• Title/Summary/Keyword: Authentication Framework

Search Result 145, Processing Time 0.028 seconds

Design and Implementation of National Supercomputing Service Framework (국가 슈퍼컴퓨팅 서비스 프레임워크의 설계 및 구현)

  • Yu, Jung-Lok;Byun, Hee-Jung;Kim, Han-Gi
    • KIISE Transactions on Computing Practices
    • /
    • v.22 no.12
    • /
    • pp.663-674
    • /
    • 2016
  • Traditional supercomputing services suffer from limited accessibility and low utilization in that users(researchers) may perform computational executions only using terminal-based command line interfaces. To address this problem, in this paper, we provide the design and implementation details of National supercomputing service framework. The proposed framework supports all the fundamental primitive functions such as user management/authentication, heterogeneous computing resource management, HPC (High Performance Computing) job management, etc. so that it enables various 3rd-party applications to be newly built on top of the proposed framework. Our framework also provides Web-based RESTful OpenAPIs and the abstraction interfaces of job schedulers (as well as bundle scheduler plug-ins, for example, LoadLeveler, Open Grid Scheduler, TORQUE) in order to easily integrate the broad spectrum of heterogeneous computing clusters. To show and validate the effectiveness of the proposed framework, we describe the best practice scenario of high energy physics Lattice-QCD as an example application.

A Secure Data Processing Using ID-Based Key Cryptography in Mobile Cloud Computing (모바일 클라우드 컴퓨팅 환경에서 ID-기반 키 암호화를 이용한 안전한 데이터 처리 기술)

  • Cheon, EunHong;Lee, YonSik
    • Convergence Security Journal
    • /
    • v.15 no.5
    • /
    • pp.3-8
    • /
    • 2015
  • Most mobile cloud computing system use public key cryptography to provide data security and mutual authentication. A variant of traditional public key technologies called Identity-Based Cryptography(IBC) has recently received considerable attention. The certificate-free approach of IBC may well match the dynamic qualities of cloud environment. But, there is a need for a lightweight secure framework that provides security with minimum processing overhead on mobile devices. In this paper, we propose to use hierarchical ID-Based Encryption in mobile cloud computing. It is suitable for a mobile network since it can reduce the workload of root Public Key Generators by delegating the privilege of user authentication and private key generation. The Identity-Based Encryption and Identity-Based Signature are also proposed and an ID-Based Authentication scheme is presented to secure data processing. The proposed scheme is designed by one-way hash functions and XOR operations, thus has low computation costs for mobile users.

The Access Control Systems on OSI Security Framework (OSI 보안 프레임워크에서 접근 제어 시스템)

  • 조인준;김동규
    • Review of KIISC
    • /
    • v.7 no.1
    • /
    • pp.103-124
    • /
    • 1997
  • OSI 통신망 보안의 전체적인 보안 프레임워크는 ITU-T X.810, 인증(Authentication) 프레임워크는 ITU-T X.811 그리고 접근 제어(Access Control) 프레임워크는 ITU-T X.812에서 각각 기술하고 있다. 이들은 OSI 참조 모델을 기반으로 한 보안 시스템 설계의 기본 골격을 제공한다. 본 고에서는 통신망 보호를 위한 기밀성(Secrecy), 무결성(Integrity), 가용성(Availability) 보안 서비스들 중에서 기밀성 보장에 해당하는 접근 제어(Access Control) 프레임워크를 ITU-T Rec. X.812(1995.7)를 기반으로 분석하였다.

  • PDF

A Comparative Analysis for Website Certification Service in the Context of Electronic Commerce (전자상거래 환경하에서의 신용인증 서비스에 관한 비교 분석)

  • 김정덕;김도일;박현출
    • Proceedings of the Korea Database Society Conference
    • /
    • 2000.11a
    • /
    • pp.47-52
    • /
    • 2000
  • 전자상거래에 있어서 인증 서비스는 크게 신원인증, 내용인증(전자공증), 신용인증 등 세 가지로 나눌 수 있다. 전자상거래가 활성화됨에 따라 여러 인증기관에서 신용인증 서비스를 제공하고 있으나, 인증기관의 성격에 따라 인증 실무기준을 달리한다. 따라서 본 논문에서는 현재 신용인증 서비스를 제공하는 인증기관의 성격별로 각 신용인증 서비스를 비교 분석한 후, 신용인증 서비스의 종합적인 인증 실무기준 framework제시에 초점을 둔다.

  • PDF

User Authentication Mechanisms in The OSGi Service Framework Environment (OSGi Service Framework 환경에서 사용자 인증 방법)

  • 전경석;문창주;박대하;백두권
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2002.04a
    • /
    • pp.865-867
    • /
    • 2002
  • 최근 들어 정보가전과 홈 게이트웨이를 사용하여 집안의 가전제품과 외부 네트워크를 연결해 다양한 서비스를 제공하려고 하는 시도가 많아졌으며, 이와 함께 홈 게이트웨이에 대한 표준화 작업이 여러 단체에서 진행 중에 있다. 본 논문에서는 홈 게이트웨이 환경에서 여러 보안관련 부분중 사용자 인증에 관한 문제점을 해결하고자 한다. 홈 게이트웨이는 기존 PC 환경처럼 CPU, 메모리 등의 리소스들이 충분하지 않고 각 서비스를 사용하기 위해 매번 로그인하지 않아야 하는 등의 이유로 PC환경에서 사용하는 보안 메커니즘을 그대로 적용하는데는 한계가 있다. 홈 게이트웨이의 특성과 위와 같이 대두되는 몇 가지 문제점을 본 논문에서 제시하는 사용자 인증 방법을 통해 해결하고자 한다.

  • PDF

Design of an USB Security Framework for Double Use Detection (이중사용 방지를 위한 USB 보안 프레임워크의 설계)

  • Jeong, Yoon-Su;Lee, Sang-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.4
    • /
    • pp.93-99
    • /
    • 2011
  • Recently, the development of internet technology makes user's personal data used by being saved in USB. But there is a critical issue that personal data can be exposed with malicious purpose because that personal data doesn't need to be certificate to use. This paper proposes USB security framework to prevent a duplicate use of personal data for protecting the data which in USB. The proposed USB security framework performs certification process of user with additional 4bite of user's identification data and usage choice of USB security token before certification data when the framework uses USB security product in different network. It makes communication overhead and service delay increased. As a result of the experiment, packet certification delay time is more increased by average 7.6% in the proposed USB security framework than simple USB driver and USB Token, and procedure rate of certification server on the number of USB is also increased by average 9.8%.

Design and Implementation of CoAP Authorization Framework Based on OAuth 2.0 (OAuth 2.0 기반 CoAP 인증 프레임워크 설계 및 구현)

  • Kim, Kyoung-Han;Lim, Hyun-Kyo;Heo, Joo-Seong;Han, Youn-Hee
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.6 no.8
    • /
    • pp.329-342
    • /
    • 2017
  • Recently, interest and investment in the Internet of Things (IoT) have increased significantly, and security issues are constantly being raised. As a solution, the IETF ACE Working Group is establishing the ACE framework standard, which is a new security framework for various constrained IoT environments based on the existing OAuth 2.0. However, additional work is required to apply the ACE framework, which proposes a new lightweight security system, to the existing Internet environment, and this additional cost is a factor that hinders the application of OAuth 2.0 to the IOT environment. Therefore, we propose an IoT authentication framework based on OAuth 2.0's existing development motivation, and implement a proposal framework based on CoAPthon and analyze its performance.

Improvement of AACS Security Framework with Access Control to Personal Contents (개인 콘텐츠 접근제어 기능을 갖는 개선된 AACS 보안 Framework)

  • Kim, Dae-Youb
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.4
    • /
    • pp.167-174
    • /
    • 2008
  • As both a digital camera and a digital camcorder are popularized in recent years, UCC created by general users is also popularized. Unfortunately, according to that, the lack of privacy is also increasing more and more. The UCC is saved on the recordable media(Media) like DVD and deposited personally as well as distributed through Internet portal service. If you use Internet portal service to put up your contents, you can partially prevent the violation of privacy using security technologies such as authentication and illegal copy protection offered by internet portal service providers. Media also has technologies to control illegal copy. However, it is difficult to protect your privacy if your Media having personal contents is stolen or lost. Therefore, it is necessary to develope an additional security mechanism to guarantee privacy protection when you use Media. In this paper, we describe AACS framework for Media Security and propose improved AACS framework to control the access to personal contents saved on Media.

Dynamic RBAC Model based on OSGi (OSGi 기반 동적 RBAC 모델)

  • Kim, In-Tae;Chung, Kyung-Yong;Rim, Kee-Wook;Lee, Jung-Hyun
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.1
    • /
    • pp.53-60
    • /
    • 2009
  • In home network environments, the user authentication and authorization associated user's information and usability may be important security issue. The OSGi service platform, a well-known home network gateway already specifies the mechanism of that. The traditional authority method provided OSGi implements simple RBAC(Role Based Access Control) model. This is difficult to support efficient access control. In this paper, we propose the dynamic RBAC model based on OSGi. The proposed method describes the extended framework that manage two roles named as absolute role and relative role, extend existed framework with relative role and propose programming model to enable dynamic access control. Finally, we implement the proposed framework using AspectJ and Java annotation.

Design and Implementation of a Proxy-based Mobile Grid Services Framework (프록시 기반의 모바일 그리드 서비스 프레임워크 설계 및 구현)

  • Kim, Min-Gyu;Park, Si-Yong;Lee, Bong-Hwan
    • Journal of Internet Computing and Services
    • /
    • v.8 no.3
    • /
    • pp.85-98
    • /
    • 2007
  • In distributed computing paradigm, mobile surrogate systems have not gained wide acceptance because of security concerns that have not been suitably addressed yet. Currently even the widely used Grid middleware, Globus, does not have a host authentication mechanism, which makes it hard to provide high performance Grid computing capabilities to mobile clients. In this paper, a mobile Grid service framework is designed and implemented in order to provide Grid services to mobile host such as PDA. The surrogate host-based system allows mobile hosts to be provided with Grid services while moving. The implemented mobile Grid services system has been applied to mobile healthcare system which utilizes Grid computing for ECG signal processing. The presented system framework can be used as a secure enterprise mobile healthcare system for hospital physicians.

  • PDF