DOI QR코드

DOI QR Code

A Study on the Contents Security Management Model for Multi-platform Users

  • Received : 2021.03.22
  • Accepted : 2021.04.04
  • Published : 2021.06.30

Abstract

Today people adopt various contents from their mobile devices which lead to numerous platforms. As technology of 5G, IOT, and smart phone develops, the number of people who create, edit, collect, and share their own videos, photos, and articles continues to increase. As more contents are shared online, the numbers of data being stolen continue to increase too. To prevent these cases, an authentication method is needed to encrypt the content and prove it as its own content. In the report, we propose a few methods to secure various misused content with secondary security. A unique private key is designed when people create new contents through sending photos or videos to platforms. The primary security is to encrypt the "Private Key" with a public key algorithm, making its data-specific "Timeset" that doesn't allow third-party users to enter. For the secondary security, we propose to use Message Authentication Codes(MACs) to certify that we have produced the content.

Keywords

References

  1. Seung-Jung Shin, "The Model Proposal of Mobile Cloud Security Technology," The Institute of Internet, Broadcasting and Communication (IIBC), Vol. 11, No. 6, pp. 151-156, Dec. 2011. DOI: https://doi.org/10.7236/JIWIT.2011.11.6.151
  2. Cho, Jung-Won, "Digital Audio Watermarking System for Copyright Protection of Web Contents," Korea Academy Industrial Cooperation Society, pp. 558-560, 2006
  3. Shin, HyeWon and Ji, SeongWoo, "A Normative Study on the Paradigm and Solution of the New Digital Divide in the Smart Media Era," Study on the American Constitution, Vol. 25, No.3, pp. 171-203, Dec 2014.
  4. Seon-Joo Kim, "Secure Management Method for Private Key using Smartphon's Information," The Korea Contents Society, Vol. 16, No. 8, pp. 90-96, Aug 2016. https://doi.org/10.5392/JKCA.2016.16.08.090
  5. Wook-Lae Cho and Kyung-Wook Shin, "Scalable RSA public-key cryptography processor based on CIOS Montgomery modular multiplication Algorithm," Journal of the Korea Institute of Information and Communication Engineering(JKLLCE), Vol. 22, No. 1, pp. 100-108, Jan 2018. DOI: http://doi.org/10.6109/jkiice.2018.22.1.100
  6. Minwoo Kim and Taekyoung Kwon, "Analysis of Research Trend and Performance Comparison on Message Authentication Code," Journal of KIISE, Vol. 43, No. 11, pp. 1245-1258, Nov 2016. DOI: https://doi.org/10.5626/JOK.2016.43.11.1245
  7. Mun, Si-Hun, Kim, Min-U and Gwon, Tae-Gyeong, "Lightweight encryption technology trends for IoT communication environments", Information and Communications Magazine, Vol. 33, No.3, pp. 80-86, 2016.
  8. Man-Seub Park, Chang-Su Kim and Hoe-Kyung Jung, "A Study on the Management of the WCMS-based Web-Contents," Journal of the Korea Institute of Information and Communication Engineering, Vol. 17, No. 4, pp. 857-862, Apr 2013. https://doi.org/10.6109/jkiice.2013.17.4.857
  9. Md. Sadique Shaikh and Vasundhara Fegade, "Modeling Essentials of Content Management System (CMS) for Web-Based MIS Application," International Journal of Engineering and Technology, Vol. 2, No. 3, pp. 379-383, Mar 2012. DOI: https://doi.org/10.6109/jkiice.2013.17.4.857
  10. Hyung Suk Won, Jonghyuk Roh, Daesun Choi and Seunghun Jin, "TSP SDK Implementation," The Korean Institute of Information Scientists and Engineers, Vol. 29, No.2, pp. 589-591, Oct 2002.