Browse > Article
http://dx.doi.org/10.9717/kmms.2011.14.10.1303

A 3-Party Negotiation Protocol Design for the Security of Self-Organized Storage on Infra-Clouding Environment  

Lee, Byung-Kwan (관동대학교 컴퓨터학과)
Jeong, Eun-Hee (강원대학교 지역경제학과)
Publication Information
Abstract
This paper proposes the design of 3-party negotiation protocol for the security of self_organized storage which consists of the owner node possessing data, the holder node holding the owner's data and the verification node verifying the data of the holder node on infra-cloud environment. The proposed security technique delegating the data verification of the holder node to the verification node increases the efficiency of the self-organized storage. In addition, the encrypt key and certification of the storage created by EC-DH algorithm enhances the security much more. Also, when the self-organized storage is composed, the security technique not only prevents external flooding attack by setting a certification key among three parties, but also prevents internal flooding attack by restricting the number of verification nodes. And The replay attack which can occur in the step of verification is automatically detected by using the created seed value whenever the verification is requested.
Keywords
Self-Organizing; Security; Negotiation Protocol;
Citations & Related Records
Times Cited By KSCI : 3  (Citation Analysis)
연도 인용수 순위
1 이정아, "모바일 클라우드 서비스 국내외 정책 추진현황," KT 경제경영연구소, pp. 1-15, http://digieco.co.kr
2 민옥기, 김학영, 남궁한 "클라우드 컴퓨팅 기술 동향," 전자통신동향분석, 제24권, 제4호, pp. 1-13, 2009.
3 C. Prehofer and C. Bettstetter, "Selforganization in communication networks: Principles and design paradigms," IEEE Communications Magazine, Vol.43, No.7, pp. 78-85, 2005.
4 권혁찬, 문용혁, 구자법, 고선기, 나재훈, 장종수, "P2P 표준화 및 기술동향," 전자통신동향분석, 제22권 제1호, pp. 11-23, 2007.
5 문용혁, 권혁찬, 나재훈, 장종수, "P2P 사용자 인증과 OTP 분석," 정보보호논문지, 제17권 제3호, pp. 32-40, 2007.
6 김진형, 김윤정, 박춘식, "클라우드 컴퓨팅에서 신뢰하지 않는 서버 데이터의 안전한 접근," 정보과학회지, 제28권, 제12호, pp. 67-74, 2010.
7 임철수, "클라우드 컴퓨팅 보안 기술," 정보보호학회지, 제19권, 제3호, pp. 14-17, 2009.
8 은성경, 조남수, 김영호, 최대선, "클라우드 컴퓨팅 보안 기술," 전자통신동향분석, 제24권, 제4호, pp. 79-88, 2009.
9 N. Koblitz, "Elliptic Curve Cryptosystems," Mathematics of Computation, Vol.48, No.177, pp. 203-209, 1987.   DOI   ScienceOn
10 V. Miller, "Uses of Elliptic Curves in Cryptography," advances in Cryptology Proceedings of Crypto'85, LNCS(218), pp.417-426, 1986
11 이완복, 노창현, 류대현, "공개키 연산기의 효율적인 통합 설계를 위한 임계경로분석," 멀티미디어학회논문지, 제8권 제1호, pp.79-87, 2005
12 http://en.wikipedia.org/