Browse > Article

Design of Information Security in Ubiquitous City  

Yoon, Seuk-Kyu (평택대학교 컴퓨터학과)
Jang, Hee-Seon (평택대학교 e-비즈니스및창업)
Publication Information
Abstract
In this paper, the design methodology of information security is analyzed to implement the ubiquitous city (u-City). The definition, concept, and main u-services of u-City are presented. The main components, functio ns and offering services of u-City management center are presented, and the laws and network security requirements related to protect the personal information in collecting, processing, and exchanging are also analyzed. Three step security levels of Router/Switch, Firewall/VPN, and IPS are applied where main functions of in terception of abnormal packets($1^{st}$ level), access control for each service($2^{nd}$ level), and real-time network monitoring($3^{rd}$ level) are performed. Finally, application cases are presented to validate the security of personal information in providing the u-City services.
Keywords
u-City(Ubiquitous City); Information Security; Network Security;
Citations & Related Records
연도 인용수 순위
  • Reference
1 BSI, BS 7799, Code of Practice for Information Security Management, 1997.
2 ISO/IEC JTC1/SC27, TR13335-1, Guidelines for the Management of IT Security(GMITS): Part 1 - Concepts and Models for IT Security, 1996.
3 Mark Weiser, "Hot Topic: Ubiquitous Computin g", IEEE Computer, Vol.10, pp.71-72, 1993.
4 Philip Purpura, Security and Loss Prevention, Fourth Edition, Elsevier, 2003.
5 Robert Fischer, Introduction to Security, Eighth Editon, Elsevier, 2011.
6 가나, 우리들의 유비쿼터스, 혜지원, 2005년.
7 손병희, 장종찬, 유비쿼터스 개론: 개념과 기술, ITC, 2009년.
8 장희선, "u-City에서의 비즈니스 모델", 주간기술 동향, 제1406호, pp.1-13, 2009년.-
9 한국지역정보개발원, u-City 사업의 이해, 2011년.