Browse > Article
http://dx.doi.org/10.7472/jksii.2012.13.6.33

The Important Factors in Security for Introducing the Cloud Services  

Yoon, Young Bae (Graduate School of Information, Yonsei University)
Oh, Junseok (Communications Policy Research Center, Yonsei University)
Lee, Bong Gyou (Graduate School of Information, Yonsei University)
Publication Information
Journal of Internet Computing and Services / v.13, no.6, 2012 , pp. 33-40 More about this Journal
Abstract
The cloud service has become the significant factor to save the IT operation cost and to improve the productivities in companies. It was introduced to Korea for enterprise services of major companies in 2008. As the increase of recognition for its effect, more small businesses and public institutions plan to introduce the cloud computing services. The cloud computing researches have only focused on the security threats and response technologies to them. Therefore, this research analyzed the importances of responses to security threats in specific domains. The domains were divided into managerial, physical, and technical security. The specific factors in three domains were used for the analysis in this research as well. The ordered logit model was used for the analysis and the analysis results showed that physical security and managerial security are considered to be significantly important in the cloud computing security. The results also presented that the security policy, the control and surveillance to service infrastructure, and application security are highly important in the respect of specific factors. This research will contribute to enterprises or institutions in Korea, which want to introduce the cloud computing services, by aiding the establishment of effective security strategies.
Keywords
Cloud Services; Security Importance; Ordered Logit Model;
Citations & Related Records
Times Cited By KSCI : 3  (Citation Analysis)
연도 인용수 순위
1 Korea Communications Commission and Korea Internet Security Agency, "Information Security guide for Cloud Services", 2011.
2 S.K.Eun, "Cloud Computing Security Technology Trends", Review of Korea Institute of Information Security and Cryptology, Vol.20, No.2, pp.27-31, 2010.
3 Korea Communications Commission and Korea Internet Security Agency, "Information Security guide for Cloud Services", 2011.
4 "Asia Pacific End-User Cloud Computing Survey", International Data Corporation, 2009
5 Cloud Security Alliance, "Top Threats to Cloud Computing V1.0", 2010.
6 Gartner, "Assessing the Security Risks of Cloud Computing", 2008.
7 T.H.Kim, I.H.Kim, C.W.Min and Y.I,Eom, "Security Technology Trend in Cloud Computing", Korea Information Science Society review, Vol.30, No.1, pp.30-38, 2012.   과학기술학회마을
8 J.S.Ryu, "Cloud Computing as Green IT and Security Issues", The Graduate School of Computer Information Communications, Korea University, 2010.
9 S.K.Eun, N.S.Cho, Y.H.Kim and D.S.Choi, "Cloud Computing Security Technology", Electronics and Telecommunications Trends, ETRI, Vol.24, No.4, pp.79-88, 2009.   과학기술학회마을
10 K.A.Shin and S.J.Lee, "Information Security Management System on Cloud Computing Service", Journal of the Korea Institute of Information Security and Cryptology, Vol.22, No.1, 2012.   과학기술학회마을
11 S.J.Kim, "Information Security Plan on Cloud Computing: Information Security Management System", Management Consulting Review, Vol.2, No.2, pp.194-208, 2010.
12 K.J.Lee, "The Study on the Issue of Cloud Computing Security and the Plans for the Personal Information Protection", Department of Information Security, The Graduate School of Information and Communications, Sungkyunkwan University, 2010.
13 D.H.Kim, "A Study on the improvement and application of Information Security Management System for Cloud Computing Security", Department of Information Security, The Graduate School of Information and Communications, Sungkyunkwan University, 2011.
14 S.W.Lee, S.H.Min, J.Y.Park and S.D.Yoon, "Application of Logit and Probit Model", Pakyoungsa, 2005.
15 J.S.Oh, Y.B.Yoon, J.R.Suh and B.G.Lee, "The Difference of Awareness between Public Institutions and Private Enterprises for Cloud Computing Security", International Journal of Security and Its Applications, Vol.6, No.3, pp.1-10, 2012.