Table 6.
Evaluation items of security and reliability.
| Evaluation criteria | Evaluation item |
|---|---|
|
Security/ reliability (9 items) |
(1) Whether or not the security policy and channel are secured by providing cloud service |
| (2) Whether or not the access control is applied to unauthorized users | |
| (3) Whether or not the integrated authentication process is secured to verify users | |
| (4) Whether or not cloud service user data's confidentiality and integrity are secured | |
| (5) Whether or not firewall is introduced to protect cloud service users | |
| (6) Whether or not a management solution such as monitoring and tracking is introduced by analyzing the log file for preventing and tracking unauthorized users' access | |
| (7) Whether or not the nonrepudiation function is provided at the messaging level (except the transmission level) | |
| (8) Whether or not the personal privacy protection function is provided at the messaging level (except the transmission level) | |
| (9) Existence of the measures to the service and data's failure |