• Title/Summary/Keyword: Grid security

Search Result 326, Processing Time 0.024 seconds

Design of a Protocol to Delegate Signing Right for Multi-level Proxy Signature (다단계 대리서명을 위한 권한위임 프로토콜 설계)

  • Kim Seong-yeol
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.9 no.2
    • /
    • pp.361-365
    • /
    • 2005
  • Proxy signature schemes which allows original signer to delegate proxy signer to sign message on its behalf have a considerable amount of interest from researchers since Mambo[1] and have found many practical applications such as distributed network, Grid computing and electronic commerce. Araki[6] extended them to multi-level proxy signature. But it could not satisfy some security requirement. In this paper we propose a protocol to delegate signing right to another entity for multi-level proxy signature. Our protocol do not require secure channel and guarantee that nobody is able to repudiate delegation or acceptance of signing right, it is impossible for anyone to generate signature except designed and original signer can withdraw the delegation before expiration if it is necessary.

A Fast and Exact Verification of Inter-Domain Data Transfer based on PKI

  • Jung, Im-Y.;Eom, Hyeon-Sang;Yeom, Heon-Y.
    • Journal of Information Technology Applications and Management
    • /
    • v.18 no.3
    • /
    • pp.61-72
    • /
    • 2011
  • Trust for the data created, processed and transferred on e-Science environments can be estimated with provenance. The information to form provenance, which says how the data was created and reached its current state, increases as data evolves. It is a heavy burden to trace and verify the massive provenance in order to trust data. On the other hand, it is another issue how to trust the verification of data with provenance. This paper proposes a fast and exact verification of inter-domain data transfer and data origin for e-Science environment based on PKI. The verification, which is called two-way verification, cuts down the tracking overhead of the data along the causality presented on Open Provenance Model with the domain specialty of e-Science environment supported by Grid Security Infrastructure (GSI). The proposed scheme is easy-applicable without an extra infrastructure, scalable irrespective of the number of provenance records, transparent and secure with cryptography as well as low-overhead.

GEP-based Framework for Immune-Inspired Intrusion Detection

  • Tang, Wan;Peng, Limei;Yang, Ximin;Xie, Xia;Cao, Yang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.4 no.6
    • /
    • pp.1273-1293
    • /
    • 2010
  • Immune-inspired intrusion detection is a promising technology for network security, and well known for its diversity, adaptation, self-tolerance, etc. However, scalability and coverage are two major drawbacks of the immune-inspired intrusion detection systems (IIDSes). In this paper, we propose an IIDS framework, named GEP-IIDS, with improved basic system elements to address these two problems. First, an additional bio-inspired technique, gene expression programming (GEP), is introduced in detector (corresponding to detection rules) representation. In addition, inspired by the avidity model of immunology, new avidity/affinity functions taking the priority of attributes into account are given. Based on the above two improved elements, we also propose a novel immune algorithm that is capable of integrating two bio-inspired mechanisms (i.e., negative selection and positive selection) by using a balance factor. Finally, a pruning algorithm is given to reduce redundant detectors that consume footprint and detection time but do not contribute to improving performance. Our experimental results show the feasibility and effectiveness of our solution to handle the scalability and coverage problems of IIDS.

Proposal and Implementation on Non-Repudiation of Origin for DNP3 (DNP3에 적합한 발신 부인 방지 기법 제안과 그 구현)

  • Yu, Ki-Soon;Song, Kyoung-Young;Jang, Min-Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.5
    • /
    • pp.815-825
    • /
    • 2015
  • DNP3(Distributed Network Protocol) is one of the most representative protocols which is used in SCADA(Supervisory Control and Data Acquisition) system. IEC 62351 is listing the integrity, confidentiality, availability and non-repudiation or accountability as the security requirement. However, IEEE Std. 1815 that is DNP3 standards does not define a mechanism for non-repudiation or accountability. In this paper, we propose a non-repudiation of origin technique about the sender of critical ASDU and implement the proposed scheme using software such as OpenSSL and SCADA source code library.

A method for improving security and data accessibility in EMR systems based on GRID technologies (EMR 시스템을 위한 그리드 기술 기반의 보안성 및 데이터 접근성 향상 기법)

  • Shin, Dong-Min;Shin, Dong-Kyoo;Shin, Dong-Il
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2010.06c
    • /
    • pp.211-215
    • /
    • 2010
  • 지금까지 병원에서 사용하던 일반 종이차트를 벗어나 전자적으로 환자의 데이터를 기록하고 유전자 데이터를 이용하여 환자의 유사 질병까지 찾아 낼 수 있는 EMR(Electronic Medical Record 전자 의무 기록)이 개발되면서 의료계는 환자에게 더욱 신속하고 정확한 진료를 할 수 있게 되었다. 본 논문은 이에 그리드 환경을 접목하여 더 빠른 데이터 처리와 신뢰성 과 접근성을 높일 수 있는 방법을 제시한다. 첫째, 현재 기 개발된 EMR 시스템의 환경에서 인증된 사용자만이 스토리지에 접근 할 수 있도록 GSI Service를 이용하여 단일 인증 방식으로 보안성을 높이며 동시에 단 한번의 인증절차로 모든 자원을 활용 할 수 있다. 둘째, Replica Service를 이용하여 기존의 스토리지를 복제 하여 중요한 데이터 들을 보호하며 다수의 접근이 발생할 경우 처리를 분산 시킬 수 있는 방법을 제시한다. 그리드 미들웨어인 글로 버스가 스토리지와 서버 상에서 CA인증을 담당하며 파일 전송을 담당하는 RFT는 스토리지의 Replica를 관리하는 RLS서버의 정보를 사용 하여 멀리 떨어져 있는 복제된 데이터와의 관계를 기억하고 접근시 가장 가용성이 뛰어난 머신에서 데이터를 불러온다. 이런 글로버스의 서비스 들은 중요하며 고용량이 데이터를 분산 시킴으로써 데이터의 지역성을 높여 재사용 혹은 동시 접근시 처리 시간을 단축 시킬 수 있다. 본 논문은 그리드 환경을 접목하여 이러한 서비스를 구현할 경우 높은 신뢰성과 접근의 신속성을 보장할 수 있다고 제시한다.

  • PDF

Considering the accuracy and efficiency of the wireless sensor network Support Plan (무선 센서 네트워크에서의 정확도와 효율성을 고려한 기술 지원 방안)

  • You, Sanghyun;Choi, Jaehyun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.96-98
    • /
    • 2014
  • Wireless Sensor Network(WSN) is a wireless real-time information(Acquired from the sensor nodes that have the computing power and wireless communication capabilities.) collected, and to take advantage of processing techniques. Currently it is very diverse, such as environmental monitoring, health care, security, smart home, smart grid applications is that. Thus it is required in the wireless sensor network, the algorithm for the efficient use of the limited energy capacity. Suggested by the algorithm for selecting a cluster head node for a hybrid type and clustered, by comparing the amount of energy remaining and a connection between the nodes In this paper, we aim to increase efficiency and accuracy of the wireless sensor network.

  • PDF

Developing an Energy Self-Reliance Model in a Sri Lankan Rural Area (스리랑카 농촌 지역의 에너지 자립화 모델 개발)

  • Donggun Oh;Yong-heack Kang;Boyoung Kim;Chang-yeol Yun;Myeongchan Oh;Hyun-Goo Kim
    • New & Renewable Energy
    • /
    • v.20 no.1
    • /
    • pp.88-94
    • /
    • 2024
  • This study explored the potential and implementation of renewable energy sources in Sri Lanka, focusing on the theoretical potential of solar and wind energy to develop self-reliant energy models. Using advanced climate data from the European Centre for Medium-Range Weather Forecasts and Global Solar/Wind Atlas provided by the World Bank, we assessed the renewable energy potential across Sri Lanka. This study proposes off-grid and minigrid systems as viable solutions for addressing energy poverty in rural regions. Rural villages were classified based on solar and wind resources, via which we proposed four distinct energy self-reliance models: Renewable-Dominant, Solar-Dominant, Wind-Dominant, and Diesel-Dominant. This study evaluates the economic viability of these models considering Sri Lanka's current energy market and technological environment. The outcomes highlight the necessity for employing diversified energy strategies to enhance the efficiency of the national power supply system and maximize the utilization of renewable resources, contributing to Sri Lanka's sustainable development and energy security.

Design and Implementation of Factory Equipment Monitoring System using Grid-based Key Pre-Distribution (그리드 기반 키 선분배 방식을 사용하는 공장 설비 모니터링 시스템 설계 및 구현)

  • CHO, YANGHUI;PARK, JAEPYO;YANG, SEUNGMIN
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.11
    • /
    • pp.51-56
    • /
    • 2016
  • In this paper, we propose an Arduino-based plant monitoring system. The proposed system is based on the Arduino platform, using an environmental sensor and a pressure sensor for measuring temperature, humidity and illuminance in order to monitor the state of the environment and the facilities of the plant. Monitoring data are transmitted to a ZigBee coordinator connected to a server through a radio frequency transceiver. When using a pressure sensor and the environment sensor data stored on the host server, checking the pressure in the environment of the plant and equipment is intended to report any alarm status to the administrator. Using a grid line-based key distribution scheme, the authentication node dynamically generates a data key to protect the monitoring information. Applying a ZigBee wireless sensor network does not require additional wiring for the actual implementation of a plant monitoring system. Possible working-environment monitoring of an efficient plant can help analyze the cause of any failure by backtracking the working environment when a failure occurs. In addition, it is easy to expand or add a sensor function using the Arduino platform and an expansion board.

A Study on the Safe Route through the Analysis of the Density of the Gill Netters in the West Sea (자망어선 밀도 분석을 통한 서해안 안전항로에 관한 연구)

  • Yoo, Sang-Lok;Jeong, Jong-Chul;Jeong, Jae-Yong;Yim, Jeong-Bin
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.22 no.5
    • /
    • pp.389-401
    • /
    • 2016
  • This study attempted to present the monthly distribution of the inshore gill netters for the prevention of propeller failure caused by the damage of fishing gear by the merchant vessels in the West Sea. This study was conducted using the transmitting device of fishing location (V-Pass) data for 1 year in 2014. The grid intervals are $30minute{\times}30minute$ ($latitude{\times}longitude$) based on the section of the sea. A total of 56 sections were analyzed by constructing a grid. The results revealed that the section no. 194 with the highest density index showed no fishing gear damage accident. But the section no. 193 with a relatively lower density index showed more frequent fishing gear damage accident. It is because the section no. 193 is included in the main route of the merchant vessels. Based on this analysis, it is found that the fishing gears are not damaged in proportion to density index but risk of damage exists according to the main routes of merchant vessels. Therefore, for the safe navigation of the merchant vessels, notifying the waters of $34.5^{\circ}{\sim}35.5^{\circ}$ at latitude and $125.67^{\circ}{\sim}126^{\circ}$ at longitude, as a navigational warning area from May through September, will prevent marine accident, such as propeller failure and fishing gear damage. Accordingly, when the merchant vessels navigate in the section no. 193 and 203, the area of $34.5^{\circ}{\sim}35.5^{\circ}$ at latitude and $125.5^{\circ}{\sim}125.67^{\circ}$ at longitude is recommended for the safe navigation.

A Study on the Application of Cross-Certification Technology for the Automatic Authentication of Charging Users in ISO 15118 Standard (ISO 15118 충전 사용자 자동인증을 위한 교차인증서 기술의 적용에 관한 연구)

  • Lee, Sujeong;Shin, Minho;Jang, Hyuk-soo
    • The Journal of Society for e-Business Studies
    • /
    • v.25 no.2
    • /
    • pp.1-14
    • /
    • 2020
  • ISO 15118 is an international standard that defines communication between electric vehicles and electric vehicle chargers. Plug & Charge (PnC) was also defined as a technology to automatically authenticate users when using charging services. PnC indicates automatic authentication technology where all processes such as electric vehicle user authentication, charging and billing are automatically processed. According to the standard, certificates for chargers and CPSs (Certificate Provisioning Services) should be under the V2G (Vehicle to Grid) Root certificate. In Korea, the utility company operates its own PKI (Public Key Infrastructure), making it difficult to provide chargers under the V2G Root Certificate. Therefore, a method that can be authenticated is necessary even when you have different Root Certificates. This paper proposes to apply cross-certificate technology to PnC authentication. Automatic authentication of Cross Certification is to issue a cross-certificate of the Root CA and include it in the certificate chain to proceed with automatic authentication, even if you have different Root certificates. Applying cross-certificate technology enables verification of certificates under other Root certificates. In this paper, the PnC automatic authentication and cross certificate automatic authentication is implemented, so as to proceed with proof of concept proving that both methods are available. Define development requirements, certificate profiles, and user authentication sequences, and implement and execute them accordingly. This experiment confirms that two automatic authentication are practicable, especially the scalability of automatic authentication using cross-certificate PnC.