Browse > Article
http://dx.doi.org/10.13089/JKIISC.2017.27.5.1149

Survey and Prospective on Privacy Protection Methods on Cloud Platform Environment  

Park, Tae-hwan (Pusan National University Department of Electrical and Computer Engineering)
Lee, Ga-ram (Pusan National University Department of Electrical and Computer Engineering)
Kim, Ho-won (Pusan National University Department of Electrical and Computer Engineering)
Abstract
In these days, cloud environments such as cloud platforms, cloud services like Amazon AWS, IBM Bluemix are used in the Internet of Things for providing efficient services. These cloud platform environments have various security threats according to increasing of use, so the recent research results on cloud security and privacy protection technologies and related regimes and legislations are written in this paper and we suggest prospect of research on cloud platform environment security and privacy preserving.
Keywords
Cloud Platform; Privacy; Security; IoT; Cloud Service;
Citations & Related Records
Times Cited By KSCI : 5  (Citation Analysis)
연도 인용수 순위
1 Sang-jin Lee, Jin Kim and Kwang-jo Kim, "An efficient privacy protection scheme for low-cost RFID," Proceeding of KIISC Summer Information Security Conference, pp. 569-573, Jun, 2005.
2 Dae-ha Park and Tae-seok Baek, "Trend and assignment of cloud computing privacy protection research," Review of KIISC, 21(5), pp. 37-44, Aug, 2011.
3 Ae-ri Lee, Do-eun Cho and Jae-young Lee, "A study on the protection of user data in the cloud system," Journal of digital convergence, 10(11), pp. 389-394, Dec, 2012.   DOI
4 Jong-hwei Shin, "Cloud security authentication and assignments," Review of KIISC, 22(6), pp. 28-33, Oct, 2012.
5 Jang-young Chung and Young-sik Hong method, "Distributed image encryption schemes for privacy-preserving of ultra high resolution images in cloud environments," Journal of Korean Institute of Information Scientists and Engineers: Reality and Letter of Computing, 20(4), pp. 262-266, Apr, 2014.
6 Byung-rae Cha, Dae-kyu Kim, Nam-ho Kim, Se-ill Choi and Jong-won Kim, "Design of searchable image encryption system of streaming media based on cloud computing," Journal of Korea Institute of Electronic Communication Sciences, 7(4), pp. 811-819, 2012.   DOI
7 Mok-ryeon Baek, Dong-min Kim and Ik-rae Jeong, "Privacy-preserving self-certified public auditing for secure cloud storage," Journal of KIISE, 43(4), pp. 497-508, Apr, 2016.   DOI
8 Hyun-sung Kim and Sung-woon Lee, "Homomorphic encryption scheme and applications for cloud computing security," Journal of Security Engineering, 10(2), pp. 213-224, Apr, 2013.
9 National Law Information Center, "Personal information protection act," http://www.law.go.kr/eng/engLsSc.do?menuId=2&query=PERSONAL%20INFORMATION%20PROTECTION%20ACT#liBgcolor15, (accessed 19 JUNE 2017)
10 Hyun-mi Jung, Jae-in Sin and Gang-soo Lee, "Design of user authentication method in mobile cloud computing," Proceeding of Korea Institute of Multimedia, 2010(2), pp. 516-519, 2010.
11 National Law Information Center, "Act on promotion of information and communicat ions network urilization and information protection, etc," http://www.law.go.kr/eng/engLsSc.do?menuId=2&query=ACT%20ON%20PROMOTION%20OF%20INFORMATION%20AND%20COMMUNIC ATIONS%20NETWORK%20UTILIZATION%20AND%20INFORMATION%20PROTECTION%2C%20ETC.#liBgcolor0, (accessed 19 JUNE 2017)
12 Tae-sik Son and Jong-bin Ko, "Trend of IoT (Internet of Things) security on cloud computing," Review of KIISC 22(1), pp. 20-30, Feb, 2012.
13 Tae-hyung Kim, "'Attention!' db access control solution for protecting personal infor mation leakage", Boannews, 2016.05.17., http://www.boannews.com/media/view.asp?idx=50623, (accessed 19 JUNE 2017)
14 IBM, "IBM Bluemix security," https://console.ng.bluemix.net/docs/security/index.html#security (accessed MAY 13 2017)
15 Jae-gyu Choi and Bong-nam Noh, "Security technology research in cloud computing environment," Journal of Security Engineering 8(3), pp. 371-384, Jun, 2011.
16 IBM, "IBM Bluemix Hardward Security Module(HSM)," https://www.ibm.com/cloud-computing/bluemix/ko/node/2361 (accessed MAY 13 2017)
17 Sung-kyung Eun, "Trend of cloud computing security Technologies," Review of KIISC, 20(2), pp. 27-31, Apr, 2010.
18 Geun-mo Park, "Google Open the Key Management System(KMS) on Cloud," Korea IT & Industry News, (2017.01.12.), http://www.kinews.net/ news/article-View.html?idxno=102595 (accessed 13 MAY 2017)
19 Microsoft Azure (2017.04.27.), "Azure Security Document," https://docs.mic rosoft.com/ko-kr/azure/security/azure-security (accessed MAY 13 2017)
20 Sung-jae Jeong and Yu-mi Bae, "Trend analysis of Threats and Technologies for Cloud Security," Journal of Security Engineering, 10(2), pp. 199-212, Apr, 2013.
21 Yeun-Dek Chung, "The legal study of protection of personal infomation in cloud computing service," Review of Korea Association For Informedia Law, 15(3), pp. 31-54, Feb, 2012.
22 Cheol-soo Lim, "Cloud computing security technologies," Review of KIISC, 19(3), pp. 14-17, Jun, 2009.
23 Kee-chang Kim, "Cloud service and protection of personal data," Policy research report for improvement of personal information protection law(Privacy Policy Research Forum), pp. 72-83, Feb, 2013.
24 Heung-yeol Yeom and Mi-yeon Yoon, "Trend of international standard on cloud computing security," Review of KIISC, 23(3), pp. 14-18, Jun, 2013.
25 Hak-bum Kim, Eun-jung Jeon and Sung-jun Kim, "Study on security management in cloud computing environment," Management Consulting Review, 2(1), pp. 127-144, Feb, 2011.
26 Woo-yong Yu and Jong-in Lim, "A study on the privacy security management under the cloud computing service provide," Journal of the Korea Institute of Information Security and Cryptology, 22(2), pp. 337-346, Apr, 2012.
27 Jeong-hoon Jeon, "A study on the privacy threats factors of cloud services," Convergence Security Journal, 15(5), pp. 87-95, Sep, 2015.
28 Il-jung Kim, Eun-young Choi and Dong-hoon Lee, "A RFID privacy protect scheme based on mobile," Journal of the Korea Institute of Information Security and Cryptology, 17(1), pp. 89-96, Feb, 2007.
29 Min-kyong Seong and Yeon-don Jung, "A model for privacy preserving publication of social network data," Journal of KIISE : Database, 37(4), pp. 209-219, Aug, 2010.
30 Doo-hyun Jeon, Ji-young Chun and Ik-rae Jeong, "An efficient privacy-preserving data sharing scheme in social network," Journal of the Korea Institute of Information Security and Cryptology, 22(3), pp. 447-461, Jun, 2012.
31 Seung-koo Lee, Sang-soo Yeo, Jung-sik Cho and Sung-kwon Kim, "Secure and efficient privacy protection scheme in RFID system," Proceeding of KIISE: Korea Computer Congress, A, pp. 196-198, Jul, 2005.