• Title/Summary/Keyword: Mobile security

Search Result 1,993, Processing Time 0.031 seconds

A Design of Authority Management Protocol for Secure Storage Access Control in Cloud Environment (클라우드 환경에서 안전한 스토리지 접근 제어를 위한 권한 관리 프로토콜 설계)

  • Min, So-Yeon;Lee, Kwang-Hyong;Jin, Byung-Wook
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.9
    • /
    • pp.12-20
    • /
    • 2016
  • With the enhancements in existing major industries, cloud computing-based converging services have been created, as well as value-added industries. A variety of converging services are now provided, from personalized services up to industrial services. In Korea, they have become the driving force behind existing industries throughout the whole economy, but mainly in finance, mobile systems, social computing, and home services, based on cloud services. However, not only denial of service (DOS) and distributed DOS (DDOS) attacks have occurred, but also attack techniques targeting core data in storage servers. Even security threats that are hardly detected, such as multiple attacks on a certain target, APT, and backdoor penetration have also occurred. To supplement defenses against these, in this article, a protocol for authority management is designed to provide users with safe storage services. This protocol was studied in cases of integration between a cloud environment and big data-based technology, security threats, and their requirements. Also studied were amalgamation examples and their requirements in technology-based cloud environments and big data. With the protocol suggested, based on this, security was analyzed for attack techniques that occur in the existing cloud environment, as well as big data-based techniques, in order to find improvements in session key development of approximately 55%.

An Estimation Method for Location Coordinate of Object in Image Using Single Camera and GPS (단일 카메라와 GPS를 이용한 영상 내 객체 위치 좌표 추정 기법)

  • Seung, Teak-Young;Kwon, Gi-Chang;Moon, Kwang-Seok;Lee, Suk-Hwan;Kwon, Ki-Ryong
    • Journal of Korea Multimedia Society
    • /
    • v.19 no.2
    • /
    • pp.112-121
    • /
    • 2016
  • ADAS(Advanced Driver Assistance Systems) and street furniture information collecting car like as MMS(Mobile Mapping System), they require object location estimation method for recognizing spatial information of object in road images. But, the case of conventional methods, these methods require additional hardware module for gathering spatial information of object and have high computational complexity. In this paper, for a coordinate of road sign in single camera image, a position estimation scheme of object in road images is proposed using the relationship between the pixel and object size in real world. In this scheme, coordinate value and direction are used to get coordinate value of a road sign in images after estimating the equation related on pixel and real size of road sign. By experiments with test video set, it is confirmed that proposed method has high accuracy for mapping estimated object coordinate into commercial map. Therefore, proposed method can be used for MMS in commercial region.

The Determinants Towards the Use of University Smartphone Application's System: Focused on Mobile Environments (대학행정 어플리케이션 이용에 미치는 결정요인: 모바일 환경을 중심으로)

  • Son, Dal-Ho;Park, Jun Woo
    • The Journal of Information Systems
    • /
    • v.22 no.1
    • /
    • pp.1-27
    • /
    • 2013
  • The advancement of information and communication technology have brought the increase and the diversification of the digitalized information, which can be shared at any time from any place. Especially, with the recent spread of smartphone usage, the amount and the diversity of information have increased to amounts that are difficult to quantify. Within such an era of accelerated accumulation and diversification of digitalized information, the informatization of universities is becoming a critical factor for institutional advancement. Thus, universities are developing smartphone applications to provide easily accessible administration services, and support the information needs of each administration process by keeping a relationship with students from admission to post-graduation. This research systematically defines a university smartphone application, distinguishes its system quality factors, and studies the effects they have on satisfaction, intention of reuse, and intention of electronic word-of-mouth. The results showed that the security factor of system quality did not have a significant effect on satisfaction. The responsiveness and the empathy factors of service quality did not show a significant effect on satisfaction. Moreover, it was found that a higher user satisfaction for smartphone applications has a significant influence on intention of reuse and on the intention of electronic word-of-mouth.

The Importance of Financial Literacy: Household's Income Mobility Measurement and Decomposition Approach

  • MONSURA, Melcah Pascua
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.7 no.12
    • /
    • pp.647-655
    • /
    • 2020
  • This study introduced income mobility analysis using pseudo-longitudinal panel data from Family Income and Expenditure Survey (FIES) to consider the dynamic process of individual's well-being through time. Since there is no comprehensive measurement of income mobility because of its dynamic process, various income mobility indices such as Chi-square, Average Jump Index, Atkinson et al. Mobility Ratio, and Shorrocks' Mobility Index were used. These indices revealed that Filipino households' income movements are more mobile than expected, and their income status improved from 2000 to 2015. As income mobility takes place, income inequality is reduced by 91.80 percent (91.80%). Furthermore, the growth effect is the main factor of income mobility. This indicates that households took the economic opportunities from economic growth to earn more. However, income mobility due to transfer effect (transfer of income from one household to another through lottery winning and borrowing) increased when the economy is not good. The higher income mobility due to growth effect compared to transfer effect, whether the economy is good or bad, means that households learned how to use their income in savings, investments, and entrepreneurship. This is the result of a successful financial literacy program of the government wherein households realized financial stability and security.

A Study on User Authentication for Wireless Communication Security in the Telematics Environment (텔레메틱스 환경에서 무선통신 보안을 위한 사용자 인증에 관한 연구)

  • Kim, Hyoung-Gook
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.9 no.2
    • /
    • pp.104-109
    • /
    • 2010
  • In this paper, we propose a user authentication technology to protect wiretapping and attacking from others in the telematics environment, which users in vehicle can use internet service in local area network via mobile device. In the proposed user authentication technology, the packet speech data is encrypted by speech-based biometric key, which is generated from the user's speech signal. Thereafter, the encrypted data packet is submitted to the information communication server(ICS). At the ICS, the speech feature of the user is reconstructed from the encrypted data packet and is compared with the preregistered speech-based biometric key for user authentication. Based on implementation of our proposed communication method, we confirm that our proposed method is secure from various attack methods.

A Coordinated Ciphertext Policy Attribute-based PHR Access Control with User Accountability

  • Lin, Guofeng;You, Lirong;Hu, Bing;Hong, Hanshu;Sun, Zhixin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.4
    • /
    • pp.1832-1853
    • /
    • 2018
  • The personal health record (PHR) system is a promising application that provides precise information and customized services for health care. To flexibly protect sensitive data, attribute-based encryption has been widely applied for PHR access control. However, escrow, exposure and abuse of private keys still hinder its practical application in the PHR system. In this paper, we propose a coordinated ciphertext policy attribute-based access control with user accountability (CCP-ABAC-UA) for the PHR system. Its coordinated mechanism not only effectively prevents the escrow and exposure of private keys but also accurately detects whether key abuse is taking place and identifies the traitor. We claim that CCP-ABAC-UA is a user-side lightweight scheme. Especially for PHR receivers, no bilinear pairing computation is needed to access health records, so the practical mobile PHR system can be realized. By introducing a novel provably secure construction, we prove that it is secure against selectively chosen plaintext attacks. The analysis indicates that CCP-ABAC-UA achieves better performance in terms of security and user-side computational efficiency for a PHR system.

Response Time Simulation for 2-tier and 3-tier C/S System (2-계층과 3-계층 C/S 시스템의 응답시간 시뮬레이션)

  • Kim Yong-Soo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.9 no.3
    • /
    • pp.45-53
    • /
    • 2004
  • The fact that the end-user response time could become unacceptable in the 2-tier C/S system has been well known to C/S system developers. But inexperienced new developers who want to provide mobile solutions using PDA sometimes do not realize the ominous consequences of the 2-tier C/S systems. Except for the easy of development. the 2-tier C/S system has many weak points like in application deployment, security, scalability, application reuse, heterogeneous DBMS support, availability. and response time. This paper analyzes the response time in the 2-tier and 3-tier C/S systems through simulation. Although the problem space is confined to the 2 and 3 tiers, the result could be equally applied to any multi-tier systems.

  • PDF

A Design of Electronic Health Records Partial Encryption Method for Protecting Patient's Information on the U-Healthcare Environment (U-Healthcare 환경에서 환자정보보호를 위한 전자차트 부분 암호화 기법 설계)

  • Shin, Seon Hee;Kim, Hyun Chul;Park, Chan Kil;Jeon, Moon Seog
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.6 no.3
    • /
    • pp.91-101
    • /
    • 2010
  • By using the U-Healthcare environment, it is possible to receive the health care services anywhere anytime. However, since the user's personal information can be easily exposed in the U-Healthcare environment, it is necessary to strengthen the security system. This thesis proposes the technique which can be used to protect the personal medical records at hospital safely, in order to avoid the exposure of the user's personal information which can occur due to the frequent usage of the electronic chart according to the computerization process of medical records. In the proposed system, the following two strategies are used: i) In order to reduce the amount of the system load, it is necessary to apply the partial encryption process for electronic charts. ii) Regarding the user's authentication process for each patient, the authentication number for each electronic chart, which is in the encrypted form, is transmitted through the patient's mobile device by the National Health Insurance Corporation, when the patient register his or her application at hospital. Regarding the modern health care services, it is important to protect the user's personal information. The proposed technique will be an important method of protecting the user's information.

A Design of Device Identification and Communication Method for Secure Device Monitoring based Smart Phone (스마트폰 기반에서 안전한 디바이스 모니터링을 위한 디바이스 식별 및 통신 기법 설계)

  • Jin, Byungwook;Ahn, Heuihak;Jun, Moonseog
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.13 no.1
    • /
    • pp.69-78
    • /
    • 2017
  • As the smartphone-based devices are diffused and developed rapidly, they provide the convenience to the users. The abovementioned sentence technologies are being used not only in the existing sensor and wireless network technology but also in the application services of the diverse fields application services such as smart appliance, smart car, smart health care, etc. and the new fusion paradigm from the industry is presented by undertaking the researches in diverse area by the enterprises and research institutions. However, the smart environment exposes its weaknesses in the mobile terminal area, existing wireless network and IT security area. In addition, due to new and variant ways of attack, not only the critical information are disclosed However also the financial damages occur. This paper proposed the protocol to perform the smartphone-based safe device monitoring and safe communication. The proposed protocol designed the management procedure of registration, identification, communication protocol and device update management protocol and the safety against the attack techniques such as the an-in-the-middle-attack, impersonation attack, credential threat, information leaks and privacy invasion was analyzed. It was observed that the proposed protocol showed the performance improved by approximately 52% in the communication process than the existing system.

A Proposal of Secure Route Discovery Protocol for Ad Hoc Network (Ad Hoc 네트워크를 위한 안전한 경로발견 프로토콜 제안)

  • Park Young-Ho;Kim Jin-Gyu;Kim Cheol-Su
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.10 no.3
    • /
    • pp.30-37
    • /
    • 2005
  • Ad hoc network is a collection of mobile nodes without using any infrastructure, it , is using in the various fields. Because ad hoc network is vulnerable to attacks such as routing disruption and resource consumption, it is in need of routing protocol security. In this paper, we propose two secure route-discovery protocols. One is a protocol using hash function. This protocol is weak in active attack but has some merits such as small data of transmission packet and small computation at each hop. The other is a protocol using hash function and public key cryptography. This protocol is strong in active attack.

  • PDF