• Title/Summary/Keyword: Secure Data management

Search Result 754, Processing Time 0.032 seconds

Data Life Cycle Proposal for Research Data Management (연구 데이터 관리를 위한 데이터 라이프 사이클 제안)

  • Kim, Juseop;Kim, Suntae;Jeon, Yerin
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.53 no.4
    • /
    • pp.309-340
    • /
    • 2019
  • Although overseas countries have already developed data life cycle for the preservation and curation of data since the 1990s, the research in Korea has been very insufficient. In this study, we analyzed the data life cycles developed in DCC, ICPSR, IWGDD, DataONE, USGS and UKDA to propose data life cycle for efficient management of research data. As a result of the analysis, the common components derived are 'Plan', 'Create & Collect', 'Process', 'Preserve', 'Dispose', 'Access & Use', 'Describe', 'Assure' and 'Backup & Secure'. In addition, the nine components were subdivided into stages to describe the details to be carried out at that stage. It is expected that the content of this study will be applicable in the future development of data life cycle for research data management in Korea.

Implementation of Secure Vehicular Communication System in u-TSN (u-TSN에서의 안전한 차량 통신 시스템 구현)

  • Park, Yo-Han;Park, Young-Ho;Moon, Sang-Jae
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.48 no.4
    • /
    • pp.100-106
    • /
    • 2011
  • u-TSN is a promising technology facilitating road safety and traffic management for drivers and passengers. To deploy this technology in a real environment, personal information and communicated data should be protected against malicious adversaries. Even though such adversaries would appear relatively infrequently, in such cases, the benefits of u-TSN could be disrupted and disabled. Therefore, one of the ultimate goals in the design of secure u-TSN is to protect against attacks of malicious adversaries. In this paper, we present secure communication scenario for u-TSN and implement security protocols and algorithms that are the components of the scenario on an IXP425 board. The security systems, implemented as a security module, supports secure and efficient communication for the u-TSN.

Efficient and Secure Identity-Based Public Auditing for Dynamic Outsourced Data with Proxy

  • Yu, Haiyang;Cai, Yongquan;Kong, Shanshan;Ning, Zhenhu;Xue, Fei;Zhong, Han
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.10
    • /
    • pp.5039-5061
    • /
    • 2017
  • Cloud storage becomes a new trend that more and more users move their data to cloud storage servers (CSSs). To ensure the security of cloud storage, many cloud auditing schemes are proposed to check the integrity of users' cloud data. However, most of them are based on public key infrastructure, which leads to complex certificates management and verification. Besides, most existing auditing schemes are inefficient when user uploads a large amount of data or a third party auditor (TPA) performs auditing for multiple users' data on different CSSs. To overcome these problems, in this paper, we propose an efficient and secure auditing scheme based on identity-based cryptography. To relieve user's computation burden, we introduce a proxy, which is delegated to generate and upload homomorphic verifiable tags for user. We extend our auditing scheme to support auditing for dynamic data operations. We further extend it to support batch auditing in multiple users and multiple CSSs setting, which is practical and efficient in large scale cloud storage system. Extensive security analysis shows that our scheme is provably secure in random oracle model. Performance analysis demonstrates that our scheme is highly efficient, especially reducing the computation cost of proxy and TPA.

A study on the credibility estimation model for the indurance experience rate-making (보험 경험요율산정을 위한 신뢰도 추정모형 연구)

  • 강정혁;양원섭
    • Korean Management Science Review
    • /
    • v.11 no.3
    • /
    • pp.153-167
    • /
    • 1994
  • Credibility theory has provided with a useful tool the assignment of weighting factor that reflects the credibility of the observed individual and collective experience to secure fair experience rate-,making. We review credibility models which can effectively estimate risk premiums using credibility theory, and suggest an empirical Bayed model based on the collective statistics to estimate the structural parameters. To illustrate the use of evolutionary models, the models are applied to the actual data, such as loss ratio, claim frequencies and severity, in the Korean automobile insurance. Also the possibilities of generalizations and applications of empirical models are discussed.

  • PDF

Field Survey on the Shading Structure and Environmental Management for Ginseng Cultivation (인삼재배시설의 구조 및 환경관리 실태조사)

  • Nam, Sang-Woon
    • Proceedings of the Korean Society of Agricultural Engineers Conference
    • /
    • 2002.10a
    • /
    • pp.65-68
    • /
    • 2002
  • This study was conducted to secure the structural safety and to build fundamental data for development of controlled environment facilities in ginseng cultivation. Shading structures of ginseng cultivation were classified with materials, structural forms, and detailed setups. They are wood or steel pipe, single or multi span, and frame or cable type. For structures having representative forms and dimensions, modeling for structural analysis was builded by SAP2000. And there was almost no farm carrying out the environmental management specially.

  • PDF

Discussion for Securing Self-Reliant Finance of Local Government Using Public Data (공공데이터를 활용한 지자체 자주재원 확보 논의)

  • Seo, Hyung-Jun
    • The Journal of the Korea Contents Association
    • /
    • v.15 no.4
    • /
    • pp.380-390
    • /
    • 2015
  • Because the local governments has closet contact for public services compared to central government, their role is important in the age when welfare issue is more important than before. So Local Public Finance being important than ever, but regrettably local financial issues related to the mostly negative. In particular, many local government face problem of local fiscal independence, as a result, they have hard time to secure financial resources. Reliant local finance by central government can be alternative, however, it causes negative effect for autonomous management of local finance and fiscal soundness. In this study, public data by public institutions is suggested as solution to secure financial resources. Although, utilization of public data is initial level, this paper deal with exploratory discussion for public data as self-reliant local finance with validity and suggestions.

Key Management Framework based on Double Hash Chain for Secure Smart Grid Environments (안전한 스마트 그리드 환경을 위한 이중 해쉬 체인 기반 키 관리 프레임워크)

  • Lee, Young-Seok
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.9
    • /
    • pp.2063-2072
    • /
    • 2013
  • Smart Grid is the next-generation intelligent power grid that maximizes energy efficiency with the convergence of IT technologies and the existing power grid. It enables consumers to check power rates in real time for active power consumption. It also enables suppliers to measure their expected power generation load, which stabilizes the operation of the power system. However, there are high possibility that various kinds of security threats such as data exposure, data theft, and privacy invasion may occur in interactive communication with intelligent devices. Therefore, to establish a secure environment for responding to such security threat with the smart grid, the key management technique, which is the core of the development of a security mechanism, is required. Using a hash chain, this paper suggests a group key management mechanism that is efficiently applicable to the smart grid environment with its hierarchical structure, and analyzes the security and efficiency of the suggested group key management framework.

A Study on Process Management Method of Offshore Plant Piping Material (해양플랜트 배관재 공정관리 방법에 관한 연구)

  • Park, JungGoo;Woo, JongHun
    • Journal of the Society of Naval Architects of Korea
    • /
    • v.55 no.2
    • /
    • pp.124-135
    • /
    • 2018
  • In order to secure manufacturing competitiveness of offshore plants, piping process is one of the most important processes. This study is about the design of management system for piping materials manufacturing of the offshore plant. As a result of the study, we analyzed the system and algorithms needed for the processing of piping material products and designed the structure of the entire management system. We conducted a process analysis of the design, manufacturing and installation processes. And also we proposed a system structure to improve the various problems that have come out. We also proposed an algorithm to determine the delivery order of the pipe spools, and proposed a raw material management system for the manufacturing of the pipe spools. And we designed a manufacturing process management system to manage the risk of pipe materials delivery. And finally we proposed a data structure for the installation process management system. The data structures and algorithms were actually implemented, and applied the actual process data to verify the effect of the system.

The Security Life Cycler Energy Service Platform for Universal Middleware (유니버설미들웨어기반 생명주기 보안에너지 서비스플랫폼 연구)

  • Lee, Hae-Jun;Hwang, Chi-Gon;Yoon, Chang-Pyo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.6
    • /
    • pp.1197-1202
    • /
    • 2017
  • Security services that support electric energy service gateway require relatively high reliability. In particular, the application services that accompany communications and data are run organically. Each of the security services should support a secure service platform that supports a secure, scalable life cycle for existing services which should be extends security layer of Universal Middleware. In this convergence platform, it is the study of security transfer modular services that allow independent life cycle management of systems through Universal middleware. First, It is modular in terms of energy consumption service and data, enabling real-time operation, communications, remote management and applications. Second, the life cycle of the secure module to support start, stop and updating of the security module by applying the security policy module layer concept. It is modular system enabling to design of dyanmic models in the smart grid, the service was intended to be standardized and applied to the security service platform.

Secure and Energy Efficient Protocol based on Cluster for Wireless Sensor Networks (무선 센서 네트워크에서 안전하고 에너지 효율적인 클러스터 기반 프로토콜)

  • Kim, Jin-Su;Lee, Jung-Hyun
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.2
    • /
    • pp.14-24
    • /
    • 2010
  • Because WSNs operate with limited resources of sensor nodes, its life is extended by cluster-based routing methods. In this study, we use data on direction, distance, density and residual energy in order to maximize the energy efficiency of cluster-based routing methods. Through this study, we expect to minimize the frequency of isolated nodes when selecting a new cluster head autonomously using information on the direction of the upper cluster head, and to reduce energy consumption by switching sensor nodes, which are included in both of the new cluster and the previous cluster and thus do not need to update information, into the sleep mode and updating information only for newly included sensor nodes at the setup phase using distance data. Furthermore, we enhance overall network efficiency by implementing secure and energy-efficient communication through key management robust against internal and external attacks in cluster-based routing techniques. This study suggests the modified cluster head selection scheme which uses the conserved energy in the steady-state phase by reducing unnecessary communications of unchanged nodes between selected cluster head and previous cluster head in the setup phase, and thus prolongs the network lifetime and provides secure and equal opportunity for being cluster head.