• Title/Summary/Keyword: 클라우드 보안 정책

Search Result 95, Processing Time 0.032 seconds

Security Issues on Cloud Based Smart Grid (클라우드 기반 스마트 그리드 환경에서의 보안 이슈)

  • Lee, Hyeop-Geon;Lee, Kyoung-Hwa;Park, Min-Su;Shin, Yong-Tae
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2010.04a
    • /
    • pp.770-773
    • /
    • 2010
  • 최근 큰 관심을 모으고 있는 스마트 그리드는 그린 에너지 환경 구현을 위한 기반 기술로 에너지 효율을 최적화하고자 하는 차세대 전략망이다. 스마트 그리드의 다양한 활용 가능성에도 불구하고 구조적 특징과 상호 운용성 표준의 부재로 인해 신뢰적인 인증을 보장하지 못한다. 이로 인해 네트워크의 신뢰성을 약화시키는 요인으로 작용하며, 많은 보안상의 문제를 야기한다. 따라서, 신뢰적인 클라우드 기반 스마트 그리드 환경을 구현하기 위하여 표준 및 정책 제정과 안전한 데이터 통신을 위한 보안 메커니즘 개발 및 인증 기술 개발이 필요하다. 본 논문에서는 클라우드 기반 스마트 그리드와 표준화 동향 및 클라우드 기반 스마트 그리드 환경에서의 보안기술을 살펴보고 이를 해결하기 위한 대안을 제시함을 목표로 한다.

Development of Device Resource and Contents Access Security Policy Based Cloud Media Service (리소스 접근 제어 보안 정책 기반 이종기기 연계형 클라우드 미디어 서비스 기술 개발)

  • Park, Byoung Ha;Hong, Sung Hye;Jung, Kwang Mo;Koh, Byoung Soo
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2012.11a
    • /
    • pp.241-242
    • /
    • 2012
  • 본 논문에서는 스마트폰, 태블릿, 스마트TV 등 이종기기가 접속된 클라우드 미디어 서비스 환경에서 보안 정책 기반 리소스/콘텐츠 접근 제어를 통해 단말 로컬콘텐츠, 클라우드 아카이버 콘텐츠가 연동된 채널 형태의 융합형 미디어 콘텐츠를 사용자 주도로 이종 단말 간 연계를 통해 제공하는 모바일 웹 애플리케이션 형태의 이종기기 연계형 클라우드 미디어 서비스 기술 개발에 관하여 논한다.

  • PDF

A Design of Multimedia Content Management through Cloud Computing Paradigm (클라우드 컴퓨팅 파라다임을 통한 멀티미디어 컨텐츠 관리 설계)

  • Tolentino, Randy;Kim, Yong-Tae;Jeong, Yoon-Su
    • Journal of Digital Convergence
    • /
    • v.10 no.11
    • /
    • pp.343-349
    • /
    • 2012
  • Usage control models are the new breed of access control models that allow description of comprehensive policies for usage of protected content. In this paradigm, decisions regarding access to objects are not limited to request time only. It is coupled with the usage of the protected objects and becomes a continuous process carried out in parallel to the usage. The realization of usage control has been a long standing research problem to overcome the issue of loss of control in secure document dissemination. With the emergence of cloud computing, documents are stored in the cloud, the document viewers and editors themselves reside in the cloud and are accessed from thin clients such as browsers. We note that such scenarios provide an ideal opportunity for the realization of usage control for securing the usage of documents based on the stakeholders' policies. In this paper, we proposed Multimedia Content Management (MCM) for a better realization multimedia content in the cloud based applications. We designed a robust architecture to provide fine-grained control over usage of protected objects through the use of emerging cloud computing paradigm. We present the design principles for this realization and discuss our proposed architecture.

A Study on Analysis of Security Functional Requirements for Virtualization Products through Comparison with Foreign Countries' Cases (해외 사례 비교를 통한 가상화 제품의 보안기능 요구사항 분석에 관한 연구)

  • Lee, Ji-Yeon
    • Journal of Digital Convergence
    • /
    • v.17 no.8
    • /
    • pp.221-228
    • /
    • 2019
  • The importance of security for virtualization products has been increased with the activation policy of cloud computing and it is necessary to analyze cyber security threats and develop security requirements for virtualization products to provide with more secure cloud environments. This paper is a preliminary study with the purpose of developing security functional requirements through analyzing security features and cyber security threats as well as comparison of foreign countries' cases for virtualization products. To do this, the paper compares evaluation schemes for virtualization products in US and UK foreign countries, and analyzes the cyber security threats, security objectives and security requirements in both countries. Furthermore, it proposes the essential checking items and processes for developing security functional requirements about security features of virtualization products to contribute to its more secure development and the establishment of related security evaluation standards.

New security requirements for cloud services account fraud (클라우드 서비스 계정도용 방지를 위한 새로운 보안 요구사항)

  • Ahn, Dong-Il;Choi, Jin-Young
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2014.11a
    • /
    • pp.66-69
    • /
    • 2014
  • 클라우드는 IT를 직접 소유하기 보다 제 3 자가 제공하는 소프트웨어, 플랫폼, 인프라구조 등을 필요에 따라 선택하고 이용하는 방식으로 시스템을 중앙에서 집중 관리하여 규모의 경제를 달성하는 데 용이하지만 해커에게는 더 없이 매력적인 공격 대상이 된다. 아무리 완벽한 보안 설비와 정책을 이행하고 있더라도 사용자의 아이디와 패스워드가 도용 되었을 때 발생되는 문제점은 치명적이다. 본 논문에서는 사용자의 편의성을 보장하면서 계정도용을 방지하기 위한 새로운 보안 요구사항을 제시하고자 한다.

A Study on Model fostering for Cloud Service Brokerage (클라우드서비스 브로커리지 성공모델 육성 연구)

  • Choi, Sung
    • Journal of Digital Convergence
    • /
    • v.13 no.2
    • /
    • pp.1-11
    • /
    • 2015
  • The growing company that provides high quality service to every customer by introducing a cloud-system organization. However, the information needs of diverse and different, so every cloud system, and acts as a barrier to entry for cloud services provide appropriate. Cloud services are becoming complicated and diversified depending on concerns about cloud security continues, the growing need of professionalism held by the cloud service(Cloud Service Brokerage) CSB companies. Thus, to analyze the various services, find my support legislation, security and compatibility issues, the services of the best new business through service offerings tailored to the environment, and will implement the necessary management services which brokerage (CSB) is. This study presents a brokerage(CSB) development model, and suggested policy measures that apply to the co-op that I am having difficulties in cloud services business models.

A Study on Cloud Computing for Financial Sector limited to Processing System of Non-Critical Information: Policy Suggestion based on US and UK's approach (비중요 정보처리시스템으로 한정된 국내 금융권 클라우드 시장 활성화를 위한 제안: 영미 사례를 중심으로)

  • Do, Hye-Ji;Kim, In-Seok
    • The Journal of Society for e-Business Studies
    • /
    • v.22 no.4
    • /
    • pp.39-51
    • /
    • 2017
  • In October 2016, the NFSA (National Financial Supervisory Authorities) revised the network separation clause of the Regulation on Supervision of Electronic Financial Activities in order to promote the Cloud Computing implementation in the financial sectors. The new regulation, however, limits the Cloud Computing usage to non-critical information and its processing system. Financial institutions that provide customer data analysis and personalized services based on personal data regard current revision as unchanged as before. The implementation of Cloud Computing has greatly contributed to cost reduction, business innovation and is an essential requirement in ever-changing information communication technology environment. To guarantee both security and reliability of the implementation of the Cloud Computing in financial sectors, a considerable amount of research and debate needs to be done. This paper examines current Cloud Computing policies in the Korean financial sector and the challenges associated with it. Finally, the paper identifies policy suggestions based on both European Union and United States' approach as they have successfully introduced Cloud Computing Services for their financial sectors.

Influence Factors of Innovation Resistance of Cloud Computing Service: Focus on Small and Medium Enterprises (클라우드 컴퓨팅 서비스의 혁신저항 영향요인: 중소기업을 대상으로)

  • Lee, Sanghoon;Choi, Jeong Min
    • Journal of Digital Convergence
    • /
    • v.18 no.12
    • /
    • pp.105-115
    • /
    • 2020
  • The purpose of this study is to investigate the factors influencing the innovation resistance of cloud computing services and to suggest policy alternatives to increase the use of domestic cloud computing services. For this, a survey was conducted on 178 SMEs that introduced cloud computing services with government support. As a result, technostress, CEO informatization leadership and organizational structure concentration had a significant influence on innovation resistance. Therefore, in the future, first, it is necessary to provide user-centered cloud computing services in the direction of reducing technostress. Second, it is necessary to apply cloud computing services through a deeper understanding of the organizational characteristics of each small and medium enterprise. Third, there is a need for advanced security authentication and a compensation system. In order to promote the use of cloud computing services, an environment in which users can safely use should be prepared first.

A Study on the Factors Affecting the Intention to use public Institution staff's Cloud Computing Service (공공기관 조직구성원의 클라우드 컴퓨팅 서비스 이용의도에 영향을 미치는 요인에 관한 연구)

  • Choi, Hyukra;Kim, SeonMyung
    • Informatization Policy
    • /
    • v.21 no.2
    • /
    • pp.49-66
    • /
    • 2014
  • In the last few years, cloud computing has grown from being a promising business concept to one of the fast growing segments of the IT industry. However, as more and more information on individuals and companies are placed in the cloud, concerns on just how safe the computing environment is have gradually increased. In this study, it will be explored if key characteristics of cloud computing services would affect the behavioral intention to use public cloud computing services. A conceptual model is developed and seven research hypotheses are proposed for empirical testing. The proposed model is examined through structural equation analysis. The results show that perceived risk has statistically significant effect on the privacy concern of users and the privacy concern has a negative influence on the trust. Finally, the trust has a positive effect on the attitude and the attitude has statistically significant effect on use intention. Implications of these findings are discussed for both researchers and practitioners and future research issues are raised as well.

Research Trends and Considerations for Blockchain-based IoT Cloud Systems (블록체인 기반 IoT 클라우드 시스템에 대한 연구동향 및 고찰)

  • Kim, Tae Woo;Park, Jong Hyuk
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2020.11a
    • /
    • pp.349-352
    • /
    • 2020
  • 클라우드는 가상화 기술을 사용한 리소스의 유연성과 뛰아난 접근성을 장점으로 빅데이터, 딥러닝 등 여러 분야에서 클라우드를 사용하고 있다. 최근 클라우드와 결합된 IoT 시스템을 통해 시스템 관리, 데이터 처리 및 저장, 데이터를 이용한 빅데이터 활용 등 여러 방법으로 사용 할 수 있어 많은 관심을 받고 있다. 그러나 IoT 클라우드의 많은 활용에 따라 대규모 시스템화, 여러 사용자의 개인정보 저장 등의 이유로 많은 공격자의 표적이 되고있다. 여러 공격자의 공격을 방아하기 위해 IoT 클라우드 시스템은 블록체인, 보안 IoT 디바이스, 변형된 클라우드 모델등 여러 연구가 진행되고 있다. 본 논문에서는 최근 연구되고 있는 블록체인, 클라우드, IoT 시스템의 동향에 대해 조사하고, 기존에 연구되었던 기술을 바탕으로 효과적인 블록체인 기반의 IoT 클라우드 시스템을 제안한다. 제안하는 IoT 클라우드 시스템은 블록체인 기술을 사용하여 보안정책을 관리할 수 있어 신뢰성이 높으며, 클라우드 시스템이 작동하지 않을 경우 페일오버 기능을 수행할 수 있어 가용성이 뛰어나다.