Browse > Article
http://dx.doi.org/10.9708/jksci.2014.19.9.085

A Study of Definition of Security Requirements on Encryption and Audit Logging  

Shin, Seong-Yoon (Dept. of Computer Information Engineering, Kunsan National University)
Lee, Kang-Ho (Dept. of Computer Information Security, Korea National University of Welfare)
Abstract
Encryption is a method to convert information to no-sense code in order to prevent data from being lost or altered by use of illegal means. Audit logging creates audit log of users' activities, exceptions, and information security events, and then conserves it for a certain period for investigation and access-control auditing. Our paper suggests that confidentiality and integrity of information should be guaranteed when transmitting and storing important information in encryption. Encryption should consider both one-way encryption and two-way one and that encryption key should assure security. Also, all history related to electronic financial transactions should be logged and kept. And, it should be considered to check the details of application access log and major information. In this paper, we take a real example of encryption and log audit for safe data transmission and periodic check.
Keywords
Encryption; Audit Logging; Confidentiality; Integrity; Access Contro;
Citations & Related Records
Times Cited By KSCI : 8  (Citation Analysis)
연도 인용수 순위
1 JangYoung Chung, YoungSik Hong, "Distributed Image Encryption Schemes for Privacy-Preserving of Ultra High Resolution Images in Cloud Environments," Journal of Korea Convergence Security Association, Vol. 20, No. 4, pp.262-266, 2014   과학기술학회마을
2 Youngho Seo, Eui-Sun Choi, Dong-Wook Kim "Efficient Encryption Technique of Image using Packetized Discrete Wavelet Transform," Journal of Korea Convergence Security Association, Vol. 17, No. 3, pp. 603-611, 2013   과학기술학회마을   DOI   ScienceOn
3 Sang Keun Gil," Optical CBC Block Encryption Method using Free Space Parallel Processing of XOR Operations," Korean Journal of Optics and Photonics, Vol. 24, No. 5, pp. 262-270, October 2013   과학기술학회마을   DOI   ScienceOn
4 Sangjin Kim, Heekuck Oh, "A Security Hole in Comparable Encryption," Jonornal of The Korea Institute of information Security & Cryptology, Vol. 23, No. 4, pp. 267-271, 2013   과학기술학회마을   DOI   ScienceOn
5 http://cafe.naver.com/softwarequality/book1621832/731
6 Kim Min Soo, Noh Bong Nam, "Information Security : Secure logging system with self-protecting function," The Transactions of the Korea Information Processing Society , Vol. 6, No. 9, pp. 2442-2450, 1999
7 http://terms.naver.com/entry.nhn?docId=932499&cid= 43667&categoryId=43667
8 http://cafe.naver.com/handrake/46
9 Seonyoung Park, Youngseok Lee, "A Performance Analysis of Encryption in HDFS," Journal of KIISE : Database, Vol. 41, No. 2, pp. 21-27, 2014   과학기술학회마을
10 Hyun-wook Kim, Sung-eun Park, Seong-yul Euh, "The Distributed Encryption Processing System for Large Capacity Personal Information based on MapReduce," J. Korea Inst. Inf. Commun. Eng., Vol. 18, No. 3, pp. 576-585, Mar. 2014   과학기술학회마을   DOI   ScienceOn
11 Hyun-Jun Choi, "Data Encryption Technique for Depth-map Contents Security in DWT domain," J. Korea Inst. Inf. Commun. Eng., Vol. 17, No. 5, pp. 1245-1252, 2013   과학기술학회마을   DOI   ScienceOn
12 Junho Jeong, Young Sik Hong, "Efficient Multi-indices Scheme for Searchable Encryption System against Brute Force Attack in Cloud Computing Environments," Journal of KIISE : Information Networking, Vol. 40, No. 5, pp. 286-293, 2013   과학기술학회마을