메뉴 건너뛰기




Volumn 5, Issue 4, 2009, Pages 354-375

A 'cloud-free' security model for cloud computing

Author keywords

AHP; Analytic hierarchy process; Availability; Cloud computing; Cloud computing services standards; Cloud free security model; Confidentiality; Information security; Integrity

Indexed keywords


EID: 77949776507     PISSN: 17408849     EISSN: 17408857     Source Type: Journal    
DOI: 10.1504/IJSS.2009.032177     Document Type: Article
Times cited : (8)

References (50)
  • 1
    • 70350606938 scopus 로고    scopus 로고
    • Data management in the clouds: Limitations and opportunities
    • Abadi, D.J. (2009) 'Data management in the clouds: limitations and opportunities', IEEE Data Engineering, Vol. 32, No. 1, pp.3-12.
    • (2009) IEEE Data Engineering , vol.32 , Issue.1 , pp. 3-12
    • Abadi, D.J.1
  • 3
    • 12244306739 scopus 로고    scopus 로고
    • An information security meta-policy for emergent organizations
    • Baskerville, R. and Siponen, M. (2002) 'An information security meta-policy for emergent organizations', Logistics Information Management, Vol. 15, Nos. 5-6, pp.337-346.
    • (2002) Logistics Information Management , vol.15 , Issue.5-6 , pp. 337-346
    • Baskerville, R.1    Siponen, M.2
  • 4
    • 33644542600 scopus 로고    scopus 로고
    • A usability study of internet privacy policies for state and commercial websites
    • Becker, S.A. (2004) 'A usability study of internet privacy policies for state and commercial websites', International Journal of Services and Standards, Vol. 1, No. 1, pp.52-68.
    • (2004) International Journal of Services and Standards , vol.1 , Issue.1 , pp. 52-68
    • Becker, S.A.1
  • 5
    • 77949840689 scopus 로고    scopus 로고
    • Gartner: Seven cloud-computing security risks
    • Brodkin, J. (2008) 'Gartner: seven cloud-computing security risks', Infoworld, pp.1-3.
    • (2008) Infoworld , pp. 1-3
    • Brodkin, J.1
  • 6
    • 77949797000 scopus 로고    scopus 로고
    • Available online at, accessed on 27 October 2009
    • Brenner, B. (2009) 'The curse of cloud security', NetWorkWorld. Available online at: http://www.networkworld.com/news/2009/102709-the-curse-of-cloud.html (accessed on 27 October 2009).
    • (2009) The Curse of Cloud Security
    • Brenner, B.1
  • 8
    • 48649083931 scopus 로고    scopus 로고
    • Information security management - a practical approach
    • Dey, M. (2007) 'Information security management - a practical approach', IEEE, pp.1-6.
    • (2007) IEEE , pp. 1-6
    • Dey, M.1
  • 9
    • 70349459300 scopus 로고    scopus 로고
    • Cloud computing: Distributed internet computing for IT and scientific research
    • Dikaiakos, M.D., Pallis, G., Katsaros, D., Mehra, P. and Vakali, A. (2009) 'Cloud computing: distributed internet computing for IT and scientific research', IEEE Computer Society, Vol. 13, No. 5, pp.10-13.
    • (2009) IEEE Computer Society , vol.13 , Issue.5 , pp. 10-13
    • Dikaiakos, M.D.1    Pallis, G.2    Katsaros, D.3    Mehra, P.4    Vakali, A.5
  • 15
    • 77949833655 scopus 로고    scopus 로고
    • Cloud computing and cyber defense, white paper
    • Available online at
    • Gourley, B. (2009) 'Cloud computing and cyber defense, white paper', National Security. Available online at: http://www.whitehouse.gov/files/ documents/cyber/Gourley-Cloud-Computing-and-Cyber-Defense-21-Mar-2009.pdf.
    • (2009) National Security
    • Gourley, B.1
  • 16
    • 34248524413 scopus 로고    scopus 로고
    • Organizational culture of customer care: Market orientation and service quality
    • Green, K.W., Chakrabarty, S. and Whitten, D. (2007) 'Organizational culture of customer care: market orientation and service quality', International Journal of Services and Standards, Vol. 3, No. 2, pp.137-153.
    • (2007) International Journal of Services and Standards , vol.3 , Issue.2 , pp. 137-153
    • Green, K.W.1    Chakrabarty, S.2    Whitten, D.3
  • 18
    • 77949836922 scopus 로고    scopus 로고
    • Cloud computing: Finding the silver lining
    • Available online at
    • Hanna, S. (2009) 'Cloud computing: finding the silver lining', Juniper Networks. Available online at: http://www.ists.dartmouth.edu/docs/ HannaCloudComputingv2.pdf.
    • (2009) Juniper Networks
    • Hanna, S.1
  • 19
    • 85024260157 scopus 로고    scopus 로고
    • Cloud computing: A software migrates from local PCs to distant internet servers, users and developers alike go along for the ride
    • Hayes, B. (2008) 'Cloud computing: a software migrates from local PCs to distant internet servers, users and developers alike go along for the ride', Communication of the ACM, Vol. 51, No. 7, pp.9-11.
    • (2008) Communication of the ACM , vol.51 , Issue.7 , pp. 9-11
    • Hayes, B.1
  • 20
    • 9744278382 scopus 로고    scopus 로고
    • A novel cloud-based trust model for pervasive computing
    • He, R., Niu, J., Yuan, M. and Hu, J. (2004) 'A novel cloud-based trust model for pervasive computing, IEEE, pp.693-700.
    • (2004) IEEE , pp. 693-700
    • He, R.1    Niu, J.2    Yuan, M.3    Hu, J.4
  • 22
    • 77949848041 scopus 로고    scopus 로고
    • State-of-the-art information security management systems with ISO/IEC 27001:2005
    • January-February
    • Humphrey, T. (2006) 'State-of-the-art information security management systems with ISO/IEC 27001:2005', ISO Management Systems, January-February, pp.15-18.
    • (2006) ISO Management Systems , pp. 15-18
    • Humphrey, T.1
  • 23
    • 77949781620 scopus 로고    scopus 로고
    • Infosecurity Europe, Available online at, accessed on 19 February 2009
    • Infosecurity Europe (2009) Cloud computing security survey results. Available online at: http://www.prosecurityzone.com/Customisation/News/ Education-Training-and-Professional-Services/Exhibitions-and-Trade-Shows/ Cloud-computing-security-survey-results.asp (accessed on 19 February 2009).
    • (2009) Cloud Computing Security Survey Results
  • 26
    • 33947408114 scopus 로고    scopus 로고
    • A framework for the management of information security risks
    • Jones, A. (2007) 'A framework for the management of information security risks', BT Technology Journal, Vol. 25, No. 1, pp.30-36.
    • (2007) BT Technology Journal , vol.25 , Issue.1 , pp. 30-36
    • Jones, A.1
  • 27
    • 59849089966 scopus 로고    scopus 로고
    • Is cloud computing really ready for prime time?
    • January
    • Leavitt, N. (2009, January) 'Is cloud computing really ready for prime time?', IEEE Computer Society, pp.15-20.
    • (2009) IEEE Computer Society , pp. 15-20
    • Leavitt, N.1
  • 28
    • 34547121214 scopus 로고    scopus 로고
    • Applying ISO 17799:2005 in information security management
    • Lee, M-C. and Chang, T. (2007) 'Applying ISO 17799:2005 in information security management', International Journal of Services and Standards, Vol. 3, No. 3, pp.352-373.
    • (2007) International Journal of Services and Standards , vol.3 , Issue.3 , pp. 352-373
    • Lee, M.-C.1    Chang, T.2
  • 29
    • 43049134342 scopus 로고    scopus 로고
    • Developing evaluation standards of e-learning courses by the analytic hierarchy process
    • Liu, C. (2007) 'Developing evaluation standards of e-learning courses by the analytic hierarchy process', International Journal of Services and Standards, Vol. 3, No. 4, pp.476-490.
    • (2007) International Journal of Services and Standards , vol.3 , Issue.4 , pp. 476-490
    • Liu, C.1
  • 31
    • 33846704341 scopus 로고    scopus 로고
    • IT security: In search of the holy grail
    • Oppliger, R. (2007) 'IT security: in search of the holy grail', Communications of the ACM, Vol. 50, No. 2, pp.96-98.
    • (2007) Communications of the ACM , vol.50 , Issue.2 , pp. 96-98
    • Oppliger, R.1
  • 32
    • 77949858931 scopus 로고    scopus 로고
    • Available online at
    • Rash, W. (2009) 'Is cloud computing secure? Prove it', eWeek, pp.1-3. Available online at: http://www.eweek.com/c/a/Cloud-Computing/Is-Cloud- Computing-Secure-Prove-It-849274/.
    • (2009) Is Cloud Computing Secure? Prove it , pp. 1-3
    • Rash, W.1
  • 33
    • 74049152260 scopus 로고    scopus 로고
    • Hey, you. Get off of my cloud: Exploring information leakage in third-party compute clouds
    • 9-13 November 2009, Chicago, Illinois
    • Ristenpart, T., Tromer, E., Shacham, H. and Savage, S. (2009) 'Hey, you. Get off of my cloud: exploring information leakage in third-party compute clouds', CCS'09, 9-13 November 2009, Chicago, Illinois.
    • (2009) CCS'09
    • Ristenpart, T.1    Tromer, E.2    Shacham, H.3    Savage, S.4
  • 34
  • 35
    • 0000048723 scopus 로고
    • An exposition of the AHP in reply to the paper "remarks on the analytic hierarchy process"
    • Saaty, T.L. (1990) 'An exposition of the AHP in reply to the paper "remarks on the analytic hierarchy process"', Management Science, Vol. 36, No. 3, pp.259-268.
    • (1990) Management Science , vol.36 , Issue.3 , pp. 259-268
    • Saaty, T.L.1
  • 36
    • 77949779615 scopus 로고    scopus 로고
    • Available online at
    • San Martin, C.V. (2009) Jurisdictional aspects of cloud computing. Available online at: http://www.coe.int/t/dghl/cooperation/economiccrime/ cybercrime/Documents/Reports-Presentations/2079%20if09%20pres%20cristos%20cloud. pdf.
    • (2009) Jurisdictional Aspects of Cloud Computing
    • San Martin, C.V.1
  • 38
    • 0242365403 scopus 로고    scopus 로고
    • A dynamic risk model for information technology security in a critical infrastructure environment
    • Santa Barbara, California. Available online at
    • Saunders, J. (2003) 'A dynamic risk model for information technology security in a critical infrastructure environment', Proceedings of the 10th Conference on Risk-Based Decision Making in Water Resources, ASCE, Santa Barbara, California. Available online at: http://www.johnsaunders.com/papers/ riskcip/RiskConference.htm.
    • (2003) Proceedings of the 10th Conference on Risk-Based Decision Making in Water Resources, ASCE
    • Saunders, J.1
  • 39
    • 34248596042 scopus 로고    scopus 로고
    • Strategic aspects of electronic document encryption
    • Smith, A.D. (2007) 'Strategic aspects of electronic document encryption', International Journal of Services and Standards, Vol. 3, No. 2, pp.203-221.
    • (2007) International Journal of Services and Standards , vol.3 , Issue.2 , pp. 203-221
    • Smith, A.D.1
  • 41
    • 77949819684 scopus 로고    scopus 로고
    • Cloud computing and data security: Looking before you leap
    • 25 August 2009 Available online at
    • Stanley, N. (2009) 'Cloud computing and data security: looking before you leap', Bloor, 25 August 2009 Available online athttp://www.bloorresearch.com/ analysis/11466/cloud-computinglooking-before-you-leap.html.
    • (2009) Bloor
    • Stanley, N.1
  • 42
    • 0000280419 scopus 로고
    • Effective IS security: An empirical study
    • Straub, D.W. (1990) 'Effective IS security: an empirical study', Information Systems Research, Vol. 1, No. 3, pp.255-276.
    • (1990) Information Systems Research , vol.1 , Issue.3 , pp. 255-276
    • Straub, D.W.1
  • 43
    • 64949196361 scopus 로고    scopus 로고
    • The implementation of Deming's system model to improve security management: A case study
    • Tang, J. (2008) 'The implementation of Deming's system model to improve security management: a case study', International Journal of Management, Vol. 25, No. 1, pp.54-68.
    • (2008) International Journal of Management , vol.25 , Issue.1 , pp. 54-68
    • Tang, J.1
  • 45
    • 77949820721 scopus 로고    scopus 로고
    • 7 September 2009. Available online at
    • Vijayan, J. (2009) 'Google pursue government biz: security concern: loom', Business Week, 7 September 2009. Available online at: http://www.businessweek.com/technology/content/sep2009/tc20090917-122270.htm.
    • (2009) Google Pursue Government Biz: Security Concern: Loom
    • Vijayan, J.1
  • 47
    • 70350389843 scopus 로고    scopus 로고
    • Enabling public verifiability and data dynamics for storage security in cloud computing
    • Wang, Q., Wang, C., Li, J., Ren, K. and Lou, W. (2009) 'Enabling public verifiability and data dynamics for storage security in cloud computing', ESORICS, pp.355-370.
    • (2009) ESORICS , pp. 355-370
    • Wang, Q.1    Wang, C.2    Li, J.3    Ren, K.4    Lou, W.5
  • 48
    • 85042415733 scopus 로고    scopus 로고
    • The real problems with cloud computing
    • 24 August 2009. Available online at
    • Winkler, I. (2009) 'The real problems with cloud computing', CSO, 24 August 2009. Available online at: http://www.csoonline.com/article/500344/ Winkler-The-Real-Problems-With-Cloud-Computing.
    • (2009) CSO
    • Winkler, I.1
  • 49
    • 34447298085 scopus 로고    scopus 로고
    • Threats and countermeasures for information system security: A cross-industry study
    • Yeh, Q.J. and Chang, A.J.T. (2007) 'Threats and countermeasures for information system security: a cross-industry study', Information & Management, Vol. 44, No. 5, pp.480-491.
    • (2007) Information & Management , vol.44 , Issue.5 , pp. 480-491
    • Yeh, Q.J.1    Chang, A.J.T.2
  • 50
    • 38349147070 scopus 로고    scopus 로고
    • Intrusion prevention in information systems: Reactive and proactive responses
    • Yue, W. and Cakanyildrim, M. (2007) 'Intrusion prevention in information systems: reactive and proactive responses', Journal of Management Information Systems, Vol. 24, No. 1, pp.329-353.
    • (2007) Journal of Management Information Systems , vol.24 , Issue.1 , pp. 329-353
    • Yue, W.1    Cakanyildrim, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.