DOI QR코드

DOI QR Code

Relative priority evaluation of security attributes in cloud computing using fuzzy AHP

Fuzzy AHP를 적용한 클라우드 컴퓨팅 환경에서 보안 속성의 상대적 중요도 평가

  • 최철림 (경희대학교 컴퓨터공학과) ;
  • 송영재 (경희대학교 컴퓨터공학과)
  • Received : 2011.10.07
  • Accepted : 2011.12.30
  • Published : 2011.12.31

Abstract

In spite of many advantages of cloud computing, security concerns are a barrier in users' adopting the cloud service. In this paper, we evaluate relative priorities between security attributes of ISO 7498-2 standards affecting overall security quality in cloud computing. For an objective evaluation, the fuzzy AHP(Analytic hierarchical process) is applied. The evaluation results represented the relative priority with concrete number can be an effective management method to choose and develop the cloud computing service.

클라우드 컴퓨팅의 장점에도 불구하고 보안성에 대한 문제들이 많은 사용자들의 선택에 장애가 되고 있다. 본 논문에서는 클라우드 컴퓨팅의 보안성에 대한 ISO 7498-2 표준의 관련 속성들이 전체 보안 품질에 미치는 상대적 영향도를 평가하였다. 많은 요인들의 영향도를 객관적으로 평가하기 위하여 Fuzzy AHP(Analytic hierarchical process)를 적용하였다. 본 연구는 클라우드 컴퓨팅 서비스의 보안 관련 각 속성들의 상대적 중요성을 구체적으로 수치화 할 수 있었고, 클라우드 컴퓨팅 서비스의 효율적인 선택 및 개발에 필요한 관리 방법을 제시할 수 있었다.

Keywords

References

  1. Hassan Takabi, James B. D. Joshi, Gail-Joon Ahn, "Security and Privacy Challenges in Cloud Computing Environments", IEEE Security and Privacy, pp. 24-31, 2010.
  2. Brodkin J, "Gartner: Seven cloud- computing security risk", viewed 1 August 2011, from < http://www.idi.ntnu.no/emner/tdt60/papers/Cloud_ Computing _Security_Risk.pdf>, 2008.
  3. ISO/IEC 7498-2: 1995, "ISO 7498-2:1989, Information processing systems-Open Systems Interconnection. ISO 7498-2", 1995.
  4. Saaty T.L., "The Analytic Hierarchy Process", McGraw-Hill, New York, 1980.
  5. Hsiu-Fen Lin, "An application of fuzzy AHP for evaluating course website quality", Computers & Education, vol. 54, pp. 877-888, 2010. https://doi.org/10.1016/j.compedu.2009.09.017
  6. Shing-Ko Liang and Chi-Tai Lien, "Selecting the Optimal ERP Software by Combining the ISO 9126 Standard and Fuzzy AHP Approach", Contemporary Management Research, vol. 3, No. 1, pp. 23-44, 2007.
  7. Cloud Security Alliance Report, "Security Guidance for Critical Areas of Focus in Cloud Computing V2.16", viewed 1 Aug. 2011, from , 2011.
  8. Ramgovind S, Eloff MM, and Smith E, "The Management of Security in Cloud Computing", Information Security for South Africa, pp. 1-7, Aug. 2010.
  9. Buyukozkan, G., "Multi-criteria decision making for e-marketplace selection", Internet Research, vol. 14(2), pp. 139-154, 2004. https://doi.org/10.1108/10662240410530853
  10. Bozbura F. T., Beskese A., and Kahraman C., "Prioritization of human capital measurement indicators using fuzzy AHP", Expert Systems with Applications, vol. 32(4), pp. 1100-1112, 2007. https://doi.org/10.1016/j.eswa.2006.02.006
  11. Opricovic, S., and Tzeng, G. H., "Defuzzification within a multicriteria decision model", International Journal of Uncertainty, Fuzziness and Knowledge-based Systems, vol. 11(5), pp. 635-652, 2003. https://doi.org/10.1142/S0218488503002387
  12. R. Kuswandari, "Assessment of Different Methods for Measuring the Sustainability of Forest Management", International Institute for Geo-Information Science and E.O.E, Netherlands, 2004.
  13. L. Mikhailov, "Deriving Priorities from Fuzzy Pair Wise Comparison Judgments", Fuzzy Sets and Systems, vol. 134, pp. 365-385, 2003. https://doi.org/10.1016/S0165-0114(02)00383-4
  14. Chan-Sook Noe, "Design of the Medical Knowledge-Based System using Fuzzy Relational Method", Korean Institute of Information Technology, vol. 9, no. 11, pp. 161-169, 2011.
  15. Gwi-Bong Lee, Byung-Soo Lee, "A Study on RFID information protection with the modified ECC Algorithm", Korean Institute of Information Technology, vol. 8, no. 3, pp. 77-85, 2010.

Cited by

  1. 정보보안 예산 수립에서 퍼지 AHP의 적용을 통한 위험 비용 분석 vol.14, pp.3, 2011, https://doi.org/10.12812/ksms.2012.14.3.119