A Study on Smartwork Security Technology Based on Cloud Computing Environment
Computing environment has changed a lot by development of network and wide spread of the mobile terminal. Among them, adoption of cloud computing causes a large change socially. The social consensus by introduction of smartwork based on this cloud computing environment is increasing. Especially, sma...
Saved in:
Published in | Wireless personal communications Vol. 94; no. 3; pp. 445 - 454 |
---|---|
Main Authors | , |
Format | Journal Article |
Language | English |
Published |
New York
Springer US
01.06.2017
Springer Nature B.V |
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | Computing environment has changed a lot by development of network and wide spread of the mobile terminal. Among them, adoption of cloud computing causes a large change socially. The social consensus by introduction of smartwork based on this cloud computing environment is increasing. Especially, smartwork which can work freely anytime and anywhere has been noted as a new business model while broadband communication infrastructure becomes popular. However, smartwork based on cloud computing environment has a variety of security vulnerabilities. The risk of information leakage is increasing according to increasing of vulnerability of virtualization technology which cloud computing has, and security threats of mobile terminal used to smartwork. In this paper, we look security element by smartwork design for the activation of the smartwork based on cloud computing and organize to respond to the attack. The corresponding method presented in this paper will be applied to safe security model. |
---|---|
AbstractList | Computing environment has changed a lot by development of network and wide spread of the mobile terminal. Among them, adoption of cloud computing causes a large change socially. The social consensus by introduction of smartwork based on this cloud computing environment is increasing. Especially, smartwork which can work freely anytime and anywhere has been noted as a new business model while broadband communication infrastructure becomes popular. However, smartwork based on cloud computing environment has a variety of security vulnerabilities. The risk of information leakage is increasing according to increasing of vulnerability of virtualization technology which cloud computing has, and security threats of mobile terminal used to smartwork. In this paper, we look security element by smartwork design for the activation of the smartwork based on cloud computing and organize to respond to the attack. The corresponding method presented in this paper will be applied to safe security model. |
Author | Yoo, Seung-Jae Yang, Hwan-Seok |
Author_xml | – sequence: 1 givenname: Hwan-Seok surname: Yang fullname: Yang, Hwan-Seok organization: Department of Information Security Engineering, Joongbu University – sequence: 2 givenname: Seung-Jae surname: Yoo fullname: Yoo, Seung-Jae email: sjyoo@joongbu.ac.kr organization: Department of Information Security Engineering, Joongbu University |
BookMark | eNp1kD1PwzAQhi0EEm3hB7BZYjb47CapxxKVD6mIoUVis1LbKSmtXWwHmn-PqzCwcMstz_Oe7h2iU-usQegK6A1QWtwGAFYUhEJGOBVADidoAFnByISP307RgAomSM6AnaNhCBtKkyXYAD1P8SK2usPO4sWu8vHb-Q-8MKr1Tezw0qh367Zu3eG7Khh9xMqtazUu3W7fxsau8cx-Nd7ZnbHxAp3V1TaYy989Qq_3s2X5SOYvD0_ldE4UhzwSxnJTTHQ9WdUZzznlRZ1X4_SA4Hkl0hSM1hUHpalWmul6NQYAVUG2UsAF4yN03efuvftsTYhy41pv00kJgqY8ITgkCnpKeReCN7Xc-yb92Emg8tia7FuTqTV5bE0eksN6JyTWro3_k_yv9AMBg3E_ |
CitedBy_id | crossref_primary_10_1109_ACCESS_2024_3400862 crossref_primary_10_1155_2022_7649317 crossref_primary_10_1007_s11277_019_06565_x |
Cites_doi | 10.1016/j.compeleceng.2012.04.015 10.3745/JIPS.2013.9.2.247 10.1166/sl.2013.3001 10.1016/j.future.2011.04.012 10.2298/CSIS130919057C 10.1007/s10207-013-0208-7 10.2298/CSIS120922030L |
ContentType | Journal Article |
Copyright | Springer Science+Business Media New York 2015 Copyright Springer Science & Business Media 2017 |
Copyright_xml | – notice: Springer Science+Business Media New York 2015 – notice: Copyright Springer Science & Business Media 2017 |
DBID | AAYXX CITATION |
DOI | 10.1007/s11277-015-3091-x |
DatabaseName | CrossRef |
DatabaseTitle | CrossRef |
DatabaseTitleList | |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Journalism & Communications Engineering Business |
EISSN | 1572-834X |
EndPage | 454 |
ExternalDocumentID | 10_1007_s11277_015_3091_x |
GroupedDBID | -5B -5G -BR -EM -Y2 -~C .4S .86 .DC .VR 06D 0R~ 0VY 123 1N0 1SB 2.D 203 28- 29R 29~ 2J2 2JN 2JY 2KG 2KM 2LR 2P1 2VQ 2~H 30V 4.4 406 408 409 40D 40E 5QI 5VS 67Z 6NX 8TC 8UJ 95- 95. 95~ 96X AAAVM AABHQ AABYN AAFGU AAHNG AAIAL AAJKR AANZL AAPBV AARHV AARTL AATNV AATVU AAUYE AAWCG AAYFA AAYIU AAYQN AAYTO ABBBX ABBXA ABDZT ABECU ABFGW ABFTD ABFTV ABHLI ABHQN ABJNI ABJOX ABKAG ABKAS ABKCH ABKTR ABMNI ABMQK ABNWP ABQBU ABSXP ABTEG ABTHY ABTKH ABTMW ABULA ABWNU ABXPI ACBMV ACBRV ACBXY ACBYP ACGFS ACHSB ACHXU ACIGE ACIPQ ACKNC ACMDZ ACMLO ACOKC ACOMO ACREN ACTTH ACVWB ACWMK ADHHG ADHIR ADIMF ADINQ ADKNI ADKPE ADMDM ADMVV ADOXG ADRFC ADTPH ADURQ ADYFF ADYOE ADZKW AEBTG AEEQQ AEFIE AEFTE AEGAL AEGNC AEGXH AEJHL AEJRE AEKMD AEKVL AENEX AEOHA AEPYU AESKC AESTI AETLH AEVLU AEVTX AEXYK AFEXP AFGCZ AFLOW AFNRJ AFQWF AFWTZ AFYQB AFZKB AGAYW AGDGC AGGBP AGGDS AGJBK AGMZJ AGQMX AGWIL AGWZB AGYKE AHAVH AHBYD AHSBF AHYZX AIAKS AIIXL AILAN AIMYW AITGF AJBLW AJDOV AJRNO AJZVZ AKQUC ALMA_UNASSIGNED_HOLDINGS ALWAN AMKLP AMTXH AMXSW AMYLF AMYQR AOCGG ARCEE ARCSS ARMRJ ASPBG AVWKF AXYYD AYJHY AZFZN B-. BA0 BBWZM BDATZ BGNMA CAG COF CS3 CSCUP DDRTE DL5 DNIVK DPUIP DU5 EBLON EBS EDO EIOEI EJD ESBYG FD6 FEDTE FERAY FFXSO FIGPU FINBP FNLPD FRRFC FSGXE FWDCC GGCAI GGRSB GJIRD GNWQR GQ6 GQ7 GQ8 GXS HF~ HG5 HG6 HMJXF HQYDN HRMNR HVGLF HZ~ I-F I09 IHE IJ- IKXTQ ITG ITH ITM IWAJR IXC IZIGR IZQ I~X I~Z J-C J0Z JBSCW JCJTX JZLTJ KDC KOV KOW LAK LLZTM M4Y MA- N2Q N9A NB0 NDZJH NPVJJ NQJWS NU0 O9- O93 O9G O9I O9J OAM OVD P19 P9P PF0 PT4 PT5 QOK QOS R4E R89 R9I RHV RIG RNI RNS ROL RPX RSV RZC RZE RZK S16 S1Z S26 S27 S28 S3B SAP SCLPG SCV SDH SDM SEG SHX SISQX SJYHP SNE SNPRN SNX SOHCF SOJ SPISZ SRMVM SSLCW STPWE SZN T13 T16 TEORI TSG TSK TSV TUC TUS U2A U5U UG4 UNUBA UOJIU UTJUX UZXMN VC2 VFIZW W23 W48 WK8 YLTOR Z45 Z5O Z7R Z7S Z7X Z7Y Z7Z Z81 Z83 Z86 Z88 Z8M Z8N Z8R Z8S Z8T Z8U Z8W Z92 ZMTXR _50 ~A9 ~EX AACDK AAEOY AAJBT AASML AAYXX ABAKF ACAOD ACDTI ACZOJ AEFQL AEMSY AFBBN AGQEE AIGIU CITATION H13 |
ID | FETCH-LOGICAL-c316t-226e78df8bf5363037f6a4127936a9999720fa31cd0dcd2dfb4111ca15bc13923 |
IEDL.DBID | AGYKE |
ISSN | 0929-6212 |
IngestDate | Fri Sep 13 03:44:30 EDT 2024 Thu Sep 12 19:42:31 EDT 2024 Sat Dec 16 12:04:39 EST 2023 |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 3 |
Keywords | Security element Cloud computing Smartwork Security analysis |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c316t-226e78df8bf5363037f6a4127936a9999720fa31cd0dcd2dfb4111ca15bc13923 |
PQID | 1900379931 |
PQPubID | 2043826 |
PageCount | 10 |
ParticipantIDs | proquest_journals_1900379931 crossref_primary_10_1007_s11277_015_3091_x springer_journals_10_1007_s11277_015_3091_x |
PublicationCentury | 2000 |
PublicationDate | 2017-06-01 |
PublicationDateYYYYMMDD | 2017-06-01 |
PublicationDate_xml | – month: 06 year: 2017 text: 2017-06-01 day: 01 |
PublicationDecade | 2010 |
PublicationPlace | New York |
PublicationPlace_xml | – name: New York – name: Dordrecht |
PublicationSubtitle | An International Journal |
PublicationTitle | Wireless personal communications |
PublicationTitleAbbrev | Wireless Pers Commun |
PublicationYear | 2017 |
Publisher | Springer US Springer Nature B.V |
Publisher_xml | – name: Springer US – name: Springer Nature B.V |
References | Chen, Tsaur, Chen, Chang (CR4) 2014; 11 Rong, Nguyen, Jaatun (CR2) 2013; 39 Guha, Shrivastava (CR5) 2013; 3 Lee, Kim, Rhee, Uk (CR7) 2013; 10 Kim, Chang (CR9) 2013; 11 Diogo, Fernandes (CR1) 2014; 13 Peng (CR6) 2013; 9 Joo, Son, Jeon (CR8) 2012; 10 Li, Li, Wo, Hu, Huai, Liu, Lam (CR3) 2012; 28 V Guha (3091_CR5) 2013; 3 C Rong (3091_CR2) 2013; 39 J Li (3091_CR3) 2012; 28 C-L Chen (3091_CR4) 2014; 11 SG Joo (3091_CR8) 2012; 10 Y Kim (3091_CR9) 2013; 11 T Lee (3091_CR7) 2013; 10 K Peng (3091_CR6) 2013; 9 AB Diogo (3091_CR1) 2014; 13 |
References_xml | – volume: 3 start-page: 9 issue: 1 year: 2013 ident: CR5 article-title: Review of information authentication in mobile cloud over SaaS & PaaS layers publication-title: International Journal of Advanced Computer Research (IJACR) contributor: fullname: Shrivastava – volume: 39 start-page: 47 issue: 1 year: 2013 end-page: 54 ident: CR2 article-title: Beyond lightning: A survey on security challenges in cloud computing publication-title: Computers & Electrical Engineering doi: 10.1016/j.compeleceng.2012.04.015 contributor: fullname: Jaatun – volume: 9 start-page: 247 issue: 2 year: 2013 end-page: 258 ident: CR6 article-title: A secure network for mobile wireless service publication-title: Journal of Information Processing Systems doi: 10.3745/JIPS.2013.9.2.247 contributor: fullname: Peng – volume: 11 start-page: 1799 issue: 9 year: 2013 end-page: 1803 ident: CR9 article-title: A study on small and medium enterprise information foundation for wireless sensor networks work environment implementation publication-title: Sensor Letters doi: 10.1166/sl.2013.3001 contributor: fullname: Chang – volume: 28 start-page: 379 issue: 2 year: 2012 end-page: 390 ident: CR3 article-title: CyberGuarder: A virtualization security assurance architecture for green cloud computing publication-title: Future Generation Computer Systems doi: 10.1016/j.future.2011.04.012 contributor: fullname: Lam – volume: 10 start-page: 11 year: 2012 end-page: 22 ident: CR8 article-title: Policy implications for the smart work diffusion: Focusing on the perceptual differences on organizational effectiveness between smart workers and office workers publication-title: Journal of Digital Policy & Management contributor: fullname: Jeon – volume: 11 start-page: 925 issue: 3 year: 2014 end-page: 941 ident: CR4 article-title: A secure mobile DRM system based on cloud architecture publication-title: Computer Science and Information Systems doi: 10.2298/CSIS130919057C contributor: fullname: Chang – volume: 13 start-page: 113 issue: 2 year: 2014 end-page: 170 ident: CR1 article-title: Security issues in cloud environments: A survey publication-title: International Journal of Information Security doi: 10.1007/s10207-013-0208-7 contributor: fullname: Fernandes – volume: 10 start-page: 703 issue: 2 year: 2013 end-page: 724 ident: CR7 article-title: Design and implementation of E-discovery as a service based on cloud computing publication-title: Computer Science and Information Systems doi: 10.2298/CSIS120922030L contributor: fullname: Uk – volume: 10 start-page: 11 year: 2012 ident: 3091_CR8 publication-title: Journal of Digital Policy & Management contributor: fullname: SG Joo – volume: 11 start-page: 1799 issue: 9 year: 2013 ident: 3091_CR9 publication-title: Sensor Letters doi: 10.1166/sl.2013.3001 contributor: fullname: Y Kim – volume: 28 start-page: 379 issue: 2 year: 2012 ident: 3091_CR3 publication-title: Future Generation Computer Systems doi: 10.1016/j.future.2011.04.012 contributor: fullname: J Li – volume: 11 start-page: 925 issue: 3 year: 2014 ident: 3091_CR4 publication-title: Computer Science and Information Systems doi: 10.2298/CSIS130919057C contributor: fullname: C-L Chen – volume: 3 start-page: 9 issue: 1 year: 2013 ident: 3091_CR5 publication-title: International Journal of Advanced Computer Research (IJACR) contributor: fullname: V Guha – volume: 13 start-page: 113 issue: 2 year: 2014 ident: 3091_CR1 publication-title: International Journal of Information Security doi: 10.1007/s10207-013-0208-7 contributor: fullname: AB Diogo – volume: 10 start-page: 703 issue: 2 year: 2013 ident: 3091_CR7 publication-title: Computer Science and Information Systems doi: 10.2298/CSIS120922030L contributor: fullname: T Lee – volume: 39 start-page: 47 issue: 1 year: 2013 ident: 3091_CR2 publication-title: Computers & Electrical Engineering doi: 10.1016/j.compeleceng.2012.04.015 contributor: fullname: C Rong – volume: 9 start-page: 247 issue: 2 year: 2013 ident: 3091_CR6 publication-title: Journal of Information Processing Systems doi: 10.3745/JIPS.2013.9.2.247 contributor: fullname: K Peng |
SSID | ssj0010092 |
Score | 2.1602938 |
Snippet | Computing environment has changed a lot by development of network and wide spread of the mobile terminal. Among them, adoption of cloud computing causes a... |
SourceID | proquest crossref springer |
SourceType | Aggregation Database Publisher |
StartPage | 445 |
SubjectTerms | Broadband Business Cloud computing Communications Engineering Computer Communication Networks Engineering Networks Signal,Image and Speech Processing |
Title | A Study on Smartwork Security Technology Based on Cloud Computing Environment |
URI | https://link.springer.com/article/10.1007/s11277-015-3091-x https://www.proquest.com/docview/1900379931/abstract/ |
Volume | 94 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1JT8JAFH5BuOjBBTUiSOZgPGiGdDpdj0BAopELkuCp6UzbxCDFCCTqr_dNFwouB29NOplmZl7n-_KW7wFcOqYvuc9MKqwooIbLBBWGlNT3mXBVsyQtTBJkh9ZgbNxNzEkJ9LXrIp628ohkclEXtW5MRRsRvShHjKPIGyum6kpdhkr79um-t44dKBmhRGFPJXbgzZzHMn-bZBuNCor5LSqagE3_IC0AXCQahSrHZNpaLUVLfv5UcPzHOg5hP-OepJ0ayxGUwrgKexuKhFWoZ4OeFzNyRbaqRxbH8NAmKu_wg8xjMpqh0amsLjLKWuCRwk1POgiOgRrWfZmvApL2jsAvkF5RWHcC437vsTugWT8GKjmzlhSZWmg7QeSIyOQWYp8dWb6By3G55SPRdG1di3zOZKAFMtCDSBh4k0q0BCGRaOr8FMrxPA7PgGgiEY5Hehdxw-GWo_sWE9KWWoTPwq3BdX4u3msqu-EVAstqBz3cQU_toPdeg0Z-cl72By48ply0NrIvVoOb_CQ2Xv812fm_RtdhV1c4n7hlGlBevq3CC2QpS9FEs-x3OsNmZp5N2Bnr7S8rgeAp |
link.rule.ids | 315,786,790,27957,27958,41116,41558,42185,42627,52146,52269 |
linkProvider | Springer Nature |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1BS8MwFA4yD-pBdCrOTc1BPCiBpmnT9jjHxtRtl22wW0jSBgTXid1A_70vXWs30YO3QkNKX9L3fc1773sI3YS-1ExSnyhuYuJFVBHlaU2kpCqyzZKcJE-QHfH-1Hua-bOijjsrs93LkGTuqatiN2rDjQBfhAHIESCOu1ZO3f5xTd32d-jAqgjlAns2rwMccxnK_G2KbTCqGOaPoGiONb0jdFiQRNxer-ox2knSOjrYkA6so2Yx6CWb41u8VeaRnaBhG9sEwU-8SPF4DrvDpl_hcdGrDlfn6fgBUCy2wzqvi1WM100e4Am4W1XAnaJprzvp9EnROIFoRvmSAKVKgjA2oTI-4wBSgeHSg3ePGJfACKPAdYxkVMdOrGM3NsoDl6dhyZQGRuiyM1RLF2lyjrCjcoV34GGGeSHjoSs5VTrQjoFrFTXQXWlB8bbWxxCVErI1twBzC2tu8dFArdLGovhUMkHtWWoANIk20H1p943bf0128a_R12ivPxkOxOBx9NxE-64F5_wspYVqy_dVcgnUYqmu8q30BeLQxJQ |
linkToPdf | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LS8NAEF6kguhBtCrWVt2DeFCWZrPJJjnW2lJfRaiF3kJ2NwuCTYtNQf-9s3mYVvTgLZBhQ2Yf38fOzDcIXfhuJFlEXSK4VsQJqCDCkZJEERWBaZZkxVmC7JAPxs79xJ0UfU4XZbZ7GZLMaxqMSlOStudKt6vCN2pCjwBlhAHgESCRmwYZTU7X2O58hxGMolAmtmdyPOCQLsOavw2xDkwV2_wRIM1wp7-HdgvCiDv5DO-jjTipo50VGcE6ahZGr4spvsRrJR-LA_TUwSZZ8BPPEjyawkoxqVh4VPStw9XdOr4BRFPGrPs2WyqcN3yAL-BeVQ13iMb93kt3QIomCkQyylMC9Cr2fKV9oV3GAbA8zSMH_j1gPAJ2GHi2pSNGpbKUVLbSwoHjT8L0CQns0GZHqJbMkvgYYUtkau_AyTRzfMZ9O-JUSE9aGp5F0EBXpQfDea6VEVaqyMbdIbg7NO4OPxqoVfo4LLbNIqTmXtUDykQb6Lr0-8rrvwY7-Zf1Odp6vu2Hj3fDhybatg1OZ9cqLVRL35fxKbCMVJxlK-kLl6rI2Q |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=A+Study+on+Smartwork+Security+Technology+Based+on+Cloud+Computing+Environment&rft.jtitle=Wireless+personal+communications&rft.au=Yang%2C+Hwan-Seok&rft.au=Yoo%2C+Seung-Jae&rft.date=2017-06-01&rft.issn=0929-6212&rft.eissn=1572-834X&rft.volume=94&rft.issue=3&rft.spage=445&rft.epage=454&rft_id=info:doi/10.1007%2Fs11277-015-3091-x&rft.externalDBID=n%2Fa&rft.externalDocID=10_1007_s11277_015_3091_x |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0929-6212&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0929-6212&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0929-6212&client=summon |