• Title/Summary/Keyword: Integrity Information

Search Result 1,465, Processing Time 0.026 seconds

A Warning Threshold Proposal for Operation Improvement of Maritime DGPS Reference Station (해양용 DGPS 운영성 개선을 위한 시스템 경고 임계값 제안)

  • Choi, Yong Kwon;Lee, Ju Hyun;Son, Seok Bo;Lee, Sang Jeong
    • Journal of Advanced Navigation Technology
    • /
    • v.21 no.1
    • /
    • pp.12-20
    • /
    • 2017
  • A maritime DGPS in Korea offers pseudo-range correction information and monitors integrity of correction data by using multiple GNSS receivers. The maritime DGPS reference station and integrity monitor service sets alarm threshold value about integrity monitoring parameters for preventing service interruption status. However there is no way to avoid system interruption according to malfunction of backup systems and outside factors. Therefore, in this paper, warning threshold values were proposed for maritime DGPS operator can be counteract in advance. And Markov analysis method was carried out for selection of these warning threshold values.

A Spatial Transformation Scheme Supporting Data Privacy and Query Integrity for Outsourced Databases (아웃소싱 데이터베이스에서 데이터 프라이버시 및 질의 무결성을 지원하는 공간 변환 기법)

  • Kim, Hyeong-Il;Song, Young-Ho;Chang, Jaewoo
    • Journal of KIISE
    • /
    • v.42 no.5
    • /
    • pp.652-663
    • /
    • 2015
  • Due to the popularity of location-based services, the amount of generated spatial data in daily life has been dramatically increasing. Therefore, spatial database outsourcing has become popular for data owners to reduce the spatial database management cost. The most important consideration in database outsourcing is meeting the privacy requirements and guarantying the integrity of the query result. However, most of existing database transformation techniques do not support both of the data privacy and integrity of the query result. To solve this problem, we propose a spatial data transformation scheme that utilizes the shearing transformation with rotation shifting. In addition, we described the attack models to measure the data privacy of database transformation schemes. Finally, we demonstrated through the experimental evaluations that our scheme provides high level of data protection against different kinds of attack models, compared to the existing schemes, while guaranteeing the integrity of the query result sets.

Development of Lakes Benthic Macroinvertebrate-based Multi-metric Index (LBMMI) for Biological Integrity Assessment of Korean Lake (국내 호소의 온전성 평가를 위한 저서성 대형무척추동물 다중계량지수(LBMMI)의 개발)

  • Geun-Yong Park;Myoung-Chul Kim;Dongsoo Kong
    • Journal of Korean Society on Water Environment
    • /
    • v.40 no.5
    • /
    • pp.243-257
    • /
    • 2024
  • Although lakes are an important part of freshwater, research on biological methods for assessing ecological integrity of Korean lakes is insufficient. Therefore, this study aimed to develop Lakes Benthic Macroinvertebrates Multi-Metric Index (LBMMI) to assess the ecological integrity of lakes in Korea to further understand Korean lake's ecosystem. We used biological data from 388 sampling units of national lake monitoring programs from 2022 to 2023 and water quality data from Water Environment Information System (WEIS). As a result, firstly, reference points and disturbed points were selected through Principal Component Analysis (PCA). Secondly, six core metric elements (Pielou's Evenness index (J), Total number of taxa (To.t), Percent of taxa in insecta (% I.t), Percent of individuals in Oligochaeta and chironomidae(tuble) (% OliCht.i), Percent of taxa in Predator (% Pe.t), and Percent of taxa in Clingers (% CL.t) were selected through discriminant analysis and relationship-test. Lastly, LBMMI was calculated for each sampling point by scoring using core metric elements and five grades were assigned for LBMMI scores using a Beta probability distribution model, with the suitability of LBMMI reviewed by comparing it with TSIKO. LBMMI developed in this study is expected to appropriately assess ecological integrity of Korean lakes and provide a basis for further research on lake environment conservation.

Analysis on the Multi-Constellation SBAS Performance of SDCM in Korea

  • Lim, Cheol-Soon;Park, Byungwoon;So, Hyoungmin;Jang, Jaegyu;Seo, Seungwoo;Park, Junpyo;Bu, Sung-Chun;Lee, Chul-Soo
    • Journal of Positioning, Navigation, and Timing
    • /
    • v.5 no.4
    • /
    • pp.181-191
    • /
    • 2016
  • A Satellite Based Augmentation System (SBAS) provides differential correction and integrity information through geostationary satellite to users in order to reduce Global Navigation Satellite System (GNSS)-related errors such as ionospheric delay and tropospheric delay, and satellite orbit and clock errors and calculate a protection level of the calculated location. A SBAS is a system, which has been set as an international standard by the International Civilian Aviation Organization (ICAO) to be utilized for safe operation of aircrafts. Currently, the Wide Area Augmentation System (WAAS) in the USA, the European Geostationary Navigation Overlay Service (EGNOS) in Europe, MTSAT Satellite Augmentation System (MSAS) in Japan, and GPS-Aided Geo Augmented Navigation (GAGAN) are operated. The System for Differential Correction and Monitoring (SDCM) in Russia is now under construction and testing. All SBASs that are currently under operation including the WAAS in the USA provide correction and integrity information about the Global Positioning System (GPS) whereas the SDCM in Russia that started SBAS-related test services in Russia in recent years provides correction and integrity information about not only the GPS but also the GLONASS. Currently, LUCH-5A(PRN 140), LUCH-5B(PRN 125), and LUCH-5V(PRN 141) are assigned and used as geostationary satellites for the SDCM. Among them, PRN 140 satellite is now broadcasting SBAS test messages for SDCM test services. In particular, since messages broadcast by PRN 140 satellite are received in Korea as well, performance analysis on GPS/GLONASS Multi-Constellation SBAS using the SDCM can be possible. The present paper generated correction and integrity information about GPS and GLONASS using SDCM messages broadcast by the PRN 140 satellite, and performed analysis on GPS/GLONASS Multi-Constellation SBAS performance and APV-I availability by applying GPS and GLONASS observation data received from multiple reference stations, which were operated in the National Geographic Information Institute (NGII) for performance analysis on GPS/GLONASS Multi-Constellation SBAS according to user locations inside South Korea utilizing the above-calculated information.

Detection of Forgery of Mobile App and Study on Countermeasure (모바일 단말기 앱의 위·변조 탐지 및 대응방안 연구)

  • Jung, Hyun Soo;Chae, Gyoo-Soo
    • Journal of Convergence Society for SMB
    • /
    • v.5 no.3
    • /
    • pp.27-31
    • /
    • 2015
  • As the number of smartphone users is increasing with the development of mobile devices, the range of monetary transaction from the individual use is increasing. Therefore, hacking methods are diversified and the information forgery of mobile devices has been a current issue. The forgery via apps in mobile devices is a hacking method that creates an app similar to well-known apps to deceive the users. The forgery attack corresponds to the violation of integrity, one of three elements of security. Due to the forgery, the value and credibility of an app decreases with the risk increased. With the forgery in app, private information and data can be stolen and the financial losses can occur. This paper examined the forgery, and suggested a way to detect it, and sought the countermeasure to the forgery.

  • PDF

Security Assessment Metrics Model for Online Services (온라인 서비스를 위한 보안성 평가 지표 모델)

  • Choo, Yeun-Su;Park, Jae-Pyo;Jun, Moon-Seog
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39C no.4
    • /
    • pp.326-333
    • /
    • 2014
  • Internet Services have security issues. To prepare proper security measures for these security issues, security level setting is positively necessary. Until now, we use a security level with CIA (Confidentiality, Integrity, and Availability) Security Levels. However, CIA Security Levels has problems with ambiguous measures for the middle level of security setting. Moreover, security level overlap occurs, in some cases, when user authentications are not done. Additionally, there exist some levels among CIA Security Levels which cannot be applied to Internet services. In this paper, new security level model, CIAA Security Levels with deletion of ambiguous middle level of security setting and addition of authentication to one of security level setting factors, is proposed. The CIAA Security Levels model can be applied to more concrete security measures than CIA Security Levels. The proposed Security Levels model is applicable to almost any on-line services and it can be applied to new online services.

User Authentication Technology Using Multi-Blocks in the Cloud Computing Environment

  • Jang, Eun-Gyeom
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.11
    • /
    • pp.139-146
    • /
    • 2020
  • Cloud computing technology provides economic and efficient system operation and management features to deal with rapidly changing IT technologies. However, this is less used in institutes and companies due to low security of cloud computing service. It is recognized that storing and managing important information, which is confidential in external systems is vulnerable to security threats. In order to enhance security of this cloud computing service, this paper suggests a system and user authentication reinforcement model. The suggested technology guarantees integrity of user authentication information and provides users with convenience by creating blocks for each cloud service and connecting service blocks with chains. The block chain user authentication model offers integrity assurance technology of block chains and system access convenience for SSO users. Even when a server providing cloud computing is invaded, this prevents chained invasions not to affect other systems.

A Novel Auditing System for Dynamic Data Integrity in Cloud Computing (클라우드 컴퓨팅에서 동적 데이터 무결성을 위한 개선된 감사 시스템)

  • Kim, Tae-yeon;Cho, Gi-hwan
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.8
    • /
    • pp.1818-1824
    • /
    • 2015
  • Cloud computing draws attention as an application to provide dynamically scalable infrastructure for application, data and file storage. An untrusted remote server can cause a variety of problems in the field of data protection. It may process intentionally or involuntarily user's data operations(modify, insert, delete) without user's permission. It may provide false information in order to hide his mistakes in the auditing process. Therefore, it is necessary to audit the integrity of data stored in the cloud server. In this paper, we propose a new data auditing system that can verify whether servers had a malicious behavior or not. Performance and security analysis have proven that our scheme is suitable for cloud computing environments in terms of performance and security aspects.

A Study on the Improvement of Research Support System for National R&D Projects Using Blockchain (블록체인을 활용한 국가연구개발사업 연구지원시스템 개선 방안 연구)

  • Donghwan Lee;Seungwook Park
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.28 no.2
    • /
    • pp.47-60
    • /
    • 2023
  • This study proposed to adopt consortium blockchain for the database in the research support system of national R&D projects in order to increase efficiency, to reduce administrative burden, and to promote transparent research environment focusing on servicing researchers. Specifically, storage methods were classified according to data characteristics. First, data that requires integrity and transparency is stored in the blockchain, Second, confidentiality and data that require modification and deletion are stored in the database, Third, data that requires confidentiality, integrity, and transparency at the same time stores the original in the database, and the hash value of the data is separately stored in the blockchain. If research support system adopts blockchain, it is possible to operate the system stably, to share quick exchange of information between research institutes, to reduce administrative burden, to improve transparency of process, to resolve asymmetry of information, and to secure integrity, confidentiality, and availability of data.

An Improvement of Certification-based One-Round Tripartite Key Agreement Protocols

  • Mtong, Kambombo;Yoon, Eun-Jun
    • IEIE Transactions on Smart Processing and Computing
    • /
    • v.2 no.5
    • /
    • pp.297-301
    • /
    • 2013
  • Key agreement protocols allow multi-parties exchanging public information to create a common secret key that is known only to those entities over an insecure network. Since Joux first published the pairing-based one round tripartite key agreement protocol, many authenticated protocols have been proposed. Unfortunately, many of them have been broken while others have been shown to be deficient in some desirable security attributes. In 2004, Cheng et al. presented two protocols aimed at strengthening Shim's certificate-based and Zhang et al.'s tripartite identity-based protocols. This paper reports that 1) In Cheng et al.'s identity-based protocol, an adversary can extract long-term private keys of all the parties involved; and 2) Cheng et al.'s certification-based protocol is weak against key integrity attacks. This paper suggests possible remedies for the security flaws in both protocols and then presents a modified Cheng et al.'s identity-based, one-round tripartite protocol that is more secure than the original protocol.

  • PDF