A Study on Integration Security Management Model in Cloud Environment

클라우드 환경에서의 통합 보안관제 모델 연구

  • Byun, Yun Sang (ISAA Lab., Department of Information Security Engineering, Soonchunhyang University) ;
  • Kwak, Jin (Dept. of Information Security Engineering, Soonchunhyang University)
  • 변연상 (순천향대학교 정보보호학과 정보보호응용및보증연구실) ;
  • 곽진 (순천향대학교 정보보호학과)
  • Received : 2013.11.20
  • Accepted : 2013.12.20
  • Published : 2013.12.28


Recently, Interest variety of IT services and computing resources are increasing. As a result, the interest in the security of cloud environments is also increasing. Cloud environment is stored that to provide services to a large amount of IT resources on the Cloud. Therefore, Cloud is integrity of the stored data and resources that such as data leakage, forgery, etc. security incidents that the ability to quickly process is required. However, the existing developed various solutions or studies without considering their cloud environment for development and research to graft in a cloud environment because it has been difficult. Therefore, we proposed wire-wireless integrated Security management Model in cloud environment.


Supported by : 한국연구재단


  1. NIST SP 800-144, "Guidelines on Security and Privacy in Public Cloud Computing", 2011.
  2. NIST SP 800-39, "Managing Information Security Risk", 2011.03
  3. Cloud Security Alliance, Top Threats to Cloud Computing V1.0, March, 2010.
  4. Cloud Security Alliance(CSA), "Security Guidance for Critical Areas of Focus in Cloud Computing V2.1", 2009.
  5. T. H. Kim, I. H. Kim, C. W. Min, Y. I. Um, " Trend of Cloud Computing Security Technology", KIISE 2012.
  6. H. H. Lee, "IT Planning Series " Cloud Computing Security Tresnds", 2011
  7. T. H. Kim, I. H. Kim, J. H. Kim, C. W. Min, J. H. Kim, Y. I. Um, "Security-Enhanced Local Process Execution Scheme in Cloud Computing Environments", Journal of KIISE Vol.20, No. 5, 2010
  8. V. Casola, R. Lettiero, M. Rak, and U. Villano, "Access Control in Cloud-on-Grid Systems: The PerfCloud Case Study," Computers, Privacy and Data Protection: an Element of Choice, 427-444, 2011.
  9. D. Chen, X. Huang, and X. Ren, "Access Control of Cloud Service Based on UCON," Lecture Notes in Computer Science, 2009.
  10. Y. J. Kim, S. Y. Lee, H. Y. Kwon, J. I. Lim, "A Study on the Improvement of Effectiveness in National Cyber Security Monitoring and Control Services", Journal of the Korea Institute of Information Security and Cryptology, vol 19, pp. 103-111, 2009. 2
  11. Renaud Bidou, "Security Operation Center Concepts& Implementation"
  12. John W.Rittinghouse and James F.Randsome, "Cloud Computing Implementation, Management and Security " in CRC Press, pp. 153-154, 2010,
  13. R.M.Savola and P.Heinonen, "Security Measurability Enhancing Mechanisms for a Distributed Adaptive Security Monitoring System," IEEE 4th International Conference on Emerging Security Information System and Technology, pp. 25-34, 2010.
  14. H. D. Lee, S. J. Lee, "A Study on development of evaluation indicators on the Managed Security Service(MSS)", Journal of the Korea Institute of Information Security and Cryptology, vol 22, No.5, 2012.
  15. B. Sotomayor, R. Montero, I. Llorente, and I. Foster, "Virtual Infrastructure Management in Private and Hybrid Clouds," IEEE Internet Computing, Vol.13, No.5, pp. 14-2, 2009.

Cited by

  1. Technology Trends, Research and Design of AIM Framework for Authentication Information Management vol.14, pp.7, 2016,
  2. A Study on the Administrative Spatial Informatization and Ubiquitous Smart City : Focus on Busan Centum City vol.11, pp.4, 2016,
  3. Design of Mobile Learning Contents using u-smart tourist information vol.12, pp.3, 2014,