• Title/Summary/Keyword: 클라우드 보안

Search Result 618, Processing Time 0.03 seconds

An efficient user authentication protocol for cloud computing environments (클라우드 컴퓨팅 환경에서 효과적인 사용자 인증 프로토콜)

  • Moon, Jeong-Kyung;Kim, Jin-Mook;Kim, Hwang-Rae
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.12 no.5
    • /
    • pp.2353-2359
    • /
    • 2011
  • The request of Green-IT technology and recommend of computer hardware resource are increasing explosively. So, necessity of Cloud computing is increasing rapidly. Berkeley Univ. announced teens constituent that threat Cloud computing in 2009 and problem for user authentication should be solved as is urgentest among them. So, We wish to propose effective user authentication protocol in Cloud computing environment. Secure safety for user quotation through Kerberos's ticket issue that is existent representative user authentication techniques, and defined authentication procedure of two steps that flow user authentication and service authentication through PKI's. Is uncomplicated structurally more than efficiency for certification protocol and examination result about safety, existent PKI that propose and simplify achievement procedure and system configuration more than Kerberos and reduced response time.

A Study on the Secure Database Controlled Under Cloud Environment (클라우드 환경하에서의 안전한 데이터베이스 구축에 관한 연구)

  • Kim, SungYong;Kim, Ji-Hong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.6
    • /
    • pp.1259-1266
    • /
    • 2013
  • Nowadays, the databases are getting larger and larger. As the company has difficulty in managing the database, they want to outsource the database to the cloud system. In this case the database security is more important because their database is managed by the cloud service provider. Among database security techniques, the encryption method is a well-certified and established technology for protecting sensitive data. However, once encrypted, the data can no longer be easily queried. The performance of the database depends on how to encrypt the sensitive data, and on the approach for searching, and the retrieval efficiency that is implemented. In this paper we propose the new suitable mechanism to encrypt the database and lookup process on the encrypted database under control of the cloud service provider. This database encryption algorithm uses the bloom filter with the variable keyword based index. Finally, we demonstrate that the proposed algorithm should be useful for database encryption related research and application activities.

A Novel Auditing System for Dynamic Data Integrity in Cloud Computing (클라우드 컴퓨팅에서 동적 데이터 무결성을 위한 개선된 감사 시스템)

  • Kim, Tae-yeon;Cho, Gi-hwan
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.8
    • /
    • pp.1818-1824
    • /
    • 2015
  • Cloud computing draws attention as an application to provide dynamically scalable infrastructure for application, data and file storage. An untrusted remote server can cause a variety of problems in the field of data protection. It may process intentionally or involuntarily user's data operations(modify, insert, delete) without user's permission. It may provide false information in order to hide his mistakes in the auditing process. Therefore, it is necessary to audit the integrity of data stored in the cloud server. In this paper, we propose a new data auditing system that can verify whether servers had a malicious behavior or not. Performance and security analysis have proven that our scheme is suitable for cloud computing environments in terms of performance and security aspects.

Efficient Security Method Using Mobile Virtualization Technology And Trustzone of ARM (모바일 가상화 기술과 ARM의 Trustzone을 사용한 효율적인 보안 방법)

  • Choi, Hwi-Min;Jang, Chang-Bok;Kim, Joo-Man
    • Journal of Digital Convergence
    • /
    • v.12 no.10
    • /
    • pp.299-308
    • /
    • 2014
  • Today, a number of users using smartphone is very rapidly increasing by development of smartphone performance and providing various services. Also, they are using it for enjoying various services(cloud service, game, banking service, mobile office, etc.). today's mobile security solution is simply to detect malicious code or stay on the level of mobile device management. In particular, the services which use sensitive information, such as certificate, corporation document, personal credit card number, need the technology which are prevented from hacking and leaking it. Recently, interest of these mobile security problems are increasing, as the damage cases been occurred. To solve the problem, there is various security research such as mobile virtualization, ARM trustzone, GlobalPlatform for mobile device. Therefore, in this paper, I suggested efficient method that uses the mobile virtualization techniques of certification, security policy and access control, password/key management, safe storage, etc. and Trustzone of ARM for preventing information leakage and hacking.

Improving the Security Policy Based on Data Value for Defense Innovation with Science and Technology (과학기술 중심 국방혁신을 위한 데이터 가치 기반 보안정책 발전 방향)

  • Heungsoon Park
    • Convergence Security Journal
    • /
    • v.23 no.1
    • /
    • pp.109-115
    • /
    • 2023
  • The future outlook for defense faces various and challenging environments such as the acceleration of uncertainty in the global security landscape and limitations in domestic social and economic conditions. In response, the Ministry of National Defense seeks to address the problems and threats through defense innovation based on scientific and technological advancements such as artificial intelligence, drones, and robots. To introduce advanced AI-based technology, it is essential to integrate and utilize data on IT environments such as cloud and 5G. However, existing traditional security policies face difficulties in data sharing and utilization due to mainly system-oriented security policies and uniform security measures. This study proposes a paradigm shift to a data value-based security policy based on theoretical background on data valuation and life-cycle management. Through this, it is expected to facilitate the implementation of scientific and technological innovations for national defense based on data-based task activation and new technology introduction.

Global Trends on Information Security Industry (정보보호산업의 글로벌 동향 -시장, 정책, 법 규제를 중심으로)

  • Kim, P.R.;Hong, J.P.;Koh, S.J.
    • Electronics and Telecommunications Trends
    • /
    • v.30 no.2
    • /
    • pp.68-78
    • /
    • 2015
  • 최근 들어 클라우드, 소셜네트워크, 빅데이터 등 보안시장에 영향을 미칠 수 있는 새로운 성장동력원이 등장하면서 정보보호산업이 급격히 진화하고 있다. 본고에서는 정보보호산업의 국내외 시장 전망과 주요국의 정보보호정책을 개관한 후, 최근 주요 선진국을 중심으로 이슈화되고 있는 IoT 정보보호 관련 법 규제 동향을 살펴보았다. 본 분석을 통하여 국내 정보보호산업을 육성하기 위해서는 제품시장도 중요하지만, 상대적으로 부가가치가 높은 서비스시장에 보다 중점을 둔 시장육성 전략이 요구된다는 점과 기존의 정보보호법을 사물인터넷에 적용하기 위한 대책을 서둘러야 한다는 시사점을 얻을 수 있었다.

  • PDF

SDN에서 데이터 경로 설계에 대한 고려 사항

  • Yun, Hyeon-Sik;Gang, Gyeong-Sun;Kim, Hak-Seo;Park, Hye-Suk
    • Information and Communications Magazine
    • /
    • v.30 no.3
    • /
    • pp.22-28
    • /
    • 2013
  • 오늘날 미래인터넷 기술의 하나로서 SDN이 클라우드 서비스, 모바일 서비스, 스마트 TV, 빅데이터 및 사물지능통신 등의 새로운 서비스를 제공할 수 있는 개방형 플랫폼으로 주목받고 있다. 본고에서는 이러한 SDN 망을 구축함에 있어서 제어 인터페이스, QoS, 멀티캐스트, 이동성 및 네트워크 보안 측면에서 고려해야 할 사항들을 살펴본다. 기존 네트워크의 근본적인 문제점으로 인해 발생한 복잡성 및 성능 저하 요인들이 SDN의 장점을 활용하여 해결될 수 있으며, 이에 본고에서 제시된 고려 사항들이 큰 역할을 할 것이다.

정보보호관리 패러다임 변화에 따른 주요 이슈와 미래 전략

  • Kim, Jungduk
    • Review of KIISC
    • /
    • v.23 no.5
    • /
    • pp.5-8
    • /
    • 2013
  • 모바일, 클라우드, BYOD 등 새로운 IT 환경으로의 변화로 인해 기존의 정보보호 접근방법의 효과성에 대해 의문이 대두되고 있다. 침입차단시스템, 안티 바이러스 등 알려진 침입패턴에 근거한 기술적 대책 중심의 접근방법으로는 복잡하고 지능화되어가는 최근의 공격에 효과적으로 대응하기에는 태생적 한계를 가지고 있다. 또한 가중되는 보안대책으로 인해 창의적인 업무 수행을 방해하고 사용자의 자율성을 감소시키는 부작용도 초래하고 있다. 따라서 새로운 환경변화에 효과적으로 대처하고 지속가능한 정보보호관리 프로그램을 수립하기 위해서는 새로운 패러다임의 도입이 필요하다고 할 수 있다. 본 고에서는 가트너에서 제시한 일련의 혁신적인 정보보호 접근방법을 소개함으로써 새로운 패러다임을 제시하고 이에 기반한 새로운 정보보호관리 프로그램 구성요소와 이의 구현을 위한 로드맵을 제시한다.

A Study of the Management for Enterprise Systems on Cloud Environment (기업 시스템 관리를 위한 클라우드 환경에서의 연구)

  • Park, Hyun jin;Lee, Sin jae
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2015.04a
    • /
    • pp.22-25
    • /
    • 2015
  • IT 기술의 발전과 변화에 따라 기업에서는 기업용 시스템 관리를 위하여 가상화 컴퓨팅 시스템을 도입을 추진 중이며 비용 절감 및 보안 이슈들을 검토하기를 앞다투고 있다. 따라서 본 논문에서는 가상화 기술의 종류 및 방법들을 연구하여 보고 사례 분석 등을 통하여 기업 시스템 관리를 위한 폐쇄적 가상화 컴퓨팅 시스템 기술의 방법을 제시해보며 효과 분석을 도출해본다.

A Method for Data Access Control and Key Management in Mobile Cloud Storage Services (모바일 클라우드 스토리지 서비스에서의 데이터 보안을 위한 데이터 접근 제어 및 보안 키 관리 기법)

  • Shin, Jaebok;Kim, Yungu;Park, Wooram;Park, Chanik
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.8 no.6
    • /
    • pp.303-309
    • /
    • 2013
  • Cloud storage services are used for efficient sharing or synchronizing of user's data across multiple mobile devices. Although cloud storages provide flexibility and scalability in storing data, security issues should be handled. Currently, typical cloud storage services offer data encryption for security purpose but we think such method is not secure enough because managing encryption keys by software and identifying users by simple ID and password are main defectives of current cloud storage services. We propose a secure data access method to cloud storage in mobile environment. Our framework supports hardware-based key management, attestation on the client software integrity, and secure key sharing across the multiple devices. We implemented our prototype using ARM TrustZone and TPM Emulator which is running on secure world of the TrustZone environment.