 \ube44\uc804, \uc804\ub7b5, \uac1c\ubc1c\uc744 \uc774\ub04c\uace0 \uc788\uc2b5\ub2c8\ub2e4. Couchbase\uc5d0 \uc785\uc0ac\ud558\uae30 \uc804\uc5d0\ub294 Oracle\uacfc Siebel Systems\uc5d0\uc11c \ub9ac\ub354, \uc544\ud0a4\ud14d\ud2b8, \uc5d4\uc9c0\ub2c8\uc5b4\ub85c \uadfc\ubb34\ud588\uc2b5\ub2c8\ub2e4."}],"_links":{"self":[{"href":"https:\/\/www.couchbase.com\/blog\/ko\/wp-json\/wp\/v2\/posts\/2396","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.couchbase.com\/blog\/ko\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.couchbase.com\/blog\/ko\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.couchbase.com\/blog\/ko\/wp-json\/wp\/v2\/users\/46"}],"replies":[{"embeddable":true,"href":"https:\/\/www.couchbase.com\/blog\/ko\/wp-json\/wp\/v2\/comments?post=2396"}],"version-history":[{"count":0,"href":"https:\/\/www.couchbase.com\/blog\/ko\/wp-json\/wp\/v2\/posts\/2396\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.couchbase.com\/blog\/ko\/wp-json\/wp\/v2\/media\/13873"}],"wp:attachment":[{"href":"https:\/\/www.couchbase.com\/blog\/ko\/wp-json\/wp\/v2\/media?parent=2396"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.couchbase.com\/blog\/ko\/wp-json\/wp\/v2\/categories?post=2396"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.couchbase.com\/blog\/ko\/wp-json\/wp\/v2\/tags?post=2396"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.couchbase.com\/blog\/ko\/wp-json\/wp\/v2\/ppma_author?post=2396"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}