DOI QR코드

DOI QR Code

An Integrative Method of Fault Tree Analysis and Fault Modes and Effect Analysis for Security Evaluation of e-Teaching and Learning System

전자 교수학습 시스템의 보안성 평가를 위한 결함트리분석과 고장유형에 대한 영향분석의 통합적 방법

  • 진은지 (부경대학교 첨단정보과학 및 정보기술학과) ;
  • 김명희 (부경대학교 교육대학원 전산교육전공) ;
  • 박만곤 (부경대학교 IT융합응용공학과)
  • Received : 2011.11.15
  • Accepted : 2012.09.21
  • Published : 2013.01.31

Abstract

These days, the teaching and learning system has been increasing for the rapid advancement of the information technologies. We can access education systems of good quality anytime, anywhere and we can use the individually personalized teaching and learning system depending on developing the wireless communication technology and the multimedia processing technology. The more the various systems develop, the more software security systems become important. There are a lot kind of fault analysis methods to evaluate software security systems. However, the only assessment method to evaluate software security system is not enough to analysis properly on account of the various types and characteristic of software systems by progressing information technology. Therefore, this paper proposes an integrative method of Fault Tree Analysis (FTA) and Fault Modes and Effect Analysis(FMEA) to evaluate the security of e-teaching and learning system as an illustration.

최근 정보통신기술의 발전으로 교육훈련 현장에는 전자 교수학습 시스템(e-teaching and learning system) 에 대한 사용이 급증하고 있다. 또한 무선 이동통신기술과 멀티미디어 처리 기술의 발전에 따라 언제 어디서나 양질의 교육 및 훈련 콘텐츠에 쉽게 접근할 수 있게 되었고, 개인 맞춤형의 교수학습 서비스 시스템도 등장하고 있다. 많은 전자 교수학습 시스템들이 개발됨에 따라 이의 보안성(security) 역시 중요한 이슈로 떠오르고 있다. 전자 교수학습 시스템들과 같은 정보 서비스 시스템의 보안성을 평가하기 위한 여러 가지 결함 분석 기법들이 있다. 그러나 융합IT 기술이 확대 발전함에 따라 정보 서비스 시스템의 종류와 특성이 다양해지면서 단지 하나의 시스템 보안성 평가 방법으로는 적절한 분석이 이루어 질 수 없다. 따라서 본 논문에서는 정보 서비스 시스템의 보안성을 평가하기 위해서 결함 트리 분석(Fault Tree Analysis; FTA)기법과 고장모드별 영향 분석(Fault Modes and Effect Analysis; FMEA)기법의 두 가지의 분석 기법을 통합하여 사용함으로서 전자 교수학습 시스템의 결함 분석을 수행하고 보안성을 개선하는 방법을 제안한다.

Keywords

References

  1. Doo-Hyun Kim and Jong-Ho Lee, "Qualitative Assessment for Hazard on the Electric Power Installations of a Construction Field using FMEA," Journal of the Korean Society of Safety, Vol.19, No.14, pp.36-41, 2004,
  2. S.Y. Kim, W.Y. Yun, and H.G. kim, "Reestablishment of RPN Evaluation Method in FMEA Procedure for Motors in Household Appliances," Journal of the Korean Society for Quality Management, Vol.35, No.1, pp.1-9, 2007.
  3. Eun-Mi Kim, "Safety Verification Method Based on Fault Tree Analysis," Proceedings of the Korean Information Science Society, Vol.25, No.2, pp.582-584, 1998.
  4. Hyo Young Kim and Hyuk Soo Han, "A Defect Prevention Model based on SW-FMEA," Journal of Korean Information Science Society, Vol.33, No.7, pp.605-614, 2006.
  5. Myonghee Kim and Man-Gon Park, "A Study on the Software Fault Modes and Effect Analysis for Software Safety Evaluation," Journal of the Korean Multimedia Society, Vol.15, No.1, pp.113-130, 2012. https://doi.org/10.9717/kmms.2012.15.1.115
  6. Man-Gon Park and Su-Do Kim, "The Architecture of e-Teaching and Learning System based on the CBD," Proceedings of the Korean Multimedia Society, Vol.7, No.2, pp.113-116, 2004.
  7. Hyun Ki Park, "A Study on Methods of Fault Analysis and the Failure Effect Analysis for Security Improvement of e-Teaching and Learning System", Ph.D Dissertation of the PuKyong National University, 2012.
  8. S.W. Lee, Y.H. Kim, H.J. Seo, J.H. Kim, and K.A. Moon, "Next Generation e-Learning Service: Focused on e-Learning System," ETRI Electronics and Communication Trend Analysis, Vol.20, No.4, pp.155-166, 2005.
  9. Ik-Sung Lee, "A Study for Quality Improvement of Convention by Failure Mode and Effects Analysis," Journal of the Korean Convention Society, Vol.5, No.1, pp.101-107, 2005.
  10. Joong-Soon Jang, "A Study on Performing FMEA Effectively," Journal of the Korean Institute of Plant Engineering, Vol.4, No.4, pp.69-77, 1999.
  11. Joong-Soon Jang and Dong-Geun An, "How to Perform FMEA Effectively," Journal of the Korean Society of Quality Management, Vol.25, No.1, pp.156-172, 1997.
  12. Adem Sabic and Jasmin Azemovic, "Model of Efficient Assessment System with Accent on Privacy, Security and Integration with e-University Components," Second International Conference on Education Technology and Computer(ICETC), Vol.3, pp.128-131, 2010.
  13. Edgar R. Weippl, "Security in e-Learning," Springer, 2005.
  14. Galyna Akmayeva, Charles Shoniregun, "Ontology of e-Learning Security," International Conference on Information Society (i-Society), pp.652-655, 2010.
  15. Jeffy Mwakalinga, Stewart Kowalski, and Louise Yngstrom, "Secure E-learning Using a Holistic and Immune Security Framework," International Conference for Internet Technology and Secured Transactions,(ICITST), pp.1-6, 2009.
  16. Jianming Yong, "Security Modelling for e-Learning," First IEEE International Symposium on Information Technologies and Applications in Education(ISITAE), pp.1-5, 2007.
  17. M. Ben-Daya and Abdul Raouf, "A Revised Failure Mode and Effects Analysis Model," International Journal of Quality & Reliability Management, Vol.13, No.1, pp.43-47, 1996. https://doi.org/10.1108/02656719610108297
  18. M. Warren and W. Hutchinson, "Information Security-An E-learning Problem," Lecture Notes in Computer Science, Vol.2783, pp.21-26, 2003.
  19. Najwa Hayaati Mohd Alwi and Ip-Shing Fan, "Information Security Management in E-Learning," International Journal of Technology Enhanced Learning, Vol.3, pp.358-371, 2010.
  20. N. Snooke and C. Price, "Model-driven automated software FMEA," Proceedings of Reliability and Maintainability Symposium (RAMS), pp.1-6, 2011.
  21. Najwa Hayaati Mohd Alwi and Ip-Shing Fan, "Information Security Management in E-Learning," International Conference for Internet Technology and Secured Transactions(ICITST), pp.1-6, 2009.
  22. Pascal Bou Nassar and Youakim Badr, "Towards Integrating Security Services in e-learning Platforms," International Conference on Advances in Computational Tools for Engineering Applications(ACTEA), pp.573-577, 2009.
  23. Prveen Kumar, Shefalika Ghoch Samaddar, Arun B. Samaddar, and Arun Kumar Misra, "Extending IEEE LTSA e-Learning Framework in Secured SOA Environment," Second International Conference on Education Technology and Computer(ICETC), Vol.2, pp.136-140, 2010.
  24. Rodrigo de Queiroz Souza and Alberto Jose Alvares, "FMEA and FTA Analysis for Application of the Reliability Centered Maintenance Methodology: Case Study on Hydraulic Turbines," ABCM Symposium Series in Mechatronic, Vol.3, pp.803-812, 2008.
  25. Ruth Raitman, Leanne Ngo, Naomi Augar, and Wanlei Zhou, "Security in the Online e-learning Environment," Fifth IEEE International Conference on Advanced Learning Technologies(ICALT), pp.702-706, 2005.
  26. Sigrid Schubert, Andreas Schwill (Advisors) and Christian Josef Eibl (Recipient), "Discussion of Information Security in E-Learning," Ph. D Thesis, Dept. of Computer Science, University of Siegen, Germany, pp.1-193, 2010. Retrieved on 16th November 2011 from http://dokumentix.ub.unisiegen. de/opus/volltexte/2010/444/
  27. Taiwo Ayodele, Charles A. Shoniregun, and Galyna Akmayeva, "Towards e-Learning Security: A Machine Learning Approach," International Conference on Information Society (i-Society), pp.490-492, 2011.
  28. Zhang Hong and Liu Binbin, "Integrated Analysis of Software FMEA and FTA," Proceedings of International Conference on Information Technology and Computer Science, pp.184-187, 2009.

Cited by

  1. FTA-FMEA-based validity verification techniques for safety standards vol.34, pp.3, 2017, https://doi.org/10.1007/s11814-016-0321-1