• Title/Summary/Keyword: 트러스트

Search Result 115, Processing Time 0.023 seconds

FIDO Platform of Passwordless Users based on Multiple Biometrics for Secondary Authentication (암호 없는 사용자의 2차 인증용 복합생체 기반의 FIDO 플랫폼)

  • Kang, Min-goo
    • Journal of Internet Computing and Services
    • /
    • v.23 no.4
    • /
    • pp.65-72
    • /
    • 2022
  • In this paper, a zero trust-based complex biometric authentication was proposed in a passwordless environment. The linkage of FIDO 2.0 (Fast IDENTITY Online) transaction authentication platforms was designed in conjunction with metaverse. In particular, it was applied with the location information of a smart terminal according to a geomagnetic sensor, an accelerator sensor, and biometric information for multi-factor authentication(MFA). At this time, a FIDO transaction authentication platform was presented for adaptive complex authentication with user's environment through complex authentication with secondary authentication based on situational awareness such as illuminance and temperature/humidity. As a result, it is possible to authenticate secondary users based on zero trust with behavior patterns such as fingerprint recognition, iris recognition, face recognition, and voice according to the environment. In addition, it is intended to check the linkage result of the FIDO platform for complex integrated authentication and improve the authentication accuracy of the linkage platform for transaction authentication using FIDO2.0.

A Study on a Smart City Supply Chain Security Model Based on Zero-Trust (제로 트러스트(Zero-Trust) 기반의 스마트시티 공급망 보안모델 연구)

  • Lee, Hyun-jin;Son, Kyung-ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.1
    • /
    • pp.123-140
    • /
    • 2022
  • Recently, research on solving problems that have introduced the concept of smart city in countries and companies around the world is in progress due to various urban problems. A smart city converges the city's ICT, connects all the city's components with a network, collects and delivers data, and consists of a supply chain composed of various IoT products and services. The increase in various cyber security threats and supply chain threats in smart cities is inevitable, in addition to establishing a framework such as supply chain security policy, authentication of each data provider and service according to data linkage and appropriate access control are required in a Zero-Trust point of view. To this end, a smart city security model has been developed for smart city security threats in Korea, but security requirements related to supply chain security and zero trust are insufficient. This paper examines overseas smart city security trends, presents international standard security requirements related to ISMS-P and supply chain security, as well as security requirements for applying zero trust related technologies to domestic smart city security models.

A Study on How to Build a Zero Trust Security Model (제로 트러스트 보안모델 구축 방안에 대한 연구)

  • Jin Yong Lee;Byoung Hoon Choi;Namhyun Koh;Samhyun Chun
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.12 no.6
    • /
    • pp.189-196
    • /
    • 2023
  • Today, in the era of the 4th industrial revolution based on the paradigm of hyper-connectivity, super-intelligence, and superconvergence, the remote work environment is becoming central based on technologies such as mobile, cloud, and big data. This remote work environment has been accelerated by the demand for non-face-to-face due to COVID-19. Since the remote work environment can perform various tasks by accessing services and resources anytime and anywhere, it has increased work efficiency, but has caused a problem of incapacitating the traditional boundary-based network security model by making the internal and external boundaries ambiguous. In this paper, we propse a method to improve the limitations of the traditional boundary-oriented security strategy by building a security model centered on core components and their relationships based on the zero trust idea that all actions that occur in the network beyond the concept of the boundary are not trusted.

Study on Methodology of Collecting Realtime File Access Event Information (실시간 파일 접근 이벤트 정보 수집 방법에 관한 연구)

  • Han, Sung-Hwa
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.10a
    • /
    • pp.447-448
    • /
    • 2021
  • The boundary-based security architecture has the advantage of easy deployment of security solutions and high operational efficiency. The boundary-based security architecture is easy to detect and block externally occurring security threats, but is inappropriate to block internally occurring security threats. Unfortunately, internal security threats are increasing in frequency. In order to solve this problem, a zero trust model has been proposed. The zero trust model requires a real-time monitoring function to analyze the behavior of a subject accessing various information resources. However, there is a limit to real-time monitoring of file access of a subject confirmed to be trusted in the system. Accordingly, this study proposes a method to monitor user's file access in real time. To verify the effectiveness of the proposed monitoring method, the target function was verified after the demonstration implementation. As a result, it was confirmed that the method proposed in this study can monitor access to files in real time.

  • PDF

Optimum Design of Grid Structures with Pretension (초기인장력을 받은 그리드 구조물의 최적설계)

  • Kim, Dae-Hwan;Lee, Jae-Hong
    • Journal of Korean Association for Spatial Structures
    • /
    • v.11 no.1
    • /
    • pp.77-85
    • /
    • 2011
  • In this study, micro genetic algorithm is used to find an optimum cross section of grid structures with pretension. Design optimization of trusses consists of arriving at optimum sizes of cross-section and prestressing force parameters, when weight of the truss is minimum, satisfying a set of specified constraints. The present approach is verified by ten-bar truss example showing good agreements with previous results. Features of the proposed method, which help in modeling and application to optimal design of pretensioned truss structures, are demonstrated by solving a problem of seventy two bar truss structures. The minimum weight design of seventy two bar truss is performed for various magnitudes of pretension and optimal prestressing forces are also found for various configurations of pretensioned truss structures.

Dynamic Characteristics of a Coupled Journal and Thrust Hydrodynamic Bearing in a HDD Spindle System Due to Groove Location (HDD 스핀들 시스템에 사용되는 저널과 트러스트가 결합된 유체 동압 베어링의 홈 위치에 따른 동특성 해석)

  • 윤진욱;장건희
    • Proceedings of the Korean Society for Noise and Vibration Engineering Conference
    • /
    • 2001.11a
    • /
    • pp.304-311
    • /
    • 2001
  • This research numerically analyzes the dynamic characteristics of a coupled journal and thrust hydrodynamic bearing due to its groove location which has the static load due to the weight of a rotor in the axial direction and the dynamic load due to its mass unbalance in the radial direction. The Reynolds equation is transformed to solve a plain member rotating type of journal bearing(PMRJ), a grooved member rotating type of journal bearing (GMRJ), a plain member rotating type of thrust bearing (PMRT) and a grooved member rotating type of thrust bearing (GMRT). FEM is used to solve the Reynolds equations in order to calculate the pressure distribution in a fluid film. Reaction forces and friction torque are obtained by integrating the pressure and shear stress along the fluid film, respectively. Dynamic behaviors, such as whirl radius or floating height of a rotor, are determined by solving its nonlinear equations of motion with the Runge-Kutta method. This research shows that the groove location affects the pressure distribution in the fluid film and consequently the dynamic performance of a HDD spindle system.

  • PDF

A Study on Establishing 'Social Media Committee' Based on the Social Trust (소셜트러스트 기반의 소셜미디어 전담기구('소셜미디어위원회') 설립 방안 연구)

  • Moon, Hyung-Nam
    • Journal of Digital Convergence
    • /
    • v.10 no.7
    • /
    • pp.41-58
    • /
    • 2012
  • Although the social media plays leading role in the change the political, economic, social and cultural environment in all fields, it is not really understanded the overall management of social media in society. With understandings on the influence of social media, the purpose of this study is to investigate the characteristics of social media and to provide some suggestion to make use effectively of social media in society. To achieve th purpose of this study, the responsibility and the effort of government was examined. As a result, the Social Media Strategy Broad (tentative title 'Social Media Committee') suggests to protection of the users' rights and active support of the current utilization. This study is expected to show the meaningful implication of social media strategy and standard of the social media utilization in policy, education etc.

Design and Forensic Analysis of a Zero Trust Model for Amazon S3 (Amazon S3 제로 트러스트 모델 설계 및 포렌식 분석)

  • Kyeong-Hyun Cho;Jae-Han Cho;Hyeon-Woo Lee;Jiyeon Kim
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.2
    • /
    • pp.295-303
    • /
    • 2023
  • As the cloud computing market grows, a variety of cloud services are now reliably delivered. Administrative agencies and public institutions of South Korea are transferring all their information systems to cloud systems. It is essential to develop security solutions in advance in order to safely operate cloud services, as protecting cloud services from misuse and malicious access by insiders and outsiders over the Internet is challenging. In this paper, we propose a zero trust model for cloud storage services that store sensitive data. We then verify the effectiveness of the proposed model by operating a cloud storage service. Memory, web, and network forensics are also performed to track access and usage of cloud users depending on the adoption of the zero trust model. As a cloud storage service, we use Amazon S3(Simple Storage Service) and deploy zero trust techniques such as access control lists and key management systems. In order to consider the different types of access to S3, furthermore, we generate service requests inside and outside AWS(Amazon Web Services) and then analyze the results of the zero trust techniques depending on the location of the service request.