A Study on Priorities of the Components of Big Data Information Security Service by AHP

Subrata Biswas, Jin Ho Yoo, Chul Yong Jung

Abstract


The existing computer environment, numerous mobile environments and the internet environment make human life easier through the development of IT technology. With the emergence of the mobile and internet environment, data is getting bigger rapidly. From this environment, we can take advantage of using those data as economic assets for organizations which make dreams come true for the emerging Big Data environment and Big Data security services. Nowadays, Big Data services are increasing. However, these Big Data services about Big Data security is insufficient at present. In terms of Big Data security the number of security by Big Data studies are increasing which creates value for Security by Big Data not Security for Big Data. Accordingly in this paper our research will show how security for Big Data can vitalize Big Data service for organizations. In details, this paper derives the priorities of the components of Big Data Information Security Service by AHP.


Full Text:

PDF

References


Oh, N. S., Han, Y. S., Eom, C. W. Oh, K. S., Lee, B. G., “Developing the Assessment Method for Information Security Level,” Journal of the Society for e- Business Studies, Vol. 16, No. 2, pp. 159-169, 2011.

Lee, H. M., Lim, J. I., “A Study on the Development of Corporate Information Security Level Assessment Models,” Korea Institute of Information Security and Cryptology, Vol. 18, No. 5, pp. 161-170, 2011.

Lee, Y. K., Kim, S. H., “A Development of Evaluation Indicators for Information Security by means of the Coincidence Analysis,” Korea Society of IT Services, Vol. 7, No. 3, pp. 175-198, 2008.

Ko, M. H., Kong, H. K., Kim, T. S., “Using a Balanced Scorecard Framework to Evaluate Corporate Information Security Level,” Telecommunication Review, Vol. 19, No. 6, pp. 925-935, 2009.

ISO/IEC 17799(BS 7799-1), “Information technology, Security techniques, Code of practice for information security,” 2005.

Eloff, j. H. P. and Eloff, M., “Integrated Information Security Architecture,” Computer Fraud and Security, pp. 10-16, 2005.

McCarthy, M. P. and Campbell, “Security Transformation,” McGraw-Hill : New York, 2001.

Tudor, J. K., “Information Security Architecture-An integrated approach to security in an organization,” Boca Raton, FL : Auerbach, 2000.

KISA, MSIP, “Korea Information Security Management System Guideline(ISMS),” March, 2013.

NISTIR 7628, “Introduction to NISTIR 7628 Guidelines for Smart Grid Cyber Security,” sep. 2010.

Shin, K. A., Lee. S. J., “Information Security Management System on Cloud Computing Service,” Journal of The Korea Institute of Information Security and Cryptology, Vol. 22, No. 1, pp. 155-167, 2012.

Jang, E. Y., Kim, H. J., Park, C. S., Kim, J. Y., Lee. J. I., “The study on a threat countermeasure of mobile Cloud services,” Journal of The Korea Institute of Information Security and Cryptology, Vol. 21, No. 1, pp. 177-186, 2011.

Noh, B. N., Choi, J. G., “Security Technology Research in Cloud Computing Environment,” Journal of Security Engineering, Vol. 8, No. 3, pp. 371-383, 2011.

Park, C. S., “Study on Security Considerations in the Cloud Computing,” Journal of academia-industrial technology, Vol. 12, No. 3, pp. 1408-1416, 2011.

National Information Society Agency (NIA), “Big Data era opening a new future,” 2013.

“CSA Big Data Working Group Releases Top 10 Big Data Security and Privacy Challenges Report,” Cloud Security Alliance, 2012.

Da Veiga, J. H. P. Eloff, “An Information Security Governance Framework,” Information Systems Management, Vol. 24, pp. 361-372, 2007.

Saaty, T. L. and Luis, G. V., “Diagnosis with Dependent Symptoms : Bayes Theorem and the Analytic Hierarchy Process,” Operations Research, Vol. 46, No. 4, pp. 491-502, 1998.

Kim, H. S., “A Study on the Quantification of Information Security Level,” The Korea Society of Management information Systems, Vol. 9, No. 4, pp. 182-201, 1999.

SOPHOS, “New platform and Changing threats,” Security Threat Report, 2013.

Von Solms, S. H., “Information Security—The fourth wave, Computers and Security,” Vol. 25, pp. 165-168, 2006.

Martins, A. and Eloff, J. H. P., “Information Security Culture, In Security in the information society,” Boston : Kluwer Academic Publishers, IFIP/SEC, pp. 203-214, 2002.


Refbacks

  • There are currently no refbacks.