DOI QR코드

DOI QR Code

File Sharing Algorithm based Mutual Cooperation using Smart Device

스마트 기기를 이용한 상호 협력 기반 파일 공유 시스템

  • Jeong, Pil-Seong (Dept. of Information Technology Communication, Myongji College) ;
  • Cho, Yang-Hyun (Division of Computer & Mechatronics Engineering, Sahmyook University)
  • 정필성 (명지전문대학 정보통신공학과) ;
  • 조양현 (삼육대학교 컴퓨터.메카트로닉스공학부)
  • Received : 2018.10.02
  • Accepted : 2018.12.20
  • Published : 2018.12.28

Abstract

With the development of information and communication technology, we have been able to access and manage documents containing corporate information anytime and anywhere using smart devices. As the work environment changes to smart work, the scope of information distribution is expanded, and more efforts are needed to manage security. This paper proposes a file sharing system that enables users who have smart devices to manage and share files through mutual cooperation. Proposed file sharing system, the user can add a partner to share files with each other when uploading files kept by spliting the part of the file and the other uses an algorithm to store on the server. After converting the file to be uploaded to base64, it splits it into encrypted files among users, and then transmits it to the server when it wants to share. It is easy to manage and control files using dedicated application to view files and has high security. Using the system developed with proposed algorithm, it is possible to build a system with high efficiency even for SMEs(small and medium-sized enterprises) that can not pay much money for security.

정보통신 기술의 발전으로 우리는 스마트 기기를 이용하여 언제 어디서나 기업정보가 담긴 문서에 접근하고 관리가 가능하게 되었다. 근무 환경이 스마트워크 근무 환경으로 변화함에 따라서 정보의 유통범위가 넓어짐과 동시에 보안을 위한 관리에 많은 노력이 필요하게 되었다. 본 논문은 스마트 기기를 소유한 사용자들끼리 상호 협력을 통해 파일을 관리하고 공유할 수 있는 파일 공유 시스템을 제안한다. 제안하는 파일 공유 시스템은 사용자가 파일을 업로드 할 때 함께 파일을 공유할 상대를 추가하면 파일의 일부분을 서로 나눠서 보관하고 나머지는 서버에 보관하는 알고리즘을 사용한다. 업로드 할 파일을 base64로 변환 후 사용자들끼리 암호화된 파일로 나누어 가진 후 공유를 원할 때 서버로 전송한다. 파일을 보기 위해서 전용 애플리케이션을 사용하여 파일 관리와 통제가 쉬우며 높은 보안성을 가진다. 본 논문에서 개발한 시스템을 이용할 경우 보안에 많은 돈을 지불하기 어려운 중소기업에서도 효율성 높은 시스템을 구축할 수 있다.

Keywords

OHHGBW_2018_v9n12_53_f0001.png 이미지

Fig. 1. Proposed service model

OHHGBW_2018_v9n12_53_f0002.png 이미지

Fig. 2. User registration flow

OHHGBW_2018_v9n12_53_f0003.png 이미지

Fig. 3. User login flow

OHHGBW_2018_v9n12_53_f0004.png 이미지

Fig. 4. User registration screen

OHHGBW_2018_v9n12_53_f0005.png 이미지

Fig. 5. User list screen

OHHGBW_2018_v9n12_53_f0006.png 이미지

Fig. 6. Login screen and main screen

OHHGBW_2018_v9n12_53_f0007.png 이미지

Fig. 7. File upload screen and notification screen

Table 1. Javascript API by Cordova

OHHGBW_2018_v9n12_53_t0001.png 이미지

Table 2. USERS table scheme

OHHGBW_2018_v9n12_53_t0002.png 이미지

Table 3. IMAGES table scheme

OHHGBW_2018_v9n12_53_t0003.png 이미지

Table 4. RESULTS table scheme

OHHGBW_2018_v9n12_53_t0004.png 이미지

Table 5. Comparison between proposed algorithm and other algorithm

OHHGBW_2018_v9n12_53_t0005.png 이미지

References

  1. S. Y. Lee, Y. T. Cho & S. E. Yoo. (2015). An Effect of Smartwork Center Design and Smartwork on Job Satisfaction Work and Life Balance, and Work Productivity. Journal of Korea Design Knowledge, 34, 183-191.
  2. C. Kwan. (2018). Issues and Improvements of Secure Coding for Preventing Cyber Crime: Focus on the Private Company Systems. Journal of Information and Security, 18(2), 69-76.
  3. J. S. Park & J. C. Ha. (2012). Vulnerability Analysis of Security Document Management in Multi Function Peripheral and Its Countermeasure. Journal of Korean Institute of Information Technology, 10(6), 133-143.
  4. J. H. Lee, D. H. Lee & H. K. Kim. (2012). Decision Support System to Detect Unauthorized Access in Smart Work Environment. Journal of the Korea Institute of Information Security & Cryptology, 22(4), 797-808.
  5. B. H. Kang. (2018). 5 Topics for Education and Research in Business Ethics. Journal of Digital Convergence, 16(8), 137-150. https://doi.org/10.14400/JDC.2018.16.8.137
  6. C. Kwan. (2015). Rethinking of Situational Context and Characteristic of Industrial Secrets Leakage: Some National Security and Psychological Perspectives. The Korean Journal of Forensic Psychology, 6(1), 1-11.
  7. B. G. Song. (2014). Differences of Small Enterprise' Industrial Security Management System : Focus on the Trade Secrets. The Journal of Social Science, 21(3), 326-358.
  8. S. R. Kang, S. R. Kim, M. S. Park & J. S. Kim. (2018). Study on Windows Event Log-Based Corporate Security Audit and Malware Detection. Journal of the Korea Institute of Information Security & Cryptology, 28(3), 591-603. https://doi.org/10.13089/JKIISC.2018.28.3.591
  9. B. C. Kim. (2015). The SME Informatization Level Analysis and Design for Privacy. Journal of Digital Convergence, 13(2), 121-126. https://doi.org/10.14400/JDC.2015.13.2.121
  10. T. S. Jeong, M. S. Yim & J. B. Lee. (2012). A Development of Comprehensive Framework for Continuous Information Security, Journal of Digital Convergence, 10(2), 1-10. https://doi.org/10.14400/JDPM.2012.10.2.001
  11. S. H. Lee. (2013). A Security Enhancement Method for Web Service, Journal of Digital Convergence, 11(12), 361-366. https://doi.org/10.14400/JDPM.2013.11.12.361
  12. G. C. Ko, J. S. Jung, S. K. Choi & K. S. Han (2017). A Study on the Affecting Factors in Performance of Internal Leakage Prevention on Industrial Technology, Journal of Digital Convergence, 15(7), 159-167. https://doi.org/10.14400/JDC.2017.15.7.159
  13. Apache Cordova. (2018). Apache Cordova Documentation. Apache Cordova Documentation(Online). https://cordova.apache.org/docs/en/latest
  14. Mozilla. (2018). Base64 encoding and decoding. MDN web docs(Online). https://developer.mozilla.org/en-US
  15. Google. (2018). Firebase Documentation. Firebase(Online). https://firebase.google.com/docs