• Title/Summary/Keyword: Data integrity

Search Result 1,363, Processing Time 0.032 seconds

Real-Time File Integrity Checker for Intrusion Recovery and Response System (침입 복구 및 대응 시스템을 위한 실시간 파일 무결성 검사)

  • Jeun Sanghoon;Hur Jinyoung;Choi Jongsun;Choi Jaeyoung
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.32 no.6
    • /
    • pp.279-287
    • /
    • 2005
  • File integrity checking is the most reliable method to examine integrity and stability of system resources. It is required to examine the whole data whenever auditing system's integrity, and its process and result depends on administrator's experience and ability. Therefore the existing method is not appropriate to intrusion response and recovery systems, which require a fast response time. Moreover file integrity checking is able to collect information about the damaged resources, without information about the person who generated the action, which would be very useful for intrusion isolation. In this paper, we propose rtIntegrit, which combines system call auditing functions, it is called Syswatcher, with file integrity checking. The rtlntegrit can detect many activities on files or file system in real-time by combining with Syswatcher. The Syswatcher audit file I/O relative system call that is specified on configuration. And it can be easily cooperated with intrusion response and recovery systems since it generates assessment data in the standard IDMEF format.

A Study on Characteristics and Techniques that Affect Data Integrity for Digital Forensic on Flash Memory-Based Storage Devices (플래시 메모리 기반 저장장치에서 디지털 포렌식을 위한 데이터 무결성에 영향을 주는 특성 및 기술 연구)

  • Hyun-Seob Lee
    • Journal of Internet of Things and Convergence
    • /
    • v.9 no.3
    • /
    • pp.7-12
    • /
    • 2023
  • One of the most important characteristics of digital forensics is integrity. Integrity means that the data has not been tampered with. If evidence is collected during digital forensic and later tampered with, it cannot be used as evidence. With analog evidence, it's easy to see if it's been tampered with, for example, by taking a picture of it. However, the data on the storage media, or digital evidence, is invisible, so it is difficult to tell if it has been tampered with. Therefore, hash values are used to prove that the evidence data has not been tampered with during the process of collecting evidence and submitting it to the court. The hash value is collected from the stored data during the evidence collection phase. However, due to the internal behavior of NAND flash memory, the physical data shape may change over time from the acquisition phase. In this paper, we study the characteristics and techniques of flash memory that can cause the physical shape of flash memory to change even if no intentional data corruption is attempted.

Dilution of Precision (DOP) Based Landmark Exclusion Method for Evaluating Integrity Risk of LiDAR-based Navigation Systems

  • Choi, Pil Hun;Lee, Jinsil;Lee, Jiyun
    • Journal of Positioning, Navigation, and Timing
    • /
    • v.9 no.3
    • /
    • pp.285-292
    • /
    • 2020
  • This paper introduces a new computational efficient Dilution of Precision (DOP)-based landmark exclusion method while ensuring the safety of the LiDAR-based navigation system that uses an innovation-based Nearest-Neighbor (NN) Data Association (DA) process. The NN DA process finds a correct landmark association hypothesis among all potential landmark permutations using Kalman filter innovation vectors. This makes the computational load increases exponentially as the number of landmarks increases. In this paper, we thus exclude landmarks by introducing DOP that quantifies the geometric distribution of landmarks as a way to minimize the loss of integrity performance that can occur by reducing landmarks. The number of landmarks to be excluded is set as the maximum number that can satisfy the integrity risk requirement. For the verification of the method, we developed a simulator that can analyze integrity risk according to the landmark number and its geometric distribution. Based on the simulation, we analyzed the relationship between DOP and integrity risk of the DA process by excluding each landmark. The results showed a tendency to minimize the loss of integrity performance when excluding landmarks with poor DOP. The developed method opens the possibility of assuring the safety risk of the Lidar-based navigation system in real-time applications by reducing a substantial amount of computational load.

The Influencing Factors on the Ego Integrity of Elderly Living Alone (독거노인의 자아통합감에 미치는 영향요인)

  • Jeong, Hyun Jeong;Yoon, Sook Hee
    • The Journal of Korean Academic Society of Nursing Education
    • /
    • v.21 no.4
    • /
    • pp.499-508
    • /
    • 2015
  • Purpose: This study was conducted in order to determine the extent of ego integrity and to confirm the association between the sense of ego integrity and integrated loneliness, social support, and social activities. Methods: For this study, 146 elderly people participated. The data was analyzed with SPSS/WIN 21.0, using descriptive statistics, t-test, ANOVA, correlation analysis, and hierarchical regression analysis. Results: In regards to differences between ego integrity according to general characteristics of subjects, there was a statistically significant difference in education (F=4.13, p=.007). In elderly living alone, ego integrity was significantly positive correlated with social support and social activities, but negative correlated with loneliness. These variables explained 43.2% of the sense of ego integrity. Conclusion: The study suggested that nursing programs and social activity programs designed to aid the elderly living alone must focus on reducing loneliness, as well as increasing social support and social activities, while taking education into consideration. Also, these programs should strive to build social support systems.

Development of Integrity Evaluation System for CANDU Pressure Tube (CANDU 압력관에 대한 건전성 평가 시스템 개발)

  • Kwak, Sang-Log;Lee, Joon-Seong;Kim, Young-Jin;Park, Youn-Won
    • Proceedings of the KSME Conference
    • /
    • 2000.11a
    • /
    • pp.843-848
    • /
    • 2000
  • The pressure tube is a major component of the CANDU reactor, which supports nuclear fuel bundle and it's containment vessel. If a flaw is found during the periodic inspection from the pressure tubes, the integrity evaluation must be carried out, and the safety requirements must be satisfied for continued service. In order to complete the integrity evaluation, complicated and iterative calculation procedures are required. Besides, a lot of data and knowledge for the evaluation are required for the entire integrity evaluation process. For this reason, an integrity evaluation system, which provides efficient way of evaluation with the help of attached databases, was developed. The developed system was built on the basis of ASME Sec. XI and FFSG(Fitness For Service Guidelines for zirconium alloy pressure tubes in operating CANDU reactors) issued by the AECL, and covers the delayed hydride cracking(DHC). Various analysis methods are provided for the integrity evaluation of pressure tube. In order to verify the developed system, several case studies have been performed and the results were compared with those from AECL. A good agreement was observed between those two results.

  • PDF

A Study on FAD Development for Probabilistic Pressure Tube Integrity Assessment (압력관의 확률론적평가에 타당한 파손평가선도 작성에 관한 연구)

  • Kwak, Sang-Log;Wang, Jong-Bae;Choi, Young-Hwan;Park, Youn-Won
    • Proceedings of the KSME Conference
    • /
    • 2003.11a
    • /
    • pp.1211-1215
    • /
    • 2003
  • Pressure tubes are major component of nuclear reactor, but only selected samples are periodically examined due to numerous numbers of tubes. Current in-service inspection result show there is high probability of flaw existence at un-inspected pressure tube. Probabilistic analysis is applied in this study for the integrity assessment of un-inspected pressure tube. But all the current integrity evaluations procedures are based on conventional deterministic approaches. So many integrity evaluation parameters are not directly apply to probabilistic analysis. As a result of this study failure assessment diagram are proposed based on test data.

  • PDF

The Effects of Ego Integrity on Death Anxiety of the Elderly: Focusing on the Mediating Effect of Depression (노인의 자아통합감이 죽음불안에 미치는 영향 : 우울의 매개효과를 중심으로)

  • Chang, Kyung-Eun
    • Korean Journal of Human Ecology
    • /
    • v.20 no.5
    • /
    • pp.917-926
    • /
    • 2011
  • The purpose of this study is to identify the influence of ego integrity on death anxiety of the elderly, mediated by depression based on Erikson theory(1963). For this study, 313 elderly over 60 years old in Daegu city participated in a survey. The data of the survey was analyzed using SPSS 15.0 and Structural Equation Modeling(SEM) with AMOS 7.0. The results of the study are as follows: ego integrity of the elderly does not influence death anxiety due to the suppressing effect of depression. However, depression does mediate the relation between ego integrity and death anxiety fully. Such findings suggest that the Erikson theory can also be applied to elderly Korean citizens. A practical benefit derived from the study's results is the proposition to implement a reminiscence program, reinforce depression treatment and prevention systems, and augment a death awareness movement for elderly.

Role of Supervisor Behavioral Integrity for Safety in the Relationship Between Top-Management Safety Climate, Safety Motivation, and Safety Performance

  • Peker, Mehmet;Dogru, Onur C.;Mese, Gulgun
    • Safety and Health at Work
    • /
    • v.13 no.2
    • /
    • pp.192-200
    • /
    • 2022
  • Background: This study examines whether employee perceptions of supervisor behavioral integrity for safety moderates the relationship between top-management safety climate and safety performance (i.e., safety compliance and safety participation) and the mediated relationships through safety motivation. Methods: Data collected from 389 blue-collar employees were analyzed using latent moderated structural equation modeling. Results: The results indicate that the relationship between top-management safety climate and safety behavior, and the mediating role of safety motivation were replicated. Moreover, the results show that the mediated relationships between top-management safety climate and safety behaviors through safety motivation were stronger for employees who report high supervisor behavioral integrity for safety. Conclusion: The study findings suggest the role of supervisor behavioral integrity for safety in clarifying how the employee perceptions of top-management safety climate transfer to the employee safety behaviors through the motivational pathway.

Privacy-Preserving Self-Certified Public Auditing for Secure Cloud Storage (안전한 클라우드 스토리지를 위한 프라이버시 보장 자체 인증 공공 감사)

  • Baek, Mokryeon;Kim, Dongmin;Jeong, Ik Rae
    • Journal of KIISE
    • /
    • v.43 no.4
    • /
    • pp.497-508
    • /
    • 2016
  • With a cloud storage service, data owners can easily access their outsourced data in cloud storage on different devices and at different locations, and can share their data with others. However, as the users no longer physically have possession of their outsourced data and the cloud still facing the existence of internal/external threats, the task of checking the data integrity is formidable. Over recent years, numerous schemes have been proposed to ensure data integrity in an untrusted cloud. However, the existing public auditing schemes use a third-party auditor(TPA) to execute high computation to check data integrity and may still face many security threats. In this paper, we first demonstrate that the scheme proposed by Zhang et al. is not secure against our two threat models, and then we propose a self-certified public auditing scheme to eliminate the security threats and guarantee a constant communication cost. Moreover, we prove the securities of our public auditing scheme under three security models.

Identity-based Provable Data Possession for Multicloud Storage with Parallel Key-Insulation

  • Nithya, S. Mary V.;Rhymend Uthariaraj, V.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.9
    • /
    • pp.3322-3347
    • /
    • 2021
  • Cloud Storage is the primary component of many businesses on cloud. Majority of the enterprises today are adopting a multicloud strategy to keep away from vendor lock-in and to optimize cost. Auditing schemes are used to ascertain the integrity of cloud data. Of these schemes, only the Provable Data Possession schemes (PDP) are resilient to key-exposure. These PDP schemes are devised using Public Key Infrastructure (PKI-) based cryptography, Identity-based cryptography, etc. PKI-based systems suffer from certificate-related communication/computational complexities. The Identity-based schemes deal with the exposure of only the auditing secret key (audit key). But with the exposure of both the audit key and the secret key used to update the audit key, the auditing process itself becomes a complete failure. So, an Identity-based PDP scheme with Parallel Key-Insulation is proposed for multiple cloud storage. It reduces the risk of exposure of both the audit key and the secret key used to update the audit key. It preserves the data privacy from the Third Party Auditor, secure against malicious Cloud Service Providers and facilitates batch auditing. The resilience to key-exposure is proved using the CDH assumption. Compared to the existing Identity-based multicloud schemes, it is efficient in integrity verification.