• Title/Summary/Keyword: Bundle authentication

Search Result 8, Processing Time 0.021 seconds

Verification and Implementation of a Service Bundle Authentication Mechanism in the OSGi Service Platform Environment (OSGi 서비스 플랫폼 환경에서 서비스 번들 인증 메커니즘의 검증 및 구현)

  • 김영갑;문창주;박대하;백두권
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.31 no.1_2
    • /
    • pp.27-40
    • /
    • 2004
  • The OSGi service platform has several characteristics as in the followings. First, the service is deployed in the form of self-installable component called service bundle. Second, the service is dynamic according to its life-cycle and has interactions with other services. Third, the system resources of a home gateway are restricted. Due to these characteristics of a home gateway, there are a lot of rooms for malicious services can be Installed, and further, the nature of service can be changed. It is possible for those service bundles to influence badly on service gateways and users. However, there is no service bundle authentication mechanism considering those characteristics for the home gateway In this paper, we propose a service bundle authentication mechanism considering those characteristics for the home gateway environment. We design the mechanism for sharing a key which transports a service bundle safely in bootstrapping step that recognize and initialize equipments. And we propose the service bundle authentication mechanism based on MAC that use a shared secret created in bootstrapping step. Also we verify the safety of key sharing mechanism and service bundle authentication mechanism using a BAN Logic. This service bundle authentication mechanism Is more efficient than PKI-based service bundle authentication mechanism or RSH protocol in the service platform which has restricted resources such as storage spaces and operations.

A Study on Authentication Technique based on OSGi Service Platform (OSGi 서비스 플랫폼 기반의 인증 기법에 관한 연구)

  • I, Chang-Uk;Hong, Won-Gi;Chang, Hoon
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.36 no.5
    • /
    • pp.387-395
    • /
    • 2009
  • The establishment of security architecture is essential because security vulnerabilities occur such as user's unjustifiable connection for the opened gateway and access to resources without permission in OSGi service platform environment. In this paper, it proposes a authentication technique for an Automatic user authentication which is used the Symmetric Key and the Service bundle authentication to consider the constraints of the hardware in the OSGi service platform environment. Typically, the type of entering a password is used for the user authentication mechanism however OSGi platform environment studies not entering the password but using MAC address and encrypted identifier of the automatic user authentication mechanism because the devices are limited in their input. In this paper, the Symmetric Key is used for bundle authentication mechanism. Therefore operation becomes quick and secure authentication process has been successfully completed by using the time data and a ticket which contains a license. Based on these two different authentication mechanisms, it could eliminate the constraints of resources and improve the convenience of users and administrators. Also it shows an effect from omitting the waiting time to enter a password and reducing operations which need for authentication in the OSGi service platform environment.

Security Architecture for OSGi Service Platform Environment (OSGi 서비스 플랫폼 환경을 위한 보안 아키텍처)

  • 박대하;김영갑;문창주;백두권
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.10 no.3
    • /
    • pp.259-272
    • /
    • 2004
  • This paper suggests a new security architecture for facilitating secure OSGi service platform environment. The security architecture includes 1) user authentication mechanism, 2) bundle authentication mechanism, 3) key sharing mechanism, and 4) authorization mechanism. The user authentication mechanism supplies SSO(single sign-on) functions which are useful for safe and easy user authentications. The bundle authentication mechanism utilizes both PKI-based and MAC-based digital signatures for efficiently authenticating service bundles. The key sharing mechanism, which is performed during bootstrapping phase of a service gateway, supplies a safe way for sharing secret keys that are required for authentication mechanisms. Finally, the authorization mechanism suggests distributed authorization among service providers and an operator by establishing their own security policies. The main contributions of the parer are twofold. First, we examine several security requirements of current OSGi specification when its security functions can be applied in real OSGi environments. Second, we describe the ways to resolve the problems by means of designing and implementing concrete security mechanisms.

An User Authentication Mechanism in the OSGi Service Platform Environment (OSGi서비스 플랫폼 환경에서의 사용자 인증 메커니즘)

  • 전경석;문창주;박대하;백두권
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.9 no.2
    • /
    • pp.191-204
    • /
    • 2003
  • In the home gateway environment, several characteristics for the user authentication mechanism should be reflected separately from the existing distributed service environment. First, the platform of a home gateway is a component based system that its services are installed dynamically. Second, the convenience that user can use several services by authentication of once should be offered. Finally, the system resources of a home gateway are restricted. However, a user authentication mechanism that reflected these characteristics is not shown at the user admin service specification of the OSGi service platform.(OSGi is the representative standardization organization of hone gateway.) Also, there is no existing authentication protocol that satisfies these qualities at the same time. In this paper, we propose a new user authentication mechanism considering those characteristics for the home gateway environment. We also design and implement an independent authentication service bundle based on the OSGi service platform so that it can perform user authentication operations for each bundle service. We supplement and extend the Kerberos Protocol that can apply.

Service Bundle Authentication Mechanisms in the OSGi Service Framework Environment (OSGi 서비스 프레임워크 환경에서의 서비스 번들 인증 메커니즘)

  • 김영갑;문창주;박대하;백두권
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2002.04a
    • /
    • pp.868-870
    • /
    • 2002
  • 기존의 네트워크 환경에서의 서비스와 달리 OSGi 프레임워크 환경에서의 서비스는 생명 주기에 따라 동적이고, 다른 서비스와의 상호작용 등이 일어나기 때문에 거짓 오퍼레이터(OP)에 의해 인증되지 않은 악의적인 서비스가 배치될 수 있고 또한 서비스가 변질 될 수도 있다. 그러므로, 개방형 서비스 게이트웨이 (OSG)를 시동하였을 때 초기화하는 과정인 부트스트랩핑(Bootstrapping)단계에서 공유 비밀키(shared secret)를 생성, 이로부터 유도된 MAC(Message Authentication Codes) Key를 기반으로 한 서비스 번들 인증을 통하여 안전한 서비스를 제공받을 수 있어야 한다. 본 논문에서는 서비스 번들을 인증 하기 위한 키 교환 방법과 서비스 인증 메커니즘을 제시하였다. 대칭키, 공개키의 키 교환 메커니즘은 대칭키를 이용한 키 교환 메커니즘이 공개키를 이용한 것보다 더 효율적이며, 이를 이용한 MAC 기반 서비스 번들 인증 또한 기존의 PKI 기반 서비스 번들 인증보다 인증 속도가 빠르다.

  • PDF

Bundle Authentication using XML Signature in the OSGi Service Platform (OSGi 환경에서 XML 전자서명을 이용한 번들 인증)

  • 임희영;김영갑
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2004.04a
    • /
    • pp.196-198
    • /
    • 2004
  • 현재 XML은 데이터의 표현에 있어서 가장 유연하고 독립성 있는 언어로 자리잡고 있으며 다양한 분야에서 활용되고 있다. 이러한 추세에 따라 OSGi 서비스 플랫폼 환경에서도 여러 서비스들이 자신의 데이터를 XML로 표현하고 있으며, 이를 기반으로 서비스 번들의 인증을 XML 전자 서명을 생성하여 수행할 수 있다. 현재 OSGi 에서는 PKI기반 서비스 번들 인중 메커니즘을 이용하고 RSH 프로토콜을 권고하고 있다. 그러나 저장 공간이나 연산이 제한된 환경에 있는 OSGi플랫폼 내에서 작동하는 데에는 어려움이 있다. 따라서 본 논문에서는 JAR파일로 제공되는 서비스 번들에 대해 별도의 연산이나 인증과정 없이 XML 전자서명을 생성하여 서비스 번들을 인증하는 메커니즘을 제시한다.

  • PDF

Design and Implementation of National Supercomputing Service Framework (국가 슈퍼컴퓨팅 서비스 프레임워크의 설계 및 구현)

  • Yu, Jung-Lok;Byun, Hee-Jung;Kim, Han-Gi
    • KIISE Transactions on Computing Practices
    • /
    • v.22 no.12
    • /
    • pp.663-674
    • /
    • 2016
  • Traditional supercomputing services suffer from limited accessibility and low utilization in that users(researchers) may perform computational executions only using terminal-based command line interfaces. To address this problem, in this paper, we provide the design and implementation details of National supercomputing service framework. The proposed framework supports all the fundamental primitive functions such as user management/authentication, heterogeneous computing resource management, HPC (High Performance Computing) job management, etc. so that it enables various 3rd-party applications to be newly built on top of the proposed framework. Our framework also provides Web-based RESTful OpenAPIs and the abstraction interfaces of job schedulers (as well as bundle scheduler plug-ins, for example, LoadLeveler, Open Grid Scheduler, TORQUE) in order to easily integrate the broad spectrum of heterogeneous computing clusters. To show and validate the effectiveness of the proposed framework, we describe the best practice scenario of high energy physics Lattice-QCD as an example application.

Comparative study of external-intenal morphological shape in origins and hybrids for Glycyrrhizae Radix et Rhizoma (감초의 기원 및 교잡종 외내부형태 성상 비교연구)

  • Kim, Young-Sik;Park, Chun-Geon;Choi, Goya;Chang, Jae-Ki;Lee, Jeong-Hoon;Ju, Young-Sung
    • The Korea Journal of Herbology
    • /
    • v.34 no.5
    • /
    • pp.1-12
    • /
    • 2019
  • Objectives : The consumption of licorice is large in Korea, but domestic production is insufficient due to the lack of adaptability. This study aimed to provide a morphological basis for adding interspecific hybrid licorice with improved adaptability to pharmacopoeia. Methods : This study was to establish identification criteria for the original plants, external and internal morphology of the authentic herbal medicines (Glycyrrhiza uralensis, G. glabra and G. inflata), market products and artificially interspecific hybrid forms of licorice. For this purpose, previous studies were investigated and visual and histological observations were carried out. We focused on the internal morphology by microscopic observation for securing objectivity. Finally, we proposed the identification keys for precise classification of each part. Results : 1) Original plant : Licorice species in the compendium were distinguished by the number of leaflets, presence of hair on the fruit, curvature and swelling of the fruit. 2) External morphology : Licorice species were distinguished by degree of powderiness, tearing gap, radial structure in the cross section and existence of protrusion of outer epidermis. 3) Internal morphology : Licorice species were distinguished by the degree of development of phloem fiber bundle, development of obliterated sieve, whether the secondary medullary ray are branched. In the case of interspecific hybrids, the characteristics of both species used for hybridization were mixed in all observation methods. Conclusions : These results suggest that the interspecific crossbred licorice is suitable for the pharmacopoeial standard. Therefore, it can be applied as a herbal medicine through additional supplementary study.