• Title/Summary/Keyword: Dynamic identity

Search Result 125, Processing Time 0.031 seconds

Designing and Producing Moving Identity for Dynamic Branding (Moving Identity를 설계 적용한 Dynamic Branding 연구)

  • Whang, Chris Inkyong;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.10a
    • /
    • pp.288-290
    • /
    • 2015
  • As well as companies such as Samsung Electronics and Hyundai Motor, which subject the summit of the International Conference on the UN personnel areemphasis on Moving Identity strongly appealing the goals and vision of the future for the current organization in the community and stakeholders. It is also an important part that how to relate Dynamic Branding in promotion and advertising method. In this paper, we are designing and producing ACM SIGCHI 2015 Conference opening animation utilizing Moving Identity Design concept as a promotional movie in Dynamic Branding perspective.

  • PDF

Traceable Dynamic Public Auditing with Identity Privacy Preserving for Cloud Storage

  • Zhang, Yinghui;Zhang, Tiantian;Guo, Rui;Xu, Shengmin;Zheng, Dong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.11
    • /
    • pp.5653-5672
    • /
    • 2019
  • In cloud computing era, an increasing number of resource-constrained users outsource their data to cloud servers. Due to the untrustworthiness of cloud servers, it is important to ensure the integrity of outsourced data. However, most of existing solutions still have challenging issues needing to be addressed, such as the identity privacy protection of users, the traceability of users, the supporting of dynamic user operations, and the publicity of auditing. In order to tackle these issues simultaneously, in this paper, we propose a traceable dynamic public auditing scheme with identity privacy preserving for cloud storage. In the proposed scheme, a single user, including a group manager, is unable to know the signer's identity. Furthermore, our scheme realizes traceability based on a secret sharing mechanism and supports dynamic user operations. Based on the security and efficiency analysis, it is shown that our scheme is secure and efficient.

A Dynamic Trust Framework for Sharing Identity Authentication (신원 인증 공유를 위한 동적 신뢰 프레임워크)

  • Park, Seung-Chul
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.10
    • /
    • pp.2199-2206
    • /
    • 2012
  • Identity authentication sharing technology which allows many service providers to share the result of identity authentication of an identity provider provides several important advantages including high usability achieved by avoiding repeated registration of identity information to service providers and single sign-on, cost effectiveness of service providers achieved by outsourcing identity authentication services from identity providers, and privacy protection achieved by exposing identity information only to a limited number of controlled identity providers. However, in order for the identity authentication sharing technologies to be widely deployed in global Internet scale, the trustworthiness issue among the participating identity providers, service providers, and users should be resolved in advance. This paper firstly analyzes existing trust frameworks for identity authentication sharing. And then, based on the result of analysis, this paper proposes a dynamic and open trust framework for identity authentication sharing.

A Fuzzy Identity-Based Signcryption Scheme from Lattices

  • Lu, Xiuhua;Wen, Qiaoyan;Li, Wenmin;Wang, Licheng;Zhang, Hua
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.11
    • /
    • pp.4203-4225
    • /
    • 2014
  • Fuzzy identity-based cryptography introduces the threshold structure into identity-based cryptography, changes the receiver of a ciphertext from exact one to dynamic many, makes a cryptographic scheme more efficient and flexible. In this paper, we propose the first fuzzy identity-based signcryption scheme in lattice-based cryptography. Firstly, we give a fuzzy identity-based signcryption scheme that is indistinguishable against chosen plaintext attack under selective identity model. Then we apply Fujisaki-Okamoto method to obtain a fuzzy identity-based signcryption scheme that is indistinguishable against adaptive chosen ciphertext attack under selective identity model. Thirdly, we prove our scheme is existentially unforgeable against chosen message attack under selective identity model. As far as we know, our scheme is the first fuzzy identity-based signcryption scheme that is secure even in the quantum environment.

Distributed Identity Management Model using SAML in Digital Ecosystem (디지털 생태계에서 SAML을 이용한 분산 아이디 관리모델)

  • Jang, In-Yong;Youm, Heung-Youl
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.9 no.6
    • /
    • pp.141-154
    • /
    • 2009
  • Digital Ecosystem is a new word for dynamic IT business environments. Digital Ecosystem can consist of various enterprise federations such as competing, collaborating and stable or unstable ones. They make it difficult to implement identity management for the environment. Existing solutions are either too restricting and inflexible to support the dynamic nature of ecosystems since they are too complex and difficult to adopt. This paper is to propose an distributed identity management model for automated processing of identity information between ecosystems. It is featured with being practical, clear and easy to deploy. And it is based on the new OASIS SAML3.0 standard to provide interoperability between existing identity technologies. This paper presents the basic and extended identity model for single service and multiple services. The model presented in this paper can be applied to enterprise context easily.

  • PDF

Secure and Efficient Privacy-Preserving Identity-Based Batch Public Auditing with Proxy Processing

  • Zhao, Jining;Xu, Chunxiang;Chen, Kefei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.2
    • /
    • pp.1043-1063
    • /
    • 2019
  • With delegating proxy to process data before outsourcing, data owners in restricted access could enjoy flexible and powerful cloud storage service for productivity, but still confront with data integrity breach. Identity-based data auditing as a critical technology, could address this security concern efficiently and eliminate complicated owners' public key certificates management issue. Recently, Yu et al. proposed an Identity-Based Public Auditing for Dynamic Outsourced Data with Proxy Processing (https://doi.org/10.3837/tiis.2017.10.019). It aims to offer identity-based, privacy-preserving and batch auditing for multiple owners' data on different clouds, while allowing proxy processing. In this article, we first demonstrate this scheme is insecure in the sense that malicious cloud could pass integrity auditing without original data. Additionally, clouds and owners are able to recover proxy's private key and thus impersonate it to forge tags for any data. Secondly, we propose an improved scheme with provable security in the random oracle model, to achieve desirable secure identity based privacy-preserving batch public auditing with proxy processing. Thirdly, based on theoretical analysis and performance simulation, our scheme shows better efficiency over existing identity-based auditing scheme with proxy processing on single owner and single cloud effort, which will benefit secure big data storage if extrapolating in real application.

The Conversion method from ID-based Encryption to ID-based Dynamic Threshold Encryption (ID기반 암호시스템을 이용하여 ID기반 동적 임계 암호시스템으로 변환하는 방법)

  • Kim, Mi-Lyoung;Kim, Hyo-Seung;Son, Young-Dong;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.4
    • /
    • pp.733-744
    • /
    • 2012
  • Dynamic threshold public-key encryption provides dynamic setting of the group of all users, receivers and the threshold value. Over recent years, there are many studies on the construction of scheme, called ID-based dynamic threshold encryption, which combines the ID-based encryption with dynamic threshold encryption. In this paper, we analyze the ID-based dynamic threshold encryption proposed by Xing and Xu in 2011, and show that their scheme has a structural problem. We propose a conversion method from ID-based encryption which uses the bilinear map to ID-based dynamic threshold encryption. Additionally, we prove this converted scheme has CPA security under the full model.

A Dynamic Defense Using Client Puzzle for Identity-Forgery Attack on the South-Bound of Software Defined Networks

  • Wu, Zehui;Wei, Qiang;Ren, Kailei;Wang, Qingxian
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.2
    • /
    • pp.846-864
    • /
    • 2017
  • Software Defined Network (SDN) realizes management and control over the underlying forwarding device, along with acquisition and analysis of network topology and flow characters through south bridge protocol. Data path Identification (DPID) is the unique identity for managing the underlying device, so forged DPID can be used to attack the link of underlying forwarding devices, as well as carry out DoS over the upper-level controller. This paper proposes a dynamic defense method based on Client-Puzzle model, in which the controller achieves dynamic management over requests from forwarding devices through generating questions with multi-level difficulty. This method can rapidly reduce network load, and at the same time separate attack flow from legal flow, enabling the controller to provide continuous service for legal visit. We conduct experiments on open-source SDN controllers like Fluid and Ryu, the result of which verifies feasibility of this defense method. The experimental result also shows that when cost of controller and forwarding device increases by about 2%-5%, the cost of attacker's CPU increases by near 90%, which greatly raises the attack difficulty for attackers.

Dynamic DNS design for HIP (HIP을 적용한 동적 DNS 설계)

  • Jung-Soo Park;In-June Jo
    • The Journal of Engineering Research
    • /
    • v.6 no.2
    • /
    • pp.125-130
    • /
    • 2004
  • In the current Internet, IP addresses does not support Mobility and Multi-homming because it depend on their topological location. To resolve these problems, IETF hip WG introduces Host Identity Protocol that separates the endpoint identifier and locator roles of IP addresses. However the DNS that was presented for the HIP had only a part of the expansion design from the existing DNS function, so it was not an absolute complete method. This paper propose how the dymanic DNS has been designed so that it support the HIP completely. We added the Host Identity Namespace and the Rendezvous Server Namespace, defined the new PRs in DNS.

  • PDF

A Traumatic Face of Colonial Hawai'i: The 1998 Asian American Event and Lois-Ann Yamanaka's Blu's Hanging

  • Kim, Chang-Hee
    • Journal of English Language & Literature
    • /
    • v.56 no.6
    • /
    • pp.1311-1337
    • /
    • 2010
  • This paper deals with one of the hottest debates in the history of the Association for Asian American Studies (AAAS) since its inception in the late 1960s. In 1998 at Hawai'i, the AAAS awarded Lois-Ann Yamanaka its Fiction Award for her novel Blu's Hanging, only to have this award protested. The point at issue was the inappropriate representation of Filipino American characters called "Human Rats" in the novel. This event divided the association into two groups: one criticizing the novel for the problematic portrayal of Filipinos in colonial Hawai'i, and the other defending it from the criticism in the name of aesthetic freedom. Such a "crisis of representation" in Asian American identity reflects on the ways in which local Hawaiians are positioned in the complicate power dynamic between oppositional Hawaiian identity and cosmopolitan diasporic identity within the larger framework of Asian American pan-ethnic identity. The controversial event triggered the eruption of Asian Americans' anxiety over the identity-bounded nation of Asian America where intra-racial classism and conflict have been at play, which are primary themes of Blu's Hanging. This paper shows how Yamanaka's Blu's Hanging becomes so disturbing a work to prevent the hegemonic formality of Asian America identity from being fully dogmatic. Ultimately, it contradicts the political unconscious of the reading public and unmasked its false consciousness by engendering a "free subjective intervention" in the ideological reality of colonial Hawai'i.