DOI QR코드

DOI QR Code

신뢰되는 DRM 클라우드 서비스를 위한 책임 추적성 분석 및 모니터링 툴 설계

Analysis of Accountability for Trust DRM Cloud Service and Design of Monitoring Tool

  • 이혜주 (숭실대학교 컴퓨터학부) ;
  • 서창호 (공주대학교 응용수학과) ;
  • 신상욱 (부경대학교 IT융합응용공학과)
  • Lee, Hyejoo (School of Computing, Soongsil University) ;
  • Seo, Changho (Dept. of Applied Mathematics, Kongju National University) ;
  • Shin, Sang Uk (Dept. of IT Convergence and Application Engineering, Pukyong National University)
  • 투고 : 2014.10.13
  • 심사 : 2014.12.20
  • 발행 : 2014.12.28

초록

클라우드 사용자들에게 책임 있는 서비스를 제공하는 클라우드 서비스의 책임 추적성(accountability)은 서비스 정책 준수, 모니터링 및 감사(auditing), 로그 정보 기록(logging) 등과 같은 여러 가지 기술을 적용한다. 궁극적으로 데이터 처리, 서비스 제공 과정에서 발생되는 여러 가지 문제들에 대해 누가 책임이 있는지를 판단함으로써 신뢰되는 클라우드 서비스를 제공하는 것을 목적으로 한다. 먼저, 부가가치가 높은 콘텐츠 서비스 제공 시에 안전하고 신뢰되는 DRM 클라우드 서비스를 제공하기 위해 본 논문에서는 콘텐츠 및 DRM 클라우드 서비스 체인을 이루는 클라우드 에코 시스템을 제시한다. 또한 콘텐츠 소유자와 콘텐츠 사용자의 DRM 클라우드 서비스에 대한 요구사항을 분석하고, 책임 추적을 위해 기록해야 할 로그 정보 및 모니터링 툴 구조를 제안한다.

The accountability of cloud service which provides the cloud users with accountable services applies various technologies such as the compliance of service policy, monitoring and auditing, logging, and others. It ultimately intends to provide trustworthy cloud service by determining who is accountable for various problems happened during data processing and service offering. In this paper, we propose a cloud ecosystem formed from the chain of content and DRM Cloud service in order to offer secure and trust DRM cloud service when providing high value-added content service. Besides this, we analyse the requirements of cloud services for content owners and users and then propose some logging information to be recorded for trace of accountability and a structure of tool for monitoring.

키워드

참고문헌

  1. M. Tan and X. Su, Media Cloud: When Media Revolution Meets Rise of Cloud Computing, Proc. of The 6th IEEE International Symposium Service Oriented System Engineering(SOSE2011), pp. 251-261, 2011.
  2. W. Zhu et al., Multimedia Cloud Computing, IEEE SIGNAL PROCESSING MAGAZINE. pp. 59-69, 2011.
  3. http://www.icloud.com/
  4. http://www.amazon.com/gp/feature.html/refcd_nav_lm?ie=UTF8&docId=1000796931
  5. http://www.google.com/intl/ko/drive/
  6. http://www.uvvu.com/
  7. Microsoft, Microsoft PlayReady Content Access Technology, White Paper, 2008.
  8. http://www.marlin-community.com/
  9. http://www.openmobilealliance.org/
  10. H. Lee, C, Heo, C, Seo, and S. U. Shin, Design and Implementation of DRM Proxy for DRM Cloud, KIPS Trans. on Comp. and Comm. Sys, Vol. 2, No. 9, pp. 553-560, 2012. https://doi.org/10.3745/KTCCS.2013.2.12.553
  11. H. Lee, C. Seo, and S. U, Shin, DRM Cloud Architecture and Service Scenario for Content Protection, Journal of Internet Services and Information Security, Vol. 3, No 3, pp. 94-105, 2013.
  12. N. Papanikolaou, S. Pearson, M. C. Mont, and R. Ko, A Toolkit for Automating Compliance in Cloud Computing Services, International Journal of Cloud Computing, Vol. 3, No. 1, pp. 46-68, 2014.
  13. R. Accorsi, A secure log architecture to support remote auditing, Mathematical and Computer Modelling, Vol. 57, pp. 1578-1791, 2013. https://doi.org/10.1016/j.mcm.2012.06.035
  14. A. Gehani, G. F. Ciocarlie, and N. Shankar, Accountable Clouds, 2013 IEEE International Conference on Technologies for Homeland Securith(HST), pp. 403-407, 2013.
  15. J. Yao, S. Chen, and C. Wang, Accountability as a Service for the Cloud, 2010 IEEE International Conference on Services Computing, pp. 81-88, 2010.
  16. R. K. L. Ko, Data Accountability in Cloud Systems, Security, Privacy and Trust in Cloud Systems, pp. 211-238, Springer-Verlag, 2014.
  17. R. K. L. Ko et al. TrustCloud: A Framework for Accountability and Trust in Cloud Computing, 2011 IEEE World Congress on Services, pp. 584-588, 2011.
  18. O. Q. Zhan, M. Krichberg, R. K L Ko, and B. S. Lee, How to Track Your Data: The case for Cloud Computing Provenance, 2011 IEEE International Conference on Cloud Computing Technology and Science, pp. 446-453, 2011.
  19. O. Q. Zhang, R. K L Ko, M. Kirchberg, C. H. Suen, P. Jagadpramana, B. S. Lee, How to Track Your Data: Rule-Based Data Provenance Tracing Algorithms, 2012 IEEE 2011 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communication, pp. 1429-1437, 2012.
  20. R. K. L. Ko, P. Jagadpramana, and B. S. Lee, Flogger: A File-centric Logger for Monitoring File Access and Transfers within Cloud Computing Environments, 2011 IEEE 10th International Conference of on Trust, Security and Privacy in Computing and Communications(TrustCom), pp. 765-771, 2011.
  21. http://www.highcloudsecurity.com/resources/whitepapers
  22. S. Pearson et al., Accountability for Cloud and Other Future Internet Services, IEEE 5th International Conference on Cloud Computing Technology and Science, pp. 629-632, 2012.
  23. http://www.a4cloud.eu/