• Title/Summary/Keyword: Middleware Security

Search Result 85, Processing Time 0.027 seconds

Smart Contract's Hierarchical Rules Modularization and Security Mechanism (스마트 컨트랙트의 계층형 규칙 모듈화와 보안 메커니즘)

  • An, Jung Hyun;Na, Sung Hyun;Park, Young B.
    • Journal of the Semiconductor & Display Technology
    • /
    • v.18 no.1
    • /
    • pp.74-78
    • /
    • 2019
  • As software becomes larger and network technology develops, the management of distributed data becomes more popular. Therefore, it is becoming increasingly important to use blockchain technology that can guarantee the integrity of data in various fields by utilizing existing infrastructure. Blockchain is a distributed computing technology that ensures that servers participating in a network maintain and manage data according to specific agreement algorithms and rules to ensure integrity. As smart contracts are applied, not only passwords but also various services to be applied to the code. In order to reinforce existing research on smart contract applied to the blockchain, we proposed a dynamic conditional rule of smart contract that can formalize rules of smart contract by introducing ontology and SWRL and manage rules dynamically in various situations. In the previous research, there is a module that receives the upper rule in the blockchain network, and the rule layer is formed according to this module. However, for every transaction request, it is a lot of resources to check the top rule in a blockchain network, or to provide it to every blockchain network by a reputable organization every time the rule is updated. To solve this problem, we propose to separate the module responsible for the upper rule into an independent server. Since the module responsible for the above rules is separated into servers, the rules underlying the service may be transformed or attacked in the middleware. Therefore, the security mechanism using TLS and PKI is added as an agent in consideration of the security factor. In this way, the benefits of computing resource management and security can be achieved at the same time.

Design and Implementation of Access Control System Based on XACML in Home Networks (XACML 기반 홈 네트워크 접근제어 시스템의 설계 및 구현)

  • Lee, Jun-Ho;Lim, Kyung-Shik;Won, Yoo-Jae
    • The KIPS Transactions:PartC
    • /
    • v.13C no.5 s.108
    • /
    • pp.549-558
    • /
    • 2006
  • For activating home network, the security service is positively necessary and especially the access control supports secure home network services and differentiated services. But, the existing security technology for home network seldom consider access control or has a architecture to be dependent on specific middleware. Therefore, in this paper we propose a scheme to support integrated access control in home network to use XACML, access control standard of next generation, to have compatability and extensibility and we design and implement XACML access control system based on this. we also had m access control experiment about various policy to connect developed XACML access control system with the UPnP proxy based on OSGi in order to verify compatability with existing home network system.

A Survey on Intrusion-Tolerant System

  • Heo, Seondong;Kim, Pyeong;Shin, Yongjoo;Lim, Jungmin;Koo, Dongyoung;Kim, Yonggon;Kwon, Ohmin;Yoon, Hyunsoo
    • Journal of Computing Science and Engineering
    • /
    • v.7 no.4
    • /
    • pp.242-250
    • /
    • 2013
  • Many information systems that provide useful services to people are connected to the Internet for convenience and efficiency. However, improper accessibility might make the systems susceptible to a variety of attacks. Although existing security solutions such as an intrusion detection system, intrusion prevention system, and firewalls have been designed to protect against such attacks, it is impossible to block all kinds of attacks. Furthermore, most of the proposed solutions require information about attacks for efficient prevention. Research on intrusion-tolerant systems (ITSs) have been conducted in order to continue providing proper services in threatening environments. The purpose of an ITS is to survive against every intrusion, rather than to prevent them. In this paper, previous studies on ITS are introduced and classified according to the centric scheme as middleware-based ITS, hardware-based ITS, and recovery-based ITS. Recent research focusing on adaptive transformation schemes is also introduced.

Design and Implementation of a Proxy-based Mobile Grid Services Framework (프록시 기반의 모바일 그리드 서비스 프레임워크 설계 및 구현)

  • Kim, Min-Gyu;Park, Si-Yong;Lee, Bong-Hwan
    • Journal of Internet Computing and Services
    • /
    • v.8 no.3
    • /
    • pp.85-98
    • /
    • 2007
  • In distributed computing paradigm, mobile surrogate systems have not gained wide acceptance because of security concerns that have not been suitably addressed yet. Currently even the widely used Grid middleware, Globus, does not have a host authentication mechanism, which makes it hard to provide high performance Grid computing capabilities to mobile clients. In this paper, a mobile Grid service framework is designed and implemented in order to provide Grid services to mobile host such as PDA. The surrogate host-based system allows mobile hosts to be provided with Grid services while moving. The implemented mobile Grid services system has been applied to mobile healthcare system which utilizes Grid computing for ECG signal processing. The presented system framework can be used as a secure enterprise mobile healthcare system for hospital physicians.

  • PDF

Development of Integrated Monitoring Middleware System for 400km/h High Speed Railway Measurement Data (400km/h급 고속철도 계측데이터 통합 모니터링 미들웨어 시스템 개발)

  • Hwang, KyungHun;Na, JunSu;Song, ByungKeun;Yang, OKYul
    • Convergence Security Journal
    • /
    • v.13 no.6
    • /
    • pp.61-68
    • /
    • 2013
  • Needs for a new technologies of infrastructure systems arose, following the development of next generation EMU(Electric Multiple Unit) train with maximum speed over 400km/h. For high-speed operation tests of the new EMU, a high-speed railway infrastructure test-bed was constructed in a 28km long section of the Honam High-speed Railway. Diverse sensors and monitoring system was installed for continuous monitoring of the railway. Due to such effort, further demands and needs of the integrated monitoring system was derived in a more comprehensive and long-term perspective.

Development of the OSGi-based USB Terminal System for U-learning (U-learning을 위한 OSGi에 기반한 USB 단말기 시스템 개발)

  • Kim, Hee-Sun;Kim, Jee-Hong;Lee, Chang-Goo
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.13 no.12
    • /
    • pp.1252-1256
    • /
    • 2007
  • U-learning (ubiquitous learning) systems, which deliver learning materials anytime and anywhere, allow learners to watch live lectures on PDAs, tablet PCs and notebook computers via broadband and wireless Internet. These systems have various problems; first, terminal devices are expensive, and it is difficult to maintain their efficiencies. Secondly, Internet does not guarantee quality of service (QoS), and in general it does not provide real-time services. Finally, the security of these systems is weaker in a local network than in an external network. The USB-based terminal system based on the OSGi service platform was designed as a ubiquitous system, in order to solve those problems. The USB terminals, used in this system, are inexpensive, and it is easy to maintain their performances. Also, this system solves the problems of security in a local network and provides guaranteed QoS. To accomplish this, the number of USB terminals connected to the system has to be limited according to the formula proposed in our paper. This system uses the OSGi specification as a middleware. It supports the discovery mechanism of the USB terminals, maintenance and administration of the system. Finally, this paper shows a driver's license testing system as an example u-learning application1.

Design of Middleware for Mobile Security in Ubiquitous Environment (유비쿼터스 환경에서의 이동 단말 보안 관리를 위한 미들웨어 설계)

  • Lee Kanghee;Jiang Zhefan;Kim Sangok;Kim Sangwook
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2005.11a
    • /
    • pp.28-30
    • /
    • 2005
  • 유비쿼터스 환경에서의 이동 단말들을 관리하기 위해서는 수많은 요구 사항들을 만족시켜야만 한다. 모든 이동 단말들과 정보를 교환할 수 있어야 하며, 기존의 이동 단말뿐 만 아니라 미래의 새로운 단말기기도 수용할 수 있도록 확장성을 제공하여야 한다. 또한 많은 종류의 이동 단말들을 제어하기 위해서 쉽게 구성된 보안 관리 체계와 정책 적용에 있어 자동성을 제공 해야 한다. 사실 이러한 요구사항을 단지 하나의 미들웨어로 만족시키기는 어렵다. 본 논문에서는 이동 단말들의 절러 미들웨어을 수용할 수 있는 유비쿼터스 환경에 적합한 이동 단말 보안 관리를 위한 미들웨어를 제안한다. 이 미들웨어는 모든 이동 단말들과의 정보 교환을 위한 서비스를 핵심으로 구성되고 각 이동 단말들의 상태와 이벤트를 관리하여 보안정책에 맞추어 리소스와 서비스를 제공한다.

  • PDF

Security Policy Management using Role-Based Access Control in CORBA Environment (CORBA 환경에서 역할-기반 접근제어 기법을 이용한 보안정책 관리)

  • 조은정;이금석
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 1998.10a
    • /
    • pp.175-177
    • /
    • 1998
  • 분산 컴퓨팅 환경에서 응용 프로그램들은 다른 응용 프로그램들과 자원을 공유하고 통신하면서 보다 효율적으로 작업을 수행하게 된다. 이러한 과정에서 침입자들에 의한 자원 손실을 막고 정보 무결성을 유지하는 것은 중요한 문제가 된다. 따라서 분산 환경에서는 분산된 자원 사용에 대한 인증(Authentication) 및 인가(Authorization)과정 등의 중요성이 증대되었다. 이질적인 시스템간의 분산 환경을 구축할 수 있는 미들웨어(Middleware)중 가장 활발히 연구되고 이는 CORBA 에서는 보안 서비스를 제공해 주기 위해 COSS (Common Object Service Specification)3에서 보안 서비스를 정의했다. 하지만 COSS3에서 정의한 객체 접근제어 기법만으로는 효율적인 보안 정책 관리가 어렵다. 따라서 본 논문에서는 CORBA 보안 서비스 중 객체 접근제어를 위해 역할-기반 접근제어 (RBAC : Role - Based Access Control)기법을 이용한 효율적이고 융통성 있는 보안정책 관리에 대해 논한다.

  • PDF

Autonomous, Scalable, and Resilient Overlay Infrastructure

  • Shami, Khaldoon;Magoni, Damien;Lorenz, Pascal
    • Journal of Communications and Networks
    • /
    • v.8 no.4
    • /
    • pp.378-390
    • /
    • 2006
  • Many distributed applications build overlays on top of the Internet. Several unsolved issues at the network layer can explain this trend to implement network services such as multicast, mobility, and security at the application layer. On one hand, overlays creating basic topologies are usually limited in flexibility and scalability. On the other hand, overlays creating complex topologies require some form of application level addressing, routing, and naming mechanisms. Our aim is to design an efficient and robust addressing, routing, and naming infrastructure for these complex overlays. Our only assumption is that they are deployed over the Internet topology. Applications that use our middleware will be relieved from managing their own overlay topologies. Our infrastructure is based on the separation of the naming and the addressing planes and provides a convergence plane for the current heterogeneous Internet environment. To implement this property, we have designed a scalable distributed k-resilient name to address binding system. This paper describes the design of our overlay infrastructure and presents performance results concerning its routing scalability, its path inflation efficiency and its resilience to network dynamics.

Middleware Service for Autonomous Home-Network Construction (자율적 홈네트워크 구축을 위한 미들웨어 서비스)

  • Kim, Hee-Soo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2002.11b
    • /
    • pp.1539-1542
    • /
    • 2002
  • 본 논문에서는 네트워크에 연결된 각종 기기 및 디지털 전자제품을 자율적 홈 네트워크 환경으로 구축하기 위한 방안을 제시한다. 제안한 자율적 홈네트워크 시스템은 네트워크상에 연결된 여러 시스템과 디바이스에 대하여 시간과 공간의 제한없이 접근, 제어할 수 있는 가능성과 함께 구성된 시스템 연합체내의 상호 교류와 접근을 통하여 각종 기기를 제어하고 이용할 수 있는 매카니즘을 제공하여 준다. 구성된 시스템은 적은 비용으로 안정성 있는 시스템 구축방법을 제시할 수 있으며 또한 서비스 관리자의 중재 역할로 서비스 요구에 대한 상호작업이 원활히 진행될 수 있었으며, 원격 프로세스의 제어와 일격 자원을 이용한 병렬 프로그래밍으로 확장 가능하다.

  • PDF