Browse > Article

A Study on effective risk analysis and evaluation method of cloud computing system environment  

Lee, Junglimg (중앙대학교 대학원 융합보안학과)
Chang, Hangbae (중앙대학교 산업보안학과)
Publication Information
Journal of Platform Technology / v.9, no.2, 2021 , pp. 10-25 More about this Journal
Abstract
Although many studies have been conducted on risk analysis and evaluation in the on-premises environment in information security, studies on effective methodologies of risk analysis and evaluation for cloud computing systems are lacking. In 2015, the Cloud Computing Development Act was enacted, which served as an opportunity to promote the introduction of cloud computing. However, due to the increase in security incidents in the cloud computing system, activation is insufficient. In addition, the cloud computing system is not being actively introduced because of the difficulty in understanding the cloud computing system technology of the person in charge who intends to introduce the cloud computing system. In this regard, this study presented an effective risk analysis and evaluation method by examining the characteristics, concepts, and models of cloud computing systems and analyzing how these characteristics affect risk analysis and evaluation.
Keywords
Cloud computing; risk analysis and evaluation; CVE; CCE; CWE; CVSS; CWSS; OWASP;
Citations & Related Records
Times Cited By KSCI : 2  (Citation Analysis)
연도 인용수 순위
1 Eunjoo Kim. "Public sector cloud application examples and performance analysis". Journal of Korean Communication Sciences (Information and Communication), 36 (2), 23-27. 2019.
2 Dongho Kim, Junghoon Lee, and Yangpyo Park, "A Study on the Factors of Cloud Computing Characteristics Influencing Enterprise's Intention to Adopt Cloud Computing Services," The Jounal of Society for e-Business Studies, vol. 17, no. 1, pp. 111-136, 2012.   DOI
3 S. Kim and H. Park, "The Relationship between Vender Dependency and Expected Benefits of Cloud Computing: The Moderating Effects of Vendor Trust and Organizational Supports," korean management review, vol. 47, no. 5, pp. 1021-1047, 2018, doi: 10.17287/kmr.2018.47.5.1021.   DOI
4 Woojin Jeon and Kiwoong Park, "Container-friendly File System Event Detection System for PaaS Cloud Computing," The Korea Next Generation Computing Society, vol. 15, no. 1, pp. 86-98, 2019.
5 Roh Hyun-suk, "A Study on the Concept of Moving Personal Information Overseas in Cloud Service" Ancient Law No. 79 2015.
6 Changjae Lee, "A Study on the Risk Assessment Plan for Persons Handling Personal Information," Dongguk University Master's Thesis, 2016.
7 http://www.ahnlab.com
8 https://www.hangrp.com/consulting/consulting_03_01.php
9 http://www.kaits.or.kr/sub/?p=sub14
10 https://cve.mitre.org/cve/update_cve_records.html
11 http://cwe.mitre.org,
12 https://nvd.nist.gov/vuln-metrics/cvss
13 https://owasp.org/
14 Lee Cheong-hee, "Information Flow-Based Risk Analysis Methodology _ Focusing on Photomask Process Flow" Master's Thesis, Kyungwon University, 2009.
15 http://aws,amazon.com/ko/agreement/, Security Handoff Point
16 Lee Myung-ryul, "A Study on Information Security Risk Analysis Method Reflecting Information Security Governance and External Threats" Master's Thesis, Soongsil University, 2017.
17 Shin Kyung-ah and Lee Sang-jin, "Information Security Management System for Cloud Computing Services," Journal of the Korea Institute of Information Security & Cryptology 21(6), vol. 22, no. 1, pp. 155-167, 2012.   DOI
18 Morgan, D. L. (1996). Focus groups as qualitative research (Vol. 16). Sage publications.
19 Thomas Erl, Zaigham Mahmood and Ricardo Puttini, "Cloud Computing: Concepts, Technology & Architecture"
20 Saeha Jeon, Narae Park, and Jung Jung Lee, "Study on the Factors Affecting the Intention to Adopt Public Cloud Computing Service," Entrue Journal of Information Technology, vol. 10, no. 2, pp. 97-112, 2011.
21 Cabrera, D., Mandel, J. T., Andras, J. P., & Nydam, M. L. (2008). What is the crisis? Defining and prioritizing the world's most pressing problems. Frontiers in Ecology and the Environment, 6(9), 469-475.   DOI
22 http://www.zinion.co.kr/index.php?mid=service04
23 Ilhoon Jung, Junghun Oh, Jungheum Park, and Sangjin Lee, "A Digital Forensic Study on IaaS Type Cloud Computing Services," Journal of the Korea Institute of Information Security & Cryptology, vol. 21, no. 9, pp. 55-65, 2011.
24 Sangyong Choi and Kimoon Jung, "Security Architecture for a Secure Cloud Computing Environment," Journal of the Korea Society of Computer and Information, vol. 23, no. 12, pp. 81-87, 2018, doi: 10.9708/jksci.2018.23.12.081.   DOI