• Title/Summary/Keyword: 데이터베이스 암호화

Search Result 110, Processing Time 0.035 seconds

Design and Implementation of the Extended DNS Security Mechanism (확장된 DNS 보안 메커니즘의 설계 및 구현)

  • Sim, Hui-Won;Kim, Jin-Seong;Sim, Yeong-Cheol;Im, Chan-Sun;Byeon, Ok-Hwan
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.1
    • /
    • pp.134-147
    • /
    • 1999
  • The DNS provides naming services which are the basis for the application of the Internet and the security of the DNS should be provided for the security of the Internet. Recently IETF proposed a method which guarantees the integrity of DNS database contents and DNS queries/replies and distributes host public keys. In this paper we describe the design and implementation of the secure DNS which is built based on the IETF proposal and extended to facilitate its sue and management. In the extended secure DNS, DNS servers are used ad the directory system in a public key infrastructure and stores/distributes user public key certificates. The Web-based management interface and security log functions are added and the extended secure DNS is being built so that new cryptographic algorithms can be easily added.

  • PDF

Group key management protocol adopt to cloud computing environment (클라우드 컴퓨팅 환경에 적합한 그룹 키 관리 프로토콜)

  • Kim, Yong-Tae;Park, Gil-Cheol
    • Journal of Digital Convergence
    • /
    • v.12 no.3
    • /
    • pp.237-242
    • /
    • 2014
  • Recently, wind energy is expanding to combination of computing to forecast of wind power generation as well as intelligent of wind powerturbine. Wind power is rise and fall depending on weather conditions and difficult to predict the output for efficient power production. Wind power is need to reliably linked technology in order to efficient power generation. In this paper, distributed power generation forecasts to enhance the predicted and actual power generation in order to minimize the difference between the power of distributed power short-term prediction model is designed. The proposed model for prediction of short-term combining the physical models and statistical models were produced in a physical model of the predicted value predicted by the lattice points within the branch prediction to extract the value of a physical model by applying the estimated value of a statistical model for estimating power generation final gas phase produces a predicted value. Also, the proposed model in real-time National Weather Service forecast for medium-term and real-time observations used as input data to perform the short-term prediction models.

Design of a Policy based Privacy Protection System using Encryption Techniques (암호기법을 이용한 정책기반 프라이버시보호시스템설계)

  • Mun Hyung-Jin;Li Yong-Zhen;Lee Dong-Heui;Lee Sang-Ho;Lee Keon-Myung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.2
    • /
    • pp.33-43
    • /
    • 2006
  • In order to provide the efficient personalized services, the organizations and the companies collect and manage the personal information. However, there have been increasing privacy concerns since the personal information might be misused and spread over in public by the database administrators or the information users. Even in the systems in which organizations or companies control access to personal information according to their access policy in order to protect personal information, it is not easy to fully reflect the information subjects' intention on the access control to their own Personal information. This paper proposes a policy-based access control mechanism for the personal information which prevents unauthorized information users from illegally accessing the personal information and enables the information subjects to control access over their own information. In the proposed mechanism, the individuals' personal information which is encrypted with different keys is stored into the directory repository. For the access control, information subjects set up their own access control policy for their personal information and the policies are used to provide legal information users with the access keys.

A Defense Mechanism Against Attacks on Files by Hiding Files (파일 은닉을 통한 파일 대상 공격 방어 기법)

  • Choi, Jione;Lee, Junghee;Lee, Gyuho;Yu, Jaegwan;Park, Aran
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.27 no.2
    • /
    • pp.1-10
    • /
    • 2022
  • Deception technology is an extended concept of honeypot, which detects, prevents or delays attacks by deceiving adversaries. It has been applied to various system components such as network ports, services, processes, system calls and database management systems. We can apply the same concept to attacks on files. A representative example of a file attack is ransomware. Ransomware is a type of malware that encrypts user files and ask for ransom to recover those files. Another example is the wiper attack, which erases all or target files of a system. In this paper we propose a defense mechanism against these kinds of attacks by hiding files. Compared to backup or virtualization techniques, the proposed method incurs less space and performance overheads.

A Design and Implementation of Local Festivals and Travel Information Service Application

  • Jae Hyun Ahn;Hang Ju Lee;Se Yeon Lee;Ji Won Han;Won Joo Lee
    • Journal of the Korea Society of Computer and Information
    • /
    • v.28 no.11
    • /
    • pp.65-71
    • /
    • 2023
  • In this paper, we design and implement the Walking Life Festival application, which is based on the Android platform and provides information about domestic travel destinations and regional festivals in South Korea. This application utilizes various sensors found in smartphones, including the Step Counter sensor, Step Detector sensor, Acceleration sensor, and GPS sensor. Additionally, it makes use of Google Map API and Public Open API to offer information about domestic travel destinations and local festivals. The application also incorporates an automatic login feature using the Shared Preference API. When storing login information in the database, it encrypts the input plaintext data using a hash algorithm. For Google Maps integration, it creates objects using the Google.maps.LatLngBounds() method and extends the location information through the extends method. Furthermore, this application contributes to the activation of the domestic tourism industry by notifying users about the timing of local festivals related to domestic travel destinations, thus increasing their opportunities to participate in these festivals.

Implementation of Alcohol Concentration Data Measurement and Management System (알코올 측정 데이터 수집 및 관리시스템 구현)

  • Ki-Young Kim
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.16 no.6
    • /
    • pp.540-546
    • /
    • 2023
  • The scope of IoT use has expanded due to the development of related technologies, and various sensors have been developed and distributed to meet the demand for implementing various services. Measuring alcohol concentration using a sensor can be used to prevent drunk driving, and to make this possible, accurate alcohol concentration must be measured and safe transmission from the smartphone to the server must be guaranteed. Additionally, a process of converting the measured alcohol concentration value into a standard value for determining the level of drinking is necessary. In this paper, we propose and implement a system. Security with remote servers applies SSL at the network layer to ensure data integrity and confidentiality, and the server encrypts the received information and stores it in the database to provide additional security. As a result of analyzing the accuracy of alcohol concentration measurement and communication efficiency, it was confirmed that the measurement and transmission were within the error tolerance.

Isolation and Characterization of Two Methyltransferase Genes, AfuvipB and AfuvipC in Aspergillus fumigatus (Aspergillus fumigatus에서 Methyltransferase 유전자 AfuvipB와 AfuvipC의 분리 및 분석)

  • Elgabbar, Mohammed A. Abdo;Han, Kap-Hoon
    • The Korean Journal of Mycology
    • /
    • v.43 no.1
    • /
    • pp.33-39
    • /
    • 2015
  • In filamentous fungi, velvet complex associated with the veA gene plays pivotal roles in development and secondary metabolism. In a model fungus Aspergillus nidulans, many proteins that can interact with VeA, including two methyltransferases VipB and VipC, have been isolated and characterized. In this study, we isolated homologs of the vipB and vipC genes in the human opportunistic pathogenic fungus Aspergillus fumigatus and named AfuvipB and AfuvipC. The AfuvipB gene, annotated as Afu3g14920 in the Aspergillus Genome Database (AspGD) database, consists of 1,510 bp interrupted with 10 introns yielding 336 amino acid-long putative methyltransferase protein. Similarly, AfuvipC, which is Afu8g01930, has 10 introns and encodes a polypeptide with 339 amino acids having a methyltransferase domain in the middle of the protein. To characterize the function of the genes in A. fumigatus, knock-out mutants were generated and the phenotypes were observed. Deletion of AfuvipB gene caused no obvious phenotypic change on point inoculation but showed smaller colony than wild-type when the mutant was subjected to culture on single spore-driven culture condition. However, AfuvipC deletion mutant demonstrated no phenotypic difference from wild type both in point inoculation and streaking cultures. These results indicate that the two methyltransfereases might have a redundant role and could be dispensable in normal culture conditions.

A Novel PHKA1 Mutation in a Patient with Glycogen Storage Disease Type IXD (당원 축적병 9D (GSD9D) 환자의 신규 PHKA1 돌연변이)

  • Kim, Hye Jin;Nam, Soo Hyun;Kim, Sang Beom;Chung, Ki Wha;Choi, Byung-Ok
    • Journal of Life Science
    • /
    • v.30 no.8
    • /
    • pp.672-679
    • /
    • 2020
  • Distal myopathy is a clinically and genetically heterogeneous group of degenerative diseases of the distal muscle. Glycogen storage disease type IXD (GSD9D) is a metabolic distal myopathy characterized by muscle deficiency of phosphorylase kinase, a key regulatory enzyme in glycogen metabolism. Affected individuals may develop muscle weakness, degeneration, and cramps, as well as abnormal muscle pain and stiffness after exercise. It has been reported that mutations in the PHKA1 gene which encodes the alpha subunit of muscle phosphorylase kinase cause GSD9D. In this study, we examined a Korean GSD9D family with a c.3314T>C (p.I1105T) mutation in the PHKA1 gene. This mutation has not been previously reported in any mutation database nor was it found in 500 healthy controls. The mutation region is well conserved in various other species, and in silico analysis predicts that it is likely to be pathogenic. To date, only seven mutations in the PHKA1 gene have been documented, and this is the first report of Korean GSD9D patients. This study also describes and compares the clinical symptoms and pathological conditions of previously reported cases and these Korean patients. We believe that our findings will be useful for the molecular diagnosis of GSD9D.

Survey of Genes Responsive to Long-Term Heat Stress Using a cDNA Microarray Analysis in Mud Loach (Misgurnus mizolepis) Liver (장기 고온 스트레스에 대한 미꾸라지(Misgurnus mizolepis) 간 조직 내 유전자 발현 반응의 cDNA microarray 분석)

  • Cho, Young Sun;Lee, Sang Yoon;Noh, Choong Hwan;Nam, Yoon Kwon;Kim, Dong Soo
    • Korean Journal of Ichthyology
    • /
    • v.18 no.2
    • /
    • pp.65-77
    • /
    • 2006
  • Gene transcripts potentially responsive to the heat stress were surveyed by cDNA microarray analysis in mud loach (Misgurnus mizolepis). Transcriptional profiles of hepatic tissue in the fish exposed to either $23^{\circ}C$ or $32^{\circ}C$ for 4 weeks were compared each other by 3 replicated hybridization assays using 1,124 unigene clones selected from mud loach liver expressed sequence tags (ESTs). A total of 93 clones showed the substantially increased mRNA levels (>2-fold) in $32^{\circ}C$-exposed group when compared in $23^{\circ}C$control group. It includes various enzymes and proteins involved in energy pathway, protease/protein metabolisms, immune/antioxidant functions, cytoskeleton/cell structure, transport and/or signal transduction. Maximum level of increase was up to 15-fold relative to $23^{\circ}C$ treatment. Heat exposure also resulted in the significant decrease (less than 50% relative to $23^{\circ}C$-exposed fish) of the transcriptional activities in 85 genes. Besides the above categories, yolk protein (vitellogenin) and ribosomal proteins were notably down regulated in the fish exposed to heat stress. A number of novel gene transcripts were also detected in both up-regulated and down-regulated groups.

A Performance Comparison of the Mobile Agent Model with the Client-Server Model under Security Conditions (보안 서비스를 고려한 이동 에이전트 모델과 클라이언트-서버 모델의 성능 비교)

  • Han, Seung-Wan;Jeong, Ki-Moon;Park, Seung-Bae;Lim, Hyeong-Seok
    • Journal of KIISE:Information Networking
    • /
    • v.29 no.3
    • /
    • pp.286-298
    • /
    • 2002
  • The Remote Procedure Call(RPC) has been traditionally used for Inter Process Communication(IPC) among precesses in distributed computing environment. As distributed applications have been complicated more and more, the Mobile Agent paradigm for IPC is emerged. Because there are some paradigms for IPC, researches to evaluate and compare the performance of each paradigm are issued recently. But the performance models used in the previous research did not reflect real distributed computing environment correctly, because they did not consider the evacuation elements for providing security services. Since real distributed environment is open, it is very vulnerable to a variety of attacks. In order to execute applications securely in distributed computing environment, security services which protect applications and information against the attacks must be considered. In this paper, we evaluate and compare the performance of the Remote Procedure Call with that of the Mobile Agent in IPC paradigms. We examine security services to execute applications securely, and propose new performance models considering those services. We design performance models, which describe information retrieval system through N database services, using Petri Net. We compare the performance of two paradigms by assigning numerical values to parameters and measuring the execution time of two paradigms. In this paper, the comparison of two performance models with security services for secure communication shows the results that the execution time of the Remote Procedure Call performance model is sharply increased because of many communications with the high cryptography mechanism between hosts, and that the execution time of the Mobile Agent model is gradually increased because the Mobile Agent paradigm can reduce the quantity of the communications between hosts.