Security controls based on K-ISMS in cloud computing service

1Citations
Citations of this article
5Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Cloud computing service can be provided by diverse forms such as XaaS, MSP and others. The most common examples of XaaS are Software as a Service, Infrastructure as a Service, and Platform as a Service. A MSP(Management Service Provider) is a type of IT service companies that provides network, server and specialized applications to end user and organization. Also cloud computing service offers many benefits of reducing cost by sharing storage resource, but is vulnerable to threats. Therefore the issue of information security should be solved to mitigate the threat in cloud computing environment. The cloud computing service providers had better establish the ISMS (Information Security Management System) to manage risks systematically. In this paper, we propose the security controls for cloud computing service which are based on K-ISMS through a comparative analysis of domestic and foreign cloud computing service guidelines. These security controls will be useful for organization's ISMS. © 2014 Springer-Verlag Berlin Heidelberg.

Cite

CITATION STYLE

APA

Mun, J., Jung, Y., Kim, J., Lee, Y., Park, K., & Won, D. (2014). Security controls based on K-ISMS in cloud computing service. In Lecture Notes in Electrical Engineering (Vol. 279 LNEE, pp. 391–404). Springer Verlag. https://doi.org/10.1007/978-3-642-41674-3_56

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free