DOI QR코드

DOI QR Code

The Security Establishment for Cloud Computing through CASE Study

  • 투고 : 2020.11.06
  • 심사 : 2020.12.30
  • 발행 : 2020.12.31

초록

Cloud computing is rapidly increasing for achieving comfortable computing. Cloud computing has essentially security vulnerability of software and hardware. For achieving secure cloud computing, the vulnerabilities of cloud computing could be analyzed in a various and systematic approach from perspective of the service designer, service operator, the designer of cloud security and certifiers of cloud systems. The paper investigates the vulnerabilities and security controls from the perspective of administration, and systems. For achieving the secure operation of cloud computing, this paper analyzes technological security vulnerability, operational weakness and the security issues in an enterprise. Based on analysis, the paper suggests secure establishments for cloud computing.

키워드

참고문헌

  1. Choi, M. and Song, J., "Social Control through Deterrence on the Compliance with Information Security Policy", Soft Computing, Vol. 22, 2018, pp. 6765-6772. https://doi.org/10.1007/s00500-018-3354-z
  2. Choi, M., "Information Security Management as a Bridge in Cloud Systems from Private to Public Organizations", Sustainability, Vol. 7, No. 9, 2015, pp. 12031-12051.
  3. Cloud Security Alliance(CSA), The Security, Trust & Assurance Registry (STAR), 2011. Available online: https://cloudsecurityalliance.org/star
  4. Hwang, K. J. and Choi, M., "Effects of Innovation-Supportive Culture and Organizational Citizenship Behavior on E-government Information System Security Stemming from Mimetic Isomorphism", Government Information Quarterly, Vol. 34, 2017, pp. 183-198. https://doi.org/10.1016/j.giq.2017.02.001
  5. Kim, J. and Choi, M., "A Study of Personal Characteristics Influencing Cloud Intention", Journal of Information Technology and Management, Vol. 26, No. 3, pp. 135-157.
  6. Kim, Y. and Choi, M., "A Study of Personal Characteristics Influencing Platform Business", Journal of Information Technology and Management, Vol. 27, No. 2, 2020, pp. 61-72.
  7. Moon, Y., Choi, M., and Amstrong, D. J., "The Impact of Relational Leadership and Social Alignment on Information Security System Effectiveness in Korean Governmental Organizations", International Journal of Information Management, Vol. 40, 2018, pp. 54-66. https://doi.org/10.1016/j.ijinfomgt.2018.01.001
  8. NIST SP 800-56c, Recommendation for Key Derivation through Extraction-then-Expansion, 2011.