• 제목/요약/키워드: Cloud service security

검색결과 337건 처리시간 0.022초

클라우드 서비스 위험이 실물옵션 채택의도에 미치는 영향: 중소기업의 퍼블릭 클라우드 서비스를 중심으로 (The Effect of Cloud Service Risks on the Intention of Purchasing Real Options: Focusing on Public Cloud Service of Small and Medium-sized Enterprises)

  • 김정은;양희동
    • 경영정보학연구
    • /
    • 제17권1호
    • /
    • pp.117-140
    • /
    • 2015
  • 클라우드 서비스는 10대 IT 전략기술 트렌드로 주목받고 있지만 국내 중소기업의 경우 대부분 비용 제약의 문제로 보안 위험이 높은 퍼블릭 클라우드를 사용하고 대기업에 비해 클라우드 서비스에 대한 이해도가 낮으며 도입률 또한 저조한 편이다. 한편 IT 프로젝트에서의 불확실성을 헷징하기 위한 방편으로 실물옵션 전략이 주목을 받고 있는데 본 연구에서는 클라우드 서비스의 기술적, 안전성, 관계적, 경제적 위험요소 간의 인과관계를 밝히고 경제적 위험이 실물옵션 채택의도에 어떠한 영향을 주는지에 관한 연구를 실시하였다. 본 연구는 전문업체에 의뢰하여 클라우드 서비스를 사용하고 있는 수도권 내 중소기업을 대상으로 설문조사를 실시하였다. 총 287부를 120개의 기업별로 평균을 내어 조직수준에서 분석을 하였으며 통계적 분석에는 Smart PLS Version 2.0.M3과 SPSS Statistics18을 활용하였다. 연구결과에 의하면 클라우드 서비스의 기술적 위험은 안전성 위험에 유의한 정(+)의 영향을 미쳤고 클라우드 서비스의 관계적 위험은 경제적 위험에 유의한 정(+)의 영향을 미쳤다. 그리고 클라우드 서비스의 안전성 위험은 경제적 위험에 유의한 정(+)의 영향을 미쳤고 경제적 위험은 연기옵션과 포기옵션 채택의도에 유의한 정(+)의 영향을 미쳤다. 본 연구는 클라우드 서비스를 사용함으로써 겪을 수 있는 여러 위험 요인을 세분화하고 위험 요인과 실물옵션간의 관계를 명확히 밝힘으로써 클라우드 서비스 계약 시에 실물옵션을 적용할 수 있는 이론적인 바탕이 될 수 있게 하였다. 실무적으로는 클라우드 서비스를 사용함에 있어 발생할 수 있는 여러 위험들을 효과적으로 관리하고 통제하기 위하여 클라우드 서비스 계약 시 이들 위험들을 관리할 수 있는 실물옵션을 계약사항에 제시함으로써 사용자와 공급자 모두에게 도움이 될 수 있는 전략을 세울 수 있다는 데에 의의가 있다.

Adaptively Secure Anonymous Identity-based Broadcast Encryption for Data Access Control in Cloud Storage Service

  • Chen, Liqing;Li, Jiguo;Zhang, Yichen
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제13권3호
    • /
    • pp.1523-1545
    • /
    • 2019
  • Cloud computing is now a widespread and economical option when data owners need to outsource or share their data. Designing secure and efficient data access control mechanism is one of the most challenging issues in cloud storage service. Anonymous broadcast encryption is a promising solution for its advantages in the respects of computation cost and communication overload. We bring forward an efficient anonymous identity-based broadcast encryption construction combined its application to the data access control mechanism in cloud storage service. The lengths for public parameters, user private key and ciphertext in the proposed scheme are all constant. Compared with the existing schemes, in terms of encrypting and decrypting computation cost, the construction of our scheme is more efficient. Furthermore, the proposed scheme is proved to achieve adaptive security against chosen-ciphertext attack adversaries in the standard model. Therefore, the proposed scheme is feasible for the system of data access control in cloud storage service.

Cloud and Fog Computing Amalgamation for Data Agitation and Guard Intensification in Health Care Applications

  • L. Arulmozhiselvan;E. Uma
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제18권3호
    • /
    • pp.685-703
    • /
    • 2024
  • Cloud computing provides each consumer with a large-scale computing tool. Different Cyber Attacks can potentially target cloud computing systems, as most cloud computing systems offer services to many people who are not known to be trustworthy. Therefore, to protect that Virtual Machine from threats, a cloud computing system must incorporate some security monitoring framework. There is a tradeoff between the security level of the security system and the performance of the system in this scenario. If strong security is needed, then the service of stronger security using more rules or patterns is provided, since it needs much more computing resources. A new way of security system is introduced in this work in cloud environments to the VM on account of resources allocated to customers are ease. The main spike of Fog computing is part of the cloud server's work in the ongoing study tells the step-by-step cloud server to change the tremendous measurement of information because the endeavor apps are relocated to the cloud to keep the framework cost. The cloud server is devouring and changing a huge measure of information step by step to reduce complications. The Medical Data Health-Care (MDHC) records are stored in Cloud datacenters and Fog layer based on the guard intensity and the key is provoked for ingress the file. The monitoring center sustains the Activity Log, Risk Table, and Health Records. Cloud computing and Fog computing were combined in this paper to review data movement and safe information about MDHC.

국내 클라우드 보안 인증스킴 개발에 관한 연구 (A study on Development of Certification Schemes for Cloud Security)

  • 정진우;김정덕;송명균;진철구
    • 디지털융복합연구
    • /
    • 제13권8호
    • /
    • pp.43-49
    • /
    • 2015
  • 대표적인 융복합 ICT 서비스라고 할 수 있는 클라우드 컴퓨팅 서비스에 대한 법안이 2015년 3월에 통과되면서 많은 업체나 기관에서 다시금 클라우드 서비스 도입을 고려하고 있으나 보안에 대한 염려 때문에 서비스 도입을 주저하고 있다. 이러한 문제를 해결하기 위해서는 클라우드 서비스 보안에 대한 객관적이고 공정한 평가와 인증을 수행할 수 있는 클라우드 보안 인증체계의 도입이 요구된다. 현재 클라우드 보안 인증체계에 관한 연구가 활발히 진행되고 있지만 인증스킴에 대한 연구는 미흡하다. 따라서 본 연구는 국외 클라우드 보안 인증체계와 클라우드 서비스 제공자에 대한 평가 제도를 분석하여 국내 클라우드 보안 인증 도입시 고려되어야 할 요소들을 분석하였다. 이를 기반으로 국내 실정에 맞는 3가지 인증스킴을 제시하였고, 포커스 그룹 인터뷰를 통하여 인증스킴별 장단점을 도출하여 상황에 적절한 인증스킴을 제시하였다.

Building a Private Cloud-Computing System for Greenhouse Control

  • Kim, JoonYong;Lee, Chun Gu;Park, Dong-Hyeok;Park, Heun Dong;Rhee, Joong-Yong
    • Journal of Biosystems Engineering
    • /
    • 제43권4호
    • /
    • pp.440-444
    • /
    • 2018
  • Purpose: Cloud-computing technology has several advantages, including maintenance, management, accessibility, and computing power. A greenhouse-control system utilizing these advantages was developed using a private cloud-computing system. Methods: A private cloud needs a collection of servers and a suite of software tools to monitor and control cloud-computing resources. In this study, a server farm, operated by OpenStack as a cloud platform, was constructed using servers, and other network devices. Results: The greenhouse-control system was developed according to the fundamental cloud service models: infrastructure as a service, platform as a service, and software as a service. This system has four additional advantages - security, control function, public data use, and data exchange. There are several considerations that must be addressed, such as service level agreement, data ownership, security, and the differences between users. Conclusions: When the advantages are utilized and the considerations are addressed, cloud-computing technology will be beneficial for agricultural use.

클라우드 환경에서의 가시성 제공 방안 연구 (A Study on the Providing the Visibility in a Cloud Environment)

  • 김태경;백남균;김정협
    • 디지털산업정보학회논문지
    • /
    • 제19권1호
    • /
    • pp.23-30
    • /
    • 2023
  • According to the government's plan for cloud conversion and integration of information resources for administrative and public institutions, work is underway to convert administrative and public institutions to the cloud by 2025. In addition, in the private sector, companies in many fields, including finance, are already using cloud services, and the usage is expected to expand more and more. As a result, changes have occurred in security control activities using security systems, it is required to secure visibility for encrypted traffic when building a cloud control environment. In this paper, an analysis was conducted on the way to provide visibility in the cloud service environment. Ways to provide visibility in the cloud service environment include methods of using load balancer, methods of using security systems, and methods of using equipment dedicated to SSL/TLS decryption. For these methods, Performance comparison was performed in terms of confidentiality, functionality (performance), cost. Through this, the pros and cons of each visibility provision method were presented.

클라우드 서비스 품질·성능 관리체계의 개선방안 (Improvement of Cloud Service Quality and Performance Management System)

  • 김남주;함재춘;서광규
    • 반도체디스플레이기술학회지
    • /
    • 제20권4호
    • /
    • pp.83-88
    • /
    • 2021
  • Cloud services have become the core infrastructure of the digital economy as a basis for collecting, storing, and processing large amounts of data to trigger artificial intelligence-based services and industrial innovation. Recently, cloud services have been spotlighted as a means of responding to corporate crises and changes in the work environment in a national disaster caused by COVID-19. While the cloud is attracting attention, the speed of adoption and diffusion of cloud services is not being actively carried out due to the lack of trust among users and uncertainty about security, performance, and cost. This study compares and analyzes the "Cloud Service Quality and Performance Management System" and the "Cloud Service Certification System" and suggests complementary points and improvement measures for the cloud service quality and performance management system.

클라우드 컴퓨팅에서의 보안 고려사항에 관한 연구 (Study on Security Considerations in the Cloud Computing)

  • 박춘식
    • 한국산학기술학회논문지
    • /
    • 제12권3호
    • /
    • pp.1408-1416
    • /
    • 2011
  • 클라우드 컴퓨팅은 컴퓨팅 리소스의 경비 절감과 효율은 물론 서비스의 확장 및 향상을 제공한다. 그러나 클라우드 서비스 사용자(기업 등)들은 클라우드 컴퓨팅 특성에 의한 여러 가지 위험들에 대해서 많은 염려를 갖고 있다. 본 논문에서는 클라우드 컴퓨팅 환경으로 인한, 시큐리티를 포함한 여러 가지 주요 이슈들을 검토하여 보고자 한다. 또한 시큐리티에 관한 문제들을 보다 구체적으로 분석하고 클라우드 컴퓨팅에 관한 위협들을 식별하여 시큐리티 위험을 줄일 수 있는 대략적인 대응책들을 제안하였다.

클라우드 사용의도에 영향을 미치는 개인특성 연구 (A Study of Personal Characteristics Influencing Cloud Intention)

  • 김진배;최명길
    • Journal of Information Technology Applications and Management
    • /
    • 제26권3호
    • /
    • pp.135-157
    • /
    • 2019
  • Information technology has economic, social and cultural impacts is closely linked to our lives. This information technology is becoming a key to the change of human civilization through connecting people and objects on the earth. In addition, future information technology is becoming more intelligent and personalized with the development of computing technology, and due to the rapid development of alcohol, environment without time and space constraint is realized, Is spreading. Since existing portable storage media are made of physical form, there is a limit to usage due to the risk of loss and limitation of capacity. Cloud services can overcome these limitations. Due to the problems of existing storage media, it is possible to overcome the limitations of storing, managing and reusing information through cloud services. Despite the large number of cloud service users, the existing research has focused mainly on the concept of cloud service and the effect of introduction on the companies. This study aims to conduct a study on individual characteristics that affect the degree of cloud use. We will conduct research on the causes of IT knowledge, personal perception of security, convenience, innovation, economical trust, and platform dependency affecting the intention to use the cloud. These results show that the variables affecting individual 's use of cloud service are influenced by individuals, and this study can be used as a basic data for individuals to use cloud service.

A Enhanced Security Model for Cloud Computing in SSO Environment

  • Jang, Eun-Gyeom
    • 한국컴퓨터정보학회논문지
    • /
    • 제22권8호
    • /
    • pp.55-61
    • /
    • 2017
  • Cloud computing is cost-effective in terms of system configuration and maintenance and does not require special IT skills for management. Also, cloud computing provides an access control setting where SSO is adopted to secure user convenience and availability. As the SSO user authentication structure of cloud computing is exposed to quite a few external security threats in wire/wireless network integrated service environment, researchers explore technologies drawing on distributed SSO agents. Yet, although the cloud computing access control using the distributed SSO agents enhances security, it impacts on the availability of services. That is, if any single agent responsible for providing the authentication information fails to offer normal services, the cloud computing services become unavailable. To rectify the environment compromising the availability of cloud computing services, and to protect resources, the current paper proposes a security policy that controls the authority to access the resources for cloud computing services by applying the authentication policy of user authentication agents. The proposed system with its policy of the authority to access the resources ensures seamless and secure cloud computing services for users.