Browse > Article

An Encrypted Service Data Model for Using Illegal Applications of the Government Civil Affairs Service under Big Data Environments  

Kim, Myeong Hee (경상대학교 컴퓨터과학과)
Baek, Hyun Chul (경남도립남해대학 스마트융합정보과)
Hong, Suk Won (경남도립거창대학 교무부)
Park, Jae Heung (경상대학교 컴퓨터과학과)
Publication Information
Abstract
Recently the government civil affairs administration system has been advanced to a cloud computing environment from a simple network environment. The electronic civil affairs processing environment in recent years means cloud computing environment based bid data services. Therefore, there exist lots of problems in processing big data for the government civil affairs service compared to the conventional information acquisition environment. That is, it processes new information through collecting required information from different information systems much further than the information service in conventional network environments. According to such an environment, applications of providing administration information for processing the big data have been becoming a major target of illegal attackers. The objectives of this study are to prevent illegal uses of the electronic civil affairs service based on IPs nationally located in civil affairs centers and to protect leaks of the important data retained in these centers. For achieving it, the safety, usability, and security of services are to be ensured by using different authentication processes and encryption methods based on these processes.
Keywords
Big data; Big data security; Cloud Computing; Computer network; Encryption; Traceback;
Citations & Related Records
Times Cited By KSCI : 4  (Citation Analysis)
연도 인용수 순위
1 J-K. Park, "A study on measures to active cultural contents service in big data age", Vol. 20, No. 1, pp. 324-334, Mar. 2014.
2 D. Pansa and T. Chomsiri, "Architecture and Protocols for Secure LAN by Using a Software-level Certificate and Cancellation of ARP Protocol", Third 2008 International Conference on Convergence and Hybrid Information Technology, pp. 21-26, 2008.
3 Steve Bellovin, Marcus Leech, Tom Taylor, "ICMP Traceback Message", IETF, draft-ietfitrace-04, Feb, 2003.
4 전정훈, "클라우드 컴퓨팅 서비스의 취약성과 대응 기술 동향에 관한 연구" 한국융합보안학회, Vol 13, No. 6, pp. 1239-1246, 2013. 4.
5 Y-T. Mu, H-C. Baek, J-Y. Choi, W-C. Jeong, and S-B. Kim, "A Proposal of a Defence Model for the Abnormal Data Collection using Trace Back Information in Big Data Environments", Journal of the Korea Institute of Information and Communication Engineering, Vol. 10, No. 2, pp. 153-162, 2015.
6 RW. Huang, X-L. Gui, S. Yu, and W. Zhuang, "Privacy-Preserving Computable Encryption Scheme of Cloud Computing", Chinese Journal of Computers, Vol. 34, No. 12, pp. 2391-2402, 2011.   DOI
7 J-K. Heo, "Web Application Authentication System using Encipherment and PKI", Journal of Information and Security, Vol. 8, No. 1, pp. 1-7, 2008
8 이경호, 김소정, 임종인, "전자정부와 프라이버시", 정보통신학회지, 제13권, 제3호, 2003. 6.
9 강푸름, 김귀남, "CCTV 영상자료 통합포털 구축모델에 관한 연구", 한국융합보안학회, Vol 12, No. 2, pp. 43-51, 2012. 5.
10 허승표, 이대성, 김귀남, "모바일 환경에서 OTP 기술과 얼굴인식 기술을 이용한 사용자 인증 개선에 관한 연구", 한국융합보안학회, Vol 11, No. 3, pp. 75-84, 2011. 6.