Browse > Article
http://dx.doi.org/10.9708/jksci.2018.23.09.073

A Design of Client BBS System for Secure HVA  

Park, Jae-Kyung (Dept. of Information Security, Seoul Gangseo Campus, Korea Polytechnics)
Kim, Young-Ja (Dept. of Data Analysis, Seoul Gangseo Campus, Korea Polytechnics)
Abstract
In this paper, we propose a new type of client server environment to improve the architecture vulnerable to hacking in an existing client server environment. On the server side, move the existing Web server to the client side and This is a way for clients to communicate only the data they need and suggests a structure that completely blocks the web attack itself to the server. This can completely prevent a server from being hacked, spreading malicious code and hacking data on a server. It also presents a new paradigm that will not affect servers even if malware is infected with client PCs. This paper validates the proposed environment through BBS (Big Bad Stick) hardware in the form of USB on the client side. This study proof that secure services are provided through encryption communication with server-side security equipment, indicating that this study is a system with new security.
Keywords
High Value Asset; Context Centric Network; Big Bad Stick; Profile; Raspberry Pi;
Citations & Related Records
Times Cited By KSCI : 2  (Citation Analysis)
연도 인용수 순위
1 Jae-Kyung Park, Won Joo Lee, Kang-Ho Lee, "A Study on the Isolated Cloud Security Using Next Generation Network" Journal of The Korea Society of Computer and Information Vol. 22 No. 11, pp. 41-48, November 2017.   DOI
2 Sung-Jin Kim, Jae-Kyung Park, "Strengthening Authentication Through Content Centric Networking" Journal of The Korea Society of Computer and Information Vol. 22 No. 4, pp. 75-82, April 2017.   DOI
3 Hyung-Su Lee, Jae-Pyo Park, Jae-Kyung Park, "A Network Transport System Using Next Generation CCN Technology" Journal of The Korea Society of Computer and Information Vol. 22 No. 10, pp. 93-100, October 2017.
4 Jaehoon Kim, et al, "Content Centric Network-based Virtual Private Community," IEEE ICCE, Las Vegas, January 2011.
5 Jae-kyung Park, "A study of Secure Total Authentication System", The Korea Society of Computer and Information Vol.23 No.2, pp. 283-284, 2015.
6 Parc, A DESCRIPTION OF CONTENT-CENTRIC NETWORKING (CCN) based on a Special Invited Plenary Short Course by Van Jacobson at the Future Internet Summer School, Bremen, Germany on July 22, 2009.
7 Van Jacobson, D. K. Smetters, James D. Thornton, Michael Plass, Nick Briggs, and Rebecca Braynard. Networking Named Content. In CoNext, 2009.
8 Van Jacobson, D. K. Smetters, James D. Thornton, Michael Plass, Nick Briggs, and Rebecca Braynard. Networking Named Content. In CoNext, 2009.
9 Michael Meisel, Vasileios Pappas, and Lixia Zhang. Ad hoc networking via named data. In MobiArch'10. ACM, 2010.
10 Van Jacobson, D. K. Smetters, Nick Briggs, Michael Plass, Paul Stewart, James D. Thornton, and Rebecca Braynard. VoCCN: Voice-over Content-Centric Networks. In ReArch, 2009.
11 Q. Deng, Y. Luo, and J. Ge, "Dual threshold based unsupervised face image clustering," Proceedings of the 2nd International Conference on Industrial Mechatronics and Automation, pp. 436-439, 2010.
12 SIMGRID Project, http://simgrid.gforge.inria.fr
13 http://blog.kt.com/1139
14 http://www.bikorea.net/news/articleView.html?idxno=20827
15 http://m.etnews.com/amp/20180726000372
16 https://en.wikipedia.org/wiki/Raspberry_Pi_Foundation