Skip to main content
Log in

A Study on Smartwork Security Technology Based on Cloud Computing Environment

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Computing environment has changed a lot by development of network and wide spread of the mobile terminal. Among them, adoption of cloud computing causes a large change socially. The social consensus by introduction of smartwork based on this cloud computing environment is increasing. Especially, smartwork which can work freely anytime and anywhere has been noted as a new business model while broadband communication infrastructure becomes popular. However, smartwork based on cloud computing environment has a variety of security vulnerabilities. The risk of information leakage is increasing according to increasing of vulnerability of virtualization technology which cloud computing has, and security threats of mobile terminal used to smartwork. In this paper, we look security element by smartwork design for the activation of the smartwork based on cloud computing and organize to respond to the attack. The corresponding method presented in this paper will be applied to safe security model.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

References

  1. Diogo, A. B., & Fernandes, L. (2014). Security issues in cloud environments: A survey. International Journal of Information Security, 13(2), 113–170.

    Article  Google Scholar 

  2. Rong, C., Nguyen, S., & Jaatun, M. (2013). Beyond lightning: A survey on security challenges in cloud computing. Computers & Electrical Engineering, 39(1), 47–54.

    Article  Google Scholar 

  3. Li, J., Li, B., Wo, T., Hu, C., Huai, J., Liu, L., & Lam, K. P. (2012). CyberGuarder: A virtualization security assurance architecture for green cloud computing. Future Generation Computer Systems, 28(2), 379–390.

    Article  Google Scholar 

  4. Chen, C.-L., Tsaur, W.-J., Chen, Y.-Y., & Chang, Y.-C. (2014). A secure mobile DRM system based on cloud architecture. Computer Science and Information Systems, 11(3), 925–941.

    Article  Google Scholar 

  5. Guha, V., & Shrivastava, M. (2013). Review of information authentication in mobile cloud over SaaS & PaaS layers. International Journal of Advanced Computer Research (IJACR), 3(1), 9.

    Google Scholar 

  6. Peng, K. (2013). A secure network for mobile wireless service. Journal of Information Processing Systems, 9(2), 247–258.

    Article  Google Scholar 

  7. Lee, T., Kim, H., Rhee, K.-H., & Uk, S. (2013). Design and implementation of E-discovery as a service based on cloud computing. Computer Science and Information Systems, 10(2), 703–724.

    Article  Google Scholar 

  8. Joo, S. G., Son, Y. G., & Jeon, S. G. (2012). Policy implications for the smart work diffusion: Focusing on the perceptual differences on organizational effectiveness between smart workers and office workers. Journal of Digital Policy & Management, 10, 11–22.

    Google Scholar 

  9. Kim, Y., & Chang, H. (2013). A study on small and medium enterprise information foundation for wireless sensor networks work environment implementation. Sensor Letters, 11(9), 1799–1803.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Seung-Jae Yoo.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Yang, HS., Yoo, SJ. A Study on Smartwork Security Technology Based on Cloud Computing Environment. Wireless Pers Commun 94, 445–454 (2017). https://doi.org/10.1007/s11277-015-3091-x

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-015-3091-x

Keywords

Navigation