• 제목/요약/키워드: Data authentication

검색결과 959건 처리시간 0.029초

Multi-dimensional Query Authentication for On-line Stream Analytics

  • Chen, Xiangrui;Kim, Gyoung-Bae;Bae, Hae-Young
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제4권2호
    • /
    • pp.154-173
    • /
    • 2010
  • Database outsourcing is unavoidable in the near future. In the scenario of data stream outsourcing, the data owner continuously publishes the latest data and associated authentication information through a service provider. Clients may register queries to the service provider and verify the result's correctness, utilizing the additional authentication information. Research on On-line Stream Analytics (OLSA) is motivated by extending the data cube technology for higher multi-level abstraction on the low-level-abstracted data streams. Existing work on OLSA fails to consider the issue of database outsourcing, while previous work on stream authentication does not support OLSA. To close this gap and solve the problem of OLSA query authentication while outsourcing data streams, we propose MDAHRB and MDAHB, two multi-dimensional authentication approaches. They are based on the general data model for OLSA, the stream cube. First, we improve the data structure of the H-tree, which is used to store the stream cube. Then, we design and implement two authentication schemes based on the improved H-trees, the HRB- and HB-trees, in accordance with the main stream query authentication framework for database outsourcing. Along with a cost models analysis, consistent with state-of-the-art cost metrics, an experimental evaluation is performed on a real data set. It exhibits that both MDAHRB and MDAHB are feasible for authenticating OLSA queries, while MDAHRB is more scalable.

3차원 광메모리를 이용한 인증 기법 (Authentication Mechanism Using Three-Dimensional Optical Memory)

  • 박철용;류재철
    • 정보보호학회논문지
    • /
    • 제26권6호
    • /
    • pp.1361-1373
    • /
    • 2016
  • 최근 사용자 인증에 대한 요구가 증가하면서 패스워드, 그래픽인증, 토큰, 생체인식, 복합 인증 등 다양한 인증 기법이 사용되고 있다. 특히 편의성으로 인해 패스워드, 그래픽, 생체 인증 등 2차원적 요소(2차원 평면)의 데이터를 정보로 이용하고 2차원 모양의 특징 정보를 저장하여 인증에 적용되는데 저장되는 정보는 2차원 정보로 기록 저장된다. 이러한 인증 데이터는 정보를 기록하고 갱신함에 있어 추가적인 데이터 기록을 요구하는 문제가 있다. 또한 2차원 메모리는 저장 데이터의 양이 증가할수록 저장 데이터를 인증 데이터와 비교하는 시간이 증가하여 인증 절차 수행에 소요되는 시간이 증가하는 단점도 있다. 이러한 인증 데이터를 메모리에 저장 및 인증하는 기술에 있어 신속하게 인증 절차를 수행하는 것은 중요한 요소가 되었다. 본 논문에서는 메모리를 사용한 인증 데이터의 기록 및 인증에 있어 기존 방식의 단점을 보완하고자 3차원 광메모리를 이용하여 데이터의 기록시 기록요소를 다양하게 변경하여 서로 다른 저장 데이터를 다중 기록하는 방식을 구성함으로써 고밀도 기록이 가능하게 하고, 데이터의 기록 및 복원시 병렬처리가 가능한 방식을 적용하여 신속한 데이터의 기록 및 복원이 가능한 기법을 제안한다. 또한 인증 데이터 갱신시 기존에 기록된 저장 데이터를 조합하여 조합한 데이터를 인증에 이용함으로써 매번 추가적인 데이터 기록을 요구하는 문제를 해결하고자 한다. 제안한 인증 방식은 3차원 광메모리에 데이터를 기록 저장 후, 복원시 기록 조건에 상응하는 조건을 만족해야만 데이터가 복원되는 방식을 적용한 인증 기법을 제안하고 이를 시험을 통해 인증 기법으로 적용 가능함을 확인하였다.

블록체인을 활용한 다단계 인증 기법 설계 (Design of Multi-Step Authentication Method using Blockchain)

  • 김세민;홍성혁
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국정보통신학회 2021년도 춘계학술대회
    • /
    • pp.292-294
    • /
    • 2021
  • 본 연구에서는 블록체인을 활용하여 인증 데이터를 적재한 후 추후의 인증 데이터와 비교하여 재차 인증을 진행할 수 있는 인증 기법을 설계하였다. 이를 위하여 기존에 많이 활용하던 ID와 패스워드 입력 방법과 널리 활용되고 있는 ARS 인증 방식을 거친 후, 각 사용자의 단말기에 저장되어 있는 생체 데이터를 활용하여 인증을 진행하게 하였다. 이러한 단계를 거친 후 기존에 저장된 체인 데이터와 최근에 인증한 데이터를 비교하여 최종 인증을 진행한 후 인증된 데이터를 다시 체인 데이터에 다시 적재하는 방식을 선택하였다. 본 연구를 통하여 다양한 인증 방식에 대한 방안을 제시할 수 있을 것으로 기대된다.

  • PDF

A Study on Finding Emergency Conditions for Automatic Authentication Applying Big Data Processing and AI Mechanism on Medical Information Platform

  • Ham, Gyu-Sung;Kang, Mingoo;Joo, Su-Chong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제16권8호
    • /
    • pp.2772-2786
    • /
    • 2022
  • We had researched an automatic authentication-supported medical information platform[6]. The proposed automatic authentication consists of user authentication and mobile terminal authentication, and the authentications are performed simultaneously in patients' emergency conditions. In this paper, we studied on finding emergency conditions for the automatic authentication by applying big data processing and AI mechanism on the extended medical information platform with an added edge computing system. We used big data processing, SVM, and 1-Dimension CNN of AI mechanism to find emergency conditions as authentication means considering patients' underlying diseases such as hypertension, diabetes mellitus, and arrhythmia. To quickly determine a patient's emergency conditions, we placed edge computing at the end of the platform. The medical information server derives patients' emergency conditions decision values using big data processing and AI mechanism and transmits the values to an edge node. If the edge node determines the patient emergency conditions, the edge node notifies the emergency conditions to the medical information server. The medical server transmits an emergency message to the patient's charge medical staff. The medical staff performs the automatic authentication using a mobile terminal. After the automatic authentication is completed, the medical staff can access the patient's upper medical information that was not seen in the normal condition.

Integration of PKI and Fingerprint for User Authentication

  • Shin, Sam-Bum;Kim, Chang-Su;Chung, Yong-Wha
    • 한국멀티미디어학회논문지
    • /
    • 제10권12호
    • /
    • pp.1655-1662
    • /
    • 2007
  • Although the PKl-based user authentication solution has been widely used, the security of it can be deteriorated by a simple password. This is because a long and random private key may be protected by a short and easy-to-remember password. To handle this problem, many biometric-based user authentication solutions have been proposed. However, protecting biometric data is another research issue because the compromise of the biometric data will be permanent. In this paper, we present an implementation to improve the security of the typical PKI-based authentication by protecting the private key with a fingerprint. Compared to the unilateral authentication provided by the typical biometric-based authentication, the proposed solution can provide the mutual authentication. In addition to the increased security, this solution can alleviate the privacy issue of the fingerprint data by conglomerating the fingerprint data with the private key and storing the conglomerated data in a user-carry device such as a smart card. With a 32-bit ARM7-based smart card and a Pentium 4 PC, the proposed fingerprint-based PKI authentication can be executed within 1.3second.

  • PDF

자유로운 문자열의 키스트로크 다이나믹스와 일범주 분류기를 활용한 사용자 인증 (User Authentication Based on Keystroke Dynamics of Free Text and One-Class Classifiers)

  • 서동민;강필성
    • 대한산업공학회지
    • /
    • 제42권4호
    • /
    • pp.280-289
    • /
    • 2016
  • User authentication is an important issue on computer network systems. Most of the current computer network systems use the ID-password string match as the primary user authentication method. However, in password-based authentication, whoever acquires the password of a valid user can access the system without any restrictions. In this paper, we present a keystroke dynamics-based user authentication to resolve limitations of the password-based authentication. Since most previous studies employed a fixed-length text as an input data, we aims at enhancing the authentication performance by combining four different variable creation methods from a variable-length free text as an input data. As authentication algorithms, four one-class classifiers are employed. We verify the proposed approach through an experiment based on actual keystroke data collected from 100 participants who provided more than 17,000 keystrokes for both Korean and English. The experimental results show that our proposed method significantly improve the authentication performance compared to the existing approaches.

코사인 유사도 측정을 통한 행위 기반 인증 (A Behavior-based Authentication Using the Measuring Cosine Similarity)

  • 길선웅;이기영
    • 한국인터넷방송통신학회논문지
    • /
    • 제20권4호
    • /
    • pp.17-22
    • /
    • 2020
  • 현재 많은 연구가 진행되고 있는 행위 기반 인증 기술은 다른 인증 기술들에 비해서 인증의 인식률을 높이는데 많은 데이터의 장기간 추출이 필요하다. 본 논문은 안드로이드 환경의 스마트폰에 내재되어있는 터치 센서와 자이로스코프를 이용하여 그동안의 행위 기반 인증 연구에서 사용 되었던 행위 특징 데이터들 중에서 핵심적인 최소한의 데이터들만을 이용하기 위해 사용자에게 다섯 차례의 측정을 요구하여 다섯 번의 터치스크린 화면을 터치 하는 방식으로 총 6가지의 행위 특징 데이터를 수집하였고 다음 터치 측정으로 넘어가는 동안의 데이터들의 변화 값에 평균 값을 구하여 이 값과 측정값의 코사인 유사도 측정을 수행하여 코사인 유사도 허용 범위를 생성 한 후, 인증 시도 데이터의 코사인 유사도 값과 비교하는 방식의 사용자 행위 기반 인증 방식을 제안한다. 본 논문을 통해서 적은 수의 특징 데이터와 실험자수 환경에서도 코사인 유사도 인증 범위에 적용되는 임계값을 조절하는 방식을 통해서 최초 EER 37.6%에서 최종 EER 1.9%의 높은 성능을 증명하는데 성공하였다.

TIM: A Trapdoor Hash Function-based Authentication Mechanism for Streaming Applications

  • Seo, Seog Chung;Youn, Taek-Young
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제12권6호
    • /
    • pp.2922-2945
    • /
    • 2018
  • Achieving efficient authentication is a crucial issue for stream data commonly seen in content delivery, peer-to-peer, and multicast/broadcast networks. Stream authentication mechanisms need to be operated efficiently at both sender-side and receiver-side at the same time because of the properties of stream data such as real-time and delay-sensitivity. Until now, many stream authentication mechanisms have been proposed, but they are not efficient enough to be used in stream applications where the efficiency for sender and receiver sides are required simultaneously since most of them could achieve one of either sender-side and receiver-side efficiency. In this paper, we propose an efficient stream authentication mechanism, so called TIM, by integrating Trapdoor Hash Function and Merkle Hash Tree. Our construction can support efficient streaming data processing at both sender-side and receiver-side at the same time differently from previously proposed other schemes. Through theoretical and experimental analysis, we show that TIM can provide enhanced performance at both sender and receiver sides compared with existing mechanisms. Furthermore, TIM provides an important feature for streaming authentication, the resilience against transmission loss, since each data block can be verified with authentication information contained in itself.

Edge Computing-Based Medical Information Platform for Automatic Authentication Using Patient Situations

  • Gyu-Sung Ham;Mingoo Kang;Suck-Tae Joung;Su-Chong Joo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제17권4호
    • /
    • pp.1049-1065
    • /
    • 2023
  • Recently, with the development of IoT, AI, and mobile terminals, medical information platforms are expanding. The medical information platform can determine a patient's emergency situation, and medical staff can easily access patient information through a mobile terminal. However, in the existing platform, emergency situation decision is delayed, and faster and stronger authentication is required in emergency situations. Therefore, we propose an edge computing-based medical information platform for automatic authentication using patient situations. We design an edge computing-based medical information platform architecture capable of rapid transmission of biometric data of IoT and quick emergency situation decision, and implement the platform data flow in emergency situations. Relying on this platform, we propose the automatic authentication using patient situations. The automatic authentication protects patient information through patient-centered authentication by using the patient's situation as an authentication factor, and enables quick authentication by automatically proceeding with mobile terminal authentication after user authentication in emergencies without user intervention. We compared the proposed platform with existing platforms to show that it can make quick and stable emergency decisions. In addition, comparing the automatic authentication with existing authentication showed that it is fast and protects medical information centered on patient situations in emergency situations.

A Lightweight Integrity Authentication Scheme based on Reversible Watermark for Wireless Body Area Networks

  • Liu, Xiyao;Ge, Yu;Zhu, Yuesheng;Wu, Dajun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제8권12호
    • /
    • pp.4643-4660
    • /
    • 2014
  • Integrity authentication of biometric data in Wireless Body Area Network (WBAN) is a critical issue because the sensitive data transmitted over broadcast wireless channels could be attacked easily. However, traditional cryptograph-based integrity authentication schemes are not suitable for WBAN as they consume much computational resource on the sensor nodes with limited memory, computational capability and power. To address this problem, a novel lightweight integrity authentication scheme based on reversible watermark is proposed for WBAN and implemented on a TinyOS-based WBAN test bed in this paper. In the proposed scheme, the data is divided into groups with a fixed size to improve grouping efficiency; the histogram shifting technique is adopted to avoid possible underflow or overflow; local maps are generated to restore the shifted data; and the watermarks are generated and embedded in a chaining way for integrity authentication. Our analytic and experimental results demonstrate that the integrity of biometric data can be reliably authenticated with low cost, and the data can be entirely recovered for healthcare applications by using our proposed scheme.