• Title/Summary/Keyword: Information Security Management Evaluation

Search Result 290, Processing Time 0.024 seconds

User privacy protection model through enhancing the administrator role in the cloud environment (클라우드 환경에서 관리자 역할을 강화한 사용자 프라이버시 보호 모델)

  • Jeong, Yoon-Su;Yon, Yong-Ho
    • Journal of Convergence for Information Technology
    • /
    • v.8 no.3
    • /
    • pp.79-84
    • /
    • 2018
  • Cloud services are readily available through a variety of media, attracting a lot of attention from users. However, there are various security damages that abuse the privacy of users who use cloud services, so there is not enough technology to prevent them. In this paper, we propose a protection model to safeguard user's privacy in a cloud environment so as not to illegally exploit user's privacy. The proposed model randomly manages the user's signature to strengthen the role of the middle manager and the cloud server. In the proposed model, the user's privacy information is provided illegally by the cloud server to the user through the security function and the user signature. Also, the signature of the user can be safely used by bundling the random number of the multiplication group and the one-way hash function into the hash chain to protect the user's privacy. As a result of the performance evaluation, the proposed model achieved an average improvement of data processing time of 24.5% compared to the existing model and the efficiency of the proposed model was improved by 13.7% than the existing model because the user's privacy information was group managed.

Serviceability Evaluation of ZigBee Technology for Construction Applications (설문조사를 통한 ZigBee 무선통신기술의 건설산업 사용성평가에 관한 연구)

  • Shin, Young Shik;Cao, Shang;Jang, Won-Suk
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.32 no.3D
    • /
    • pp.247-258
    • /
    • 2012
  • This research evaluates the serviceability of ZigBee device that provides a potential technology to realizing the ubiquitous computing by improving the productivity and effectiveness in construction and data acquisition. Literature review was conducted in various application areas such as bridge monitoring, slope management, road management, highway traffic control. In addition characteristics and challenges in various wireless technologies are described to identify their adoptability to construction environment. Among them, ZigBee technology was selected to introduce the functionality on hardware, network, and security. Then, questionnaire survey was implemented by four different group, construction engineers, students, hardware developers, and researchers to explore the success and failure factors of ZigBee technology in construction area. The results proposes a guideline of the applicability of ZigBee technology in the area of serviceability, application area, considerations, and future direction. This paper would provide valuable information for future researches and technology development in designing the wireless sensor network applications.

A Multistage Authentication Strategy for Reliable N-to-N Communication in CGSR based Mobile Ad Hoc Networks (CGSR 기반의 이동 애드 흑 네트워크에서 신뢰성 있는 통신을 위한 노드간 인증 기법)

  • Lee Hyewon K.;Mun Youngsong
    • Journal of KIISE:Information Networking
    • /
    • v.32 no.6
    • /
    • pp.659-667
    • /
    • 2005
  • A Mobile Ad Hoc Network(MANET) is a multi hop wireless network with no prepared base stations or centralized administrations, where flocks of peer systems gather and compose a network. Each node operates as a normal end system in public networks. In addition to it, a MANET node is required to work as a router to forward traffic from a source or intermediate node to others. Each node operates as a normal end system in public networks, and further a MANET node work as a router to forward traffic from a source or intermediate node to the next node via routing path. Applications of MANET are extensively wide, such as battle field or any unwired place; however, these are exposed to critical problems related to network management, node's capability, and security because of frequent and dynamic changes in network topology, absence of centralized controls, restricted usage on network resources, and vulnerability oi mobile nodes which results from the special MANET's character, shared wireless media. These problems induce MANET to be weak from security attacks from eavesdropping to DoS. To guarantee secure authentication is the main part of security service In MANET because networks without secure authentication are exposed to exterior attacks. In this paper, a multistage authentication strategy based on CGSR is proposed to guarantee that only genuine and veritable nodes participate in communications. The proposed authentication model is composed of key manager, cluster head and common nodes. The cluster head is elected from secure nodes, and key manager is elected from cluster heads. The cluster head will verify other common nodes within its cluster range in MANET. Especially, ID of each node is used on communication, which allows digital signature and blocks non repudiation. For performance evaluation, attacks against node authentication are analyzed. Based on security parameters, strategies to resolve these attacks are drawn up.

A Design of Secure Electronic Health Information Management Protocol in the Internet of Things Environment (사물 인터넷 환경에서 안전한 전자의료정보 관리 프로토콜 설계)

  • Park, Jeong Hyo;Kim, Nak Hyun;Jung, Yong Hoon;Jun, Moon Seog
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.3 no.10
    • /
    • pp.323-328
    • /
    • 2014
  • ZigBee based on the most vulnerable part of u-Healthcare system that uses the ZigBee communication is the wireless section. ZigBee communication sectors to identify vulnerabilities in this paper, we propose to compensate. ZigBee has been raised from the existing vulnerabilities organize and ZigBee also uses the 64bit address that uniquely identifies a vulnerability that was defined as exposure. And to prevent the exposure of a unique identifying address was used to address a temporary identification. ZigBee security services, the proposed system during the Network Key for encryption only use one mechanism of Residential Mode is used. Residential Mode on all nodes of the entire network because they use a common key, the key is stolen, your network's security system at a time are at risk of collapse. Therefore, in order to guard against these risks to the security policy Network Key updated periodically depending on the method used to. The proposed evaluation and comparative analysis of the system were exposed in the existing system can hide the address that uniquely identifies a public key Network Key also updated periodically, so that leaks can occur due to reduced risk.

A Study on the Selection Process of RFID Middleware and Quality Factor Evaluation in Ubiquitous Computing (유비쿼터스 컴퓨팅 환경에서 RFID 미들웨어 선정 프로세스 및 품질 요소 평가에 대한 연구)

  • Oh, Gi-Oug;Park, Jung-Oh
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.12
    • /
    • pp.257-263
    • /
    • 2011
  • Conventional middleware is software providing services between clients and servers efficiently, but it is not applicable to RFID systems because of low consistency due to the absence of context awareness function, and problems in the management of meaning, security system, etc. Accordingly, we need a quality selection process and a quality evaluation method for selecting RFID middleware based on new criteria. This Paper proposed a new selection process based on international standard ISO/IEC 14598, and extracted and selected optimal quality factors through the proposed process. The selected quality factors were mapped to the quality characteristics of standard quality model ISO/IEC 9126, and to quality factors of RFID middleware of SUN, Microsoft, EPCglobal, IBM, etc. The results of these works showed that the quality factors extracted and selected through the proposed process were fair and adequate for evaluating the quality of RFID middleware.

A Comparative Analysis of Research Trends in the Information and Communication Technology Field of South and North Korea Using Data Mining

  • Jiwan Kim;Hyunkyoo Choi;Jeonghoon Mo
    • Journal of Information Science Theory and Practice
    • /
    • v.11 no.1
    • /
    • pp.14-30
    • /
    • 2023
  • The purpose of this study is to compare research trends in the information and communication technology (ICT) field between North and South Korea and analyze the differences by using data mining. Frequency analysis, clustering, and network analysis were performed using keywords from seven South Korean and two North Korean ICT academic journals published for five years (2015-2019). In the case of South Korea (S. Korea), the frequency of research on image processing and wireless communication was high at 16.7% and 16.3%, respectively. North Korea (N. Korea) had a high frequency of research, in the order of 18.2% for image processing, 16.9% for computer/Internet applications/security, and 16.4% for industrial technology. N. Korea's natural language processing (NLP) sector was 11.9%, far higher than S. Korea's 0.7 percent. Student education is a unique subject that is not clustered in S. Korea. In order to promote exchanges between the two Koreas in the ICT field, the following specific policies are proposed. Joint research will be easily possible in the image processing sector, with the highest research rate in both Koreas. Technical cooperation of medical images is required. If S. Korea's high-quality image source is provided free of charge to N. Korea, research materials can be enriched. In the field of NLP, it calls for proposing exchanges such as holding a Korean language information conference, developing a Korean computer operating system. The field of student education encourages support for remote education contents and management know-how, as well as joint research on student remote evaluation.

The Vulnerability Analysis for Virtualization Environment Risk Model Management Systematization (가상화 환경 위험도 관리체계화를 위한 취약점 분석)

  • Park, Mi-Young;Seung, Hyen-Woo;Lim, Yang-Mi
    • Journal of Internet Computing and Services
    • /
    • v.14 no.3
    • /
    • pp.23-33
    • /
    • 2013
  • Recently in the field of IT, cloud computing technology has been deployed rapidly in the current society because of its flexibility, efficiency and cost savings features. However, cloud computing system has a big problem of vulnerability in security. In order to solve the vulnerability of cloud computing systems security in this study, impact types of virtual machine about the vulnerability were determined and the priorities were determined according to the risk evaluation of virtual machine's vulnerability. For analyzing the vulnerability, risk measurement standards about the vulnerability were defined based on CVSS2.0, which is an open frame work; and the risk measurement was systematized by scoring for relevant vulnerabilities. Vulnerability risk standards are considered to suggest fundamental characteristics of vulnerability and to provide the degree of risks and consequently to be applicable to technical guides to minimize the vulnerability. Additionally, suggested risk standard of vulnerability is meaningful as the study content itself and could be used in technology policy project which is to be conducted in the future.

Effective resource selection and mobility management scheme in mobile grid computing (모바일 그리드 컴퓨팅에서 효율적인 자원 확보와 이동성 관리 기법)

  • Lee, Dae-Won
    • The Journal of Korean Association of Computer Education
    • /
    • v.13 no.1
    • /
    • pp.53-64
    • /
    • 2010
  • In this paper, we tried to enable a mobile device as a resource to access to mobile grid networks. By advanced Internet techniques, the use of mobile devices has been rapidly increased. Some researches in mobile grid computing tried to combine grid computing with mobile devices. However, according to intrinsic properties of mobile environments, mobile devices have many considerations, such as mobility management, disconnected operation, device heterogeneity, service discovery, resource sharing, security, and so on. To solve these problems, there are two trends for mobile grid computing: a proxy-based mobile grid architecture and an agent-based mobile grid architecture. We focus on a proxy-based mobile grid architecture with IP-paging, which can easily manage idle mobile devices and grid resource status information. Also, we use SIP(Session Initiation Protocol)to support mobility management, mobile grid services. We manage variation of mobile device state and power by paging cache. Finally, using the candidate set and the reservation set of resources, we perform task migration. The performance evaluation by simulation, shows improvement of efficiency and stability during execution.

  • PDF

Estimating the Economic Impact of Smoke-free Policy in Restaurants using an Input-Output Analysis (산업연관분석을 이용한 음식점 금연 정책의 경제적 효과 분석)

  • Seo, Sukyong;Yeon, Seunguk;Yoo, Ki-Bong;Cho, Hong-Jun;Lee, Ju hyun;Noh, Jin-Won
    • Culinary science and hospitality research
    • /
    • v.23 no.5
    • /
    • pp.169-177
    • /
    • 2017
  • Smoking bans at restaurants and bars have recently been introduced in Korea. Researchers and stakeholder are interested in the resulting changes in sales of restaurants and bars and their impact on overall national economy including employment. We examined the input-output tables (2013) issued by The Bank of Korea. The result showed that the production inducement coefficient was about 2.16; employment inducement coefficient was 13.1 for the restaurant and bar industry. The amount of inducement in the national production was calculated by 93,100 billion KRW. Employment inducement was calculated by 1,219,610 persons overall industries for a year. Assuming there comes a change (3%, 5%, 10%) in restaurant and bar production in consequence of the smoking bans, we computed following change in the national production and employment. The resulting changed in national production was 6,033 billion, 10,055 billion, and 20,110 billion KRW, respectively. The impact of employment overall industries was calculated 79,032, 131,720 and 263,441 persons, respectively.

A Study on the Quality of Mobile Web Service for Environment Landscape Architecture - Focus on Korean Professional Portal Site, Lafent - (환경조경 이동통신용 웹의 서비스 품질 연구 - 전문포털사이트 라펜트를 중심으로 -)

  • Choi, Ja-Ho;Oh, Jeong-Hak
    • Journal of the Korean Society of Environmental Restoration Technology
    • /
    • v.23 no.2
    • /
    • pp.17-31
    • /
    • 2020
  • In the field of environmental landscape architecture, the internet medium is used as an effective communication tool not only in the private level but also in the policy level. Recently, the active utilization of mobile web service is emphasized as the time changes, but there is not much improvement or advance in services due to lack of relevant studies. Therefore, this study is intended to provide basic data needed for improvement and advance by researching the quality of mobile web service among multichannel services provided in environmental landscape architecture related internet media. The model for measuring service quality is SERVQUAL, which was verified in the study of Choi(2015), Choi and Koo(2016), and the final valid samples are total 230. First, the subjects were analyzed as the representative media that are possible to acquire comprehensive knowledge related to environmental landscape architecture. Second, the highest importance level in each subsection was 'protection and security maintenance of customer information' followed by 'Reliability about accurate information supply'. Regarding performance level, 'Reliability about accurate information supply' and 'professional knowledge to communicate with users' are highly evaluated. Third, regarding Importance-Performance Analysis(IPA), the first priority management should is 'Tangibles', and the next are 'Responsibility' and 'Empathy'. The ones for maintenance of the status quo are 'Reliability' and 'Assurance', and there is none for effort reduction. Meanwhile, regarding the importance of each factor and difference in the quality of PC web service and mobile web service studied before, the biggest difference is in 'Tangibles', followed by 'Assurance', 'Empathy', 'Responsibility' and 'Reliability'. It is suggested that the revitalization of Landscape information science(LB1106) presented in the National Science&Technology Standard Classification System is needed. In the future, it is necessary to research the change trend on users' response through continuous evaluation of improved mobile web service.