• Title/Summary/Keyword: Key sharing

Search Result 611, Processing Time 0.023 seconds

Sharing Economy with the Use of Car-Sharing Applications: An Empirical Study in Vietnam

  • NGUYEN, Linh Tran Cam
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.8 no.8
    • /
    • pp.93-101
    • /
    • 2021
  • The study aims to test the model of Yang et al. (2017) for the overall assessment of the transportation sector in the sharing economy and add some new elements on the benefits of customer loyalty from some previous studies that were not mentioned in Yang's model. This study will take examples from the two big brands of car-sharing apps in the sharing economy in Vietnam - Uber, and Grab. This research focuses on customer loyalty in the sharing economy with Uber and Grab as the transport sector in Ho Chi Minh City. Based on the survey data of 380 customers in Vietnam, the research results show that two independent factors positively impact commitment and satisfaction: social benefits and economic benefits. Simultaneously, economic benefit has a positive effect on satisfaction while trust benefit has a negative effect on commitment. Finally, commitment has a positive impact on customer loyalty in the sharing economy. As a result, companies in the sharing economy can identify which are the key factors that strongly influence customer satisfaction, commitment, trust, and loyalty to help managers to devise the appropriate solutions for promoting the strengths or overcoming limitations to contribute to perfecting and improving the quality of the company's services.

A Method for Data Access Control and Key Management in Mobile Cloud Storage Services (모바일 클라우드 스토리지 서비스에서의 데이터 보안을 위한 데이터 접근 제어 및 보안 키 관리 기법)

  • Shin, Jaebok;Kim, Yungu;Park, Wooram;Park, Chanik
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.8 no.6
    • /
    • pp.303-309
    • /
    • 2013
  • Cloud storage services are used for efficient sharing or synchronizing of user's data across multiple mobile devices. Although cloud storages provide flexibility and scalability in storing data, security issues should be handled. Currently, typical cloud storage services offer data encryption for security purpose but we think such method is not secure enough because managing encryption keys by software and identifying users by simple ID and password are main defectives of current cloud storage services. We propose a secure data access method to cloud storage in mobile environment. Our framework supports hardware-based key management, attestation on the client software integrity, and secure key sharing across the multiple devices. We implemented our prototype using ARM TrustZone and TPM Emulator which is running on secure world of the TrustZone environment.

Multiple Digital Watermarking Framework for Joint-Creatorship Verification in VR Environment (VR 환경에서 공동 소유권 증명을 위한 다중 워터마킹 프레임워크)

  • Cho, Mi-Sung;Sohn, Yu-Seung
    • Korean Journal of Computational Design and Engineering
    • /
    • v.12 no.2
    • /
    • pp.95-100
    • /
    • 2007
  • Virtual Reality(VR) data in VR environments like Manufacturing industries are often created jointly by many creators. It is then necessary to provide protection of the joint-creatorship and the creatorship of each participating creator. This paper proposes Multiple Digital Watermarking Framework(MDWF) to solve the problem of joint-creatorship. The proposed framework, MDWF, makes use of 3D private watermarking technology and a novel key sharing protocol for joint-creatorship verification. MDWF embeds 3D private multiple watermarks for the creatorship of each participating creators in a non-overlapping manner during the creation process. After key agreement of all private keys, MDWF embeds an additional 3D private watermark for the joint-creatorship. Therefore MDWF successfully handles the creatorship dispute among creators. That is, each participation creator can prove his/her partial creatorship as well as joint-creatorship by MDWF. In addition, MDWF can solve the collusion problems because shared secret key(SSK) can be made by every users.

Outsourcing decryption algorithm of Verifiable transformed ciphertext for data sharing

  • Guangwei Xu;Chen Wang;Shan Li;Xiujin Shi;Xin Luo;Yanglan Gan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.18 no.4
    • /
    • pp.998-1019
    • /
    • 2024
  • Mobile cloud computing is a very attractive service paradigm that outsources users' data computing and storage from mobile devices to cloud data centers. To protect data privacy, users often encrypt their data to ensure data sharing securely before data outsourcing. However, the bilinear and power operations involved in the encryption and decryption computation make it impossible for mobile devices with weak computational power and network transmission capability to correctly obtain decryption results. To this end, this paper proposes an outsourcing decryption algorithm of verifiable transformed ciphertext. First, the algorithm uses the key blinding technique to divide the user's private key into two parts, i.e., the authorization key and the decryption secret key. Then, the cloud data center performs the outsourcing decryption operation of the encrypted data to achieve partial decryption of the encrypted data after obtaining the authorization key and the user's outsourced decryption request. The verifiable random function is used to prevent the semi-trusted cloud data center from not performing the outsourcing decryption operation as required so that the verifiability of the outsourcing decryption is satisfied. Finally, the algorithm uses the authorization period to control the final decryption of the authorized user. Theoretical and experimental analyses show that the proposed algorithm reduces the computational overhead of ciphertext decryption while ensuring the verifiability of outsourcing decryption.

Group Key Management Protocol for Secure Social Network Service (안전한 소셜 네트워크 서비스를 위한 그룹키 관리 프로토콜)

  • Seo, Seung-Hyun;Cho, Tae-Nam
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.48 no.3
    • /
    • pp.18-26
    • /
    • 2011
  • Social network services whose users increase rapidly is the online services that reflect social network. They are used for various purposes such as strategy of election, commercial advertisement and marketing, educational information sharing and exchange of medical knowledge and opinions. These services make users form social networks with other users who have common interests and expand their relationships by releasing their personal information and utilizing other users' social networks. However, the social network services based on open and sharing of information raise various security threats such as violation of privacy and phishing. In this paper, we propose a group key management scheme and protocols using key rings to protect communication of small groups in social network services.

A study on Public Key Authentication using Polynomial Secret Sharing in WSN (무선센서네트워크에서 다항식 비밀분산을 이용한 공개키 인증방식에 관한 연구)

  • Kim, Il-Do;Kim, Dong-Cheon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.11
    • /
    • pp.2479-2487
    • /
    • 2009
  • Earlier researches on Sensor Networks preferred symmetric key-based authentication schemes in consideration of limitations in network resources. However, recent advancements in cryptographic algorithms and sensor-node manufacturing techniques have opened suggestion to public key-based solutions such as Merkle tree-based schemes. This paper proposes a new concept of public key-based authentication using Polynomial Secret Sharing that can be effectively applied to sensor networks and a detection of malicious node using the hash function. This scheme is based on exponential distributed data concept, a derivative from Shamir's (t,n) threshold scheme, in which the authentication of neighbouring nodes are done simultaneously while minimising resources of sensor nodes and providing network scalability.

Optical Implementation of Asymmetric Cryptosystem Combined with D-H Secret Key Sharing and Triple DES

  • Jeon, Seok Hee;Gil, Sang Keun
    • Journal of the Optical Society of Korea
    • /
    • v.19 no.6
    • /
    • pp.592-603
    • /
    • 2015
  • In this paper, an optical implementation of a novel asymmetrical cryptosystem combined with D-H secret key sharing and triple DES is proposed. The proposed optical cryptosystem is realized by performing free-space interconnected optical logic operations such as AND, OR and XOR which are implemented in Mach-Zehnder type interferometer architecture. The advantage of the proposed optical architecture provides dual outputs simultaneously, and the encryption optical setup can be used as decryption optical setup only by changing the inputs of SLMs. The proposed cryptosystem can provide higher security strength than the conventional electronic algorithm, because the proposed method uses 2-D array data, which can increase the key length surprisingly and uses 3DES algorithm, which protects against “meet in the middle” attacks. Another advantage of the proposed asymmetrical cryptosystem is that it is free to change the user’s two private random numbers in generating the public keys at any time. Numerical simulation and performance analysis verify that the proposed asymmetric cryptosystem is effective and robust against attacks for the asymmetrical cipher system.

An Analysis of Public Agencies' Sharing Administrative Information: Current Status and Future Prospects (행정정보 공동 활용의 현황과 성과에 관한 연구)

  • Kim, Young-Mi
    • Journal of Digital Convergence
    • /
    • v.6 no.4
    • /
    • pp.35-44
    • /
    • 2008
  • The development of IT has contributed a lot to enhancing administrative efficiency. In particular, it enabled administrative agencies to be able to upgrade the effects and efficiency of public services by saving unnecessary time, labor, and equipment that might surely occur in delivering routine services in repetition. As the concept of governance and knowledge-based administration assumes a pivotal value in the 21 century administrative innovation, sharing information among agencies is a key to building effective governance system. However, current extent of sharing information in public agencies is below the level of expectation and thus the need exists for the steps to making information shared more widely and effectively among public agencies. This paper gives a snap shot on the extant status of information sharing among public agencies and seeks ways to facilitate it from the perspective of electrical government.

  • PDF

The analysis of structural relationships among authentic leadership, trust for leaders, psychological well-being, and knowledge sharing (진성 리더십, 상사 신뢰, 심리적 웰빙, 지식공유 간의 구조적 관계 분석)

  • Kwon, Sang-Jib;Chung, Jee Yong
    • Knowledge Management Research
    • /
    • v.17 no.4
    • /
    • pp.1-25
    • /
    • 2016
  • The main purpose of this study is to examine relations among authentic leadership, trust for leaders, psychological well-being, and knowledge sharing. Authentic leadership proposes positive and interactional approach between leaders and subordinates. Authentic leaders are aware of their values and belief, and they keep their personal goals and support their followers. Such behaviors boost psychological well-being, knowledge sharing, and trust for leaders. To analyze the framework proposed, survey data was collected from 164 employees of three companies. In particular, this study designed a robust research method by assessing model fit and avoiding common method bias issues. The empirical results of this study are as follows. Authentic leadership positively influences trust for leaders and psychological well-being. Trust for leaders is shown to have positive impacts on psychological well-being and knowledge sharing. In addition, followers' psychological well-being positively influences knowledge sharing activities. This study contributes to the comprehension of the structural relationships among authentic leadership, trust for leaders, psychological well-being, and knowledge sharing. The results suggest that authentic leadership and trust for leaders were key success factors of building positive mindset and capability of employees in the forms of psychological well-being and knowledge sharing activities.

Security Architecture for OSGi Service Platform Environment (OSGi 서비스 플랫폼 환경을 위한 보안 아키텍처)

  • 박대하;김영갑;문창주;백두권
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.10 no.3
    • /
    • pp.259-272
    • /
    • 2004
  • This paper suggests a new security architecture for facilitating secure OSGi service platform environment. The security architecture includes 1) user authentication mechanism, 2) bundle authentication mechanism, 3) key sharing mechanism, and 4) authorization mechanism. The user authentication mechanism supplies SSO(single sign-on) functions which are useful for safe and easy user authentications. The bundle authentication mechanism utilizes both PKI-based and MAC-based digital signatures for efficiently authenticating service bundles. The key sharing mechanism, which is performed during bootstrapping phase of a service gateway, supplies a safe way for sharing secret keys that are required for authentication mechanisms. Finally, the authorization mechanism suggests distributed authorization among service providers and an operator by establishing their own security policies. The main contributions of the parer are twofold. First, we examine several security requirements of current OSGi specification when its security functions can be applied in real OSGi environments. Second, we describe the ways to resolve the problems by means of designing and implementing concrete security mechanisms.