• Title/Summary/Keyword: Quality of Security Service

Search Result 479, Processing Time 0.033 seconds

Data hiding in partially encrypted HEVC video

  • Xu, Dawen
    • ETRI Journal
    • /
    • v.42 no.3
    • /
    • pp.446-458
    • /
    • 2020
  • In this study, an efficient scheme for hiding data directly in partially encrypted versions of high efficiency video coding (HEVC) videos is proposed. The content owner uses stream cipher to selectively encrypt some HEVC-CABAC bin strings in a format-compliant manner. Then, the data hider embeds the secret message into the encrypted HEVC videos using the specific coefficient modification technique. Consequently, it can be used in third-party computing environments (more generally, cloud computing). For security and privacy purposes, service providers cannot access the visual content of the host video. As the coefficient is only slightly modified, the quality of the decrypted video is satisfactory. The encrypted and marked bitstreams meet the requirements of format compatibility, and have the same bit rate. At the receiving end, data extraction can be performed in the encrypted domain or decrypted domain that can be adapted to different application scenarios. Several standard video sequences with different resolutions and contents have been used for experimental evaluation.

A Study of Interworking Security Authentication System for the Wireless Networks of based on USIM (USIM 기반 무선 네트워크 연동 보안 인증 시스템에 관한 연구)

  • Jeong, Byung-Keun
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2007.10d
    • /
    • pp.22-26
    • /
    • 2007
  • 최근의 다양한 무선 네트워크 서비스의 장단점을 상호 보완하기 위해, 3G/WLAN/WiBRO 등을 포괄하는 통합 무선 네트워크 서비스 체계를 구축하고자 하는 노력이 활발히 이루어지고 있다. 현재 무선 네트워크 기술은 단순한 Ethernet 접속 수단이었던 초기와는 달리 공중망 서비스 지원을 위한 인증, 보안 QoS(Quality of Service), 주파수 간섭 등에 대한 기술이 추가로 개발되어 접목되고 있으며, 3세대 이동통신과의 상호 보완적 서비스 개념 형태의 진보된 초고속 무선 이동 서비스로 변화되어 가고 있다. 이 때, 각 네트워크간의 연동은 필연적이며 따라서 기존의 개별 네트워크를 넘어 연동되는 네트워크 상에서의 인증, 키 교환 및 데이터 암호화 등을 가능하게 하는 연동 보안 기술이 요구된다. 본 논문에서는 국제표준에서 제안되고 있는 무선 네트워크간의 연동 기술을 소개하고 효율적인 무선 네트워크 연동 보안을 위하여 USIM 을 통한 인증시스템이 보다 안전한 인증을 할 수 있음을 확인하였다.

  • PDF

A Study on Development of Active Network Component (능동보안 컴포넌트 개발에 관한 연구)

  • Hwang, Sang-Young;Hwang, Sun-Myung;Na, Jung-Chan
    • Annual Conference of KIPS
    • /
    • 2002.11c
    • /
    • pp.1929-1932
    • /
    • 2002
  • 최근 들어 네트워크 응용 분야의 수요가 기아급수적으로 증가하면서 네트웍 관리자나 사용자들로부터 네트워크에 대한 요구사항이 증가하고 있으며 이에 대한 서비스들은 QoS(Quality of Service)보장을 요구하고 있다. 그래서 최근에는 네트워크 노드들에 대하여 에이전트 기술이 포함되는 능동네트워크로의 전환이 이루어지고 있다. 본 연구에서는 능동보안 컴포넌트에 대해 살펴보았으며 이에 적용 가능한 능동 보안 컴포넌트 아키텍쳐를 제안하고, 능동 보안 컴포넌트를 개발할 수 있는 접근 단계와 명세 작성을 위한 명세서 규격을 제안하였다.

  • PDF

A Survey of Application Layer Protocols of Internet of Things

  • bibi, Nawab;Iqbal, Faiza;Akhtar, Salwa Muhammad;Anwar, Rabia;bibi, Shamshad
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.11
    • /
    • pp.301-311
    • /
    • 2021
  • The technological advancements of the last two decades directed the era of the Internet of Things (IoT). IoT enables billions of devices to connect through the internet and share their information and resources on a global level. These devices can be anything, from smartphones to embedded sensors. The main purpose of IoT is to make devices capable of achieving the desired goal with minimal to no human intervention. Although it hascome as a social and economic blessing, it still brought forward many security risks. This paper focuses on providing a survey of the most commonly used application layer protocols in the IoT domain, namely, Constrained Application Protocol (CoAP), Message Queuing Telemetry Transport (MQTT), Advanced Message Queuing Protocol (AMQP), and Extensible Messaging and Presence Protocol (XMPP). MQTT, AMQP, and XMPP use TCP for device-to-device communication, while CoAP utilizes UDP to achieve this purpose. MQTT and AMQP are based on a publish/subscribe model, CoAP uses the request/reply model for its structuring. In addition to this, the quality of service provision of MQTT, AMQP, and CoAP is not very high, especially when the deliverance of messages is concerned. The selection of protocols for each application is very a tedious task.This survey discusses the architectures, advantages, disadvantages, and applications of each of these protocols. The main contribution of this work is to describe each of the aforementioned application protocols in detail as well as providing their thorough comparative analysis. This survey will be helpful to the developers in selecting the protocol ideal for their system and/or application.

Review on improving measurement of cyber terror management system

  • Park, Jong-Ryeol;Noe, Sang-Ouk
    • Journal of the Korea Society of Computer and Information
    • /
    • v.21 no.6
    • /
    • pp.89-96
    • /
    • 2016
  • Damage and attack size of cyber terror is growing to the national size. Not only targeting at a certain companies or individuals but number of cyber terror targeting government bodies or unspecific people is increasing. This is because compared to traditional weapon, input cost is very cheap but ripple effect and shock are much stronger, affecting not only certain groups but also each individuals. 'Anti-terror measurement for protection of nation and public safety' passed last month is one of the renowned measurement passed regardless of objection from opposition party. The opposition party went against this through filibuster for 192 hours but this finally passed National Congress due to lack of oppositions. Korean government is taking post actions after passage of anti-terror measurement. Legislation of enforcement ordinance and regulations is due by 6th of next month. This regulation will be executed from June 4th after legislation. Whenever there is any security issues such as hacking of Korea Hydro and Nuclear Power and National Intelligence Service happens, lot of attention is made to those hackers. However, social recognition or management of those hackers need lot more improvement. Especially, as market of internet of things is increasing, there is an increased anxiety on information security. But as we only rely on security solutions, this problems are keep happening. Therefore, active investment on nurturing hackers who play the role of 'spear and shield' shall be made. Government should put more efforts to allow white hackers to show their abilities. We should have a policy for supporting high-quality programs such as BoB. To make information protection industry into future growth engine, it is necessary to nurture professionals for information protection and white hackers through special programs. Politicians should make related regulations as soon as possible to remove factors that prevent swift management of cyber attack due to lack of legislation. Government should pay lot more financial investment to nurturing professional manpower than now. Protecting life and asset of nation is responsibility and duty of our government. We all should recognize that controlling cyber attack is a part of national defense.

Cloud-Based Accounting Adoption in Jordanian Financial Sector

  • ELDALABEEH, Abdel Rahman;AL-SHBAIL, Mohannad Obeid;ALMUIET, Mohammad Zayed;BANY BAKER, Mohammad;E'LEIMAT, Dheifallah
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.8 no.2
    • /
    • pp.833-849
    • /
    • 2021
  • Cloud accounting represents a new area of accounting information systems. Past research has often focused on accounting information systems and its antecedents, rather than factors that adopt cloud accounting system. The purpose of this paper is to explain the factors that influence the adoption of cloud accounting in the financial sectors. This paper applied the technology acceptance model (TAM), technology-organization-environment, and the De Lone and Mc Lean model, coupled with proposed factors relevant to cloud accounting. The proposed model was empirically evaluated using survey data from 187 managers (financial managers, IT department managers, audit managers, heads of accounting departments, and head of internal control departments) in Jordanian bank branches. Based on the SEM results, top management support, organizational competency, service quality, system quality, perceived usefulness, and perceived ease of use had a positive relationship with the intention of using cloud accounting. Cloud accounting adoption positively affected cloud accounting usage. This paper contributes to a theoretical understanding of factors that activate the adoption of cloud accounting. For financial firms in general the results enable them to better develop cloud accounting framework. The paper verifies the factors that affect the adoption of cloud accounting and the proposed cloud accounting model.

Decoding the Branded App Engagement Process: A Grounded Theory Approach

  • Harish Kumar;Nikhita Tuli
    • Asia pacific journal of information systems
    • /
    • v.31 no.4
    • /
    • pp.582-605
    • /
    • 2021
  • The study aims to explore the nature, drivers of BAE. In particular, how and why consumers engage with branded mobile apps. Since consumer engagement is a multi-dimensional and complex phenomenon, the authors took an interpretivist paradigm and used a grounded theory approach by interviewing 24 participants. The findings reveal that branded app engagement (BAE) is triggered by mainly three aspects, i.e., media characteristics (Privacy and security, customization, and convenience), brand-related aspects (brand image and product/service quality), and benefits sought (inherent and derived). More importantly, we uncover the underlying mechanism for each factor. Furthermore, the study explains the BAE process in its entirety from an app-centric perspective rather the brand powering the app. Thus, the study offers a fresh perspective and novel insights into the BAE process.

Some Suggestions for the Development of the Nautical Education in Korea Maritime University (한국해기사의 교육개발에 관한 연구 (한국해양대학 승선학과교육의 발전과제))

  • 정세모;김효중;노장주;이상집
    • Journal of the Korean Institute of Navigation
    • /
    • v.8 no.1
    • /
    • pp.71-102
    • /
    • 1984
  • In Korea, the importance of keeping the see transportation facilities and well-trained maritime officers cannot be overemphasized, because of her geographical location and the national security in terms of both political and economical situations. In this paper, some points are suggested for the development of the nautical education in Korea Maritime University: (1) the strict regimental training should be kept as a vital important part of students life and its program should be designed to provide students with leadership training and experience, and to develope in the qualities of responsibilities for good citizenship and self-discipline to overcome hardwork for careers as leaders in Korea maritime industry. And therefore the dormitory and training vessel as essential parts of the educational facilities should be improved both in quality and quantity, (2) the undergraduate course should be extended to more than 5 years so that accredited baccalaureate curriculum and licensing professional education might be well conducted to meet the requirements to cope with the international competition in the facet of seafarers quality, (3) more enlarging the opportunities of incentive payments for students is required so that better qualified applicants can be admitted, (4) finally, a conjugal maritime officer service system should be put into practice in the foresseable furture so that seafarers might live normal family lives while staying at sea.

  • PDF

A Study on Security Reference Model in Personal Health Lifelog Services (개인 건강 라이프로그 서비스에서 보안 참조 모델에 관한 연구)

  • Yi, Myung-Kyu;Hwang, Hee-Joung
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.4
    • /
    • pp.109-115
    • /
    • 2016
  • Life log started with the simple purpose of recording or sharing mainly data regarding one's personal life, but with the introduction of advanced specialized analytic methods by many corporations, a new type of business based on the life log recently emerged, with an aim of improving the quality of people's personal lives. In spite of the indispensable advantages, however, personal health lifelog service brings critical challenges that cannot be avoided from user side if the security of the data is concerned. The problem of user's privacy infringement and leaking user's sensitive medical information is increasing with the revitalization of personal health lifelog services. In this paper, we propose an information security reference model for the personal health lifelog services. Our proposal can contribute to increase the related industry to cultivate new market by suggesting the clear announcement of the guidelines using privacy protection reference model for user-specific healthcare services which uses personal lifelog.

Problems and Improvement of Privacy Impact Assessment (개인정보영향평가의 문제점과 개선방안)

  • Choi, Young-hee;Han, Keun-hee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.4
    • /
    • pp.973-983
    • /
    • 2016
  • It's been almost 6 years since PIA was implemented based on legislation. So I analyzed problems of PIA from the perspective of ITSM 3 elements. I mainly took account of quality improvement of the report when I assessed systems processing personal informations. So, I propose in terms of logical validity improvement of assessment report. The improvements on 4 different outputs for each phase are many cases that I assessed systems processing personal informations. And I propose improvements on qualified assessors having capability of GRC and on process for managing the assessment system. To settle down PIA system as the reasonable and effective assessment system even after 2016, the statutory deadline for completion of PIA, assessors and appointed assessment firms and authorities should cooperate to complete the assessment system.