• 제목/요약/키워드: Data Security

검색결과 6,534건 처리시간 0.029초

Data Firewall: A TPM-based Security Framework for Protecting Data in Thick Client Mobile Environment

  • Park, Woo-Ram;Park, Chan-Ik
    • Journal of Computing Science and Engineering
    • /
    • 제5권4호
    • /
    • pp.331-337
    • /
    • 2011
  • Recently, Virtual Desktop Infrastructure (VDI) has been widely adopted to ensure secure protection of enterprise data and provide users with a centrally managed execution environment. However, user experiences may be restricted due to the limited functionalities of thin clients in VDI. If thick client devices like laptops are used, then data leakage may be possible due to malicious software installed in thick client mobile devices. In this paper, we present Data Firewall, a security framework to manage and protect security-sensitive data in thick client mobile devices. Data Firewall consists of three components: Virtual Machine (VM) image management, client VM integrity attestation, and key management for Protected Storage. There are two types of execution VMs managed by Data Firewall: Normal VM and Secure VM. In Normal VM, a user can execute any applications installed in the laptop in the same manner as before. A user can access security-sensitive data only in the Secure VM, for which the integrity should be checked prior to access being granted. All the security-sensitive data are stored in the space called Protected Storage for which the access keys are managed by Data Firewall. Key management and exchange between client and server are handled via Trusted Platform Module (TPM) in the framework. We have analyzed the security characteristics and built a prototype to show the performance overhead of the proposed framework.

빅데이터를 활용한 국내 보안솔루션 시장 동향 분석 (Analysis of Domestic Security Solution Market Trend using Big Data)

  • 박상천;박동수
    • 한국산학기술학회논문지
    • /
    • 제20권5호
    • /
    • pp.492-501
    • /
    • 2019
  • 사이버 공간에서 안전하게 시스템을 사용하기 위해서는 상황에 적합한 보안 솔루션을 사용해야 한다. 사이버 보안을 강화하기 위해 과거부터 현재까지 보안의 흐름을 정확히 파악하고 미래의 다양한 위협에 대비해야 한다. 본 연구에서는 텍스트마이닝을 이용하여 신뢰도가 높은 네이버 뉴스의 보안/해킹 뉴스의 정보보안 단어들을 수집 후 분석하였다. 첫 번째는 지난 7년의 연도별 보안 뉴스 기사수를 확인하고 추이를 분석하였다. 두 번째는 보안/해킹 관련 단어 순위를 확인 후 매년 주요 관심사를 확인하였다. 세 번째는 보안 솔루션별 단어를 분석하여 어느 보안 그룹의 관심도가 높은지 확인하였다. 네 번째는 보안 뉴스의 제목과 본문을 분리 후 보안 관련 단어를 추출 후 분석하였다. 다섯 번째는 세부 보안 솔루션별 추이 및 동향을 확인하였다. 마지막으로 연도별 매출액과 보안 단어 빈도수를 분석하였다. 이러한 빅데이터 뉴스 분석을 통해 보안 솔루션에 대한 전반적인 인식 조사를 수행하고 많은 비정형 데이터를 분석하여 현재 시장 추세를 분석하고 미래를 예측할 수 있는 정보를 제공하는 데 기여하고자 한다.

A Visualization System for Multiple Heterogeneous Network Security Data and Fusion Analysis

  • Zhang, Sheng;Shi, Ronghua;Zhao, Jue
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제10권6호
    • /
    • pp.2801-2816
    • /
    • 2016
  • Owing to their low scalability, weak support on big data, insufficient data collaborative analysis and inadequate situational awareness, the traditional methods fail to meet the needs of the security data analysis. This paper proposes visualization methods to fuse the multi-source security data and grasp the network situation. Firstly, data sources are classified at their collection positions, with the objects of security data taken from three different layers. Secondly, the Heatmap is adopted to show host status; the Treemap is used to visualize Netflow logs; and the radial Node-link diagram is employed to express IPS logs. Finally, the Labeled Treemap is invented to make a fusion at data-level and the Time-series features are extracted to fuse data at feature-level. The comparative analyses with the prize-winning works prove this method enjoying substantial advantages for network analysts to facilitate data feature fusion, better understand network security situation with a unified, convenient and accurate mode.

Employment Instability and Security Funds in U.S. Households

  • Baek, Eun-Woung
    • International Journal of Human Ecology
    • /
    • 제4권2호
    • /
    • pp.55-75
    • /
    • 2003
  • The purpose of this study was to investigate the effect of employment related factors on household savings for precautionary purposes when controlling for financial security and to compare the results between the two different economic periods. A conceptual framework was developed based on the precautionary saving theory, the family stress theory, and previous empirical studies. As a self-insurance, a measure of security funds were developed and used as the dependent variable. Using data on working households in the 1992 and the 1998 Survey of Consumer Finances (SCF), a MLE estimation was conducted on the pooled data. The 1992 and 1998 data were used to reflect periods of economic recession and expansion, respectively. The results suggested that factors representing resources played the most significant role in determining the amount of security funds. Some of the employment related factors, preferences, financial security, and race were also significantly affected the amount of security funds. The results suggested that stable employment conditions were important for households to accumulate security funds. Households with more human resources and financial resources had a larger amount of security funds than those that had less human and financial resources. From the findings, implications for research, policies, and financial educators had been suggested.

빅 데이터 보안 기술 및 대응방안 연구 (Big Data Security Technology and Response Study)

  • 김병철
    • 디지털융복합연구
    • /
    • 제11권10호
    • /
    • pp.445-451
    • /
    • 2013
  • 최근 국내 주요 금융권 및 방송사를 타깃으로 사이버 테러가 발생하여 많은 수의 PC가 감염되어 정상적인 서비스 제공이 어려워졌으며 이로 인한 금전적 피해도 매우 큰 것으로 보고되었다. 빅 데이터의 중요성 인식과 이를 마케팅에 이용하려는 노력은 매우 활발한데 비해 빅 데이터의 보안 및 개인정보보호에 대한 노력은 상대적으로 낮은 수준을 보이고 있다. 이에 본 연구에서는 빅 데이터 산업의 실태분석과 지능화되고 있는 빅 데이터 보안 위협과 방어 기술의 변화에 대해 알아보고, 빅 데이터 보안에 대한 향후 대응방안을 제시한다.

Secure and Efficient Privacy-Preserving Identity-Based Batch Public Auditing with Proxy Processing

  • Zhao, Jining;Xu, Chunxiang;Chen, Kefei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제13권2호
    • /
    • pp.1043-1063
    • /
    • 2019
  • With delegating proxy to process data before outsourcing, data owners in restricted access could enjoy flexible and powerful cloud storage service for productivity, but still confront with data integrity breach. Identity-based data auditing as a critical technology, could address this security concern efficiently and eliminate complicated owners' public key certificates management issue. Recently, Yu et al. proposed an Identity-Based Public Auditing for Dynamic Outsourced Data with Proxy Processing (https://doi.org/10.3837/tiis.2017.10.019). It aims to offer identity-based, privacy-preserving and batch auditing for multiple owners' data on different clouds, while allowing proxy processing. In this article, we first demonstrate this scheme is insecure in the sense that malicious cloud could pass integrity auditing without original data. Additionally, clouds and owners are able to recover proxy's private key and thus impersonate it to forge tags for any data. Secondly, we propose an improved scheme with provable security in the random oracle model, to achieve desirable secure identity based privacy-preserving batch public auditing with proxy processing. Thirdly, based on theoretical analysis and performance simulation, our scheme shows better efficiency over existing identity-based auditing scheme with proxy processing on single owner and single cloud effort, which will benefit secure big data storage if extrapolating in real application.

특성 벡터를 이용한 얼굴 인증 시스템에서 변환된 생체 정보 데이터의 가역성에 대한 보안 문제 분석 (The Security Problem Analysis for Reversibility of Transformed Biometric Information Data on Eigenvector-based face Authentication)

  • 김군순;강전일;양대헌;이경희
    • 정보보호학회논문지
    • /
    • 제18권3호
    • /
    • pp.51-59
    • /
    • 2008
  • 생체 정보 인식은 사용자의 인증을 위한 수단으로써 많은 연구가 진행 되어 오고 있다. 그 중 얼굴 인식 분야에서 특성벡터를 이용한 사용자의 얼굴 인식 기법이 존재한다. 이 기법은 전체 얼굴 데이터 집합에서 벡터 공간을 만들어 내고 생체정보 템플릿을 사상시켜 추상화된 데이터를 생성하는 기법이다. 그러나 생체 정보의 보안성을 일컫는 개념인 취소 가능한 특성(Cancelable Feature)을 기대 할 수 는 없다. 이 논문에서는 특성 벡터를 이용한 얼굴 인증 시스템에서 변환된 생체정보 데이터의 복원에 대한 보안 문제를 지적하고, 예상 가능한 공격 시나리오를 실험을 통해 보인다.

기밀정보 유출 경험을 가진 기업들의 정보사고 대응역량 강화에 관한 연구 (The Correspondence Competence of Information Accident by Firms Experienced in Confidential Information Leak)

  • 정병호
    • 디지털산업정보학회논문지
    • /
    • 제12권2호
    • /
    • pp.73-86
    • /
    • 2016
  • The purpose of this study is to examine a security investment for firms experienced in confidential information leak. Information security is an apparatus for protection of secret information. The competence of information security is a competitiveness to avoid information leakage in changing business environment. The type of information security is divided into administrative security, technical security and physical security. It is necessary to improve the incident correspondence competence through information security investment of the three types. Therefore, the investment of information security is to enhance information-asset protection of firms. To reinforce accident response competence, an organization discussed an establishment, security technology development, expand investment and legal system of the security system. I have studied empirically targeting the only information leak of firms. This data is a technical security competence and technology leakage situation of firms happened in 2010. During recovery of the DDos virus damage on countries, company and individual, the collected data signify a reality of information security. The data also identify a security competence of firms worrying information security management. According to the study, the continuous investment of information security has a high competence of accident correspondence. In addition, the most of security accidents showed a copy and stealing of paper and computer files. Firm on appropriate security investment is an accident correspondence competence higher than no security investment regardless of a large, small and medium-sized, and venture firm. Furthermore, the rational security investment should choose the three security type consideration for firm size.

고속 모뎀에서의 AES-CCM 보안 모드 구현에 관한 연구 (Research on the Implementation of the AES-CCM Security Mode in a High Data-Rate Modem)

  • 이현석;박승권
    • 전기학회논문지P
    • /
    • 제60권4호
    • /
    • pp.262-266
    • /
    • 2011
  • In high data-rate communication systems, encryption/decryption must be processed in high speed. In this paper, we implement CCM security mode which is the basis of security. Specifically, we combine CCM with AES block encryption algorithm in hardware. With the combination, we can carry out encryption/decryption as well as data transmission/reception simultaneously without reducing data-rate, and we keep low-power consumption with high speed by optimizing CCM block.

정보보호 안전진단 대상자 선정 기준의 개선 방안 연구 (An Enhanced Model on the Selection of Information Protection Security Diagnosis Target Firms)

  • 안연식
    • 한국IT서비스학회지
    • /
    • 제8권1호
    • /
    • pp.47-58
    • /
    • 2009
  • The information protection security diagnosis institution was applied services since 2004, for the leveling up of public information protection and the establishment of the stability and reliability of information communication. And this security diagnosis was implemented actually on the 142 firms in 2005, the 160 firms in 2006 and the 205 firms in 2007. But this is recognized by the some firms as one of the unnecessary regulations. And there are some difficulties with collecting the subjective and reliable source data for establishing the information protection security diagnosis target. In this research, the enhanced model on the selection of information protection security diagnosis target firms was suggested by the interview with some expert and the analysis for the related actual data. By the model which are introduced from the statistical analysis of the related data and the summary of some expert's suggestions, information protection security diagnosis target can include the information telecommunication service providers taking 5 billion won as sales in a year, and web service providers like as shopping mall site, with the personal records of 2 million subscribers.