• Title/Summary/Keyword: 주체 기반 암호화

Search Result 19, Processing Time 0.02 seconds

Effective Access Control Mechanism for Protection of Sensitive Personal Information (민감한 개인정보 보호를 위한 효율적인 접근제어 기법)

  • Mun, Hyung-Jin;Kim, Ki-Soo;Um, Nam-Kyung;Li, Yong-Zhen;Lee, Sang-Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.7C
    • /
    • pp.667-673
    • /
    • 2007
  • In order to provide the efficient personalized services, the organizations and the companies collect and manage the personal information. The stored data have some slight differences among each subject. Even though the same attribute information leaks out, the personal privacy violation is different according to personal sensitivity. However, currently the organizations or the companies protect all the information as the same level. This paper reflects the sensitive attribute information of the information subject to each personal policy by the encrypting techniques. And then we propose a policy-based access control mechanism for the personal information which strictly prevents unauthorized information users from illegally accessing the personal information. In the proposed mechanism, the individuals' personal information which is encrypted with different keys is stored into the database. For the access control, information subjects set up their own access control policy for their sensitive personal information. Then it is possible to control the information access by providing the information to the information users according to personal and organizational privacy policy.

XML Encryption System on WIPI Environment (WIPI환경에서 XML문서 암호화시스템)

  • Hong, Hyeon-Woo;Lee, Jae-Seung;Lee, Seoung-Hyeon;Jung, Hoe-Kyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.9
    • /
    • pp.1694-1701
    • /
    • 2007
  • Recently The biggest three mobile telecommunication companies of our country still using independence wireless internet platform. And, It can so many difficulties to the phone company and content provide company. Such as the timing of the development or the fee of the development. Because even they develop one product and Hey must make it prepare for some platform of every mobile telecommunication companies. And this make the development more longer and more expensive. For this reason, SKT, LG telecom and KTF develop the new wireless internet platform named WIPI with ETRI. and the working is still go on and go ahead with propulsion. And if it come to reality, the WIPI will attached from much of attack such as hacking or virus. But some data exchange between mobile phone is so important as to flow. Thus, in this paper, we consideration the XML using in the wireless environment and we are design and implementation the XML encryption system working at the WIPI in order to protect the data, we want to protect.

The Certificate Processing of the user in the Instant Message Using PKI (PKI를 이용한 인스턴트 메신저에서의 사용자 인증 처리)

  • Park, Su-Young;Choi, Gwang-Mi;Jung, Chai-Yeoung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2005.11a
    • /
    • pp.1043-1046
    • /
    • 2005
  • 컴퓨터와 네트워크의 보급이 일반화되면서 인터넷을 통한 정보전달이 일상생활처럼 되고 있다. IDC 보고서에 따르면 2003년 전 세계적으로 1억 3천명 정도가 무료 메신저를 사용하고 있으며 이중 8천만 명 정도는 매일 메신저를 이용하고 있는 것으로 나타났고 메신저의 사용은 앞으로 점점 늘어날 것으로 전망된다. PKI를 사용한 암호화 기술은 인터넷에서 접근 통제, 인증, 기밀성, 무결성, 부인거절 등의 서비스들을 제공할 수 있는 공개키 기반 구조를 발달시켜왔다. 통신의 주체가 되는 각각의 클라이언트들 간의 통신과 Server와 Client의 통신에 있어 악의적인 침입에 의한 정보누출이 문제가 되고 있다. 본 논문에서는 이러한 문제의 해결방안으로 환경에 적합한 PKI(공개키 기반 구조)를 이용한 인증 시스템을 설계하였다.

  • PDF

Design of a Policy based Privacy Protection System using Encryption Techniques (암호기법을 이용한 정책기반 프라이버시보호시스템설계)

  • Mun Hyung-Jin;Li Yong-Zhen;Lee Dong-Heui;Lee Sang-Ho;Lee Keon-Myung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.2
    • /
    • pp.33-43
    • /
    • 2006
  • In order to provide the efficient personalized services, the organizations and the companies collect and manage the personal information. However, there have been increasing privacy concerns since the personal information might be misused and spread over in public by the database administrators or the information users. Even in the systems in which organizations or companies control access to personal information according to their access policy in order to protect personal information, it is not easy to fully reflect the information subjects' intention on the access control to their own Personal information. This paper proposes a policy-based access control mechanism for the personal information which prevents unauthorized information users from illegally accessing the personal information and enables the information subjects to control access over their own information. In the proposed mechanism, the individuals' personal information which is encrypted with different keys is stored into the directory repository. For the access control, information subjects set up their own access control policy for their personal information and the policies are used to provide legal information users with the access keys.

A Design and Implementation of Digital Contents Distribution System (디지털 컨텐츠 유통 시스템 설계 및 구현)

  • 정연정;윤기송;전경표;류재철
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2003.05a
    • /
    • pp.209-213
    • /
    • 2003
  • We have several kinds of DRM(Digital Rights Management) solutions which protect and control a content based on the cryptography. The current technology of DRM focuses on the content management in the purchaser. It doesn't consider the content management in the other principles like creator, provider, and distributor and doesn't provide the efficient environments of a content distribution. In this paper, we propose a digital content distribution system which processes a content and metadata with electronic copyright management.

  • PDF

Security Communication Module Design and Implementation in the DRM distribution system (DRM 유통시스템에서의 보안 통신 모듈 설계 및 구현)

  • Sung, Su-Lyun;Jung, In-Sung;Shin, Yong-Tae;Lee, Jun-Suk;Jung, Yon-Jung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2002.11b
    • /
    • pp.1139-1142
    • /
    • 2002
  • DRM(Digital Rights Management)은 디지털 컨텐츠를 암호화하여 인터넷상에서 안전한 거래를 보장하며, 저작권자의 권리를 보호하는 기술로, 디지털 컨텐츠 유통 문제점에 관한 해결방안을 제시하고 있다. 그러나, 현재 디지털 컨텐츠 유통 주체 상호간 인증을 바탕으로 한 비밀 통신, 통신의 무결성 등을 위한 보안통신은 제대로 이루어지지 않고 있다. 또한, SSL(Secure Socket Layer)은 현재 보안 통신 메커니즘으로 가장 널리 사용되며, PKI기반 암호 통신 메커니즘이기 때문에 안정성이 높게 평가된다. 이에 본 논문은 DRM 유통 시스템에서 보안 통신을 제공하기 위한 최적화된 SSL 모듈을 설계하며 구현을 목적으로 한다.

  • PDF

A Study of Security Threats and Countermeasures in loT Environment (IoT 환경에서 보안위협과 대응방안에 관한 연구)

  • Jung, Hyun-Joo;Lee, Keun-Ho
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2014.11a
    • /
    • pp.537-539
    • /
    • 2014
  • IoT (Internet of Things), 사물 인터넷은 인터넷을 기반으로 네트워크로 연결해 다양한 분야에서 사람과 사물, 사물과 사물 간의 정보를 공유하는 지능형 기술 및 서비스로 각 분석기관마다 2014년 10대 기술 중 하나로 꼽고 있다. 각국과 다수의 업체들이 사물인터넷 시장에 적극적으로 참여중이고, 관련 시장 규모도 급성장 할 것으로 전망하고 있다. 하지만 IoT의 빠른 발전과 함께 나타나는 것은 '보안'이라는 해결 과제이다. 실제로 IoT 사용에 따른 보안 위협이 발생하고 있다는 보고가 적지 않게 나오고 있고, IoT 환경의 보안은 아직 시작단계에 불과하다. IoT에서 발생하는 보안 위협의 형태의 대부분은 데이터 전송 그 자체에서 발생할 것이고, 데이터 전송에서 취약한 암호화나 인가되지 않은 주체로부터 접근, 보안이 취약한 네트워크 등에서 많은 보안 문제가 발생할 것이다. 본 논문에서는 IoT 기술의 개요와 IoT 환경에서의 보안위협에 대해 살펴보고 향후 연구의 방향을 제시하고자 한다.

GDPR Compliant Blockchain Based Access Control(GCBAC) (GDPR 준수 가능한 블록체인 기반 접근제어 시스템)

  • Lim, Joon Ho;Chun, Ji Young;Noh, Geontae;Jeong, Ik Rae
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.6
    • /
    • pp.981-997
    • /
    • 2020
  • Blockchain technology can provide a high level security based on a decentralized distributed ledger and consensus-based structure. In order to increase the utilization of blockchain technology, it is necessary to find a way to use it in fields that require personal data processing such as health care and e-commerce. To achieve this goal, the blockchain based system should be able to comply with data privacy regulations represented by European Union(EU)'s GDPR(General Data Protection Regulation). However, because of the properties of the blockchain like the immutability and decentralized recorded data, it is difficult to technically implement the requirements of the existing privacy regulations on the blockchain. In this paper, we propose a multi-chain based access control system that can guarantee the rights of the personal data subject required by GDPR by utilizing Chameleon Hash and Attribute Based Encryption (ABE). Finally, we will show through security analysis that our system can handle personal data while maintaining confidentiality and integrity.

Design of a Security System to Defeat Abnormal IPSec Traffic in IPv6 Networks (IPv6 환경에서 비정상 IPSec 트래픽 대응 보안 시스템 설계)

  • Kim Ka-Eul;Ko Kwang-Sun;Gyeong Gye-Hyeon;Kang Seong-Goo;Eom Young-Ik
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.4
    • /
    • pp.127-138
    • /
    • 2006
  • The IPSec is a basic security mechanism of the IPv6 protocol, which can guarantee an integrity and confidentiality of data that transmit between two corresponding hosts. Also, both data and communication subjects can be authenticated using the IPSec mechanism. However, it is difficult that the IPSec mechanism protects major important network from attacks which transmit mass abnormal IPSec traffic in session-configuration or communication phases. In this paper, we present a design of the security system that can effectively detect and defeat abnormal IPSec traffic, which is encrypted by the ESP extension header, using the IPSec Session and Configuration table without any decryption. This security system is closely based on a multi-tier attack mitigation mechanism which is based on network bandwidth management and aims to counteract DDoS attacks and DoS effects of worm activity.