Browse > Article
http://dx.doi.org/10.13089/JKIISC.2018.28.1.229

IP-CCTV Risk Decision Model Using AHP (Cloud Computing Based)  

Jung, Sung-hoo (Institute of Cyber Security & Privacy (ICSP), Korea University)
Lee, Kyung-ho (Institute of Cyber Security & Privacy (ICSP), Korea University)
Abstract
This paper analyzes the problems of existing CCTV and discusses cyber security problems of IP-CCTV in cloud computing environment. In order to reduce the risk of simply removing the risk associated with the provision of cloud services, the risk analysis and counter-measures need to be carried out effectively. Therefore, the STRIDE model as the Threat Risk Modeling is used to analyze the risk factors, and Analytic Hierarchy Process(AHP) is used to measure risk priorities based on the analyzed threats.
Keywords
IP-CCTV; Cloud Computing; Threat Risk Modeling; Analytic Hierarchy Process(AHP);
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 A Public institutions cctv installation status, Ministry of the Interior, 2016.
2 Choon-Sik Park, "Study on Security considerations in the Cloud Computing", Journal of the Korea Academia- Industrial cooperation Society, Vol.12, No.3 pp.1408-1416, Mar. 2011.   DOI
3 Sung-Kyong Un, "Trend of Cloud Computing Security Technology", Review of KIISC(Korea Institute of Information Security and Cryptology) Vol.20, No.2, pp.27-31. Apr. 2010.
4 Dae Yong Jeong, "A Study on Risk Analysis and Countermeasures of Electronic Financial Fraud", KIISC (Korea Institute of Information Security and Cryptology), Vol.27 No.1 [2017], pp. 118-119, Feb. 2017.
5 Saaty T. L., "The Analytic Hierarchy ro-cess," McGraw-Hill, New York, 1980.
6 Sang-Pil Shin, "An analytic hierarchy process (AHP) approach to selection of implementation mode of mobile office system," Seoul National Univetsity of Science and Technology, July. 2013.
7 Suk-Won Lee, "Decision Making Model for Selecting Financial Company Server Privilege Account Operations". KIISC(Korea Institute of Security and Cryptology), Vol.25, No.6, p1607-1620, Dec, 2014.
8 Kihoon Sung, "A Study on Threat factors of Information Security in Social Network Service by Analytic Hierarchy Process," Journal of The Korea Institute of Information Security & Cryptology, Vol.20. no.6. pp.261-270, Dec. 2010.
9 Microsoft, "The STRIDE Threat Model" available https://msdn.microsoft.com/en-us/library/ee823878(v=cs.20).aspx
10 Schneier, Bruce, "Attack Trees," Dr. Dobb's Journal of Software Tools, 24(12), pp. 21-29. Dec. 1999.
11 "Security Requirements of the Video Surveillance System", Telecommunications Technology Association, Dec. 2012.
12 Min-Sun Lee, "Decision Model of the Effectiveness for Advanced that Security Visualization", KIISC(Korea Institute of Information Security and Cryptology), Vol.27, p154-5 Feb. 2017.
13 Jae-Gyu Choi, "Security Technology Research in Cloud Computing Environment", JSE(Journal of Security Engineering), Vol.8 No.3, p371-384, Jun. 2011.