What are the critical requirements to be considered for the security measures in Internet of Things (IoT) services? Further, how should those security resources be allocated? To provide valuable insight into these questions, this paper introduces a security assessment framework for the IoT service environment from an architectural perspective. Our proposed framework integrates fuzzy DEMATEL and fuzzy ANP to reflect dependence and feedback interrelations among security criteria and, ultimately, to weigh and prioritize them. The results, gleaned from the judgments of 38 security experts, revealed that security design should put more importance on the service layer, especially to ensure availability and trust. We believe that these results will contribute to the provision of more secure and reliable IoT services.Keywords Internet of Things · Security requirement · Security assessment · Fuzzy set theory The information age, created by the rapid advancement of information and communications technology (ICT) and the widespread adoption of wireless technologies, has presented an exciting new capability for both humans and diverse applications to extend the interconnectivity through the new dimension of "things" communication and integration [21]. Cisco predicts that by 2020, 50 billion things will be connected to the Internet via Internet of Things (IoT) technologies, generating revenues in excess of $19 trillion for industries worldwide [32].
Abstract. The purpose of this study is to develop and present security assessment models to manage the quality of Web² mobile environments. Web² is an evolved concept of web from Web 1.0 and Web 2.0 which means, diverse services and technologies including Real-time service, Social Network Services, Augmented Reality technology and Location Based Service are realized in mobile environment. However, compared to Web 1.0 and Web 2.0, few studies have been conducted for the security issues of Web² mobile environment. To be prepared for such issues, this paper reviews the characteristics of security in Web² mobile environments and present security assessment models in perspectives of Sensor-generated threats and Usergenerated threats. This study is significant in that it presents the directionality of the security issues to be discussed later in Web² mobile environments. This study will have implications for businesses and researchers preparing Web² mobile services and marketing.Keywords: Web² Mobile Environment, Security Assessment, Sensor-generated Threats, User-generated Threats IntroductionRecently, the development of mobile network infrastructures, mobile communication technologies, and terminal technologies; the advent of diverse applications; and the activation of application markets have led the global increases in the supply and use of smart phones. That is, with the evolution of mobile Internet networks such as WiFi and 3G that enable users to freely access and use the Internet anytime and anywhere; the upgrading of the performance of smart phones into all-in-one devices that enable document works and support replays of diverse multimedia; the advent of diverse applications that satisfy users' needs; the development of an operating system (OS) that supports the applications; and the activation of application markets where those applications can be bought and sold, smart phones are providing new opportunities for businesses and revenue creation in the saturated mobile market, where it has become difficult to create revenues with voice services [1]. However, diverse factors
논문투고일:2012년 10월 25일The purpose of this research is to analyze big data structure and various objects in big data industry based on ecological perspective. Big data is rapidly emerging as a highly valuable resource to secure competitiveness of enterprise and government. Accordingly, the main issues in big data are to find ways of creating economic value and solving various problems. However big data is not systematically organized, and hard to utilize as it constantly expands to related industry such as telecommunications, finance and manufacturing. Under this circumstance, it is crucial to understand range of big data industry and to which stakeholders are related. The ecological approach is useful to understand comprehensive industry structure. Therefore this study aims at confirming big data structure and finding issues from interaction among objects. Results of this study show main framework of big data ecosystem including relationship among object elements composing of the ecosystem. This study has significance as an initial study on big data ecosystem. The results of the study can be useful guidelines to the government for making systemized big data ecosystem and the entrepreneur who is considering launching big data business. 韓國IT서비스學會誌 第11卷 第4號 2012年 12月, pp.277-294 조지연․김예진․박건철․이봉규 1. 서 론 최근 스마트 기술의 급속한 발전과 함께 등장한 빅 데이터(Big data)는 정보통신분야의 선두에 있는 한국정부와 기업의 핵심 경쟁력이 되어줄 주요 자 원으로 인식되고 있다[4]. 역동적인 산업 패러다임 변화와 미래사회의 불확실성에 대응하고, 새로운 가치를 창출할 핵심 자원으로 빅데이터가 주목 받 는 것이다. 그러나 가트너의 보고서에 따르면 Fortune 500대 기업 중 85% 이상이 빅데이터의 성공 적인 활용에 실패할 것으로 예측하였다[23]. 즉 대 부분 기업들이 빠르게 증가하는 복잡한 구조의 대 용량 데이터를 수집하고 분석하여 기업의 의사결 정에 적시에 활용할 수 있는 능력을 갖추지 못하 였다는 것이다. 하지만 빅데이터 활용 실패는 데 이터에 대한 기업의 관리 능력 부족 뿐 아니라 빅 데이터를 둘러싼 복잡한 이해관계와 주변 환경 등 도 관련이 있다. 빅데이터는 개인이 데이터를 생산하고 소비하는 역할을 동시에 수행하고, 제 3자가 빅데이터를 가 공하여 서비스를 제공하는 등 복잡한 이해관계 구 조를 형성하고 있다[28]. 또한 빅데이터는 데이터 자체의 생산과 사용에 있어 즉시성, 복잡성, 연결 성 등의 특징으로 개별 기업 수준에서 비즈니스 전략을 수립하기 어렵다. 이러한 복잡한 빅데이터 구조 분석에 생태계 연구가 유용한데, 그 이유는 경 계를 넘어선 여러 산업 간, 비즈니스 간 유기적으 로 연결된 구조와 개별 개체들의 역할에 대한 종 합적인 해석이 가능하기 때문이다. 이기식 외[20] 의 소프트웨어산업 생태계 연구에서도 기술 발전 에 따른 소프트웨어 산업의 컨버전스 현상, 즉 산 업 간 경계가 와해되고 산업, 비즈니스가 유기적 으로 연결되는 네트워크형 산업구조를 분석하기에 생태계 관점이 적절하다고 언급한다. 즉 빅데이터의 성공적인 활용과 장기적 관점의 생태계 선순환 구조 형성을 위하여, 빅데이터를 둘러싼 생태계에 관한 학문적 연구가 필요한 시점 이다. 그러나 기존 빅데이터 관련 연구들은 빅데 이터의 의미와 실체, 분석 기술 및 사례 연구 등에 초점이 맞추어져 왔다 [1,6,9,28]. 최근 성공적인 빅데이터 활용을 위한 메커니즘 수립, 빅데이터 생태계 구성 방안 등에 관심이 증가하고 있지만, 빅데이터 생태계에 대한 학술적 논의는 충분히 이 루어지지 못하였다 [22,24,27,31].
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.