• Title/Summary/Keyword: Data Integrity Verification

Search Result 105, Processing Time 0.025 seconds

A DDMPF(Distributed Data Management Protocol using FAT) Design of Self-organized Storage for Negotiation among a Client and Servers based on Clouding (클라우딩 기반에서 클라이언트와 서버간 협상을 위한 자가 조직 저장매체의 DDMPF(Distributed Data Management Protocol using FAT) 설계)

  • Lee, Byung-Kwan;Jeong, Eun-Hee;Yang, Seung-Hae
    • Journal of Korea Multimedia Society
    • /
    • v.15 no.8
    • /
    • pp.1048-1058
    • /
    • 2012
  • This paper proposes the DDMPF(Distributed Data Management Protocol using FAT) which prevents data loss and keeps the security of self-organized storages by comprising a client, a storage server, and a verification server in clouding environment. The DDMPF builds a self-organized storage server, solves data loss by decentralizing the partitioned data in it in contrast to the centralized problem and the data loss caused by the storage server problems of existing clouding storages, and improves the efficiency of distributed data management with FAT(File Allocation Table). And, the DDMPF improves the reliability of data by a verification server's verifying the data integrity of a storage server, and strengthens the security in double encryption with a client's private key and the system's master key using EC-DH algorithm. Additionally, the DDMPF limits the number of verification servers and detects the flooding attack by setting the TS(Time Stamp) for a verification request message and the replay attack by using the nonce value generated newly, whenever the verification is requested.

Blockchain Technology and Utilization Schemes in Tactical Communication Network

  • Yoo, In-Deok;Lee, Woo-Sin;Kim, Hack-Joon;Jin, So-Yeon;Jo, Se-Hyeon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.23 no.12
    • /
    • pp.49-55
    • /
    • 2018
  • In this paper, we propose schemes of blockchain utilization in tactical communication environment. The military tactical communication environment has similar characteristics with blockchain network such as distributed architecture, decentralization, and the need for data integrity. A communication node constituting a tactical communication network is constituted by a system capable of configuring and connecting a network for each node. When a communication node, having such capabilities, is configured as a node of blockchain network, various functions could be performed. In this paper, we propose utilization schemes of authentication, integrity, record management, and privilege control based blockchain technology. Functions for authentication, integrity verification, and record management need to ensure the stored data and could track history. The requirement of function's characteristics are matched to blockchain which is storing data sequentially and difficult to hack data, so that it could perform functionally and sufficiently well. Functions for authority control should be able to assign different privileges according to the state of the requestor. Smart contract will function when certain conditions are satisfied and it will be able to perform its functions by using it. In this paper, we will look over functions and utilization schemes of blockchain technology which could reliably share and synchronize data in a tactical communication environment composed of distributed network environment.

Using Model Checking to Verify an Automotive Electric Parking Brake System (자동차 전자식 주차 브레이크 시스템 안전 요구사항 검증을 위한 모델검증 적용)

  • Choi, Jun Yeol;Cho, Joon Hyung;Choi, Yun Ja
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.6 no.4
    • /
    • pp.167-176
    • /
    • 2017
  • There are increasing policies and safeguards to prevent various human resource losses with the development of automotive industry. Currently ISO26262 $1^{st}$ edition has been released in 2011 to ensure functional safety of electrical and electronic systems and the $2^{nd}$ edition will be released in the second half of 2016 as part of a trend. The E/E (Electrical & Electronics) system requirements verification is required through walk-through, 인스펙션, semi-formal verification and formal verification in ISO 26262. This paper describe the efficiency of model checking for the E/E system requirements verification by applying the product development project of ASIL (Automotive Safety Integrity Level) D for the electrical parking brake system.

Development of Feedback Data Automated Verification Program for Mission S/W (임무 S/W 시험을 위한 피드백 데이터의 기댓값 검증 자동화 도구 개발)

  • Kwon, GI-Bong;Lee, Ha-Yoeun;Ha, Seok-Wun
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.49 no.10
    • /
    • pp.871-877
    • /
    • 2021
  • Aircraft defects are important matters directly related to the operation of the aircraft and the life of the pilot. The defects in the mission software that occur during aircraft control seriously affect the pilot's mission performance and safety. Therefore, the organization in charge of aircraft development or software defects are reinforced in the process to identify and eliminate defects in the early stages of development, and a lot of labor and time are spent, but due to the nature of the mission software, strong functional coupling with other avionics and high complexity, so there are restrictions on the identification and removal of software defects through the existing test method. This study analyzes the effect of securing mission software integrity and reducing test cost through data integrity verification by developing a tool that automates the verification of expected value of feedback data among communication data of mission computer interlocking equipment.

Enabling Efficient Verification of Dynamic Data Possession and Batch Updating in Cloud Storage

  • Qi, Yining;Tang, Xin;Huang, Yongfeng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.6
    • /
    • pp.2429-2449
    • /
    • 2018
  • Dynamic data possession verification is a common requirement in cloud storage systems. After the client outsources its data to the cloud, it needs to not only check the integrity of its data but also verify whether the update is executed correctly. Previous researches have proposed various schemes based on Merkle Hash Tree (MHT) and implemented some initial improvements to prevent the tree imbalance. This paper tries to take one step further: Is there still any problems remained for optimization? In this paper, we study how to raise the efficiency of data dynamics by improving the parts of query and rebalancing, using a new data structure called Rank-Based Merkle AVL Tree (RB-MAT). Furthermore, we fill the gap of verifying multiple update operations at the same time, which is the novel batch updating scheme. The experimental results show that our efficient scheme has better efficiency than those of existing methods.

Application of Probabilistic Fracture Mechanics Methodology (확률론적 파괴역학 수법의 적용성 검토)

  • 이준성;곽상록;김영진
    • Proceedings of the Korean Society of Precision Engineering Conference
    • /
    • 2001.04a
    • /
    • pp.667-670
    • /
    • 2001
  • For major structural components periodic inspections and integrity assessments are needed for the safety. However, many flaws are undetectable because sampling inspection is carried out during in-service inspection. Probabilistic integrity assessment is applied to take into consideration of uncertainty and variance of input parameters arise due to material properties and undetectable cracks. This paper describes a Probabilistic Fracture Mechanics(PEM) analysis based on the Monte Carlo(MC) algorithms. Taking a number of sampling data of probabilistic variables such as fracture toughness value, crack depth and aspect ratio of an initial surface crack, a MC simulation of failure judgement of samples is performed. For the verification of this analysis, a comparison study of th PFM analysis using a commercial code, mathematical method is carried out and a good agreement was observed between those results.

  • PDF

How to retrieve the encrypted data on the blockchain

  • Li, Huige;Zhang, Fangguo;Luo, Peiran;Tian, Haibo;He, Jiejie
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.11
    • /
    • pp.5560-5579
    • /
    • 2019
  • Searchable symmetric encryption (SSE) scheme can perform search on encrypted data directly without revealing the plain data and keywords. At present, many constructive SSE schemes were proposed. However, they cannot really resist the malicious adversary, because it (i.e., the cloud server) may delete some important data. As a result, it is very likely that the returned search results are incorrect. In order to better guarantee the integrity of outsourcing data, and ensure the correction of returned search results at the same time, in this paper, we combine SSE with blockchain (BC), and propose a SSE-on-BC framework model. We then construct two concrete schemes based on the size of the data, which can better provide privacy protection and integrity verification for data. Lastly, we present their security and performance analyses, which show that they are secure and feasible.

Design and Development of Logger of Image Data Integrity Verification System (영상 데이터 무결성 검증 시스템을 위한 Logger 설계 및 개발)

  • Kim, Myeongjun;TaeGeun, Yu;seokwon, Jeong;Park, Jaesung;Kwon, Taeun;Kang, Yunhee
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2022.11a
    • /
    • pp.650-652
    • /
    • 2022
  • 최근 데이터를 기반 응용개발이 다양한 분야에서 진행되고 있으며, 수집 데이터는 주요한 의사결정에 사용되고 있다. 이러한 데이터 기반 응용은 데이터의 무결성(data integrity)의 보장과 데이터 생산 과정에서의 진본 확인을 위한 체계가 요구된다. 본 논문에서는 영상 데이터의 무결성 검증 시스템을 구성하는 Logger 설계와 개발을 기술한다. 개발된 Logger 는 해시값을 통해 영상 데이터의 신뢰성을 만족할 수 있다면 영상 데이터를 통해 학습되어 생성된 학습 모델에 대한 신뢰성 또한 보장할 수 있다. Logger 는 라즈베리파이 환경에서 구현한 후 FPS 를 변경하며, 무결성 검증을 실험한다.

An Efficient Broadcast Authentication Scheme with Batch Verification for ADS-B Messages

  • Yang, Haomiao;Kim, Hyunsung;Li, Hongwei;Yoon, Eunjun;Wang, Xiaofen;Ding, Xuefeng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.10
    • /
    • pp.2544-2560
    • /
    • 2013
  • As a cornerstone of the next generation air traffic management (ATM), automatic dependent surveillance-broadcast (ADS-B) system can provide continual broadcast of aircraft position, identity, velocity and other messages over unencrypted data links to generate a common situational awareness picture for ATM. However, since ADS-B messages are unauthenticated, it is easy to insert fake aircrafts into the system via spoofing or insertion of false messages. Unfortunately, the authentication for ADS-B messages has not yet been well studied. In this paper, we propose an efficient broadcast authentication scheme with batch verification for ADS-B messages which employs an identity-based signature (IBS). Security analysis indicates that our scheme can achieve integrity and authenticity of ADS-B messages, batch verification, and resilience to key leakage. Performance evaluation demonstrates that our scheme is computationally efficient for the typical avionics devices with limited resources, and it has low communication overhead well suitable for low-bandwidth ADS-B data link.

Practical Requirements and Verification Management for Requirements-based Development Process in Space Launch Vehicle Development Project (요구조건 기준의 개발 수행을 위한 우주발사체 개발사업의 실제적인 요구조건-검증 관리 체계)

  • Dong Hyun Cho;Jun Hyouk Jang;Il Sang Yoo
    • Journal of the Korean Society of Systems Engineering
    • /
    • v.19 no.1
    • /
    • pp.56-63
    • /
    • 2023
  • For the success of system development, it is necessary to systematically manage the requirements that are the basis of system development and its verification results. In order to follow the principles of SE(Systems Engineering)-based V&V(Verification&Validation) process, requirements can be managed by securing the requirements and their establishments, design compliances, and verification compliances according to the system development lifecycle. Especially, in a large-complex system research and development project, such as a space launch vehicle development project, many participants establish, verify, and validate numerous requirements together during the project. Therefore, logical and systematic requirements management, including guarantee of data integrity, change history, and traceability, is very important for multiple participants to utilize numerous requirements together without errors. This paper introduces the practical requirements and verification management for the requirements-based development process in the space launch vehicle development project.