Browse > Article
http://dx.doi.org/10.7236/IJASC.2021.10.2.10

A Study on the Contents Security Management Model for Multi-platform Users  

Joo, Hansol (Department of IT Convergence, Hansei University)
Shin, Seung-Jung (Department of ICT Convergence, Hansei University)
Publication Information
International journal of advanced smart convergence / v.10, no.2, 2021 , pp. 10-14 More about this Journal
Abstract
Today people adopt various contents from their mobile devices which lead to numerous platforms. As technology of 5G, IOT, and smart phone develops, the number of people who create, edit, collect, and share their own videos, photos, and articles continues to increase. As more contents are shared online, the numbers of data being stolen continue to increase too. To prevent these cases, an authentication method is needed to encrypt the content and prove it as its own content. In the report, we propose a few methods to secure various misused content with secondary security. A unique private key is designed when people create new contents through sending photos or videos to platforms. The primary security is to encrypt the "Private Key" with a public key algorithm, making its data-specific "Timeset" that doesn't allow third-party users to enter. For the secondary security, we propose to use Message Authentication Codes(MACs) to certify that we have produced the content.
Keywords
Contents Security; MAC; Timestamp; Public key; Private key;
Citations & Related Records
Times Cited By KSCI : 3  (Citation Analysis)
연도 인용수 순위
1 Mun, Si-Hun, Kim, Min-U and Gwon, Tae-Gyeong, "Lightweight encryption technology trends for IoT communication environments", Information and Communications Magazine, Vol. 33, No.3, pp. 80-86, 2016.
2 Md. Sadique Shaikh and Vasundhara Fegade, "Modeling Essentials of Content Management System (CMS) for Web-Based MIS Application," International Journal of Engineering and Technology, Vol. 2, No. 3, pp. 379-383, Mar 2012. DOI: https://doi.org/10.6109/jkiice.2013.17.4.857   DOI
3 Seon-Joo Kim, "Secure Management Method for Private Key using Smartphon's Information," The Korea Contents Society, Vol. 16, No. 8, pp. 90-96, Aug 2016.   DOI
4 Minwoo Kim and Taekyoung Kwon, "Analysis of Research Trend and Performance Comparison on Message Authentication Code," Journal of KIISE, Vol. 43, No. 11, pp. 1245-1258, Nov 2016. DOI: https://doi.org/10.5626/JOK.2016.43.11.1245   DOI
5 Hyung Suk Won, Jonghyuk Roh, Daesun Choi and Seunghun Jin, "TSP SDK Implementation," The Korean Institute of Information Scientists and Engineers, Vol. 29, No.2, pp. 589-591, Oct 2002.
6 Seung-Jung Shin, "The Model Proposal of Mobile Cloud Security Technology," The Institute of Internet, Broadcasting and Communication (IIBC), Vol. 11, No. 6, pp. 151-156, Dec. 2011. DOI: https://doi.org/10.7236/JIWIT.2011.11.6.151   DOI
7 Shin, HyeWon and Ji, SeongWoo, "A Normative Study on the Paradigm and Solution of the New Digital Divide in the Smart Media Era," Study on the American Constitution, Vol. 25, No.3, pp. 171-203, Dec 2014.
8 Cho, Jung-Won, "Digital Audio Watermarking System for Copyright Protection of Web Contents," Korea Academy Industrial Cooperation Society, pp. 558-560, 2006
9 Wook-Lae Cho and Kyung-Wook Shin, "Scalable RSA public-key cryptography processor based on CIOS Montgomery modular multiplication Algorithm," Journal of the Korea Institute of Information and Communication Engineering(JKLLCE), Vol. 22, No. 1, pp. 100-108, Jan 2018. DOI: http://doi.org/10.6109/jkiice.2018.22.1.100   DOI
10 Man-Seub Park, Chang-Su Kim and Hoe-Kyung Jung, "A Study on the Management of the WCMS-based Web-Contents," Journal of the Korea Institute of Information and Communication Engineering, Vol. 17, No. 4, pp. 857-862, Apr 2013.   DOI