• Title/Summary/Keyword: Information Security Practice

Search Result 192, Processing Time 0.028 seconds

Trapdoor Digital Shredder: A New Technique for Improved Data Security without Cryptographic Encryption

  • Youn, Taek-Young;Jho, Nam-Su
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.3
    • /
    • pp.1249-1262
    • /
    • 2020
  • Along with the increase of the importance of information used in practice, adversaries tried to take valuable information in diverse ways. The simple and fundamental solution is to encrypt the whole data. Since the cost of encryption is increasing along with the size of data, the cost for securing the data is a burden to a system where the size of the data is not small. For the reason, in some applications where huge data are used for service, service providers do not use any encryption scheme for higher security, which could be a source of trouble. In this work, we introduce a new type of data securing technique named Trapdoor Digital Shredder(TDS) which disintegrates a data to multiple pieces to make it hard to re-construct the original data except the owner of the file who holds some secret keys. The main contribution of the technique is to increase the difficulty in obtaining private information even if an adversary obtains some shredded pieces. To prove the security of our scheme, we first introduce a new security model so called IND-CDA to examine the indistinguishability of shredded pieces. Then, we show that our scheme is secure under IND-CDA model, which implies that an adversary cannot distinguish a subset of shreds of a file from a set of random shreds.

SVM-Based Speaker Verification System for Match-on-Card and Its Hardware Implementation

  • Choi, Woo-Yong;Ahn, Do-Sung;Pan, Sung-Bum;Chung, Kyo-Il;Chung, Yong-Wha;Chung, Sang-Hwa
    • ETRI Journal
    • /
    • v.28 no.3
    • /
    • pp.320-328
    • /
    • 2006
  • Using biometrics to verify a person's identity has several advantages over the present practice of personal identification numbers (PINs) and passwords. To gain maximum security in a verification system using biometrics, the computation of the verification as well as the storing of the biometric pattern has to take place in a smart card. However, there is an open issue of integrating biometrics into a smart card because of its limited resources (processing power and memory space). In this paper, we propose a speaker verification algorithm using a support vector machine (SVM) with a very few features, and implemented it on a 32-bit smart card. The proposed algorithm can reduce the required memory space by a factor of more than 100 and can be executed in real-time. Also, we propose a hardware design for the algorithm on a field-programmable gate array (FPGA)-based platform. Based on the experimental results, our SVM solution can provide superior performance over typical speaker verification solutions. Furthermore, our FPGA-based solution can achieve a speed-up of 50 times over a software-based solution.

  • PDF

A Fuzzy Rule-based System for Automatically Generating Customized Training Scenarios in Cyber Security

  • Nam, Su Man
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.8
    • /
    • pp.39-45
    • /
    • 2020
  • Despite the increasing interest in cyber security in recent years, the emergence of new technologies has led to a shortage of professional personnel to efficiently perform the cyber security. Although various methods such as cyber rage are being used to cultivate cyber security experts, there are problems of limitation of virtual training system, scenario-based practice content development and operation, unit content-oriented development, and lack of consideration of learner level. In this paper, we develop a fuzzy rule-based user-customized training scenario automatic generation system for improving user's ability to respond to infringement. The proposed system creates and provides scenarios based on advanced persistent threats according to fuzzy rules. Thus, the proposed system can improve the trainee's ability to respond to the bed through the generated scenario.

Secure and Efficient Identity-based Batch Verification Signature Scheme for ADS-B System

  • Zhou, Jing-xian;Yan, Jian-hua
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.12
    • /
    • pp.6243-6259
    • /
    • 2019
  • As a foundation of next-generation air transportation systems, automatic dependent surveillance-broadcast (ADS-B) helps pilots and air traffic controllers create a safer and more efficient national airspace system. Owing to the open communication environment, it is easy to insert fake aircraft into the system via spoofing or the insertion of false messages. Efforts have thus been made in academic research and practice in the aviation industry to ensure the security of transmission of messages of the ADS-B system. An identity-based batch verification (IBV) scheme was recently proposed to enhance the security and efficiency of the ADS-B system, but current IBV schemes are often too resource intensive because of the application of complex hash-to-point operations or bilinear pairing operations. In this paper, we propose a lightweight IBV signature scheme for the ADS-B system that is robust against adaptive chosen message attacks in the random oracle model, and ensures the security of batch message verification and against the replaying attack. The proposed IBV scheme needs only a small and constant number of point multiplication and point addition computations instead of hash-to-point or pairing operations. Detailed performance analyses were conducted to show that the proposed IBV scheme has clear advantages over prevalent schemes in terms of computational cost and transmission overhead.

Study of Pedagogical Practice and Teaching Experience in European Countries

  • Poplavskyi, Mykhailo
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.3
    • /
    • pp.252-258
    • /
    • 2022
  • Globalization, development of the information society, intensification of migration processes, and internationalization of education in recent years have significantly affected the international labour market and increased competition between professionals in various fields. Academic, research and teaching staff are currently facing rapid changes and growing demand for quality educational services. Under such conditions, educational institutions around the world pay particular attention to improving the quality of the educational process in order for their graduates to be able to compete in the international labour market. The study of the experience of teachers' professional training in advanced countries opens new opportunities for improving the system of pedagogical training in Ukraine in order to adapt it to the requirements of the European educational space. The progressive achievements of countries demonstrating a high level of teachers' professional training in accordance with international standards, having rich historical educational traditions are of considerable scientific interest; consequently, this contributes to their leadership in science and education at the regional and global levels. The purpose of the present academic paper lies in analysing the latest trends in exploring teaching experience in the European countries and performance review of passing by students and teachers of the program on studying of pedagogical practice and experience of teaching in the countries of Europe. Methodology. Analytical and empirical (questionnaire) methods were used in the research process. Results. According to the obtained results of the research, the advantages, the most common areas of educational programs and the wishes of the participants regarding the practical implementation of the experience were identified.

DCT and Homomorphic Encryption based Watermarking Scheme in Buyer-seller Watermarking Protocol

  • Seong, Teak-Young;Kwon, Ki-Chang;Lee, Suk-Hwan;Moon, Kwang-Seok;Kwon, Ki-Ryong
    • Journal of Korea Multimedia Society
    • /
    • v.17 no.12
    • /
    • pp.1402-1411
    • /
    • 2014
  • Buyer-seller watermarking protocol is defined as the practice of imperceptible altering a digital content to embed a message using watermarking in the encryption domain. This protocol is acknowledged as one kind of copyright protection techniques in electronic commerce. Buyer-seller watermarking protocol is fundamentally based on public-key cryptosystem that is operating using the algebraic property of an integer. However, in general usage, digital contents which are handled in watermarking scheme mostly exist as real numbers in frequency domain through DCT, DFT, DWT, etc. Therefore, in order to use the watermarking scheme in a cryptographic protocol, digital contents that exist as real number must be transformed into integer type through preprocessing beforehand. In this paper, we presented a new watermarking scheme in an encrypted domain in an image that is based on the block-DCT framework and homomorphic encryption method for buyer-seller watermarking protocol. We applied integral-processing in order to modify the decimal layer. And we designed a direction-adaptive watermarking scheme by analyzing distribution property of the frequency coefficients in a block using JND threshold. From the experimental results, the proposed scheme was confirmed to have a good robustness and invisibility.

A Study On Malicious Mail Training Model (악성메일 훈련 모델에 관한 연구)

  • Kang, Young-Mook;Lee, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.2
    • /
    • pp.197-212
    • /
    • 2020
  • With the advent of virtual currency and electronic wallets creating a way to make financial gains based on anonymity, malicious code dissemination using malicious mail has continued to increase. In order to minimize the damage, the human factors, security awareness and the ability to respond, which are technical factors, should be improved evenly, which can be improved through malicious mail training. This study presented a model considering the performance of malicious mail training, such as practice. It was classified as a training for enhancing awareness of security for employees and detection and response to improve their ability to respond to malicious mail. A training system suitable for the purpose, the core functions of malware training, implementation and camouflage skills, and bypass techniques were described. Based on the above model, the training data conducted over three years were collected and the effectiveness of the training was studied through analysis of the results according to the number of training sessions, training themes and camouflage techniques.

Evaluation Tool for Analyzing Method of the Information System (정보시스템 위험분석 평가도구)

  • Kim, Kang;Cho, Kyoung-Sik
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2007.06a
    • /
    • pp.773-777
    • /
    • 2007
  • Very various infusion by development of systems that is based on network is spread. Therefore, Evaluation Tool has been an active research area to reduce the risk from intrusion. On this thesis, during threat assesment, we have planned possible an equal-weight applied assesment and considering the characteristics of the organization an assesment which security factor's weight is variably applied to, and respective organizations to examine its security by itself in order to support the easy findings of the vulnerabilities on the management point of view, and to show the advices to practice.

  • PDF

On the Application of Public Search Measures to Detect and Obtain Information

  • Kozytska, Olena;Tsilmak, Olena;Protsenko, Olena;Yankovyi, Mykola;Lysenko, Аndrii;Shulzhenko, Assol
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.9
    • /
    • pp.109-112
    • /
    • 2021
  • The article considers the state of legislation that regulates the use of public methods of obtaining information by authorized state bodies. The correlation of public investigative (search) actions with operative-search measures as concepts denoting the application of public methods of obtaining information has been studied. In addition, it argues the need for more detailed delineation and legislative regulation of public investigative (search) actions and operational and investigative measures at the legislative and departmental levels. The purpose of the article is to analyze certain provisions of the Law of Ukraine "On operational and investigative activities" to identify inconsistencies in the content of the text of the law in order to correct and prevent ambiguity in the theory and practice of law enforcement.

Analysis of the Level of Primary School Students about Secure Apps (안전한 앱에 대한 초등학교 학생의 수준 분석)

  • Ko, Yeong Hae;Kim, Chong Woo
    • Journal of The Korean Association of Information Education
    • /
    • v.18 no.1
    • /
    • pp.143-149
    • /
    • 2014
  • We study the level on the knowledge, attitudes, and practice of primary school (grades 3-6 students ) for the safe use of smart devices, and identify student status for the safe use of smart devices, and suggests ways of appropriate data collection, analyzing of data. Through this research, for the safe use of smart devices in education showed that the effect is very insignificant and the knowledge and practice of smart devices are widely recognized. We will suggests the suitable education contents for the smart devices safe use for primary school students. These education will be made up of 'smart devices safety using' and we will expect that primary students will be able to cultivate the 'smart devices security awareness'.