• 제목/요약/키워드: Confidential Information

검색결과 226건 처리시간 0.021초

ATM 망에서 QoS를 보장하는 백업 경로 설정 (Backup Path to be satisfied QoS in ATM Network)

  • 이동욱;이대영
    • 한국통신학회논문지
    • /
    • 제25권4A호
    • /
    • pp.496-501
    • /
    • 2000
  • 본 논문에서는 좀더 신뢰성이 요구되는 ATM 망을 위한 백업 VP할당에 대하여 제안하였다. QoS 파라미터별 우선순위를 두어 실시간성 QoS에 여분의 리소스를 고려하여 먼저 백업 VP를 할당한 후에 비실시간성 QoS의 백업 VP를 할당한다. 제안된 알고리즘은 이러한 우선순위 기법을 통해 상대적으로 고가의 서비스가 이루어지는 실시간성 QoS의 오류에 대비하여 신뢰성이 보장되는 백업 VP를 할당할 수 있다는 장점이 있다.

  • PDF

Privacy-Preserving Two-Party Collaborative Filtering on Overlapped Ratings

  • Memis, Burak;Yakut, Ibrahim
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제8권8호
    • /
    • pp.2948-2966
    • /
    • 2014
  • To promote recommendation services through prediction quality, some privacy-preserving collaborative filtering solutions are proposed to make e-commerce parties collaborate on partitioned data. It is almost probable that two parties hold ratings for the same users and items simultaneously; however, existing two-party privacy-preserving collaborative filtering solutions do not cover such overlaps. Since rating values and rated items are confidential, overlapping ratings make privacy-preservation more challenging. This study examines how to estimate predictions privately based on partitioned data with overlapped entries between two e-commerce companies. We consider both user-based and item-based collaborative filtering approaches and propose novel privacy-preserving collaborative filtering schemes in this sense. We also evaluate our schemes using real movie dataset, and the empirical outcomes show that the parties can promote collaborative services using our schemes.

Selective Encryption Algorithm for Vector Map using Geometric Objects in Frequency Domain

  • Pham, Ngoc-Giao;Kwon, Ki-Ryong;Lee, Suk-Hwan;Woo, Chong-Ho
    • 한국멀티미디어학회논문지
    • /
    • 제20권8호
    • /
    • pp.1312-1320
    • /
    • 2017
  • Recently, vector map data is developed and used in many domains widely. In the most cases, vector map data contains confidential information which must be kept away from unauthorized users. Moreover, the production process of vector maps is considerably complex and consumes a lot of money and human resources. Therefore, the secured storage and transmission are necessary to prevent the illegal copying and distribution from hacker. This paper presents a selective encryption algorithm using geometric objects in frequency domain for vector map data. In the proposed algorithm, polyline and polygon data in vector map is the target of the selective encryption process. Experimental results verified that proposed algorithm is effectively and adaptive the requirements of security.

A Distributed Implementation Algorithm for Physical Layer Security Based on Untrusted Relay Cooperation and Artificial Noise

  • Li, Xiangyu;Wang, Xueming;Xu, Xiangyang;Jin, Liang
    • ETRI Journal
    • /
    • 제36권1호
    • /
    • pp.183-186
    • /
    • 2014
  • In this letter, we consider a cooperation system with multiple untrusted relays (URs). To keep the transmitted information confidential, we obtain joint channel characteristics (JCCs) through combining the channels from the source to the destination. Then, in the null space of the JCCs, jammers construct artificial noise to confuse URs when the source node broadcasts its data. Through a distributed implementation algorithm, the weight of each node can be obtained from its own channel state information. Simulation results show that high-level security of the system can be achieved when internal and external eavesdroppers coexist.

A novel architecture for localized key management in wireless sensor networks

  • Raazi, Syed Muhammad Khaliq-ur-Rahman;Lee, Sung-Young;Song, Young-Jae;Lee, Young-Koo
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2007년도 춘계학술발표대회
    • /
    • pp.1091-1092
    • /
    • 2007
  • Wireless sensor networks (WSN) can be used in military surveillance, in which highly confidential data needs to be transmitted. In effect, security becomes a very important aspect in such networks. We present an efficient key management scheme for WSN. Our scheme is an improvement over SHELL [1] and mostly relies on communication within a cluster of nodes.

  • PDF

정보보호 시스템 보안성 자동 분석 방법 연구 (A Study on Scheme of Automatical Security Analysis Tools for Information Security System)

  • 김점구;김태은
    • 융합보안논문지
    • /
    • 제8권1호
    • /
    • pp.117-127
    • /
    • 2008
  • 국내 보안관리 시스템의 후진성은 선진기술을 가진 외국 보안업체에 의존하는 현상을 낳았고, 이는 국내 기업은 물론 공공기관의 기밀사항이 외국에 유출될 위험을 내포하고 있다. 따라서 본 논문은 국내 공공망의 안전성 유지를 위한 자동화 보안분석 시스템을 설계 구현함으로서 보안성 분석기술을 확보하고, 이를 이용 공공기관의 보안수준을 높이며 외국업체에 대한 의존도를 줄여 국가 보안 안전성 확보에 기여하고자 한다.

  • PDF

A Strong Designated Verifiable DL Based Signcryption Scheme

  • Mohanty, Sujata;Majhi, Banshidhar
    • Journal of Information Processing Systems
    • /
    • 제8권4호
    • /
    • pp.567-574
    • /
    • 2012
  • This paper presents a strong designated verifiable signcryption scheme, in which a message is signcrypted by a signcryptor and only a specific receiver, who called a "designated verifier", verifies it using his own secret key. The scheme is secure, as an adversary can not verify the signature even if the secret key of the signer is compromised or leaked. The security of the proposed scheme lies in the complexity of solving two computationally hard problems, namely, the Discrete Logarithm Problem (DLP) and the Integer Factorization Problem (IFP). The security analysis of the scheme has been done and it is proved that, the proposed scheme can withstand an adaptive chosen ciphertext attack. This scheme can be very useful in organizations where there is a need to send confidential documents to a specific recipient. This scheme can also be applicable to real life scenarios, such as, e-commerce applications, e-banking and e-voting.

연판정지향 Stop-and-Go 알고리즘을 이용한 적응 블라인드 등화기의 성능 향상에 관한 연구 (A Study on the performance Improvement of the Adaptive Blind Equalizer Using the Soft Decision-Directed Stop-and-Go Algorithm)

  • 정영화
    • 정보학연구
    • /
    • 제2권1호
    • /
    • pp.103-113
    • /
    • 1999
  • 본 논문에서는 연판정지향 알고리즘에 Stop-and-Go 알고리즘의 개념을 결합한 연판정지향 Stop-and-Go 알고리즘을 제안한다. 제안한 알고리즘은 두 알고리즘보다 더 신뢰성 있는 오차신호를 사용함으로써 향상된 등화 성능을 가진다. 컴퓨터 모의실험을 통하여 제안한 알고리즘이 CMA, MCMA, Stop-and-Go 알고리즘, 단순화된 연판정지향 알고리즘에 비해 잔류 심벌간 간섭과 정상상태로의 수렴 속도면에서 우수한 성능을 가짐을 확인하였다.

  • PDF

Encryption Algorithm using Polyline Simplification for GIS Vector Map

  • Bang, N.V.;Lee, Suk-Hwan;Moon, Kwang-Seok;Kwon, Ki-Ryong
    • 한국멀티미디어학회논문지
    • /
    • 제19권8호
    • /
    • pp.1453-1459
    • /
    • 2016
  • Recently, vector map has developed, used in many domains, and in most cases vector map data contains confidential information which must be kept away from unauthorized users. Moreover, the manufacturing process of a vector map is complex and the maintenance of a digital map requires substantial monetary and human resources. This paper presents the selective encryption scheme based on polyline simplification methods for GIS vector map data protection to store, transmit or distribute to authorized users. Main advantages of our algorithm are random vertices and transformation processes but it still meets requirements of security by random processes, and this algorithm can be implement to many types of vector map formats.

A Review on Preserving Data Confidentiality in Blockchain-based IoT-Supply Chain Systems

  • Omimah Alsaedi;Omar Batarfi;Mohammed Dahab
    • International Journal of Computer Science & Network Security
    • /
    • 제23권11호
    • /
    • pp.110-116
    • /
    • 2023
  • Data confidentiality refers to the characteristic that information kept undisclosed or hidden from unauthorized parties. It considered a key security requirement in current supply chain management (SCM) systems. Currently, academia and industry tend to adopt blockchain and IoT technologies in order to develop efficient and secure SCM systems. However, providing confidential data sharing among these technologies is quite challenging due to the limitations associated with blockchain and IoT devices. This review paper illustrates the importance of preserving data confidentiality in SCM systems by highlighting the state of the art on confidentiality-preserving methodologies in the context of blockchain based IoT-SCM systems and the challenges associated with it.