• Title/Summary/Keyword: Data integrity

Search Result 1,395, Processing Time 0.024 seconds

Role of Supervisor Behavioral Integrity for Safety in the Relationship Between Top-Management Safety Climate, Safety Motivation, and Safety Performance

  • Peker, Mehmet;Dogru, Onur C.;Mese, Gulgun
    • Safety and Health at Work
    • /
    • v.13 no.2
    • /
    • pp.192-200
    • /
    • 2022
  • Background: This study examines whether employee perceptions of supervisor behavioral integrity for safety moderates the relationship between top-management safety climate and safety performance (i.e., safety compliance and safety participation) and the mediated relationships through safety motivation. Methods: Data collected from 389 blue-collar employees were analyzed using latent moderated structural equation modeling. Results: The results indicate that the relationship between top-management safety climate and safety behavior, and the mediating role of safety motivation were replicated. Moreover, the results show that the mediated relationships between top-management safety climate and safety behaviors through safety motivation were stronger for employees who report high supervisor behavioral integrity for safety. Conclusion: The study findings suggest the role of supervisor behavioral integrity for safety in clarifying how the employee perceptions of top-management safety climate transfer to the employee safety behaviors through the motivational pathway.

Privacy-Preserving Self-Certified Public Auditing for Secure Cloud Storage (안전한 클라우드 스토리지를 위한 프라이버시 보장 자체 인증 공공 감사)

  • Baek, Mokryeon;Kim, Dongmin;Jeong, Ik Rae
    • Journal of KIISE
    • /
    • v.43 no.4
    • /
    • pp.497-508
    • /
    • 2016
  • With a cloud storage service, data owners can easily access their outsourced data in cloud storage on different devices and at different locations, and can share their data with others. However, as the users no longer physically have possession of their outsourced data and the cloud still facing the existence of internal/external threats, the task of checking the data integrity is formidable. Over recent years, numerous schemes have been proposed to ensure data integrity in an untrusted cloud. However, the existing public auditing schemes use a third-party auditor(TPA) to execute high computation to check data integrity and may still face many security threats. In this paper, we first demonstrate that the scheme proposed by Zhang et al. is not secure against our two threat models, and then we propose a self-certified public auditing scheme to eliminate the security threats and guarantee a constant communication cost. Moreover, we prove the securities of our public auditing scheme under three security models.

Identity-based Provable Data Possession for Multicloud Storage with Parallel Key-Insulation

  • Nithya, S. Mary V.;Rhymend Uthariaraj, V.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.9
    • /
    • pp.3322-3347
    • /
    • 2021
  • Cloud Storage is the primary component of many businesses on cloud. Majority of the enterprises today are adopting a multicloud strategy to keep away from vendor lock-in and to optimize cost. Auditing schemes are used to ascertain the integrity of cloud data. Of these schemes, only the Provable Data Possession schemes (PDP) are resilient to key-exposure. These PDP schemes are devised using Public Key Infrastructure (PKI-) based cryptography, Identity-based cryptography, etc. PKI-based systems suffer from certificate-related communication/computational complexities. The Identity-based schemes deal with the exposure of only the auditing secret key (audit key). But with the exposure of both the audit key and the secret key used to update the audit key, the auditing process itself becomes a complete failure. So, an Identity-based PDP scheme with Parallel Key-Insulation is proposed for multiple cloud storage. It reduces the risk of exposure of both the audit key and the secret key used to update the audit key. It preserves the data privacy from the Third Party Auditor, secure against malicious Cloud Service Providers and facilitates batch auditing. The resilience to key-exposure is proved using the CDH assumption. Compared to the existing Identity-based multicloud schemes, it is efficient in integrity verification.

Blockchain Technology and Utilization Schemes in Tactical Communication Network

  • Yoo, In-Deok;Lee, Woo-Sin;Kim, Hack-Joon;Jin, So-Yeon;Jo, Se-Hyeon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.23 no.12
    • /
    • pp.49-55
    • /
    • 2018
  • In this paper, we propose schemes of blockchain utilization in tactical communication environment. The military tactical communication environment has similar characteristics with blockchain network such as distributed architecture, decentralization, and the need for data integrity. A communication node constituting a tactical communication network is constituted by a system capable of configuring and connecting a network for each node. When a communication node, having such capabilities, is configured as a node of blockchain network, various functions could be performed. In this paper, we propose utilization schemes of authentication, integrity, record management, and privilege control based blockchain technology. Functions for authentication, integrity verification, and record management need to ensure the stored data and could track history. The requirement of function's characteristics are matched to blockchain which is storing data sequentially and difficult to hack data, so that it could perform functionally and sufficiently well. Functions for authority control should be able to assign different privileges according to the state of the requestor. Smart contract will function when certain conditions are satisfied and it will be able to perform its functions by using it. In this paper, we will look over functions and utilization schemes of blockchain technology which could reliably share and synchronize data in a tactical communication environment composed of distributed network environment.

A Study on Forensic Integrity Proof Standard a Cellular Phone Confiscation Criminal Investigation (휴대폰 압수수색 표준절차와 포렌식 무결성 입증)

  • Lee, Gyu-An;Park, Dae-Woo;Shin, Young-Tae
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.6C
    • /
    • pp.512-519
    • /
    • 2008
  • The proof of a cellular phone used to a crime important data of a criminal investigation and legal judgment become. A lot of on a process use the file format that do not become that is kind of various cellular phones and model pipe, and collect criminal proof, and to analyze be difficult. Also, standardization is not made, and can be adopted on procedures from confiscation search processes regarding a cellular phone to integrity extractions of Forensic data in courts in the confiscation criminal investigation spots. Standardize confiscation search procedures of a cellular phone at these papers. Use a radio waves interception envelope and radio waves interception device for a movement which a security does integrity of criminal on-site cellular phone confiscation search data by standard procedures, and was devoted to. Analyze corroborative facts of a cellular phone seized, and verify integrity, and present problems regarding cellular phone confiscation search procedures and measures, and will contribute in development of Mobile Forensic through integrity damage experiment.

Development of CANDU Pressure Tube Integrity Evaluation System : Its Application to Delayed Hydride Cracking and Blister (CANDU 압력관에 대한 건선성평가 시스템 개발-지체수소균열 및 블러스터 평가에의 적용)

  • 곽상록;이준성;김영진;박윤원
    • Journal of the Korean Society for Precision Engineering
    • /
    • v.19 no.11
    • /
    • pp.174-182
    • /
    • 2002
  • The integrity evaluation of pressure tube is essential for the safety of CANDU reactor, and integrity must be assured when flaws or contacts between pressure tube and surrounding calandria tube are found. In order to complete the integrity evaluation, not only complicated and iterative calculation procedures but also a lot of data and knowledge are required. For this reason, an integrity evaluation system, which provides an efficient way of the evaluation with the help of attached databases, was developed. The developed system was built on the basis of ASME Sec.? and FFSG issued by the AECL, and applicable for the evaluation of blister, sharp flaw and blunt notch. Delayed hydride cracking and blister evaluation modules are included in the general flaw and notch evaluation module. In order to verify the developed system, several case studies have been performed and the results were compared with those from AECL. A good agreement was observed between those two results.

Integrity Evaluation System of CANDU Reactor Pressure Tube

  • Kim, Young-Jin;Kwak, Sang-Log;Lee, Joon-Seong;Park, Youn-Won
    • Journal of Mechanical Science and Technology
    • /
    • v.17 no.7
    • /
    • pp.947-957
    • /
    • 2003
  • The pressure tube is a major component of the CANDU reactor, which supports nuclear fuel bundle. In order to complete the integrity evaluation of pressure tube, expert knowledge, iterative calculation procedures and a lot of input data are required. More over, results of integrity assessment may be different according to the evaluation method. For this reason, an integrity evaluation system, which provides efficient way of evaluation with the help of attached database, was developed. The present system was built on the basis of 3D FEM results, ASME Sec. XI, and Fitness For Service Guidelines for CANDU pressure tubes issued by the AECL (Atomic Energy Canada Limited). The present system also covers the delayed hydride cracking and the blister evaluation, which are the characteristics of pressure tube integrity evaluation. In order to verify the present system, several case studies have been performed and the results were compared with those from AECL. A good agreement was observed between those two results.

Integrity Verification in Vehicle Black Box Video Files with Hashing Method (차량용 블랙박스 영상파일의 무결성 검증에 해시함수 이용 방법)

  • Choi, Jin-young;Chang, Nam Su
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.42 no.1
    • /
    • pp.241-249
    • /
    • 2017
  • Recently, as a vehicle black box device has propagated, it has been increasingly used as a legal proof and there are the needs to verify an integrity of the video data. However, since the black box classified as the embedded system has a small capacity and low processing speed, there are limitations to the storage of video files and the integrity verification processing. In this paper, we propose a novel method for video files integrity in the black box environment with limited resources by using lightweight hash function LSH and the security of HMAC. We also present the test results of CPU idle rate at integrity verification in vehicle black box device by implementing this method, and verify the effectiveness and practicality of the proposed method.

Development of CANDU Pressure Tube Integrity Evaluation System;Its Application to Sharp Flaw and Blunt Notch (CANDU 압력관에 대한 건전성 평가시스템 개발;예리한 결함 및 둔한 노치에의 적용)

  • Gwak, Sang-Rok;Lee, Jun-Seong;Kim, Yeong-Jin;Park, Yun-Won
    • Transactions of the Korean Society of Mechanical Engineers A
    • /
    • v.24 no.1 s.173
    • /
    • pp.206-214
    • /
    • 2000
  • The pressure tube is a major component of the CANDU reactor, which supports nuclear fuel bundle and it's containment vessel. If a flaw is found during the periodic inspection from the pressure tube s. the integrity evaluation must be carried out. and the safety requirements must be satisfied for continued service. In order to complete the integrity evaluation, complicated and iterative calculation procedures are required. Besides, a lot of data and knowledge for the evaluation are required for the entire: integrity evaluation process. For this reason. an integrity evaluation system, which provides efficient of evaluation with the help of attached databases, was developed. The developed system was built on the basis of ASME Sec. XI and FFSG(Fitness For Service Guidelines for zirconium alloy pressure tubes in operating CANDU reactors) issued by the AECL, and covers the delayed hydride cracking(DHC). This system does not only provide various databases including the 3-D finite element analysis results on pressure tubes, inspection data and design specifications but also is compatible with other commercial database software. In order to verify the developed system, several case studies have been performed and the results were compared with those from AECL. A good agreement was observed between those two results.

The Effects of Elderly's Participation in Lifelong Education on the Ego Integrity, and The Mediating Effect of Life Satisfaction (노인평생교육 참여가 자아통합감에 미치는 영향과 생활만족도의 매개효과)

  • Kim, Dong bae;Jeong, Kyu hyoung;Lee, Eun Jin
    • 한국노년학
    • /
    • v.32 no.3
    • /
    • pp.801-817
    • /
    • 2012
  • This study focused on the relationship between elderly's participation in lifelong education(participation availability, participating fields) and ego integrity. To verify the correlation of two variables, mediating model structured by life satisfaction was used. The data was Seoul Welfare Panel Data made by Seoul Welfare Foundation in 2010 and the total subject was 1,862 elderly aged over 60. When it comes to research methods, structured equation analysis for verifying the mediating effect was practiced. The findings are as follows: First, life satisfaction did function as partial mediator on relationship between elderly's participation in lifelong education and ego integrity. Second, elderly's life satisfaction increased as participating in field of language, not in field of culture and art. Ego integrity of elderly was increased as participating in field of culture and art, not in field of self-improvement and hobby. This study indicates theoretical and practical interventions to promote elderly's lifelong education based on the conclusion elderly's lifelong education participation in the aging society has positive effects on life satisfaction and ego integrity are meaningful for successful aging.