Browse > Article
http://dx.doi.org/10.21219/jitam.2020.27.6.089

The Security Establishment for Cloud Computing through CASE Study  

Choi, Myeonggil (Dept.of Business Administration, Chung-Ang University)
Publication Information
Journal of Information Technology Applications and Management / v.27, no.6, 2020 , pp. 89-99 More about this Journal
Abstract
Cloud computing is rapidly increasing for achieving comfortable computing. Cloud computing has essentially security vulnerability of software and hardware. For achieving secure cloud computing, the vulnerabilities of cloud computing could be analyzed in a various and systematic approach from perspective of the service designer, service operator, the designer of cloud security and certifiers of cloud systems. The paper investigates the vulnerabilities and security controls from the perspective of administration, and systems. For achieving the secure operation of cloud computing, this paper analyzes technological security vulnerability, operational weakness and the security issues in an enterprise. Based on analysis, the paper suggests secure establishments for cloud computing.
Keywords
Cloud Systems; Security Vulnerability; Cryptography; Hardware Weakness; Key Management;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Choi, M. and Song, J., "Social Control through Deterrence on the Compliance with Information Security Policy", Soft Computing, Vol. 22, 2018, pp. 6765-6772.   DOI
2 Choi, M., "Information Security Management as a Bridge in Cloud Systems from Private to Public Organizations", Sustainability, Vol. 7, No. 9, 2015, pp. 12031-12051.
3 Cloud Security Alliance(CSA), The Security, Trust & Assurance Registry (STAR), 2011. Available online: https://cloudsecurityalliance.org/star
4 Hwang, K. J. and Choi, M., "Effects of Innovation-Supportive Culture and Organizational Citizenship Behavior on E-government Information System Security Stemming from Mimetic Isomorphism", Government Information Quarterly, Vol. 34, 2017, pp. 183-198.   DOI
5 Kim, J. and Choi, M., "A Study of Personal Characteristics Influencing Cloud Intention", Journal of Information Technology and Management, Vol. 26, No. 3, pp. 135-157.
6 Kim, Y. and Choi, M., "A Study of Personal Characteristics Influencing Platform Business", Journal of Information Technology and Management, Vol. 27, No. 2, 2020, pp. 61-72.
7 Moon, Y., Choi, M., and Amstrong, D. J., "The Impact of Relational Leadership and Social Alignment on Information Security System Effectiveness in Korean Governmental Organizations", International Journal of Information Management, Vol. 40, 2018, pp. 54-66.   DOI
8 NIST SP 800-56c, Recommendation for Key Derivation through Extraction-then-Expansion, 2011.