• KSII Transactions on Internet and Information Systems
    Monthly Online Journal (eISSN: 1976-7277)

The Establishment of Security Strategies for Introducing Cloud Computing

Vol. 7, No. 4, April 29, 2013
10.3837/tiis.2013.04.015, Download Paper (Free):

Abstract

Cloud computing has become one of the most important technologies for reducing cost and increasing productivity by efficiently using IT resources in various companies. The cloud computing system has mainly been built for private enterprise, but public institutions, such as governments and national institutes, also plans to introduce the system in Korea. Various researches have pointed to security problems as a critical factor to impede the vitalization of cloud computing services, but they only focus on the security threats and their correspondents for addressing the problems. There are no studies that analyze major security issues with regard to introducing the cloud computing system. Accordingly, it is necessary to research the security factors in the cloud computing given to public institutions when adopting cloud computing. This research focuses on the priority of security solutions for the stepwise adoption of cloud computing services in enterprise environments. The cloud computing security area is classified into managerial, physical and technical area in the research, and then derives the detailed factors in each security area. The research derives the influence of security priorities in each area on the importance of security issues according to the identification of workers in private enterprise and public institutions. Ordered probit models are used to analyze the influences and marginal effects of awareness for security importance in each area on the scale of security priority. The results show workers in public institutions regard the technical security as the highest importance, while physical and managerial security are considered as the critical security factors in private enterprise. In addition, the results show workers in public institutions and private enterprise have remarkable differences of awareness for cloud computing security. This research compared the difference in recognition for the security priority in three areas between workers in private enterprise, which use cloud computing services, and workers in public institutions that have never used the services. It contributes to the establishment of strategies, with respect to security, by providing guidelines to enterprise or institutions that want to introduce cloud computing systems.


Statistics

Show / Hide Statistics

Statistics (Cumulative Counts from December 1st, 2015)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.


Cite this article

[IEEE Style]
Y. B. Yoon, J. Oh, B. G. Lee, "The Establishment of Security Strategies for Introducing Cloud Computing," KSII Transactions on Internet and Information Systems, vol. 7, no. 4, pp. 860-877, 2013. DOI: 10.3837/tiis.2013.04.015.

[ACM Style]
Young Bae Yoon, Junseok Oh, and Bong Gyou Lee. 2013. The Establishment of Security Strategies for Introducing Cloud Computing. KSII Transactions on Internet and Information Systems, 7, 4, (2013), 860-877. DOI: 10.3837/tiis.2013.04.015.

[BibTeX Style]
@article{tiis:20289, title="The Establishment of Security Strategies for Introducing Cloud Computing", author="Young Bae Yoon and Junseok Oh and Bong Gyou Lee and ", journal="KSII Transactions on Internet and Information Systems", DOI={10.3837/tiis.2013.04.015}, volume={7}, number={4}, year="2013", month={April}, pages={860-877}}