Browse > Article
http://dx.doi.org/10.17703/JCCT.2017.3.4.199

A Study on security policy for vitalizing financial company cloud  

Im, Je-sang (Dept. of Financial Security, Korea University Division of Information Security Graduate School of Information Security)
Publication Information
The Journal of the Convergence on Culture Technology / v.3, no.4, 2017 , pp. 199-205 More about this Journal
Abstract
As cloud computing can utilize the proper allocation of system resources, it can be expected to have great benefits in terms of maintaining availability and reducing costs when a cloud is applied to a financial company's computer system. Although some provisions of the Financial Supervisory Regulation were revised in October 2016, this is limited to non-critical information processing systems, limits are remain whitch the application of cloud computing to the whole computer system of financial companies including electronic financial systems. In this paper, cloud security requirements are studied for the application of financial company's computational infrastructure system.
Keywords
cloud computing; financial sector; cloud computing policies;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 The NIST Definition of Cloud Computing, Sep 2011 https://csrc.nist.gov/publications/detail/sp/800-145/final
2 Security Guidance for Critical Areas of Focus in Cloud Computing v4.0, July 2017 https://cloudsecurityalliance.org/download/security-guidance-v4/
3 Sin, Young-Sang. Hypervisor-based virtualization security technology trend in cloud environment. OSIA Standards & Technology Review, 2012.7, 25(2), 22-36
4 Park, Jun-Hyun; Park, Jae-Seun; Jo, Jeong-Hwan; Jeon, Hwan-Ung; Jeon, Eun-Jeong; Kim, Hak-Bum. Leveraging Hybrid Cloud Technology and Security Trends. Korea Institute Of Information Security And Cryptology, 2016, 26(1), 79-91
5 Min, Sang-Sig; Sung, Jae-Mo. Cloud computing application model and security technology research in financial sector. Korea Institute Of Information Security And Cryptology, 2011.12, 21(8), 40-45
6 ITU-T X.1601 Security Framework for cloud computing, Oct 2015 https://www.itu.int/rec/T-REC-X.1601-201510-I/en
7 Cloud Computing Top Threats in 2016, February 2016 https://cloudsecurityalliance.org/download/the-treacherous-twelve-cloud-computing-top-threats-in-2016/
8 T. Kittel. "Design and Implementation of a Virtual Machine Introspection based Intrusion detection System." Master Thesis, Technische universitat munchen 2010
9 Jung, Won-Joon. A Legal Study on Personal Data Protection Issues Caused by Cloud Computing Environment, A journal of Law/DanKook Univ. 2016.03.
10 Kim, Hyung-Seok; Lee, Jong-Yong; Jung, Kye-Dong, "The Design of Data Hub System for Integration of Group In the Cloud Environment", International journal of advanced smart convergence, Vol 4, Issue 2, 2015, pp. 61-68 DOI: https://doi.org/10.7236/IJASC.2015.4.2.61   DOI