Browse > Article
http://dx.doi.org/10.13089/JKIISC.2014.24.2.411

A Study on Cloud Database Management System Protection Profile for the Secure Cloud Environment  

Wi, Yukyeong (ISAA Lab, Dept. of Information Security Engineering, Soonchunhyang University)
Kwak, Jin (Dept. of Information Security Engineering, Soonchunhyang University)
Abstract
As cloud computing has enabled, a variety of cloud services has come into wide use. Thus, cloud computing products can be easily identified in the IT market. Common Criteria is international standards for security evaluation performed of IT products. In addition, Consumers can be used as a objective guideline for the evaluation results. And, it is a provides for protection profile(security target of security products). For general, IT products are providing the protection profile. However, for cloud-related products of protection profile is not being provided. Thus, about cloud security products, there is no way for evaluation. Therefore, in this paper, we propose protection profile on cloud database management system for the secure cloud environment in common criteria.
Keywords
Protection Profile; Cloud Datacenter; Availability; Access Control; TOE;
Citations & Related Records
Times Cited By KSCI : 4  (Citation Analysis)
연도 인용수 순위
1 KISA, Internet & Security Issue, Vol.2010-10, pp.56-59, 2010.
2 Kichul Kim, Ok Heo, Seungjoo Kim, "A Security Evaluation Criteria for Korean Cloud Computing Service," Journal of the Korea Institute of Information Security and Cryptology, Vol.23 No.2, pp.251-265, 2013.   과학기술학회마을   DOI   ScienceOn
3 KISA, "Information Security Guide for Cloud Services," KISA guideline Vol.2011-8, 2011.
4 CCRA, "Common Criteria for Information Technology Security Evaluation Part 3: Security assurance components," CCMB-2012-09-003, Version 3.1r4, 2012.
5 CCRA, "Common Criteria for Information Technology Security Evaluation Part 2: Security functional components," CCMB-2012-09-002, Version 3.1r4, 2012.
6 IT Security Certification Center, "Role Based Access Control System Protection Profile V2.0," 2008.
7 IT Security Certification Center, "Network Intrusion Prevention System Protection Profile V2.1," 2010.
8 KISA, "Vulnerability analysis and response technology cloud computing security," 2010.
9 Eun-Young Jang, Hyung-Jong Kim, Choon-Sik Park, Joo-Young Kim, Jae-il Lee, "The study on a threat countermeasure of mobile cloud services," Journal of the Korea Institute of Information Security and Cryptology, Vol.21 No.1, pp.177-186, 2011.   과학기술학회마을
10 Jonghoon Lee, Seungwook Jung, Souhwan Jung, "Trends in Security as a Service," Vol.22 No.7, pp.54-61, 2012.
11 Taehyoung Kim, Inhyuk Kim, Changwoo Min, Young Ik Eom, "Cloud computing security technology trends," Review of KIISE, Vol.30 No.1, pp.30-38, 2012.
12 Kyoung-a Shin, Sang-jin Lee, "Information Security Management System on Cloud Computing Service," Journal of the Korea Institute of Information Security and Cryptology, Vol.22 No.1, pp.155-167, 2012.   과학기술학회마을
13 Young-Gi Min, Kab-Seung Kou, "A Designed of Virtual Machine Security Vulnerability Detection Tool in a Cloud Computing Environment," Journal of Security Engineering, Vol.9 No.6, pp.519-530, 2012.
14 ENISA, "Good Practice Guide for securely deploying Governmental Clouds," 2013.
15 Yukyeong Wi, Jin Kwak, "Analysis of Domestic and Foreign Information Security Evaluation/Certification for Secure Cloud Service," Korea Institute of Information Security and Cryptology CISC-W, Vol23 No.2, pp.280-284, 2013.
16 Ki-Seok Bang, Il-Gon Kim, Ji-Yeon Lee, Jun-Seok Lee, Jin-Young Choi, "Classification Criteria and Application Methodology for Evaluating IT Security Products," KKITS journal, Vol6 No.5, pp.105-112, 2011.
17 KISA, "IT Security Evaluation & Certification Guide with Common Criteria," KISA guideline Vol.2010-18, 2010.
18 KISA, "Information Security System Evaluation & Certification Guide," 2004.
19 Jon Brodkin, "Gartner:Seven Cloudcomputing security risks," Network world, Jul 2008.
20 Hyungkeun Park, "Companies to consider using public cloud computing security risks and countermeasures for 小考," Review of KIISC, Vol22 No.7, pp.46-53, 2012.
21 Park Jae Geol, Jeong Dong Woog, Lee Dong Yeoup, "A Study of Security Management on Cloud Computing in Defense," Conference of The Korean Institute of Communications and Information Sciences, pp.368-369, 2012.
22 ENISA, "Cloud Computing Benefits, risks and recommendations for information security," 2009.
23 株式会社アイ.ビー.ティ, "クラウド.コン ピューティング時代のDependa-bility の考え 方などに関する米国の動向調査," 2010.
24 Hyun-Jung Lee, Dong-Ho Won, "An Analysis of Cloud System Security Functional Requirement," Journal of Security Engineering, Vol9 No.6, pp.495-502, 2012.
25 CSA(cloud security alliance), "Security guidance for critical areas of focus in cloud computing v3.0," 2011.
26 Kim DongWoo, "Smart Media Development and Cloud Security," Review of KIISC, Vol21 No.8, pp.46-54, 2011.
27 Rak-Cheol Kim, Jeong-Hyun Gong, Geon Kim, Hyung-Hyo Lee, "Security Requirements for Cloud Services," Conference of The Korean Institute of Information Technology, pp.430-434, 2012.
28 Yukyeong Wi, Jin Kwak, "A study on Security Functional Requirement (SFR) of Applicable to the Cloud Environment in Common Criteria," The 38th conference of the KIPS, Vol20 No.2, pp.731-734, 2013.
29 Yukyeong Wi, Jin Kwak, "Data Store Scheme for the Secure Cloud Data Center," Korea Institute of Information Security and Cryptology CISC-S, Vol23 No.1, pp.297-300, 2013.
30 Taeshik Shon, Jongbin Ko, "Cloud Computing in the IoT (Internet of Things) Security Trends," Review of KIISC, Vol22 No.1, pp.20-30, 2012.
31 Yang Hwan Seok, Lee Byoung Cheon, Yoo Seung Jea, "Study on Intrusion Detection System under Cloud Computing Environment," Jouranl of Information and Security, Vol12 No.3, pp.59-65, 2012.   과학기술학회마을
32 Lee Hyang Jin, Son Kyoung Ho, Lee Jae Il, "Cloud-based enterprise information security services to Strengthen," Review of KIISC, Vol23 No.4, pp.59-64, 2013.
33 Eui-nam Huh, "Personal Cloud Security Technology and Privacy," TTA Journal, Vol.139, pp.65-69, 2012.
34 Jin Hee Kang, Ji Yeon Kim, Choon Sik Park, Hyung Jong Kim, "Privacy IaaS services company considering the characteristics of technical analysis and how to apply research skills," Review of KIISC, Vol22 No.8, pp.61-73, 2012.
35 CCRA, "Common Criteria for Information Technology Security Evaluation Part 1: Introduction and general model," CCMB-2012-09-001, Version 3.1r4, 2012.
36 IT Security Certification Center, "Enterprise Security Management System Protection Profile V2.0," 2008.