A Study on Smartwork Security Technology Based on Cloud Computing Environment

Computing environment has changed a lot by development of network and wide spread of the mobile terminal. Among them, adoption of cloud computing causes a large change socially. The social consensus by introduction of smartwork based on this cloud computing environment is increasing. Especially, sma...

Full description

Saved in:
Bibliographic Details
Published inWireless personal communications Vol. 94; no. 3; pp. 445 - 454
Main Authors Yang, Hwan-Seok, Yoo, Seung-Jae
Format Journal Article
LanguageEnglish
Published New York Springer US 01.06.2017
Springer Nature B.V
Subjects
Online AccessGet full text

Cover

Loading…
Abstract Computing environment has changed a lot by development of network and wide spread of the mobile terminal. Among them, adoption of cloud computing causes a large change socially. The social consensus by introduction of smartwork based on this cloud computing environment is increasing. Especially, smartwork which can work freely anytime and anywhere has been noted as a new business model while broadband communication infrastructure becomes popular. However, smartwork based on cloud computing environment has a variety of security vulnerabilities. The risk of information leakage is increasing according to increasing of vulnerability of virtualization technology which cloud computing has, and security threats of mobile terminal used to smartwork. In this paper, we look security element by smartwork design for the activation of the smartwork based on cloud computing and organize to respond to the attack. The corresponding method presented in this paper will be applied to safe security model.
AbstractList Computing environment has changed a lot by development of network and wide spread of the mobile terminal. Among them, adoption of cloud computing causes a large change socially. The social consensus by introduction of smartwork based on this cloud computing environment is increasing. Especially, smartwork which can work freely anytime and anywhere has been noted as a new business model while broadband communication infrastructure becomes popular. However, smartwork based on cloud computing environment has a variety of security vulnerabilities. The risk of information leakage is increasing according to increasing of vulnerability of virtualization technology which cloud computing has, and security threats of mobile terminal used to smartwork. In this paper, we look security element by smartwork design for the activation of the smartwork based on cloud computing and organize to respond to the attack. The corresponding method presented in this paper will be applied to safe security model.
Author Yoo, Seung-Jae
Yang, Hwan-Seok
Author_xml – sequence: 1
  givenname: Hwan-Seok
  surname: Yang
  fullname: Yang, Hwan-Seok
  organization: Department of Information Security Engineering, Joongbu University
– sequence: 2
  givenname: Seung-Jae
  surname: Yoo
  fullname: Yoo, Seung-Jae
  email: sjyoo@joongbu.ac.kr
  organization: Department of Information Security Engineering, Joongbu University
BookMark eNp1kD1PwzAQhi0EEm3hB7BZYjb47CapxxKVD6mIoUVis1LbKSmtXWwHmn-PqzCwcMstz_Oe7h2iU-usQegK6A1QWtwGAFYUhEJGOBVADidoAFnByISP307RgAomSM6AnaNhCBtKkyXYAD1P8SK2usPO4sWu8vHb-Q-8MKr1Tezw0qh367Zu3eG7Khh9xMqtazUu3W7fxsau8cx-Nd7ZnbHxAp3V1TaYy989Qq_3s2X5SOYvD0_ldE4UhzwSxnJTTHQ9WdUZzznlRZ1X4_SA4Hkl0hSM1hUHpalWmul6NQYAVUG2UsAF4yN03efuvftsTYhy41pv00kJgqY8ITgkCnpKeReCN7Xc-yb92Emg8tia7FuTqTV5bE0eksN6JyTWro3_k_yv9AMBg3E_
CitedBy_id crossref_primary_10_1109_ACCESS_2024_3400862
crossref_primary_10_1155_2022_7649317
crossref_primary_10_1007_s11277_019_06565_x
Cites_doi 10.1016/j.compeleceng.2012.04.015
10.3745/JIPS.2013.9.2.247
10.1166/sl.2013.3001
10.1016/j.future.2011.04.012
10.2298/CSIS130919057C
10.1007/s10207-013-0208-7
10.2298/CSIS120922030L
ContentType Journal Article
Copyright Springer Science+Business Media New York 2015
Copyright Springer Science & Business Media 2017
Copyright_xml – notice: Springer Science+Business Media New York 2015
– notice: Copyright Springer Science & Business Media 2017
DBID AAYXX
CITATION
DOI 10.1007/s11277-015-3091-x
DatabaseName CrossRef
DatabaseTitle CrossRef
DatabaseTitleList

DeliveryMethod fulltext_linktorsrc
Discipline Journalism & Communications
Engineering
Business
EISSN 1572-834X
EndPage 454
ExternalDocumentID 10_1007_s11277_015_3091_x
GroupedDBID -5B
-5G
-BR
-EM
-Y2
-~C
.4S
.86
.DC
.VR
06D
0R~
0VY
123
1N0
1SB
2.D
203
28-
29R
29~
2J2
2JN
2JY
2KG
2KM
2LR
2P1
2VQ
2~H
30V
4.4
406
408
409
40D
40E
5QI
5VS
67Z
6NX
8TC
8UJ
95-
95.
95~
96X
AAAVM
AABHQ
AABYN
AAFGU
AAHNG
AAIAL
AAJKR
AANZL
AAPBV
AARHV
AARTL
AATNV
AATVU
AAUYE
AAWCG
AAYFA
AAYIU
AAYQN
AAYTO
ABBBX
ABBXA
ABDZT
ABECU
ABFGW
ABFTD
ABFTV
ABHLI
ABHQN
ABJNI
ABJOX
ABKAG
ABKAS
ABKCH
ABKTR
ABMNI
ABMQK
ABNWP
ABQBU
ABSXP
ABTEG
ABTHY
ABTKH
ABTMW
ABULA
ABWNU
ABXPI
ACBMV
ACBRV
ACBXY
ACBYP
ACGFS
ACHSB
ACHXU
ACIGE
ACIPQ
ACKNC
ACMDZ
ACMLO
ACOKC
ACOMO
ACREN
ACTTH
ACVWB
ACWMK
ADHHG
ADHIR
ADIMF
ADINQ
ADKNI
ADKPE
ADMDM
ADMVV
ADOXG
ADRFC
ADTPH
ADURQ
ADYFF
ADYOE
ADZKW
AEBTG
AEEQQ
AEFIE
AEFTE
AEGAL
AEGNC
AEGXH
AEJHL
AEJRE
AEKMD
AEKVL
AENEX
AEOHA
AEPYU
AESKC
AESTI
AETLH
AEVLU
AEVTX
AEXYK
AFEXP
AFGCZ
AFLOW
AFNRJ
AFQWF
AFWTZ
AFYQB
AFZKB
AGAYW
AGDGC
AGGBP
AGGDS
AGJBK
AGMZJ
AGQMX
AGWIL
AGWZB
AGYKE
AHAVH
AHBYD
AHSBF
AHYZX
AIAKS
AIIXL
AILAN
AIMYW
AITGF
AJBLW
AJDOV
AJRNO
AJZVZ
AKQUC
ALMA_UNASSIGNED_HOLDINGS
ALWAN
AMKLP
AMTXH
AMXSW
AMYLF
AMYQR
AOCGG
ARCEE
ARCSS
ARMRJ
ASPBG
AVWKF
AXYYD
AYJHY
AZFZN
B-.
BA0
BBWZM
BDATZ
BGNMA
CAG
COF
CS3
CSCUP
DDRTE
DL5
DNIVK
DPUIP
DU5
EBLON
EBS
EDO
EIOEI
EJD
ESBYG
FD6
FEDTE
FERAY
FFXSO
FIGPU
FINBP
FNLPD
FRRFC
FSGXE
FWDCC
GGCAI
GGRSB
GJIRD
GNWQR
GQ6
GQ7
GQ8
GXS
HF~
HG5
HG6
HMJXF
HQYDN
HRMNR
HVGLF
HZ~
I-F
I09
IHE
IJ-
IKXTQ
ITG
ITH
ITM
IWAJR
IXC
IZIGR
IZQ
I~X
I~Z
J-C
J0Z
JBSCW
JCJTX
JZLTJ
KDC
KOV
KOW
LAK
LLZTM
M4Y
MA-
N2Q
N9A
NB0
NDZJH
NPVJJ
NQJWS
NU0
O9-
O93
O9G
O9I
O9J
OAM
OVD
P19
P9P
PF0
PT4
PT5
QOK
QOS
R4E
R89
R9I
RHV
RIG
RNI
RNS
ROL
RPX
RSV
RZC
RZE
RZK
S16
S1Z
S26
S27
S28
S3B
SAP
SCLPG
SCV
SDH
SDM
SEG
SHX
SISQX
SJYHP
SNE
SNPRN
SNX
SOHCF
SOJ
SPISZ
SRMVM
SSLCW
STPWE
SZN
T13
T16
TEORI
TSG
TSK
TSV
TUC
TUS
U2A
U5U
UG4
UNUBA
UOJIU
UTJUX
UZXMN
VC2
VFIZW
W23
W48
WK8
YLTOR
Z45
Z5O
Z7R
Z7S
Z7X
Z7Y
Z7Z
Z81
Z83
Z86
Z88
Z8M
Z8N
Z8R
Z8S
Z8T
Z8U
Z8W
Z92
ZMTXR
_50
~A9
~EX
AACDK
AAEOY
AAJBT
AASML
AAYXX
ABAKF
ACAOD
ACDTI
ACZOJ
AEFQL
AEMSY
AFBBN
AGQEE
AIGIU
CITATION
H13
ID FETCH-LOGICAL-c316t-226e78df8bf5363037f6a4127936a9999720fa31cd0dcd2dfb4111ca15bc13923
IEDL.DBID AGYKE
ISSN 0929-6212
IngestDate Fri Sep 13 03:44:30 EDT 2024
Thu Sep 12 19:42:31 EDT 2024
Sat Dec 16 12:04:39 EST 2023
IsPeerReviewed true
IsScholarly true
Issue 3
Keywords Security element
Cloud computing
Smartwork
Security analysis
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c316t-226e78df8bf5363037f6a4127936a9999720fa31cd0dcd2dfb4111ca15bc13923
PQID 1900379931
PQPubID 2043826
PageCount 10
ParticipantIDs proquest_journals_1900379931
crossref_primary_10_1007_s11277_015_3091_x
springer_journals_10_1007_s11277_015_3091_x
PublicationCentury 2000
PublicationDate 2017-06-01
PublicationDateYYYYMMDD 2017-06-01
PublicationDate_xml – month: 06
  year: 2017
  text: 2017-06-01
  day: 01
PublicationDecade 2010
PublicationPlace New York
PublicationPlace_xml – name: New York
– name: Dordrecht
PublicationSubtitle An International Journal
PublicationTitle Wireless personal communications
PublicationTitleAbbrev Wireless Pers Commun
PublicationYear 2017
Publisher Springer US
Springer Nature B.V
Publisher_xml – name: Springer US
– name: Springer Nature B.V
References Chen, Tsaur, Chen, Chang (CR4) 2014; 11
Rong, Nguyen, Jaatun (CR2) 2013; 39
Guha, Shrivastava (CR5) 2013; 3
Lee, Kim, Rhee, Uk (CR7) 2013; 10
Kim, Chang (CR9) 2013; 11
Diogo, Fernandes (CR1) 2014; 13
Peng (CR6) 2013; 9
Joo, Son, Jeon (CR8) 2012; 10
Li, Li, Wo, Hu, Huai, Liu, Lam (CR3) 2012; 28
V Guha (3091_CR5) 2013; 3
C Rong (3091_CR2) 2013; 39
J Li (3091_CR3) 2012; 28
C-L Chen (3091_CR4) 2014; 11
SG Joo (3091_CR8) 2012; 10
Y Kim (3091_CR9) 2013; 11
T Lee (3091_CR7) 2013; 10
K Peng (3091_CR6) 2013; 9
AB Diogo (3091_CR1) 2014; 13
References_xml – volume: 3
  start-page: 9
  issue: 1
  year: 2013
  ident: CR5
  article-title: Review of information authentication in mobile cloud over SaaS & PaaS layers
  publication-title: International Journal of Advanced Computer Research (IJACR)
  contributor:
    fullname: Shrivastava
– volume: 39
  start-page: 47
  issue: 1
  year: 2013
  end-page: 54
  ident: CR2
  article-title: Beyond lightning: A survey on security challenges in cloud computing
  publication-title: Computers & Electrical Engineering
  doi: 10.1016/j.compeleceng.2012.04.015
  contributor:
    fullname: Jaatun
– volume: 9
  start-page: 247
  issue: 2
  year: 2013
  end-page: 258
  ident: CR6
  article-title: A secure network for mobile wireless service
  publication-title: Journal of Information Processing Systems
  doi: 10.3745/JIPS.2013.9.2.247
  contributor:
    fullname: Peng
– volume: 11
  start-page: 1799
  issue: 9
  year: 2013
  end-page: 1803
  ident: CR9
  article-title: A study on small and medium enterprise information foundation for wireless sensor networks work environment implementation
  publication-title: Sensor Letters
  doi: 10.1166/sl.2013.3001
  contributor:
    fullname: Chang
– volume: 28
  start-page: 379
  issue: 2
  year: 2012
  end-page: 390
  ident: CR3
  article-title: CyberGuarder: A virtualization security assurance architecture for green cloud computing
  publication-title: Future Generation Computer Systems
  doi: 10.1016/j.future.2011.04.012
  contributor:
    fullname: Lam
– volume: 10
  start-page: 11
  year: 2012
  end-page: 22
  ident: CR8
  article-title: Policy implications for the smart work diffusion: Focusing on the perceptual differences on organizational effectiveness between smart workers and office workers
  publication-title: Journal of Digital Policy & Management
  contributor:
    fullname: Jeon
– volume: 11
  start-page: 925
  issue: 3
  year: 2014
  end-page: 941
  ident: CR4
  article-title: A secure mobile DRM system based on cloud architecture
  publication-title: Computer Science and Information Systems
  doi: 10.2298/CSIS130919057C
  contributor:
    fullname: Chang
– volume: 13
  start-page: 113
  issue: 2
  year: 2014
  end-page: 170
  ident: CR1
  article-title: Security issues in cloud environments: A survey
  publication-title: International Journal of Information Security
  doi: 10.1007/s10207-013-0208-7
  contributor:
    fullname: Fernandes
– volume: 10
  start-page: 703
  issue: 2
  year: 2013
  end-page: 724
  ident: CR7
  article-title: Design and implementation of E-discovery as a service based on cloud computing
  publication-title: Computer Science and Information Systems
  doi: 10.2298/CSIS120922030L
  contributor:
    fullname: Uk
– volume: 10
  start-page: 11
  year: 2012
  ident: 3091_CR8
  publication-title: Journal of Digital Policy & Management
  contributor:
    fullname: SG Joo
– volume: 11
  start-page: 1799
  issue: 9
  year: 2013
  ident: 3091_CR9
  publication-title: Sensor Letters
  doi: 10.1166/sl.2013.3001
  contributor:
    fullname: Y Kim
– volume: 28
  start-page: 379
  issue: 2
  year: 2012
  ident: 3091_CR3
  publication-title: Future Generation Computer Systems
  doi: 10.1016/j.future.2011.04.012
  contributor:
    fullname: J Li
– volume: 11
  start-page: 925
  issue: 3
  year: 2014
  ident: 3091_CR4
  publication-title: Computer Science and Information Systems
  doi: 10.2298/CSIS130919057C
  contributor:
    fullname: C-L Chen
– volume: 3
  start-page: 9
  issue: 1
  year: 2013
  ident: 3091_CR5
  publication-title: International Journal of Advanced Computer Research (IJACR)
  contributor:
    fullname: V Guha
– volume: 13
  start-page: 113
  issue: 2
  year: 2014
  ident: 3091_CR1
  publication-title: International Journal of Information Security
  doi: 10.1007/s10207-013-0208-7
  contributor:
    fullname: AB Diogo
– volume: 10
  start-page: 703
  issue: 2
  year: 2013
  ident: 3091_CR7
  publication-title: Computer Science and Information Systems
  doi: 10.2298/CSIS120922030L
  contributor:
    fullname: T Lee
– volume: 39
  start-page: 47
  issue: 1
  year: 2013
  ident: 3091_CR2
  publication-title: Computers & Electrical Engineering
  doi: 10.1016/j.compeleceng.2012.04.015
  contributor:
    fullname: C Rong
– volume: 9
  start-page: 247
  issue: 2
  year: 2013
  ident: 3091_CR6
  publication-title: Journal of Information Processing Systems
  doi: 10.3745/JIPS.2013.9.2.247
  contributor:
    fullname: K Peng
SSID ssj0010092
Score 2.1602938
Snippet Computing environment has changed a lot by development of network and wide spread of the mobile terminal. Among them, adoption of cloud computing causes a...
SourceID proquest
crossref
springer
SourceType Aggregation Database
Publisher
StartPage 445
SubjectTerms Broadband
Business
Cloud computing
Communications Engineering
Computer Communication Networks
Engineering
Networks
Signal,Image and Speech Processing
Title A Study on Smartwork Security Technology Based on Cloud Computing Environment
URI https://link.springer.com/article/10.1007/s11277-015-3091-x
https://www.proquest.com/docview/1900379931/abstract/
Volume 94
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1JT8JAFH5BuOjBBTUiSOZgPGiGdDpdj0BAopELkuCp6UzbxCDFCCTqr_dNFwouB29NOplmZl7n-_KW7wFcOqYvuc9MKqwooIbLBBWGlNT3mXBVsyQtTBJkh9ZgbNxNzEkJ9LXrIp628ohkclEXtW5MRRsRvShHjKPIGyum6kpdhkr79um-t44dKBmhRGFPJXbgzZzHMn-bZBuNCor5LSqagE3_IC0AXCQahSrHZNpaLUVLfv5UcPzHOg5hP-OepJ0ayxGUwrgKexuKhFWoZ4OeFzNyRbaqRxbH8NAmKu_wg8xjMpqh0amsLjLKWuCRwk1POgiOgRrWfZmvApL2jsAvkF5RWHcC437vsTugWT8GKjmzlhSZWmg7QeSIyOQWYp8dWb6By3G55SPRdG1di3zOZKAFMtCDSBh4k0q0BCGRaOr8FMrxPA7PgGgiEY5Hehdxw-GWo_sWE9KWWoTPwq3BdX4u3msqu-EVAstqBz3cQU_toPdeg0Z-cl72By48ply0NrIvVoOb_CQ2Xv812fm_RtdhV1c4n7hlGlBevq3CC2QpS9FEs-x3OsNmZp5N2Bnr7S8rgeAp
link.rule.ids 315,786,790,27957,27958,41116,41558,42185,42627,52146,52269
linkProvider Springer Nature
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1BS8MwFA4yD-pBdCrOTc1BPCiBpmnT9jjHxtRtl22wW0jSBgTXid1A_70vXWs30YO3QkNKX9L3fc1773sI3YS-1ExSnyhuYuJFVBHlaU2kpCqyzZKcJE-QHfH-1Hua-bOijjsrs93LkGTuqatiN2rDjQBfhAHIESCOu1ZO3f5xTd32d-jAqgjlAns2rwMccxnK_G2KbTCqGOaPoGiONb0jdFiQRNxer-ox2knSOjrYkA6so2Yx6CWb41u8VeaRnaBhG9sEwU-8SPF4DrvDpl_hcdGrDlfn6fgBUCy2wzqvi1WM100e4Am4W1XAnaJprzvp9EnROIFoRvmSAKVKgjA2oTI-4wBSgeHSg3ePGJfACKPAdYxkVMdOrGM3NsoDl6dhyZQGRuiyM1RLF2lyjrCjcoV34GGGeSHjoSs5VTrQjoFrFTXQXWlB8bbWxxCVErI1twBzC2tu8dFArdLGovhUMkHtWWoANIk20H1p943bf0128a_R12ivPxkOxOBx9NxE-64F5_wspYVqy_dVcgnUYqmu8q30BeLQxJQ
linkToPdf http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LS8NAEF6kguhBtCrWVt2DeFCWZrPJJjnW2lJfRaiF3kJ2NwuCTYtNQf-9s3mYVvTgLZBhQ2Yf38fOzDcIXfhuJFlEXSK4VsQJqCDCkZJEERWBaZZkxVmC7JAPxs79xJ0UfU4XZbZ7GZLMaxqMSlOStudKt6vCN2pCjwBlhAHgESCRmwYZTU7X2O58hxGMolAmtmdyPOCQLsOavw2xDkwV2_wRIM1wp7-HdgvCiDv5DO-jjTipo50VGcE6ahZGr4spvsRrJR-LA_TUwSZZ8BPPEjyawkoxqVh4VPStw9XdOr4BRFPGrPs2WyqcN3yAL-BeVQ13iMb93kt3QIomCkQyylMC9Cr2fKV9oV3GAbA8zSMH_j1gPAJ2GHi2pSNGpbKUVLbSwoHjT8L0CQns0GZHqJbMkvgYYUtkau_AyTRzfMZ9O-JUSE9aGp5F0EBXpQfDea6VEVaqyMbdIbg7NO4OPxqoVfo4LLbNIqTmXtUDykQb6Lr0-8rrvwY7-Zf1Odp6vu2Hj3fDhybatg1OZ9cqLVRL35fxKbCMVJxlK-kLl6rI2Q
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=A+Study+on+Smartwork+Security+Technology+Based+on+Cloud+Computing+Environment&rft.jtitle=Wireless+personal+communications&rft.au=Yang%2C+Hwan-Seok&rft.au=Yoo%2C+Seung-Jae&rft.date=2017-06-01&rft.issn=0929-6212&rft.eissn=1572-834X&rft.volume=94&rft.issue=3&rft.spage=445&rft.epage=454&rft_id=info:doi/10.1007%2Fs11277-015-3091-x&rft.externalDBID=n%2Fa&rft.externalDocID=10_1007_s11277_015_3091_x
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0929-6212&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0929-6212&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0929-6212&client=summon