DOI QR코드

DOI QR Code

A Study on Priorities of the Components of Big Data Information Security Service by AHP

AHP 기법을 활용한 Big Data 보안관리 요소들의 우선순위 분석에 관한 연구

  • Biswas, Subrata (Department of Business Administration, Sangmyung University) ;
  • Yoo, Jin Ho (Department of Business Administration, Sangmyung University) ;
  • Jung, Chul Yong (Department of Business Administration, Sangmyung University)
  • Received : 2013.10.10
  • Accepted : 2013.11.20
  • Published : 2013.11.30

Abstract

The existing computer environment, numerous mobile environments and the internet environment make human life easier through the development of IT technology. With the emergence of the mobile and internet environment, data is getting bigger rapidly. From this environment, we can take advantage of using those data as economic assets for organizations which make dreams come true for the emerging Big Data environment and Big Data security services. Nowadays, Big Data services are increasing. However, these Big Data services about Big Data security is insufficient at present. In terms of Big Data security the number of security by Big Data studies are increasing which creates value for Security by Big Data not Security for Big Data. Accordingly in this paper our research will show how security for Big Data can vitalize Big Data service for organizations. In details, this paper derives the priorities of the components of Big Data Information Security Service by AHP.

IT기술의 발전은 기존의 컴퓨터 환경과 더불어 수많은 모바일 환경 및 사물 인터넷환경을 통해 사람의 삶을 편리하게 하고 있다. 이러한 모바일과 인터넷 환경의 등장으로 데이터가 급속히 폭증하고 있으며, 이러한 환경에서 데이터를 경제적인 자산으로 활용 가능한 Big Data 환경과 서비스가 등장하고 있다. 그러나 Big Data를 활용한 서비스는 증가하고 있지만, 이러한 서비스를 위해 발생되는 다량의 데이터에는 보안적 문제점이 있음에도 불구하고 Big Data의 보안성에 대한 논의는 미흡한 실정이다. 그리고 기존의 Big Data에 대한 보안적인 측면의 연구들은 Big Data의 보안이 아닌 Big Data를 활용한 서비스의 보안이 주를 이루고 있다. 이에 따라서 본 연구에서는 Big Data의 서비스 산업의 활성화를 위하여 Big Data의 보안에 대한 연구를 하였다. 세부적으로 AHP 기법을 활용한 Big Data 환경에서 보안관리를 위한 구성요소를 파악하고 그에 대한 우선순위를 도출하였다.

Keywords

References

  1. Oh, N. S., Han, Y. S., Eom, C. W. Oh, K. S., Lee, B. G., "Developing the Assessment Method for Information Security Level," Journal of the Society for e- Business Studies, Vol. 16, No. 2, pp. 159-169, 2011.
  2. Lee, H. M., Lim, J. I., "A Study on the Development of Corporate Information Security Level Assessment Models," Korea Institute of Information Security and Cryptology, Vol. 18, No. 5, pp. 161-170, 2011.
  3. Lee, Y. K., Kim, S. H., "A Development of Evaluation Indicators for Information Security by means of the Coincidence Analysis," Korea Society of IT Services, Vol. 7, No. 3, pp. 175-198, 2008.
  4. Ko, M. H., Kong, H. K., Kim, T. S., "Using a Balanced Scorecard Framework to Evaluate Corporate Information Security Level," Telecommunication Review, Vol. 19, No. 6, pp. 925-935, 2009.
  5. ISO/IEC 17799(BS 7799-1), "Information technology, Security techniques, Code of practice for information security," 2005.
  6. Eloff, j. H. P. and Eloff, M., "Integrated Information Security Architecture," Computer Fraud and Security, pp. 10-16, 2005.
  7. McCarthy, M. P. and Campbell, "Security Transformation," McGraw-Hill : New York, 2001.
  8. Tudor, J. K., "Information Security Architec ture-An integrated approach to security in an organization," Boca Raton, FL : Auerbach, 2000.
  9. KISA, MSIP, "Korea Information Security Management System Guideline(ISMS)," March, 2013.
  10. NISTIR 7628, "Introduction to NISTIR 7628 Guidelines for Smart Grid Cyber Security," sep. 2010.
  11. Shin, K. A., Lee. S. J., "Information Security Management System on Cloud Computing Service," Journal of The Korea Institute of Information Security and Cryptology, Vol. 22, No. 1, pp. 155-167, 2012.
  12. Jang, E. Y., Kim, H. J., Park, C. S., Kim, J. Y., Lee. J. I., "The study on a threat countermeasure of mobile Cloud services," Journal of The Korea Institute of Information Security and Cryptology, Vol. 21, No. 1, pp. 177-186, 2011.
  13. Noh, B. N., Choi, J. G., "Security Technology Research in Cloud Computing Environment," Journal of Security Engineering, Vol. 8, No. 3, pp. 371-383, 2011.
  14. Park, C. S., "Study on Security Considerations in the Cloud Computing," Journal of academia-industrial technology, Vol. 12, No. 3, pp. 1408-1416, 2011.
  15. National Information Society Agency (NIA), "Big Data era opening a new future," 2013.
  16. "CSA Big Data Working Group Releases Top 10 Big Data Security and Privacy Challenges Report," Cloud Security Alliance, 2012.
  17. Da Veiga, J. H. P. Eloff, "An Information Security Governance Framework," Information Systems Management, Vol. 24, pp. 361-372, 2007. https://doi.org/10.1080/10580530701586136
  18. Saaty, T. L. and Luis, G. V., "Diagnosis with Dependent Symptoms : Bayes Theorem and the Analytic Hierarchy Process," Operations Research, Vol. 46, No. 4, pp. 491-502, 1998. https://doi.org/10.1287/opre.46.4.491
  19. Kim, H. S., "A Study on the Quantification of Information Security Level," The Korea Society of Management information Systems, Vol. 9, No. 4, pp. 182-201, 1999. https://doi.org/10.1046/j.1365-2575.1999.00060.x
  20. SOPHOS, "New platform and Changing threats," Security Threat Report, 2013.
  21. Von Solms, S. H., "Information Security- The fourth wave, Computers and Security," Vol. 25, pp. 165-168, 2006. https://doi.org/10.1016/j.cose.2006.03.004
  22. Martins, A. and Eloff, J. H. P., "Information Security Culture, In Security in the information society," Boston : Kluwer Academic Publishers, IFIP/SEC, pp. 203-214, 2002.

Cited by

  1. Demand Forecasting Models for Medicines through Wireless Sensor Networks Data and Topic Trend Analysis vol.11, pp.9, 2015, https://doi.org/10.1155/2015/907169
  2. Designing Index for Assessing Structural Vulnerability of Supply Chain considering Risk Propagation vol.20, pp.2, 2015, https://doi.org/10.7838/jsebs.2015.20.2.125
  3. The Study of Developing Korean SentiWordNet for Big Data Analytics : Focusing on Anger Emotion vol.19, pp.4, 2014, https://doi.org/10.7838/jsebs.2014.19.4.001
  4. 기술사업화 프로세스 단계별 빅데이터 활용방안에 관한 연구 vol.19, pp.4, 2013, https://doi.org/10.7838/jsebs.2014.19.4.073
  5. 빅데이터 보안 분야의 연구동향 분석 vol.23, pp.1, 2013, https://doi.org/10.22693/niaip.2016.23.1.003
  6. AHP 방법을 활용한 디지털포렌식 전문가 역량의 우선순위 도출 vol.22, pp.1, 2017, https://doi.org/10.7838/jsebs.2017.22.1.107