• Title/Summary/Keyword: Personal Cloud

Search Result 194, Processing Time 0.028 seconds

Intention to Use of Personal Cloud Services: Focusing on the Security Factors (보안요인을 중심으로 한 개인용 클라우드 서비스 사용의도)

  • Lee, Jae Seok;Kim, Kyoung-jae
    • Knowledge Management Research
    • /
    • v.18 no.4
    • /
    • pp.237-260
    • /
    • 2017
  • Recently, with the proliferation of smart phones and mobile devices and the increase in the speed of mobile Internet, IT services are increasingly used in smart phones and mobile devices in a different way from the past. That is, a cloud service that downloads and uses data stored in the server in real time is expanding, and as a result, the security due to the continuous Internet connection of the user becomes a problem. In this study, we analyzed the relationship between factors affecting the continuous use of personal cloud service by using technology acceptance model. In addition to the technology acceptance model, confidentiality, privacy, accessibility, innovation, and self-efficacy were extracted from the existing research with emphasis on the characteristics of the cloud service and security factors. Moreover, the difference of intention to use among genders was verified through structural equation modeling with survey data from 262 personal cloud service users.

The Exploratory Study on the Impact of User's Characteristics and Use Behaviors on Personal Cloud Service Use (이용자 특성과 이용행태가 개인형 클라우드 서비스 이용에 미치는 영향에 관한 탐색적 연구)

  • Kim, Dong-Woo;Pyo, Si-Young;Joung, Won-Jo
    • Journal of Broadcast Engineering
    • /
    • v.19 no.1
    • /
    • pp.3-13
    • /
    • 2014
  • This study as an exploratory study, investigates personal cloud service use which has been developed and distributed rapidly. Focusing on the user's characteristics and use behaviors, the influences of connected uses of platform and contents are empirically figured out. The results show that the contents which need small-data capacity like pictures and musics have been used very frequently in a cloud service. Second, 'platform-connected use' has been found out as the most influential factor in cloud service. SNS, e-mail, and personal innovativeness are also proved as significant factors. As a leading study analyzing theoretically the personal cloud service, it implies that it is necessary to consider the user's characteristics and use behaviors in developing cloud service in the market and making policy for promoting relevant industry.

Security Requirements of Personal Health Service (개인건강서비스를 위한 보안 요구사항)

  • Kim, Sang-Kon;Hwang, Hee-Joung
    • Journal of IKEEE
    • /
    • v.19 no.4
    • /
    • pp.548-556
    • /
    • 2015
  • When the variety of personal health services are provided in the ICBM(IoT, Cloud, Bigdata, and Mobile) environment, the security requirements of personal health service(PHS) including privacy issues is proposed in this paper. Because it is expected that the services related to personal health are provided in the cloud environment, the security requirements of a cloud environment is firstly investigated and then security threats including direct and indirect threats in a cloud environment are analyzed in terms of the security of PHS. In addition, the security requirements of PHS is developed based on the security requirements of electronic medical record(EMR) for medical service in this paper, then the validity of the proposed security requirements is shown by the relation between security requirements of cloud environment and PHS to indicate that a security requriement is supported by several security requirements of PHS.

An efficient cloud security scheme for multiple users (다중 사용자를 위한 효율적인 클라우드 보안 기법)

  • Jeong, Yoon-Su
    • Journal of Convergence for Information Technology
    • /
    • v.8 no.2
    • /
    • pp.77-82
    • /
    • 2018
  • Recently, as cloud services become popular with general users, users' information is freely transmitted and received among the information used in the cloud environment, so security problems related to user information disclosure are occurring. we propose a method to secure personal information of multiple users by making personal information stored in the cloud server and a key for accessing the shared information so that the privacy information of the multi users using the cloud service can be prevented in advance do. The first key used in the proposed scheme is a key for accessing the user 's personal information, and is used to operate the information related to the personal information in the form of a multi - layer. The second key is the key to accessing information that is open to other users than to personal information, and is necessary to associate with other users of the cloud. The proposed scheme is constructed to anonymize personal information with multiple hash chains to process multiple kinds of information used in the cloud environment. As a result of the performance evaluation, the proposed method works by allowing third parties to safely access and process the personal information of multiple users processed by the multi - type structure, resulting in a reduction of the personal information management cost by 13.4%. The efficiency of the proposed method is 19.5% higher than that of the existing method.

Cloud Computing in the Vulnerability Analysis for Personal Information Security (Cloud Computing의 개인 정보 보안을 위한 취약점 분석)

  • Sun, Jae-Hoon;Kim, Kui-Nam J.
    • Convergence Security Journal
    • /
    • v.10 no.4
    • /
    • pp.77-82
    • /
    • 2010
  • Cloud computing is defined as numerous concepts by research institutions and scholars. However, due to the present business trend in the IT sector, emphasizing on cost and efficiency, cloud computing has been defined as a form of computing which can provide extendable mass storage components in the virtual environment. As a result, security issues have been arising due to the variety of cloud computing services provided by the industries. This paper aims to analyze the weaknesses such as security techniques and inquiries, and personal information protection required for various cloud computing services.

Analysis of Influence Factors on the Intention to Use Personal Cloud Computing (개인용 클라우드 컴퓨팅 사용에 미치는 영향요인 분석)

  • Ryu, Jae Hong;Moon, Hye Young;Choi, Jinho
    • Journal of Information Technology Services
    • /
    • v.12 no.4
    • /
    • pp.319-335
    • /
    • 2013
  • Cloud computing allows users to access software or specific programs that support the cloud platform through an information communicating device that can connect to the internet anywhere or anytime. Also, the cloud architecture not only reduces the expenses of IT infrastructure construction and maintenance, but also speeds up processing and mobility, which leads to a significant ease of use. In spite of the advantages of cloud computing, previous studies have been centered on case studies of the execution, advantages, and problems of cloud computing. In contrast, empirical research on individual cloud computing up till now is very insufficient. Thus, the research aims to create a model of an individual user's perspective and verify validation. This study reveals types of influence that characteristics can have on an individual user's intention to use, by searching the characteristics that the individual user recognizes on cloud computing services. The results are as follows:first, the characteristics of cloud computing indicates a significant influence on usage intention. Second, all characteristics in cloud computing, accessibility, reliability, perceived ease of use, and fusibility, are confirmed in providing significant influences in shaping social influence forms. Third, social influence has a significant influence on usage intention.

Digital Contents Control for Desktop Virtualization: A Case of Virtual Folder Based Implementation (데스크톱 가상화에 따른 디지털콘텐츠 통제방안: 가상폴더방식의 구현사례)

  • Yoon, Han Seong
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.10 no.4
    • /
    • pp.1-9
    • /
    • 2014
  • Recently, with the enlargement of cloud computing, virtual desktop infrastructure(VDI) can be an alternative of the existing personal computer based information environment. For the case of partially introduced VDI coexisting with personal computer environment, we suggest a virtual folder based approach to control the overall digital contents within an organization with a case of implementation. Although a centralizing device was used for storage and sharing of organization's digital contents, it was not easy to accomplish centralizing digital contents completely. It is tried to prevent users from utilizing their own storage in their personal computers or virtual machines and to use virtual folder which transfer and store digital contents to and in EDMS. The virtual folder system of this paper looks like a real folder in a personal computer, but it is another virtual device for outer storage devices including EDMS. It can be an alternative and reference of digital contents control for future applications of cloud computing.

A Study of Personal Characteristics Influencing Cloud Intention (클라우드 사용의도에 영향을 미치는 개인특성 연구)

  • Kim, Jin Bae;Cho, Myeonggil
    • Journal of Information Technology Applications and Management
    • /
    • v.26 no.3
    • /
    • pp.135-157
    • /
    • 2019
  • Information technology has economic, social and cultural impacts is closely linked to our lives. This information technology is becoming a key to the change of human civilization through connecting people and objects on the earth. In addition, future information technology is becoming more intelligent and personalized with the development of computing technology, and due to the rapid development of alcohol, environment without time and space constraint is realized, Is spreading. Since existing portable storage media are made of physical form, there is a limit to usage due to the risk of loss and limitation of capacity. Cloud services can overcome these limitations. Due to the problems of existing storage media, it is possible to overcome the limitations of storing, managing and reusing information through cloud services. Despite the large number of cloud service users, the existing research has focused mainly on the concept of cloud service and the effect of introduction on the companies. This study aims to conduct a study on individual characteristics that affect the degree of cloud use. We will conduct research on the causes of IT knowledge, personal perception of security, convenience, innovation, economical trust, and platform dependency affecting the intention to use the cloud. These results show that the variables affecting individual 's use of cloud service are influenced by individuals, and this study can be used as a basic data for individuals to use cloud service.

A Design of Interdependent Multi Session Authentication Scheme for Secure Cloud Service (안전한 클라우드 서비스를 위한 상호의존적 다중세션 인증 기법 설계)

  • Song, Jun Ho;Choi, Do Hyun;Park, Jung Oh
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.10 no.3
    • /
    • pp.181-196
    • /
    • 2014
  • Cloud computer technology currently provides diverse services based on a comprehensive environment ranging from hardware to solution, network and service. While the target of services has been extended from institutions and corporations to personal infrastructure and issues were made about security problems involved with protection of private information, measures on additional security demands for such service characteristics are insufficient. This paper proposes a multi-session authentication technique based on the characteristics of SaaS (Software as a Service) among cloud services. With no reliable authentication authority, the proposed technique reinforced communication sessions by performing key agreement protocol safe against key exposure and multi-channel session authentication, providing high efficiency of performance through key renewal using optimzied key table. Each formed sessions have resistance against deprivation of individual confirmation and service authority. Suggested confirmation technique that uses these features is expected to provide safe computing service in clouding environment.

Verifiable Could-Based Personal Health Record with Recovery Functionality Using Zero-Knowledge Proof (영지식 증명을 활용한 복원 기능을 가진 검증 가능한 클라우드 기반의 개인 건강기록)

  • Kim, Hunki;Kim, Jonghyun;Lee, Dong Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.6
    • /
    • pp.999-1012
    • /
    • 2020
  • As the utilize of personal health records increases in recent years, research on cryptographic protocol for protecting personal information of personal health records has been actively conducted. Currently, personal health records are commonly encrypted and outsourced to the cloud. However, this method is limited in verifying the integrity of personal health records, and there is a problem with poor data availability because it is essential to use it in decryption. To solve this problem, this paper proposes a verifiable cloud-based personal health record management scheme using Redactable signature scheme and zero-knowledge proof. Verifiable cloud-based personal health record management scheme can be used to verify the integrity of the original document while preserving privacy by deleting sensitive information by using Redactable signature scheme, and to verify that the redacted document has not been deleted or modified except for the deleted part of the original document by using the zero-knowledge proof. In addition, it is designed to increase the availability of data than the existing management schemes by designing to recover deleted parts only when necessary through the Redact Recovery Authority. And we propose a verifiable cloud-based personal health record management model using the proposed scheme, and analysed its efficiency by implementing the proposed scheme.