• 제목/요약/키워드: Data Security

검색결과 6,626건 처리시간 0.031초

Secure Multicast using Proxy Re-Encryption in an IoT Environment

  • Kim, SuHyun;Hwang, YongWoon;Seo, JungTaek
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제12권2호
    • /
    • pp.946-959
    • /
    • 2018
  • Recently interest in Internet of Things(IoT) has attracted significant attention at national level. IoT can create new services as a technology to exchange data through connections among a huge number of objects around the user. Data communication between objects provides not only information collected in the surrounding environment but also various personalized information. IoT services which provide these various types of data are exposed to numerous security vulnerabilities. If data is maliciously collected and used by an attacker in an IoT environment that deals with various data, security threats are greater than those in existing network environments. Therefore, security of all data exchanged in the IoT environment is essential. However, lightweight terminal devices used in the IoT environment are not suitable for applying the existing encryption algorithm. In addition, IoT networks consisting of many sensors require group communication. Therefore, this paper proposes a secure multicast scheme using the proxy re-encryption method based on Vehicular ad-hoc networks(VANET) environment. The proposed method is suitable for a large-scale dynamic IoT network environment using unreliable servers.

An Efficient Provable Secure Public Auditing Scheme for Cloud Storage

  • Xu, Chunxiang;Zhang, Yuan;Yu, Yong;Zhang, Xiaojun;Wen, Junwei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제8권11호
    • /
    • pp.4226-4241
    • /
    • 2014
  • Cloud storage provides an easy, cost-effective and reliable way of data management for users without the burden of local data storage and maintenance. Whereas, this new paradigm poses many challenges on integrity and privacy of users' data, since users losing grip on their data after outsourcing the data to the cloud server. In order to address these problems, recently, Worku et al. have proposed an efficient privacy-preserving public auditing scheme for cloud storage. However, in this paper, we point out the security flaw existing in the scheme. An adversary, who is on-line and active, is capable of modifying the outsourced data arbitrarily and avoiding the detection by exploiting the security flaw. To fix this security flaw, we further propose a secure and efficient privacy-preserving public auditing scheme, which makes up the security flaw of Worku et al.'s scheme while retaining all the features. Finally, we give a formal security proof and the performance analysis, they show the proposed scheme has much more advantages over the Worku et al.'s scheme.

보안성과 유연성을 갖춘 Peer-to-Peer 데이터 공유 기법의 설계 및 구현 (Design and Implementation of a Peer-to-Peer Data Sharing Scheme for Closed User Group with Security and Flexibility)

  • 이구연;이용;김화종;정충교;이동은
    • 정보보호학회논문지
    • /
    • 제15권4호
    • /
    • pp.61-70
    • /
    • 2005
  • We propose and implement a flexible secure peer-to-peer(P2P) file sharing scheme which can be used for data sharing among closed user group (CUG) members. When a member wants to share data, notification messages are sent to the members with whom the member wants to share data. Each notification message includes one-time password encrypted with the receiver's public key. A member who received the notification message can download the data by using the one-time password. The proposed scheme provides selective sharing, download confirmation and efficient storage management. In terms of security, the proposed scheme supports authentication, entity privacy, replay attack protection and disguise prevention. We also implement the proposed system and find that the system is very useful among P2P service of closed user groups.

Encryption-based Image Steganography Technique for Secure Medical Image Transmission During the COVID-19 Pandemic

  • Alkhliwi, Sultan
    • International Journal of Computer Science & Network Security
    • /
    • 제21권3호
    • /
    • pp.83-93
    • /
    • 2021
  • COVID-19 poses a major risk to global health, highlighting the importance of faster and proper diagnosis. To handle the rise in the number of patients and eliminate redundant tests, healthcare information exchange and medical data are transmitted between healthcare centres. Medical data sharing helps speed up patient treatment; consequently, exchanging healthcare data is the requirement of the present era. Since healthcare professionals share data through the internet, security remains a critical challenge, which needs to be addressed. During the COVID-19 pandemic, computed tomography (CT) and X-ray images play a vital part in the diagnosis process, constituting information that needs to be shared among hospitals. Encryption and image steganography techniques can be employed to achieve secure data transmission of COVID-19 images. This study presents a new encryption with the image steganography model for secure data transmission (EIS-SDT) for COVID-19 diagnosis. The EIS-SDT model uses a multilevel discrete wavelet transform for image decomposition and Manta Ray Foraging Optimization algorithm for optimal pixel selection. The EIS-SDT method uses a double logistic chaotic map (DLCM) is employed for secret image encryption. The application of the DLCM-based encryption procedure provides an additional level of security to the image steganography technique. An extensive simulation results analysis ensures the effective performance of the EIS-SDT model and the results are investigated under several evaluation parameters. The outcome indicates that the EIS-SDT model has outperformed the existing methods considerably.

Access Control Mechanism for CouchDB

  • Ashwaq A., Al-otaibi;Reem M., Alotaibi;Nermin, Hamza
    • International Journal of Computer Science & Network Security
    • /
    • 제22권12호
    • /
    • pp.107-115
    • /
    • 2022
  • Recently, big data applications need another database different from the Relation database. NoSQL databases are used to save and handle massive amounts of data. NoSQL databases have many advantages over traditional databases like flexibility, efficiently processing data, scalability, and dynamic schemas. Most of the current applications are based on the web, and the size of data is in increasing. NoSQL databases are expected to be used on a more and large scale in the future. However, NoSQL suffers from many security issues, and one of them is access control. Many recent applications need Fine-Grained Access control (FGAC). The integration of the NoSQL databases with FGAC will increase their usability in various fields. It will offer customized data protection levels and enhance security in NoSQL databases. There are different NoSQL database models, and a document-based database is one type of them. In this research, we choose the CouchDB NoSQL document database and develop an access control mechanism that works at a fain-grained level. The proposed mechanism uses role-based access control of CouchDB and restricts read access to work at the document level. The experiment shows that our mechanism effectively works at the document level in CouchDB with good execution time.

방산기술보호를 위한 방산기술 마스터 데이터 관리 체계 구현 방안 (A Study on the Implementation of Defense Technology Master Data Management System for Defense Technology Security)

  • 박흥순;김세용;권혁진
    • 정보보호학회논문지
    • /
    • 제31권1호
    • /
    • pp.111-122
    • /
    • 2021
  • 4차 산업혁명 기술의 확산으로 국내 방위산업은 첨단 기술이 집약된 산업 구조로 발전하고 있다. 방산기술의 중요성이 점차 증대됨에 따라 정부는 방산기술보호법을 제정하여 방산기술을 보유하거나 관리하는 기관을 대상으로 방산기술보호체계를 구축하도록 하고 있다. 대상기관이 기술보호체계를 도입하기 위해서는 보호대상이 되는 방산기술을 식별하고 체계적인 데이터 관리를 선행하여야 한다. 이를 위해 본 논문에서는 방산기술 데이터 관리를 위한 마스터 데이터 항목을 도출하고, 방위산업 환경에 적합한 방산기술 마스터 데이터 관리 시스템 구현 방안을 분석하였다. 도출된 방안으로 1차, 2차 마스터 데이터 등 방산기술 마스터 데이터를 식별하였고, AHP분석을 통해 마스터 데이터 관리시스템 목표 모델로 Co-existence 유형이 적합한 것으로 분석되었다. 방산기술 마스터 데이터 관리 시스템 도입을 통해 한층 강화된 방산기술보호 정책이 추진될 것으로 기대한다.

Big Data Key Challenges

  • Alotaibi, Sultan
    • International Journal of Computer Science & Network Security
    • /
    • 제22권4호
    • /
    • pp.340-350
    • /
    • 2022
  • The big data term refers to the great volume of data and complicated data structure with difficulties in collecting, storing, processing, and analyzing these data. Big data analytics refers to the operation of disclosing hidden patterns through big data. This information and data set cloud to be useful and provide advanced services. However, analyzing and processing this information could cause revealing and disclosing some sensitive and personal information when the information is contained in applications that are correlated to users such as location-based services, but concerns are diminished if the applications are correlated to general information such as scientific results. In this work, a survey has been done over security and privacy challenges and approaches in big data. The challenges included here are in each of the following areas: privacy, access control, encryption, and authentication in big data. Likewise, the approaches presented here are privacy-preserving approaches in big data, access control approaches in big data, encryption approaches in big data, and authentication approaches in big data.

CALS체계의 정보보호 구조 연구 (A Study on the Security Architecture of CALS System)

  • 남길현
    • 한국전자거래학회지
    • /
    • 제4권2호
    • /
    • pp.197-208
    • /
    • 1999
  • With developing computer and communication technologies, the concept of CALS system has been popular not only to military but also to commercial industries. The security problem is one of the most critical issues to construct CALS infrastructure. The CALS system needs some security functions such that data confidentiality, integrity, authenticity, availability, and non-repudiation. This paper proposes a security architecture model in CALS. The security architecture model is composed of 5 submodels such that network security model, authentication and key management model, operation and audit model, integrated database security model, and risk analysis model.

  • PDF

모바일 클라우드 환경에서 안전한 데이터 접근 제어에 관한 연구 (A Study on Secure Data Access Control in Mobile Cloud Environment)

  • 김시정;여상수
    • 디지털융복합연구
    • /
    • 제11권2호
    • /
    • pp.317-322
    • /
    • 2013
  • 최근 다양한 환경을 통한 인터넷 접속으로 모바일 클라우드 환경이 대중화되고 있다. 컴퓨터의 성능 향상과 서비스 개발을 통해 그 수요가 날로 증가됨에 따라 그 피해도 급증하고 있다. 때문에 모바일 클라우드 서비스에서 발생하는 대량의 데이터베이스 관리에서 요구되는 보안 사항의 문제점에 관한 연구가 요구된다. 현재 다양한 방식으로 데이터베이스로의 접근을 제한하는 보안 솔루션이 적용되고 있으나 모바일 클라우드와 같이 새로운 사용자 환경에 대한 보안 정책의 분석이 필요하다. 본 논문은 모바일 클라우드 환경에서 데이터베이스 관리를 통한 안전한 데이터 접근에 관한 취약성을 분석해 보고 안전한 데이터 관리에 대한 보안 요구사항을 알아본다. 클라우드에서 제공되는 서비스 상에서 발생하는 보안 위협에 관한 요소를 분석하고 이를 통하여 보다 안전한 접근제어에 대한 보안 요구사항을 도출한다. 향후 접근제어에 대한 보안 요구사항에 대한 시스템 적용과 평가에 대한 연구가 요구된다.

보안정책 서버의 경보데이터 분석을 위한 데이터마이닝 엔진의 구현 (Implementation of Data Mining Engine for Analyzing Alert Data of Security Policy Server)

  • 정경자;신문선
    • 한국컴퓨터정보학회논문지
    • /
    • 제7권4호
    • /
    • pp.141-149
    • /
    • 2002
  • 최근 네트워크 구성이 복잡해짐에 따라 정책기반의 네트워크 관리기술에 대한 필요성이 증가하고 있으며, 특히 네트워크 보안관리를 위한 새로운 패러다임으로 정책기반의 네트워크 관리 기술이 도입되고 있다. 보안정책 서버는 새로운 정책을 입력하거나 기존의 정책을 수정, 삭제하는 기능과 보안정책 결정 요구 발생시 정책결정을 수행하여야 하는데 이를 위해서는 보안정책 실행시스템에서 보내온 경보 메시지에 대한 분석 및 관리가 필요하다. 따라서 이 논문에서는 정책기반 네트워크 보안관리 프레임워크의 구조 중에서 보안정책 서버의 효율적인 보안정책 수립 및 수행을 지원하기 위한 경보데이터 관리기를 설계하고 구현한다. 경보 데이터 관리기는 데이터 마이닝 기법을 적용하여 경보 관리기나 고수준 분석기가 효율적으로 경보데이터를 분석하고 능동적인 보안정책관리를 지원할 수 있도록 한다.

  • PDF