• 제목/요약/키워드: Group Authentication

Search Result 206, Processing Time 0.023 seconds

Multi-group Information Management Techniques to efficiently Protect User Privacy in Heterogeneous Environments of 5G (5G의 이질적인 환경에서 사용자 프라이버시를 효율적으로 보호하기 위한 다중 그룹 정보 관리 기법)

  • Kim, Kyoum-Sun;Yon, Yong-Ho;Jeong, Yoon-Su
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.7
    • /
    • pp.1-7
    • /
    • 2019
  • With the recent commercialization of the next generation of wireless 5G in everyday life, many changes have been made to organizations, industries and businesses of various sizes in various fields. However, although the improved speed and latency of 5G has improved, improvements in encryption, authentication and privacy are still required. In this paper, multiple groups of information management techniques are proposed to efficiently protect users' privacy in the heterogeneous environment of 5G. The proposed technique aims to allow distributed management of users' privacy links by clouding the privacy information generated by different heterogeneous devices to efficiently interface with different groups. Suggestion techniques process user-specific privacy information independently in a virtual space so that users can periodically synchronize their privacy information.

SaaS Platform Structure Design for Authentication and Accounting based on Trusted Computing Technology (신뢰 컴퓨팅기술 기반 SaaS 인증 및 과금 플랫폼 구조 설계)

  • Lee, Sang Hwan;Kim, Jane Chungyoon;Jun, Sungik
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2007.11a
    • /
    • pp.991-994
    • /
    • 2007
  • 최근 컴퓨터 기술의 발전과 네트워크의 개방화 그리고 무선 모바일 통신 기술의 비약적인 보급으로 인하여 컴퓨팅 환경을 이루고 있는 각종 장치(PC, 모바일 단말, 저장장치, 네트워크 기기 등)가 다양한 형태의 보안 위협에 노출되어 데이터의 유실, 조작, 유출되어 금전적인 피해를 입거나 프라이버시 침해를 받고 있다. 이러한 문제를 근본적으로 해소하기 위하여 설립된 TCG(Trusted Computing Group)는 세계적인 IT 핵심기업들을 중심으로 구성된 비영리 단체로서 PC 혹은 모바일 기기 등의 단말과 서버 장비 그리고 저장 장치 및 네트워크로 구성된 컴퓨팅 환경에서 보안성 향상 및 데이터의 신뢰성을 제고하기 위하여 TPM(Trusted Platform Module)이라는 반도체 칩을 신뢰의 기반(root of trust)으로 한 신뢰 플랫폼을 제안하고 있다. 한편 SaaS(Software as a Service)는 패키지 형태의 소프트웨어를 네트워크 서비스 형태로 바꾸어 사용량에 비례한 요금제로 과금하는 방식을 채택하고 사용자가 온디맨드로 요청한 서비스를 적시에 제공하는 기술로 최근 전세계적으로 각광을 받고 있다. 이때 다양한 컴퓨팅 환경 안의 사용자에게 높은 신뢰성과 보안성 그리고 연속성을 갖는 SaaS 서비스를 제공하고 데이터의 무결성 및 비밀유지와 정확한 서비스 사용시간을 기록하고 업로드하는 기능들을 제공하는 SaaS 플랫폼은 TPM기반의 신뢰컴퓨팅 기술을 통하여 쉽게 구현될 수 있다. 본 논문에서는 일시적으로 네트워크와 차단된 상태의 PC 혹은 모바일 단말에서도 위의 조건들을 만족하는 SaaS 서비스를 지원하는 신뢰 플랫폼이 가져야 할 기능들에 대하여 분석-도출한 후 그러한 기능들을 제공하는 컴포넌트로 구성된 신뢰형 SaaS 사용자 플랫폼을 설계하였다.

  • PDF

A Multi-Level Access Control Scheme on Dynamic Multicast Services (동적 멀티캐스트 서비스상의 다단계 접근통제 기법)

  • 신동명;박희운;최용락
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.12 no.6
    • /
    • pp.47-58
    • /
    • 2002
  • The access control techniques, which can control unauthorized members to access to multicast service, have not been studied very often while there are a lot of on-going study on secure multicast architecture, multicast key distribution and sender authentication scheme have been studied. Multi level access control scheme in multicast can be used in a remote secure conference or to provide graduated multimedia services to each customers. In fact, multicast network has its own virtual networks according to different security levels. However, Early schemes are not effective when it protects unauthorized access in multi-access network environment. Furthermore this scheme does not provide us with hierarchical access control mechanism. This paper, therefore, proposes hierarchical access control scheme to provide the effectiveness in network layer by security level comparison. And we also suggests hierarchical key distribution scheme for multi level access control in application layer and effective hierarchical key renewal scheme in dynamic multicast environment which is easy to join and leaving the multicast group.

A Service Protection Scheme based on non-CAS for Mobile IPTV Service (Mobile IPTV 서비스 환경을 위한 non-CAS 기반의 서비스 보호 기법)

  • Roh, Hyo-Sun;Jung, Sou-Hwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.2
    • /
    • pp.27-35
    • /
    • 2011
  • Due to the advancement of IPTV technologies, Mobile IPTV service is needed to be supported for service and content protection. CAS is generally used in the IPTV service to protect service and content. However, the CAS is not efficient in the Mobile IPTV. The CAS needs too much bandwidth for Service Key update to the each subscriber. Moreover, the CAS is increasing computation burden for the service key refreshment in the key management server when the subscriber frequently changes of the IPTV service group. To solve the problems, we used hierarchical key structure based on pre-shared key that is securely stored into smart card or USIM and do not use the EMM for Service Key update. As a result, the proposed scheme decreases computation burden at the key management server and wireless bandwidth burden in the Mobile IPTV service.

Quantitative aspects of the hydrolysis of ginseng saponins: Application in HPLC-MS analysis of herbal products

  • Abashev, Mikhail;Stekolshchikova, Elena;Stavrianidi, Andrey
    • Journal of Ginseng Research
    • /
    • v.45 no.2
    • /
    • pp.246-253
    • /
    • 2021
  • Background: Ginseng is one of the most valuable herbal supplements. It is challenging to perform quality control of ginseng products due to the diversity of bioactive saponins in their composition. Acid or alkaline hydrolysis is often used for the structural elucidation of these saponins and sugars in their side chains. Complete transformation of the original ginsenosides into their aglycones during the hydrolysis is one of the ways to determine a total saponin group content. The main hurdle of this approach is the formation of various by-products that was reported by many authors. Methods: Separate HPLC assessment of the total protopanaxadiol, protopanaxatriol and ocotillol ginsenoside contents is a viable alternative to the determination of characteristic biomarkers of these saponin groups, such as ginsenoside Rf and pseudoginsenoside F11, which are commonly used for authentication of P. ginseng Meyer and P. quinquefolius L. samples respectively. Moreover, total ginsenoside content is an ideal aggregated parameter for standardization and quality control of ginseng-based medicines, because it can be directly applied for saponin dosage calculation. Results: Different hydrolysis conditions were tested to develop accurate quantification method for the elucidation of total ginsenoside contents in herbal products. Linearity, limits of quantification, limits of detection, accuracy and precision were evaluated for the developed HPLC-MS method. Conclusion: Alkaline hydrolysis results in fewer by-products than sugar elimination in acidic conditions. An equimolar response, as a key parameter for quantification, was established for several major ginsenosides. The developed approach has shown acceptable results in the analysis of several different herbal products.

A Secure Yoking-Proof Protocol Providing Offline Verification (오프라인 검증을 지원하는 안전한 요킹증명 프로토콜)

  • Ham, Hyoungmin
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.2
    • /
    • pp.113-120
    • /
    • 2021
  • RFID (Radio Frequency Identification) yoking authentication provides methods scanning a pair of RFID tags with a reader device and verifying them to ensure the physical proximity of objects. In the first yoking proof protocols, a verifier connected to a reader device online is essential to verify the yoking proof, and this condition limits the environment in which yoking proof can be applied. To solve this limitation, several studies have been conducted on offline yoking proof protocol that does not require the online connection between a reader and a verifier. However, the offline yoking proof protocols do not guarantee the basic requirements of yoking proof, and require relatively more operations on the tag compared to the previous yoking proof protocols. This paper proposes an efficient offline yoking proof protocol that supports offline verification without the need for an online verifier. The proposed protocol provides a secure yoking proof with fewer number of operations than the existing ones, and it also can be extended to the group proof for more than a pair of tags without additional devices. The analysis in this paper shows that the proposed protocol provides offline verification securely and effectively.

A Study on the Efficiency of Cafeteria Management Systems (구내식당 관리 시스템의 효율성에 관한 연구)

  • Shin-Hyeong Choi;Choon-Soo Lee
    • Journal of Advanced Technology Convergence
    • /
    • v.3 no.2
    • /
    • pp.9-15
    • /
    • 2024
  • Due to the high inflation rate of dining out, along with changes in group meals or cafeteria services, office workers are increasingly using workplace cafeterias to reduce their meal expenses even slightly. With the recent development of ICT technology, various fields are realizing that not only are smartphones becoming more popular, but they are also becoming an integration of the latest technologies. In this paper, we analyze the current status of cafeterias with a large number of customers and propose ways to improve problems or difficulties. Since most people always carry their smartphones for urgent communication or work tasks, we aim to develop a cafeteria management system that utilizes the NFC function of smartphones. By presenting the process from customer entry to menu selection, it will enable more efficient use of the cafeteria.

The Design and Implementation of User Authorization Module based on Zigbee for Automotive Smart-key System (차량용 스마트키 시스템을 위한 지그비 기반의 사용자 인증 모듈 설계 및 구현)

  • Kim, Kyeong-Seob;Lee, Yun-Seob;Yun, Hyun-Min;Choi, Sang-Bang
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.11
    • /
    • pp.2442-2450
    • /
    • 2010
  • Using sensor devices applied to various objects will be needed wireless network that it is easy to install in them. Tiny devices configured to processor that bas comparatively low computing ability are inappropriate to use devices that are wireless LAN, etc. In result, network devices needed to not only have simple communication protocol, but have Plug and Play function that it works as soon as it connects without installing any device driver. it also will industrially have both low power and low cost because of mobility of it. From IEEE 802.11 standard, WPAN(Wireless Personal Area Network) included in LAN is being developed by WPAN WG(Working Group) on area with low power consumption and low complexity. In addition to, it is standardizing MAC and PRY of the standard that is expected to wirelessly communicate within 10m. WPAN will be used generally in the more near future because of both low power and low cost of Zigbee. In this paper we designed zigbee based user authentication module for a automotive smart-key system.

A New Secure Multicast Protocol in Micro-Mobility Environments using Secure Group Key (마이크로 모빌리티 환경에서 보안 그룹키를 이용한 안전한 멀티캐스트 프로토콜)

  • Kang, Ho-Seok;Shim, Young-Chul
    • The KIPS Transactions:PartC
    • /
    • v.15C no.6
    • /
    • pp.573-586
    • /
    • 2008
  • The improved performance and miniaturization of computer and the improvement of wireless communication technology have enabled the emergence of many high quality services. Among them multicast services are receiving much attention and their usage is increasing due to the increase of Internet multimedia services such as video conference, multimedia stream, internet TV, etc. Security plays an important role in mobile multicast services. In this paper, we proposed a secure multicast protocol for a hierarchical micro-mobility environment. The proposed secure multicast protocol provides security services such as authentication, access control, confidentiality and integrity using mechanisms including symmetric/asymmetric key crypto-algorithms and capabilities. To provide forward/backward secrecy and scalability, we used sub-group keys based on the hierarchical micro-mobility environment. With this security services, it is possible to guard against all kinds of security attacks performed by illegal mobile nodes. Attacks executed by internal nodes can be thwarted except those attacks which delete packet or cause network resources to be wasted. We used simulator to measure the performance of proposed protocol. As a result, the simulation showed that effect of these security mechanisms on the multicast protocol was not too high.

An Enhanced System of Group Key Management Based on MIPUF in IoT (IoT 환경의 MIPUF 기반 그룹키 관리 시스템 개선)

  • Tak, Geum Ji;Jeong, Ik Rae;Byun, Jin Wook
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.6
    • /
    • pp.1243-1257
    • /
    • 2019
  • With the emergence of the IoT environment, various smart devices provide consumers with the convenience and various services. However, as security threats such as invasion of privacy have been reported, the importance of security issues in the IoT environment has emerged, and in particular, the security problem of key management has been discussed, and the PUF has been discussed as a countermeasure. In relation to the key management problem, a protocol using MIPUF has been proposed for the security problem of the group key management system. The system can be applied to lightweight IoT environments and the safety of the PUF ensures the safety of the entire system. However, in some processes, it shows vulnerabilities in terms of safety and efficiency of operation. This paper improves the existing protocol by adding authentication for members, ensuring data independence, reducing unnecessary operations, and increasing the efficiency of database searches. Safety analysis is performed for a specific attack and efficiency analysis results are presented by comparing the computational quantities. Through this, this paper shows that the reliability of data can be improved and our proposed method is lighter than existing protocol.