• Title/Summary/Keyword: Database Protection

Search Result 247, Processing Time 0.025 seconds

The privacy protection algorithm of ciphertext nearest neighbor query based on the single Hilbert curve

  • Tan, Delin;Wang, Huajun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.9
    • /
    • pp.3087-3103
    • /
    • 2022
  • Nearest neighbor query in location-based services has become a popular application. Aiming at the shortcomings of the privacy protection algorithms of traditional ciphertext nearest neighbor query having the high system overhead because of the usage of the double Hilbert curves and having the inaccurate query results in some special circumstances, a privacy protection algorithm of ciphertext nearest neighbor query which is based on the single Hilbert curve has been proposed. This algorithm uses a single Hilbert curve to transform the two-dimensional coordinates of the points of interest into Hilbert values, and then encrypts them by the order preserving encryption scheme to obtain the one-dimensional ciphertext data which can be compared in numerical size. Then stores the points of interest as elements composed of index value and the ciphertext of the other information about the points of interest on the server-side database. When the user needs to use the nearest neighbor query, firstly calls the approximate nearest neighbor query algorithm proposed in this paper to query on the server-side database, and then obtains the approximate nearest neighbor query results. After that, the accurate nearest neighbor query result can be obtained by calling the precision processing algorithm proposed in this paper. The experimental results show that this privacy protection algorithm of ciphertext nearest neighbor query which is based on the single Hilbert curve is not only feasible, but also optimizes the system overhead and the accuracy of ciphertext nearest neighbor query result.

A Study of Effective Privacy Protection System on High Concurrent Transaction Database System (동시 트랜잭션이 많은 데이터베이스에서 효과적인 개인정보보호 시스템 연구)

  • Kang, Ji-Won
    • Convergence Security Journal
    • /
    • v.12 no.2
    • /
    • pp.107-113
    • /
    • 2012
  • Recently, according to the establishment of personal information protection Act, the public and private organizations are taking a step to protect personal information rights and interests by employing the technical methods such as the access control mechanism, cryptography, etc. The result of the personal information leakage causes a serious damage for the organization image and also has to face with the responsibility by law. However, applying access control and cryptographic approach on the personal information item for every connection to large database system causes significant performance degradation in a large database system. In this paper, we designed and implemented the light weight system using JVM (Java Virtual Machine) for the Oracle DBMS environment which the concurrent transaction occurs many, thereby the proposed system provides the minimum impact on the system performance and meets the need of personal information protection. The proposed system was validated on the personal information protection system which sits on a 'A' public organization's portal site and personnel information management system.

Design and Implementation of DB Protection System through Critical Query Signature (핵심 쿼리 결제를 통한 DB 보호 시스템 설계 및 구현)

  • Kim, Yang-Hoon;Kwon, Hyuk-Jun;Lee, Jae-Pil;Park, Chun-Oh;Kim, Jun-Woo;Chang, Hang-Bae
    • Journal of Korea Multimedia Society
    • /
    • v.14 no.2
    • /
    • pp.228-237
    • /
    • 2011
  • The risk of leakage or theft of critical data which is stored in database is increasing in accordance with evolution of information security paradigm. At the same time, needs for database security have been on the rapid increase due to endless leakage of massive personal information. The existing technology for prevention of internal information leakage possesses the technical limitation to achieve security goal completely, because the passive control method including a certain security policy, which allows the only authorized person to access to DBMS, may have a limitation. Hence in this study, we propose Query Signature System which signatures the queries accessing to the critical information by interrupting and passing them. Furthermore this system can apply a constant security policy to organization and protect database system aggressively by restricting critical query of database.

A Study on Cloud Database Management System Protection Profile for the Secure Cloud Environment (안전한 클라우드 환경을 위한 클라우드 데이터 관리 시스템에 적용 가능한 보호프로파일에 관한 연구)

  • Wi, Yukyeong;Kwak, Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.2
    • /
    • pp.411-429
    • /
    • 2014
  • As cloud computing has enabled, a variety of cloud services has come into wide use. Thus, cloud computing products can be easily identified in the IT market. Common Criteria is international standards for security evaluation performed of IT products. In addition, Consumers can be used as a objective guideline for the evaluation results. And, it is a provides for protection profile(security target of security products). For general, IT products are providing the protection profile. However, for cloud-related products of protection profile is not being provided. Thus, about cloud security products, there is no way for evaluation. Therefore, in this paper, we propose protection profile on cloud database management system for the secure cloud environment in common criteria.

A study on copyright protection & utilization of bibliographic utility database (서지유틸리티 데이타베이스의 저작권 보호와 이용에 관한 연구)

  • Hong, Jae Hyeon
    • Journal of the Korean Society for information Management
    • /
    • v.10 no.2
    • /
    • pp.111.1-111.1
    • /
    • 1993
  • There are two types of bibliographic database, the one IS bibliographic database with creativlty. theother is bibliographic database without creativlty, The purpose of this paper is to investigate the problemsof bibliographic database with creatlvity by giving consideration of copyright law and the problems ofbihographic database w~thout creat~vity by sui genem system. Thus thls paper provided the methods thatresolve the problems of the current copyright law in order to protect all types of database being producedby way of the cooperation between the libraries and the information service centers. Secondly, this paperprovlded the legal devlces to protect bibliographic database produced by the libraries wh~ch cannot beprotected due to the lack of the creatlvity in the selection or arrangement of the material.

A study on copyright protection & utilization of bibliographic utility database (서지유틸리티 데이타베이스의 저작권 보호와 이용에 관한 연구)

  • 홍재현
    • Journal of the Korean Society for information Management
    • /
    • v.10 no.2
    • /
    • pp.111-143
    • /
    • 1993
  • There are two types of bibliographic database, the one IS bibliographic database with creativlty. the other is bibliographic database without creativlty, The purpose of this paper is to investigate the problems of bibliographic database with creatlvity by giving consideration of copyright law and the problems of bihographic database w~thout creat~vity by sui genem system. Thus thls paper provided the methods that resolve the problems of the current copyright law in order to protect all types of database being produced by way of the cooperation between the libraries and the information service centers. Secondly, this paper provlded the legal devlces to protect bibliographic database produced by the libraries wh~ch cannot be protected due to the lack of the creatlvity in the selection or arrangement of the material.

  • PDF

A Study on Development of Fire Accident Analysis System Using Classification Model and Database (화재사고 분류모델 및 데이터베이스를 이용한 화재사고 분석시스템 구축에 관한 연구)

  • Kim In-Tae;Heo Jaeseok;Song Hee-Oeul;Ko Jae-Wook;Kim In-Won
    • Journal of the Korean Institute of Gas
    • /
    • v.2 no.1
    • /
    • pp.90-98
    • /
    • 1998
  • In order to establish detailed plans for fire protection and reduce the possible fire accidents in the future, collection of domestic and foreign fire accident cases and fundamental analysis are very important. In this study the classification model for fire accidents was developed and the direction to a new model was suggested by comparison ours with the accidents classification model of NFPA of United States of America and Japan. A new developed PC-based database program for fire accidents (FADBS) was used to analyse fire accidents easily and efficiently.

  • PDF

The Delineation of Water-Pollutant Buffering Zone for Sustaining Better Drinking Water Quality Using a GIS (GIS를 이용한 상수원 보호를 위한 수변구역 지정에 관한 연구)

  • Kim, Kye-Hyun;Yoon, Ho-Seok;Kwon, Woo-Suk
    • Journal of Environmental Impact Assessment
    • /
    • v.9 no.3
    • /
    • pp.239-248
    • /
    • 2000
  • The aggravating water quality from the expansion of industrialization along with increasing population lead to develop more intensive physical measures to secure better drinking water quality. This study was mainly initiated to establish a water-pollutant buffering zone for the upper stream basin of Paldang--the major source area of drinking water for the metropolitan Seoul and suburban areas with a population more than 13 million. Two different criteria were considered in determining the buffering distance from the edge of the streamflow : 1km-width buffer zone for the special protection area which has been strictly controlled by the conventional laws for the protection of drinking water supply, and 500m-width buffer zone for the rest of the area. To delineate the exact boundaries of the water-pollutant buffering zone, GIS database was created integrating topography, hydrography, cadastral, and other related layers. The newly designated water-pollutant buffering zone would contribute to improve the water quality in a long term along with the conservation of the wet land. More study, however, should be made within the water-pollutant buffering zone such as the detailed survey of the pollutants, vegetation, and ecosystem for more effective management of the buffering zone.

  • PDF

An Ethernet Ring Protection Method to Minimize Transient Traffic by Selective FDB Advertisement

  • Lee, Kwang-Koog;Ryoo, Jeong-Dong;Min, Seung-Wook
    • ETRI Journal
    • /
    • v.31 no.5
    • /
    • pp.631-633
    • /
    • 2009
  • We introduce an improved Ethernet ring protection method, selective filtering database (FDB) advertisement, to minimize traffic overshoot in the event of a failure or recovery. On the protection switching event, the proposed method makes all ring nodes perform an FDB flush except the FDB entries associated with their client subnets. Then, ring nodes rapidly exchange their client MAC address lists so that their FDBs are immediately updated by indirect MAC address learning. The proposed scheme guarantees fast and reliable protection switching over the standard scheme.