Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Choon-Sik Park is active.

Publication


Featured researches published by Choon-Sik Park.


Ksii Transactions on Internet and Information Systems | 2013

Privacy Level Indicating Data Leakage Prevention System

Jinhyung Kim; Choon-Sik Park; Jun Hwang; Hyung-Jong Kim

The purpose of a data leakage prevention system is to protect corporate information assets. The system monitors the packet exchanges between internal systems and the Internet, filters packets according to the data security policy defined by each company, or discretionarily deletes important data included in packets in order to prevent leakage of corporate information. However, the problem arises that the system may monitor employees’ personal information, thus allowing their privacy to be violated. Therefore, it is necessary to find not only a solution for detecting leakage of significant information, but also a way to minimize the leakage of internal users’ personal information. In this paper, we propose two models for representing the level of personal information disclosure during data leakage detection. One model measures only the disclosure frequencies of keywords that are defined as personal data. These frequencies are used to indicate the privacy violation level. The other model represents the context of privacy violation using a private data matrix. Each row of the matrix represents the disclosure counts for personal data keywords in a given time period, and each column represents the disclosure count of a certain keyword during the entire observation interval. Using the suggested matrix model, we can represent an abstracted context of the privacy violation situation. Experiments on the privacy violation situation to demonstrate the usability of the suggested models are also presented.


Journal of the Korea Academia-Industrial cooperation Society | 2011

Study on Security Considerations in the Cloud Computing

Choon-Sik Park

Cloud computing provides not only cost savings and efficiencies for computing resources, but the ability to expend and enhance services. However, cloud service users(enterprisers) are very concerned about the risks created by the characteristics of cloud computing. In this paper, we discuss major concerns about cloud computing environments including concerns regarding security. We also analyze the security concerns specifically, identify threats to cloud computing, and propose general countermeasures to reduce the security risks.


information security and cryptology | 2016

A Study on Service Security Framework for SW-IaaS Cloud

Myeonggil Choi; Choon-Sik Park; Jaehun Jeong

Cloud computing-related security incidents have occurred recently are beyond the scope of a enterprises security incident is expanded to the entire range of customers who use the cloud computing environment. The control technology for the overall integrated security of the cloud data center is required for this purpose. This study research integrated and additional security elements for the cloud data center control to understand the existing control technology. It is a better understanding of the IaaS cloud environment to build the IaaS cloud environment by CloudStack. SW-IaaS cloud structure by combining CloudStack and IaaS cloud model presented by NIST is proposed in this study. This paper derive a security framework to consider in each layer of The SW-IaaS cloud components, which are composed of the Cloud Manager, Cluster Manager, and Computer Manager.


information security and cryptology | 2015

A Study on Improvement of Inspection Items for Activation of the Information Security Pre-inspection*

Ju Young Choi; Jinhyung Kim; Jung-Sub Park; Choon-Sik Park

ABSTRACT IT environments such as IoT, SNS, BigData, Cloud computing are changing rapidly. These technologies add new technologies to some of existing technologies and increase the complexity of Information System. Accordingly, they require enhancing the security function for new IT services. Information Security Pre -inspection aims to assure stability and reliability for user a nd supplier of new IT services by proposing development stage whic h considers security from design phase. Existing ‘Information Security Pre-inspection’ (22 domains, 74 control items, 129 det ail items) consist of 6 stage (Requirements Definition, Design, Training, Implementation, Test, Sustain). Pilot tests were exec uted for one of IT development companies to verify its effectiveness. Consequently, for some inspection items, some improvement requirements and reconstitution needs appeared. This paper conducts a study on activation of ‘Information Security P re-inspection’ which aims to construct prevention system for ne w information system. As a result, an improved ‘Information Security Pre-inspection’ is suggested. This has 16 domains, 54 inspection items, 76 detail items which include some improvemen t requirements and reconstitution needs. Keywords: Information Security Pre-Inspection, Security Development Life cycle


Journal of the Korea Society for Simulation | 2011

A study of Modeling and Simulation for the Availability Optimization of Cloud Computing Service

Eun-Young Jang; Choon-Sik Park

Cloud computing emerges as a new paradigm for deploying, managing and offering IT resources as a service anytime, anywhere on any devices. Cloud computing data center stores many IT resources through resource integration. So cloud computing system has to be designed by technology and policy to make effective use of IT resources. In other words, cloud vendor has to provide high quality services to all user and mitigate the dissipation of IT resources. However, vendors need to predict the performance of cloud services and the use of IT resources before releasing cloud service. For solving the problem, this research presents cloud service modeling on network environment and evaluation index for availability optimization of cloud service. We also study how to optimize an amount of requested cloud service and performance of datacenter using CloudSim toolkit.


information security and cryptology | 2011

The study on a threat countermeasure of mobile cloud services

Eun-Young Jang; Hyung-Jong Kim; Choon-Sik Park; Joo-Young Kim; Jaeil Lee


information security and cryptology | 2009

Technique and Implementation of Secure Downloadable Conditional Access System

Seong-Ku Kang; Jongyoul Park; Euihyun Paik; Choon-Sik Park; Jae-Cheol Ryou


information security and cryptology | 2008

A Group Key based Authentication Protocol Providing Fast Handoff in IEEE 802.11

Changyong Lee; Sangjin Kim; Heekuck Oh; Choon-Sik Park


information security and cryptology | 2017

OTP-Based Dynamic Authentication Framework for Virtual Machine Migration

Eunji Lee; Choon-Sik Park; Jin Kwak


information security and cryptology | 2012

A Study on Operating the IaaS Cloud Computing in view of Integrated Security Management System

Ju-Young Choi; Choon-Sik Park; Myuhng-Joo Kim

Collaboration


Dive into the Choon-Sik Park's collaboration.

Top Co-Authors

Avatar

Eun-Young Jang

Seoul Women's University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Jinhyung Kim

Seoul Women's University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Euihyun Paik

Electronics and Telecommunications Research Institute

View shared research outputs
Top Co-Authors

Avatar

Eunji Lee

Chungnam National University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Jae-Cheol Ryou

Chungnam National University

View shared research outputs
Researchain Logo
Decentralizing Knowledge