• Title/Summary/Keyword: Key sharing

Search Result 615, Processing Time 0.029 seconds

Chord System Algorithm Based on the mobility in the mobile environment (모바일 환경에서 이동성을 고려한 Chord 시스템 알고리즘)

  • Hong, Rok Ji;Moon, Il Young
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.6 no.4
    • /
    • pp.75-81
    • /
    • 2010
  • Due to the increasing use of smart phones, using Wifi, Wibro of mobile devices spread. Accordingly, Need of using peer-to-peer file sharing between mobile devices is growing. However, common Peer-to-Peer(P2P) system is too complex and is not suitable to be applied to mobile devices. Thus, the need of research has shown to improve way in a mobile environment that has a constraints as mobility and the scope of communication. Among them, there is a Chord as contents look up algorithm. Chord is the issue. Chord as the DHT-based P2P protocol shares files, index-key and distributed key across the network. However, exist Chord doesn't consider the mobility. So, It has a lot of problems in the mobile environment. Thus, in this paper, I will try to explore an appropriate way of Chord in a mobile environment.

Detection for JPEG steganography based on evolutionary feature selection and classifier ensemble selection

  • Ma, Xiaofeng;Zhang, Yi;Song, Xiangfeng;Fan, Chao
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.11
    • /
    • pp.5592-5609
    • /
    • 2017
  • JPEG steganography detection is an active research topic in the field of information hiding due to the wide use of JPEG image in social network, image-sharing websites, and Internet communication, etc. In this paper, a new steganalysis method for content-adaptive JPEG steganography is proposed by integrating the evolutionary feature selection and classifier ensemble selection. First, the whole framework of the proposed steganalysis method is presented and then the characteristic of the proposed method is analyzed. Second, the feature selection method based on genetic algorithm is given and the implement process is described in detail. Third, the method of classifier ensemble selection is proposed based on Pareto evolutionary optimization. The experimental results indicate the proposed steganalysis method can achieve a competitive detection performance by compared with the state-of-the-art steganalysis methods when used for the detection of the latest content-adaptive JPEG steganography algorithms.

Current Status and Improvement Plan for Records Management at Research and Management Institutions: Focused on Core Research Records (연구관리 전문기관 기록물관리 현황 및 개선 방안: 핵심 연구기록물을 중심으로)

  • Kim, Hye-mi;Lee, Young-hak
    • Journal of Korean Society of Archives and Records Management
    • /
    • v.19 no.2
    • /
    • pp.173-191
    • /
    • 2019
  • A research and management institution plays a middleman role between government departments and research institutes. Research records collected from research institutes are important not only as evidence for research tasks but also for knowledge and information sharing. In this study, the key research records collected by research management institutions are identified, and problems are analyzed to present efficient measures to improve key research management.

A Study on Follow-up Survey Methodology to Verify the Effectiveness of (<인생나눔교실> 사업의 효과 검증을 위한 추적 조사 방법론 연구 - 2017~2018년도 영상추적조사를 중심으로 -)

  • Lee, Dong Eun
    • Korean Association of Arts Management
    • /
    • no.53
    • /
    • pp.207-247
    • /
    • 2020
  • is a project for the senior generation with humanistic knowledge to become a mentor and communicate with them to present the wisdom and direction of life to the new generations of mentees based on various life experiences. has been expanding since 2015, starting with the pilot operation in 2014. In general, projects such as these are assessed to establish effectiveness indicators to verify effectiveness and to establish project management and development strategies. However, most of the evaluations have been conducted quantitatively and qualitatively based on the short-term duration of the project. Therefore, in the case of continuous projects such as , especially in the field of culture and arts where long-term effectiveness verification is required, the short-term evaluation is difficult to predict and judge the actual meaningful effects. In this regard, tried to examine the qualitative change of key participants in this project through the 2017 and 2018 image tracking survey. For this purpose, we adopted qualitative research methodology through interview video shooting, field shooting, and value coding as a research method suitable for the research subject. To analyze the results, first, the interview images were transcribed, keywords were extracted, value encoding works were matched with human psychological values, and the theoretical method was used to identify changes and to derive the meaning. In fact, despite the fact that the study conducted in this study was a follow-up survey, it remained a limitation that it analyzed the changed pattern in a rather short time of 2 years. However, this study systemized the specific methodology that researchers should conduct for follow-up and provided the flow of research at the present time when there is hardly a model for follow-up in the field of culture and arts education business in Korea as well as abroad. Significance can be derived from this point. In addition, it can be said that it has great significance in preparing the detailed system and case of comparative analysis methodology through value coding.

A Case Study: ICT and the Region-based Sharing Economy of a Start-up Social Enterprise (ICT 기반 지역 공유경제형 사회적 기업 사례 연구)

  • Roh, Taehyup
    • Information Systems Review
    • /
    • v.18 no.1
    • /
    • pp.157-175
    • /
    • 2016
  • Under the market economy of capitalism, several limitations reveal the inequity and redistribution problem of wealth, inefficiency of over-manufacturing and over-consumption, pollution of the natural environment, and the constraint of human liberty and dignity. The new challenge of symbiotic relationships that encourage individual corporations coincides with the need to practice social responsibility and share values to overcome these limitations. Social economy and the social enterprises that simultaneously pursue the making of corporate private profits and the realization of social values have been suggested and disseminated as alternative social value creators. Furthermore, the concept of a sharing economy, which refers to the sharing of things rather than owning them, is growing traction as a new paradigm of capitalism. However, these efforts of social enterprises have fallen short against the conflicts between private profit and social values. This study deals with the case of a start-up social corporation, "Purun Bike Sharing Inc.," which is based on a regional sharing economy business model about bike rental services that use Information and Communication Technology (ICT). This corporation pursues harmonic management to achieve a balance between private profit and social value. Its corporate mission is to achieve sharing, coexistence, and contribution for public welfare. This mission is a possible idea for use in the local community network as a core key for sustainable social enterprises. The model can also be an alternative approach to overcome the structural friction in the social corporation. This study considers the case of Purun Bike Sharing as a sustainable way to practice a sharing economy business model based on a regional cooperation network, which can be combined with social value, and to apply ICT to a sharing economy system. It also examines the definition and current state of social enterprises and the sharing economy, and the cases of the sharing economy business model for the review of prior research.

Secure Key Management Framework in USN Environment using Certificateless Public Keys (USN 환경에서 비인증서 공개키를 사용하는 보안키 관리 프레임워크)

  • Heo, Joon;Hong, Choong-Seon
    • Journal of KIISE:Information Networking
    • /
    • v.36 no.6
    • /
    • pp.545-551
    • /
    • 2009
  • In this paper, we propose the secure key management framework to connect USN with different network. Although connected USN with different network has no CA (Certificate Authority), it is important to use public key based cryptography system because this network consists of numerous devices. The proposed mechanisms focus on device authentication and public/private key management without existing PKI system of IP network. To solve no CA and certificate problems, the IDC (Identity Based Cryptography) concept is adopted in our proposed mechanism. To verify the possibility of realization, we make an effort to implement the proposed mechanisms to real system. In the test bed, both USN and PLC network are connected to IP network; and proposed mechanisms are implemented to PLC and sensor devices. Through this test using the proposed mechanism, we met the similar performance with symmetric algorithms on key generation and update process. Also, we confirmed possibility of connection between different network and device authentication.

Design of Quantum Key Distribution System without Fixed Role of Cryptographic Applications (암호장치의 송·수신자 역할 설정이 없는 양자키분배 시스템 설계)

  • Ko, Haeng-Seok;Ji, Se-Wan;Jang, Jingak
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.5
    • /
    • pp.771-780
    • /
    • 2020
  • QKD(Quantum Key Distribution) is one of the protocols that can make two distant parties safely share secure keys against the threat of quantum computer. Generally, cryptographic applications which are connected to the QKD device have fixed roles as a transmitter and a receiver due to the race condition and complexity of implementation. Because the conventional QKD system is mainly applied to the link encryptor, there are no problems even if the roles of the cryptographic devices are fixed. We propose a new scheme of QKD system and protocol that is easy to extend to the QKD network by eliminating quantum key dependency between cryptographic device and QKD node. The secure keys which are generated by the TRNG(True Random Number Generator) are provided to the cryptographic applications instead of quantum keys. We design an architecture to transmit safely the secure keys using the inbound and outbound quantum keys which are shared between two nodes. In this scheme, since the dependency of shared quantum keys between two QKD nodes is eliminated, all cryptographic applicatons can be a master or a slave depending on who initiates the cryptographic communications.

Development of Tree Structures and Algorithms for the Efficient Group Key Management in Multicast Environment (멀티캐스트 환경에서 효율적인 그룹키 관리를 위한 트리구조 및 알고리즘 개발)

  • Han, Keun-Hee
    • The KIPS Transactions:PartB
    • /
    • v.9B no.5
    • /
    • pp.587-598
    • /
    • 2002
  • In multicast environment, the main objective of group key management is to provide security services to group communications by sharing a single group key among all the members of the group and subsequently encrypting and decrypting all the communication messages exchanged among the members of the group. Up to now, there has been no effort to develop group key management mechanism that considers the rate of users' join/leave operations. Hence, in this research, we propose group key management mechanisms that consider the rate of user's join/leave operations. We also define a new tree structure called variable tree which is much more flexible than full regular trees and show that variable trees are more efficient than full regular trees for group key management. Especially, we propose an algorithm that minimizes the necessary number of rekey messages according to the rate of join and leave operations. We also shows that if the rate of leave operation is greater than 50%, then the tree structure with degrees 2 or 3 are the optimal structures.

Optimal Power Allocation and Outage Analysis for Cognitive MIMO Full Duplex Relay Network Based on Orthogonal Space-Time Block Codes

  • Liu, Jia;Kang, GuiXia;Zhu, Ying
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.3
    • /
    • pp.924-944
    • /
    • 2014
  • This paper investigates the power allocation and outage performance of MIMO full-duplex relaying (MFDR), based on orthogonal space-time block codes (OSTBC), in cognitive radio systems. OSTBC transmission is used as a simple means to achieve multi-antenna diversity gain. Cognitive MFDR systems not only have the advantage of increasing spectral efficiency through spectrum sharing, but they can also extend coverage through the use of relays. In cognitive MFDR systems, the primary user experiences interference from the secondary source and relay simultaneously, owing to full duplexing. It is therefore necessary to optimize the transmission powers at the secondary source and relay. In this paper, we propose an optimal power allocation (OPA) scheme based on minimizing the outage probability in cognitive MFDR systems. We also analyse the outage probability of the secondary user in noise-limited and interference-limited environments in Nakagami-m fading channels. Simulation results show that the proposed schemes achieve performance improvements in terms of reducing outage probability.

A Modified IPsec Protocol for key sharing between a service provider and clients (서비스 제공자의 키 획득을 위한 IPsec 프로토콜)

  • Song, Se-Hwa;Lee, Jong-Eon;Hwang, In-Yong;Lee, You-Shin;Kim, Seok-Joong;Choi, Hyoung-Kee
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2009.01a
    • /
    • pp.377-380
    • /
    • 2009
  • VoIP기반의 음성통화가 기존 PSTN망을 대체하여 빠르게 확산되고 있다. 이러한 IP기반의 음성통신은 IP 네트워크가 가진 보안 취약점을 그대로 가지고 있어 이에 대한 보완이 필요하다. IPsec은 IP망에서 보안을 제공하는 프로토콜로 데이터의 기밀성 및 무결성을 제공한다. 한편, 서비스 제공자는 적절한 과금 및 서비스 중재 및 부가 서비스 제공을 위해 통신에 사용된 암호화 키를 획득할 수 있어야 한다. 본 논문에서는 IPsec의 키 교환 프로토콜인 Internet Key Exchange v2를 수정하여 서비스 제공자와 통신하는 양 단말이 동시에 키 교환을 수행하도록 한다. 이 방식을 통하여 서비스 제공자가 키 생성에 참여함으로서 Men in the middle 공격을 효과적으로 막을 수 있고, 부가 서비스를 제공할 수 있는 발판을 마련할 수 있다.

  • PDF