DOI QR코드

DOI QR Code

Research on SecureOS Module Based on File System for Data Protection

데이터 보호를 위한 파일시스템 기반의 SecureOS Module에 관한 연구

  • Yonggu JANG (Korea Institute of Civil engineering and Building Technology) ;
  • Inchul KIM (SCUBEI CO.,LTD) ;
  • Jisong RYU (Korea Institute of Civil engineering and Building Technology)
  • Received : 2023.10.14
  • Accepted : 2023.11.06
  • Published : 2023.12.31

Abstract

Service environments through laptops, smart devices, and various IoT devices are developing very rapidly. Recent security measures in these Internet environments mainly consist of network application level solutions such as firewall(Intrusion Prevention Systems) and IDS (intrusion detection system). In addition, various security data have recently been used on-site, and issues regarding the management and destruction of such security data have been raised. Products such as DRM(Digital Rights Management) and DLP(Data Loss Prevention) are being used to manage these security data. However despite these security measures, data security measures taken out to be used in the field are operated to the extent that the data is encrypted, delivered, and stored in many environments, and measures for encryption key management or data destruction are insufficient. Based on these issues we aim to propose a SecureOS Module, an OS-based security module. With this module users can manage and operate security data through a consistent interface, addressing the problems mentioned above.

노트북, 스마트 기기 및 다양한 IoT 장비를 통한 서비스 환경은 매우 빠르게 발달하고 있다. 이러한 인터넷 환경에서 최근의 보안 대책은 주로 네트워크 응용 수준의 보안 대책인 방화벽(침입 차단 시스템-Firewall)과 IDS(침입 탐지 시스템-Intrusion Detection System)으로 이루어지고 있다. 또한, 최근에는 다양한 보안 데이터의 현장 활용이 이루어지고 있고 이런 보안 데이터의 관리와 파기에 대한 이슈 소요가 제기되고 있다. 이러한 보안 데이터의 관리를 위해 문서보안(DRM:Digital Rights Management)이나 데이터 손실 방지 솔루션(DLP:Data Loss Prevention)과 같은 제품이 사용되고 있다. 그러나 이런 보안 대책에도 사용성 문제로 인해 현장에서 사용하기 위해 반출된 데이터 보안 대책은 대부분 환경에서 해당 데이터를 암호화하여 전달하고 저장하는 정도로 운영되고 있으며, 암호키 관리나 데이터의 파기에 관한 대책이 미흡한 것이 현실이다. 이러한 문제점을 기반하여 OS 기반의 보안 모듈을 제공함으로써 사용자는 동일한 인터페이스로 보안 데이터를 관리 운영할 수 있는 SecureOS Module을 제시하고자 한다.

Keywords

Acknowledgement

본 연구는 국토교통부/국토교통과학기술진흥원의 지원으로 수행되었음(과제번호 : RS-2020-KA158151)

References

  1. Hong, S.S., Shin, H.J., Hwang, U.H., Chae, H.S., 2019, Study on Suitability for Web Service of River Geospatial Information, Journal of the Korean Association of Geographic Information Studies 22(2):121-132
  2. Hyun, G.N., Park, N.J., 2023, A Study on the Law Analysis and the Application Method of the Personal Information Protection Act for the Promotion of Data Opening in Public Institutions. Journal of the Korean Institute of Information Technology, 9-11.
  3. Jeong, H.G., Kang, KT., 2022, Application monitoring system design and implementation using system call pattern, Journal of KIISE 32(10):795-801. https://doi.org/10.5626/JOK.2022.49.10.795
  4. Jang, Y.G, Jeong, J.H., Lee, J.W., Kim, H.S., 2009. A Study on Optimal Technical Factors of USFSS Based on Integrated Technique of Wireless Communication and Location Awareness, Journal of the Korean Association of Geographic Information Studies 12(4):48-58.
  5. Kim, B.S., Cho, J.S., 2018. Linux Kernel Attack of IoT Device using LKM-based System Call Hooking, Journal of the Korean Institute of Information Scientists and Engineers, 1195-1197.
  6. Kim, H.Y., Lee, S.H., 2008, A Study on the Application of Social Network Analysis for Expanding the use of Spatial Data in Local Government, Journal of the Korean Association of Geographic Information Studies 11(3):80-91.
  7. Kim. J.Y., Kim, H.J., Yu, G.Y., 2022, A Study on Effective Real Estate Big Data Management Method Using Graph Database Model, Journal of the Korean Association of Geographic Information Studies 25(4):163-180.
  8. Kim, S.S., Hong, C.S., 2014, Prevention of personal Information leakage through system call hooking in Android Kernel, Journal of the Korean Institute of Information Scientists and Engineers, 1,015-1,017.
  9. Lee, E.I., Kim, D.H., 2022, Serialization Method for large spatial data transmission of High Definition Map, Journal of the Korean Association of Geographic Information Studies 25(4):32-48.
  10. Lee, S.Y., Kim, H.G., Park, M.S.. 2022. Encryption key generation and encryption algorithm classification of encrypted data for smartphone app, Journal of the Korea Institute of Information Security & Cryptology, 32(6):17-22.
  11. USGS. 2015. Landsat 8(L8) Data Users Handbook. Department of the Interior US Geological Survey v1. https://www.usgs.gov/land-resources/nli/landsat/landsat-8-data-users-handbook. ( August 15, 2019)
  12. Zhang, Jun, SU, Purui, FENG, Dengguo, 2006, Design and implementation of intrusion detection system based on system-call, Journal of Computer Applications 26(9):2137-2139.