• Title/Summary/Keyword: Attribute change key

Search Result 15, Processing Time 0.025 seconds

Sharing and Privacy in PHRs: Efficient Policy Hiding and Update Attribute-based Encryption

  • Liu, Zhenhua;Ji, Jiaqi;Yin, Fangfang;Wang, Baocang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.1
    • /
    • pp.323-342
    • /
    • 2021
  • Personal health records (PHRs) is an electronic medical system that enables patients to acquire, manage and share their health data. Nevertheless, data confidentiality and user privacy in PHRs have not been handled completely. As a fine-grained access control over health data, ciphertext-policy attribute-based encryption (CP-ABE) has an ability to guarantee data confidentiality. However, existing CP-ABE solutions for PHRs are facing some new challenges in access control, such as policy privacy disclosure and dynamic policy update. In terms of addressing these problems, we propose a privacy protection and dynamic share system (PPADS) based on CP-ABE for PHRs, which supports full policy hiding and flexible access control. In the system, attribute information of access policy is fully hidden by attribute bloom filter. Moreover, data user produces a transforming key for the PHRs Cloud to change access policy dynamically. Furthermore, relied on security analysis, PPADS is selectively secure under standard model. Finally, the performance comparisons and simulation results demonstrate that PPADS is suitable for PHRs.

ECC-based IPTV Service Key Establishment Protocol With User Attribute (사용자 속성을 이용한 ECC 기반의 IPTV 서비스 키 설립 프로토콜)

  • Jeong, Yoon-Su;Shin, Seung-Soo
    • Journal of Digital Convergence
    • /
    • v.10 no.3
    • /
    • pp.105-111
    • /
    • 2012
  • Internet Protocol Television (IPTV) through broadband cable network is a subscriber-based system which consists of software and set-top box. However, a weakness for the current IPTV system is the lack of security between users and CAS. This paper proposes a user authentication protocol at STB, which limits the service by the user-valued attribute to prevent illegal IPTV users. User attribute values change the order with bit form according to the certain rule, and apply to one-way hash function and Diffie-Hellman's elliptic curve key-exchange algorithm. The proposed protocol is able to improve on user authentication and computation. Also, each user generates an authentication message by smart card and receives various services based on the user-valued attribute.

A Study of a Secure Smart Car System using Attribute-based Delegation Method (속성 기반 권한위임 관리 기법을 사용한 스마트 자동차 안전성 검토에 관한 연구)

  • Kim, Jin-Mook;Moon, Jeong-Kyung;Hwang, Deuk-Young
    • Convergence Security Journal
    • /
    • v.19 no.3
    • /
    • pp.71-79
    • /
    • 2019
  • The demand of smart cars is increasing rapidly. International stand organize such as 3GPP and 5GAA are proposing standard communication protocvols for connected-car, and automotive network infrastructure. But Smart car network have many security threats and more dangerous against the existed wire communication network. Typically, peripheral devices of a smart car may disguise their identity and steal location information and personal information about the vehicle. In addition, the infrastructure elements around smart cars can conspire and put driving cars in danger, threatening lives. This is a very serious security threat. Therefore, in order to solve these problems, we proposed a system that is secure from collusion and tampering attacks using attribute-based authorize delegation method and threshold encryption algorithms. We have demonstrated using a semantic safety model that the proposed system can be safe from collusion attack.

The Composite in Train Exterior & Interior Design (복합소재 철도차량의 실내외 디자인 연구)

  • Han Suk Woo;Jin Mi ja;Cho Se Hyun;Lee Seung Chul
    • Proceedings of the Korean Society For Composite Materials Conference
    • /
    • 2004.04a
    • /
    • pp.59-62
    • /
    • 2004
  • According to the change of industry structure, design is the key element to accelerate enhance the value of railway industry as they core competence factors for productive and superiority its level. It is important utilizing materials to embody new train aesthetics and build high technologies. Consequently, apply properties of composite with design formative attribute also functional usability and technology system.

  • PDF

UCQM: A Quality Model for Practical Evaluation of Ubiquitous Computing Systems (유비쿼터스 컴퓨팅 시스템의 실용적 품질 평가 모델)

  • Oh, Sang-Hun;Kim, Soo-Dong;Rhew, Sung-Yul
    • Journal of KIISE:Software and Applications
    • /
    • v.34 no.4
    • /
    • pp.342-358
    • /
    • 2007
  • Ubiquitous Computing System (UCS) is a system where the user can get information through computer network anytime and anywhere regardless of the places. Since UCS is a personalized system, it should interact with other systems. UCS will bring a remarkable change in production, consumption, politics, economy, community, culture, and other areas related to our daily life. That is, a high-quality UCS results in high-quality services provided to users. Hence, this paper proposes a systematic quality model based on ISO/lEC 9126 in order to evaluate the ubiquitous computing system, based on ISO/lEC 9126. And, we identify key characteristics of UCS and derive the set of quality attributes based on identified characteristics. We define metrics for each quality attribute and Ubiquitous Computing Quality Model CUCQM) so that we can evaluate overall environment and important characteristics of UCS.

A large eddy simulation on the effect of buildings on urban flows

  • Zhang, Ning;Jiang, Weimei;Miao, Shiguang
    • Wind and Structures
    • /
    • v.9 no.1
    • /
    • pp.23-35
    • /
    • 2006
  • The effect of buildings on flow in urban canopy is one of the most important problems in local/micro-scale meteorology. A large eddy simulation model is used to simulate the flow structure in an urban neighborhood and the bulk effect of the buildings on surrounding flows is analyzed. The results demonstrate that: (a) The inflow conditions affect the detailed flow characteristics much in the building group, including: the distortion or disappearance of the wake vortexes, the change of funneling effect area and the change of location, size of the static-wind area. (b) The bulk effect of the buildings leads to a loss of wind speed in the low layer where height is less than four times of the average building height, and this loss effect changes little when the inflow direction changes. (c) In the bulk effect to environmental fields, the change of inflow direction affects the vertical distribution of turbulence greatly. The peak value of the turbulence energy appears at the height of the average building height. The attribution of fluctuations of different components to turbulence changes greatly at different height levels, in the low levels the horizontal speed fluctuation attribute mostly, while the vertical speed fluctuation does in high levels.

A hierarchical property-based multi-level approach method for improves user access control in a cloud environment (클라우드 환경에서 사용자 접근제어를 향상시킨 계층적 속성 기반의 다단계 접근 방법)

  • Jeong, Yoon-Su;Kim, Yong-Tae;Park, Gil-Choel
    • Journal of the Korea Convergence Society
    • /
    • v.8 no.11
    • /
    • pp.7-13
    • /
    • 2017
  • In recent years, cloud computing technology has been socially emerged that provides services remotely as various devices are used. However, there are increasing attempts by some users to provide cloud computing services with malicious intent. In this paper, we propose a property - based multi - level hierarchical approach to facilitate authentication access for users accessing servers in cloud environment. The proposed method improves the security efficiency as well as the server efficiency by hierarchically distributing a set of attribute values by replacing the order of the user 's attribute values in the form of bits according to a certain rule. In the performance evaluation, the proposed method shows that the accuracy of authentication according to the number of attributes is higher than that of the existing method by an average of 15.8% or more, and the authentication delay time of the server is decreased by 10.7% on average. As the number of attributes increases, the average overhead change is 8.5% lower than that of the conventional method.

A Study on Factors Affecting the Purchase Intention of Housing (주택 구매의도에 미치는 영향에 관한 연구)

  • Kim, Soo Kyung;Ha, Kyu Soo
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.14 no.2
    • /
    • pp.181-190
    • /
    • 2019
  • The purpose of this study is to help the understanding of the housing market through the influence of consumer choice attributes and financial policy on home buyer behavior. The key issue in the analysis is to take into account moderate effect of housing investment demand between different types of housing attribute choice and financial policy. The results of the study are as follows. First, convenience, education location, and neighborhood level have a significant effect on the purchase intention of the housing. Second, government policy have no significant influence on the purchase intention of the house. Third, the moderating effects of real estate investment outlook are that the neighbors level and interaction variables have a statistically significant effect on the purchase intention of the house. Since the government's financial policies do not affect the decision to buy a house, in reality, excessive regulation may reduce the quality of housing welfare for the first time home buyers. As a result of this study, the financial policy of the government does not affect the decision of the purchase of the house. In reality, the excessive regulation may reduce the quality of the housing welfare for the first time home buyer. Only an analysis which combines these aspects of consumer's choice can adequately describe and explain the actual change in demand in the residential market.

Analysis of visit attributes among rural experience program participants and impact on revisit intention - Based on the case of Cheong-Ho region

  • Yu, Chan Ju;Cha, Ji Eun;Jang, Dong Heon
    • Korean Journal of Agricultural Science
    • /
    • v.43 no.4
    • /
    • pp.678-687
    • /
    • 2016
  • Rural area development projects are being carried out in a strategy to create new value in agriculture and farm villages and to change the public perception. This study targeted rural experience participants visiting Cheong-Ho region, where the Rural Village Comprehensive Development Project was carried out. They were surveyed about attributes of visits to farm villages to determine which attributes of the experience could influence their revisits. This study was conducted under an umbrella project conducted as per the Special Act on Life Improvement and Regional Improvement for Farmers and Fishermen. Cheong-Ho region in Buan-gun produces mulberry, organic wheat, and rice grown using environmentally-friendly agricultural practices. This region as held events offering visitors the chance to experience rural villages and mulberry farms. Survey results showed that the natural landscape of villages, village experience, and the services provided by residents had a positive relationship with the probability of revisiting the village. Also, village facilities, harmony of natural landscape, hospitality of village residents, amusement value of rural experience, and the cost for rural experience were significant attributes. Therefore, it is necessary to revitalize the rural experience program targeting rural experience participants in Cheong-Ho region through continuous and monitoring of key visit attributes and revisit factors.

Security Elevation of XML Document Using DTD Digital Signature (DTD 전자서명을 이용한 XML문서의 보안성 향상)

  • 김형균;오무송
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2002.11a
    • /
    • pp.592-596
    • /
    • 2002
  • Can speak that DTD is meta data that define meaning of expressed data on XML document. Therefore, In case DTD information is damaged this information to base security of XML document dangerous. Not that attach digital signature on XML document at send-receive process of XML document in this research, proposed method to attach digital signature to DTD. As reading DTD file to end first, do parsing, and store abstracted element or attribute entitys in hash table. Read hash table and achieve message digest if parsing is ended. Compose and create digital signature with individual key after achievement. When sign digital, problem that create entirely other digest cost because do not examine about order that change at message digest process is happened. This solved by method to create DTD's digital signature using DOM that can embody tree structure for standard structure and document.

  • PDF