• Title/Summary/Keyword: Concept of Protection

Search Result 528, Processing Time 0.024 seconds

Functional Privacy-preserving Outsourcing Scheme with Computation Verifiability in Fog Computing

  • Tang, Wenyi;Qin, Bo;Li, Yanan;Wu, Qianhong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.1
    • /
    • pp.281-298
    • /
    • 2020
  • Fog computing has become a popular concept in the application of internet of things (IoT). With the superiority in better service providing, the edge cloud has become an attractive solution to IoT networks. The data outsourcing scheme of IoT devices demands privacy protection as well as computation verification since the lightweight devices not only outsource their data but also their computation. Existing solutions mainly deal with the operations over encrypted data, but cannot support the computation verification in the same time. In this paper, we propose a data outsourcing scheme based on an encrypted database system with linear computation as well as efficient query ability, and enhance the interlayer program in the original system with homomorphic message authenticators so that the system could perform computational verifying. The tools we use to construct our scheme have been proven secure and valid. With our scheme, the system could check if the cloud provides the correct service as the system asks. The experiment also shows that our scheme could be as effective as the original version, and the extra load in time is neglectable.

A Study on Explosion Risk Management for Hot Oil Heater (열매체 가열기 설비에서의 폭발위험관리에 관한 연구)

  • Jang, Chul;Kwon, Jin-Wook;Hwang, Myoung-Hwan
    • Journal of the Korea Safety Management & Science
    • /
    • v.19 no.3
    • /
    • pp.1-9
    • /
    • 2017
  • In the industrial field, various type of fuel have been used for product processing facilities. Recent for 10 years, the usage of natural gas (NG) was gradually increased. Because it has many merits; clean fuel, no transportation, storage facility and so on. There are common safety concept that strict explosion protection approaches are needed for facilities where explosive materials such as flammable liquid, vapor and gases exist. But some has an optimistic point of view that the lighter than air gases such as NG disperse rapidly, hence do not form explosion environment upon release into the atmosphere, many parts has a conventional safety point of view that those gases are also inflammable gases, hence can form explosion environment although the extent is limited and present. In this paper, the heating equipments (Hot Oil Heater) was reviewed and some risk management measures were proposed. These measures include hazardous area classification and explosion-proof provisions of electric apparatus, an early gas leak detection and isolation, ventilation system reliability, emergency response plan and training and so on. This study calculates Hazardous Area Classification using the hypothetical volume in the KS C IEC code.

A SECURITY ARCHITECTURE FOR THE INTERNET OF THINGS

  • Behrens, Reinhard;Ahmed, Ali
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.12
    • /
    • pp.6092-6115
    • /
    • 2017
  • This paper demonstrates a case for an end-to-end pure Application Security Layer for reliable and confidential communications within an Internet of Things (IoT) constrained environment. To provide a secure key exchange and to setup a secure data connection, Transport Layer Security (TLS) is used, which provides native protection against replay attacks. TLS along with digital signature can be used to achieve non-repudiation within app-to-app communications. This paper studies the use of TLS over the JavaScript Object Notation (JSON) via a The Constrained Application Protocol (CoAP) RESTful service to verify the hypothesis that in this way one can provide end-to-end communication flexibility and potentially retain identity information for repudiation. As a proof of concept, a prototype has been developed to simulate an IoT software client with the capability of hosting a CoAP RESTful service. The prototype studies data requests via a network client establishing a TLS over JSON session using a hosted CoAP RESTful service. To prove reputability and integrity of TLS JSON messages, JSON messages was intercepted and verified against simulated MITM attacks. The experimental results confirm that TLS over JSON works as hypothesised.

Development of effective management strategy for geographical database based on the concept of intellectual property rights (지리정보DB의 효율적 유통관리 방안 연구 - 지적재산권 설정을 중심으로 -)

  • 양광식;이종열;이영대
    • Spatial Information Research
    • /
    • v.11 no.1
    • /
    • pp.73-88
    • /
    • 2003
  • Geographical data sets are expensive to create and are very easy to copy because the intellectual property rights for the distribution should be protected. The main object of copyright law is to encourage expression of ideas in tangible form and it extend only to original works, it is limited to control the balance of interests between data producers and user. Because the development of a useful legal framework for both private and public activity in this field is an important issue. This paper presents an intial attempt at such a the effective management strategy intended to support continuing research into the legal protection of geographical information.

  • PDF

Design and Implementation of the DRM Supporting Smart Multimedia Streaming in Ubi-Home (Ubi-Home에서의 지능적 멀티미디어 스트리밍을 지원하는 DRM 설계 및 구현)

  • Park Jong-Hyuk;Lee Sang-Jin;Hong In-Hwa;Ahn Tae-Won;Lee Deok-Gyu
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.3C
    • /
    • pp.293-301
    • /
    • 2006
  • In this paper, we design and implement the UHSNS-DRM(Ubi-Home Smart Multimedia Streaming-Digital Right Management) in Ubi-Home. The proposed system support flexible distribution platform for digital content copyright protection and management in Ubi-Home. This system also can provide multimedia streaming service to authorized users who are using PC, STB, PDA, and Portable Device, etc. Furthermore, we adopt concept of domain authentication and it help to improve the efficiency of license management for all devices in Ubi-Home. We design user's location recognition algorithm in order to provide intelligent services. Of course, this algorithm is applied for the proposed system. Start after striking space key 2 times.

A Combined Fuzzy AHP and BSC Model based Green Supplier Selection Problem (Fuzzy AHP와 BSC 결합모델기반의 Green Supplier 선정 문제)

  • Seo, Kwang-Kyu
    • Journal of the Korea Safety Management & Science
    • /
    • v.13 no.3
    • /
    • pp.63-69
    • /
    • 2011
  • As environmental protection is becoming more and more important, green production has become a key issue for almost every manufacturer and will determine a manufacturer can be sustainable in the long term. Therefore a performance evaluation system for green suppliers is necessary to determine the suitability of suppliers to cooperate with the company. While the works on the evaluation and/or selection of suppliers are abundant, those that concern environmental issues are rather limited. The objective of this study is to construct a combined model based on fuzzy analytic hierarchy process (FAHP) and balanced scorecard (ESC) for evaluating green suppliers in the manufacturing industry. The ESC concept is applied to define the hierarchy with four major perspectives (i.e. financial, customer, internal business process, and learning and growth), and performance indicators are selected for each perspective. FAHP is then proposed in order to tolerate vagueness and ambiguity of information. Finally, FAHP is finally constructed to facilitate the solving process. With the proposed model, manufacturers can have a better understanding of the capabilities that a green supplier must possess and can evaluate and select the most suitable green supplier for cooperation.

IDENTIFICATION OF SAFETY CONTROLS FOR ENGINEERING-SCALE PYROPROCESS FACILITY

  • MOON, SEONG-IN;SEO, SEOK-JUN;CHONG, WON-MYUNG;YOU, GIL-SUNG;KU, JEONG-HOE;KIM, HO-DONG
    • Nuclear Engineering and Technology
    • /
    • v.47 no.7
    • /
    • pp.915-923
    • /
    • 2015
  • Pyroprocess technology has been considered as a fuel cycle option to solve the spent fuel accumulation problems in Korea. The Korea Atomic Energy Research Institute, Daejeon, Korea has been studying pyroprocess technology, and the conceptual design of an engineering-scale pyroprocess facility, called the Reference Engineering-scale Pyroprocess Facility, has been performed on the basis of a 10 ton heavy metal throughput per year. In this paper the concept of Reference Engineering-scale Pyroprocess Facility is introduced along with its safety requirements for the protection of facility workers, collocated workers, the off-site public, and the environment. For the identification of safety structures, systems, and components and/or administrative controls, the following activities were conducted: (1) identifying hazards associated with operations; (2) identifying potential events associated with these hazards; and (3) identifying the potential preventive and/or mitigative controls that reduce the risk associated with these accident events. This study will be used to perform a safety evaluation for accidents involving any of the hazards identified, and to establish safety design policies and propose a more definite safety design.

The Application of the Principle of "Preserving the Original Form" to Intangible Heritage and Its Meaning (무형문화재 '원형규범'의 이행과 의미 고찰)

  • Lee, Jae Phil
    • Korean Journal of Heritage: History & Science
    • /
    • v.49 no.1
    • /
    • pp.146-165
    • /
    • 2016
  • With the introduction of the system of recognizing masters of craft and performance skills in 1970, the principle of "preserving the original form," which was already in general use, was adopted as a legal principle in the Cultural Heritage Protection Act. While the concept "original form" can be related to tangible elements of heritage through the Act, the intangibility of craft and performance skills does not allow their pinpointing at a particular temporal period or the identification of a particular master from the past as the basis of an original form. Therefore, those craft or performance skills that are available at the point of recognition of relevant masters must serve as the basis of the original form for the intangible heritage concerned. This means that the principle of preserving the original form of intangible heritage has been implemented not based on a fundamental form of materiality, but rather on the craft or performance skills that may be held by a master at the time of his/her recognition as a "temporary original form." This principle has been observed through intangible heritage transmission and education policies for recognized masters and their trainees, contributing to establish an elitist transmission environment in which public were denied to join the education on intangible heritage. Even with policies guided by the principle of preserving the original form, designated craft and performance skills have been transformed contingent upon given social and environmental conditions, thus hindering the preservation of the original form. Despite the intrinsic limitations of the principle of preserving the original form when applied to intangible heritage, this principle has served as a practical guideline for protecting traditional Korean culture from external influences such as modernization and Westernization, and also as an ultimate goal for the safeguarding of intangible heritage, engendering actual policy effects. The Act on the Safeguarding and Promotion of Intangible Cultural Heritage that comes into effect in March 2016 takes the constantly evolving nature of intangible heritage into consideration and resultantly adopts a concept of "essential form" (jeonhyeong) in place of "original form" (wonhyeong). This new concept allows for any transformations that may take place in the environment surrounding the intangible heritage concerned, and is intended to mitigate the rigidity of the concept of "original form." However, it should be noted that "essential form," which is manifested as the unique significance, knowledge, and skills delivered by the intangible heritage concerned, should be maintained according to the guidelines and principles related to heritage conservation. Therefore, the new concept can be understood not as a rupture, but more as a continuum of the concept of "original form."

Classification of the Intrusion Tolerant Systems and Integrated Framework for Survivability Enhancement (생존성 강화를 위한 침입감내 시스템의 분류와 통합 프레임워크 제안)

  • Kim, Gi-Han;Chio, Myeong-Ryeoi;Lee, Kyung-Whan
    • The KIPS Transactions:PartC
    • /
    • v.10C no.3
    • /
    • pp.295-304
    • /
    • 2003
  • Currently security researchers focus on protection of program and data from malicious users and accidents. Therefore, many firewalls and intrusion detection systems have been developed commercially. The intrusion tolerance is a new concept that is the last line of defense for the information survivability. It emphasizes availability and integrity to provide critical system services continuously even when system is compromised. In this paper, we classify current intrusion tolerant technologies from the point of view of program and data. Furthermore, we propose an integrated framework that supports intrusion tolerance of program and data.

The Exploratory Study on Community Link of Community Childcare Center (지역아동센터의 지역사회연계에 관한 탐색적 연구)

  • Kim, Nam-Sook
    • Journal of Digital Convergence
    • /
    • v.11 no.12
    • /
    • pp.803-810
    • /
    • 2013
  • Since 2004, community childcare centers are legislated and the centers are running as the concept of community-oriented child welfare services. Recently child welfare paradigm are changed from simple "study room" for protection to the future capabilities of the "social welfare". For children who grow in their community, it must request to new construction with ecological system.