• Title/Summary/Keyword: Secure Data management

Search Result 757, Processing Time 0.024 seconds

FI-Based Local Group Key Generation/Distribution for Mobile Multicast in a Hierarchical Mobile IPv6Network

  • Baek, Jin-Suk;Fisher, Paul S.;Kwak, Ming-Yung
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.2 no.1
    • /
    • pp.5-21
    • /
    • 2008
  • In order to securely transmit multicast data packets in a mobile environment where frequent join/leave events are a characteristic of the environment, there is a need for a new secure and efficient group key management solution. We propose a secure group key generation/distribution solution providing scalability and reliability. Using this solution, when a mobile node, which is in a multicast session, enters a new domain, the agent of the domain joins the multicast session and coordinates its data packets with the mobile node. The agent encrypts and transmits subsequent data packets to the mobile node, using a local one-time pad key. This key is generated with FI sequences, enabling the mobile node to regenerate the same data packet, based on the information sent by the agent. Our performance analysis demonstrates that the proposed solution can significantly reduce the number of key generations and distributions, when it is applied to the hierarchical mobile IPv6 network.

Provably secure attribute based signcryption with delegated computation and efficient key updating

  • Hong, Hanshu;Xia, Yunhao;Sun, Zhixin;Liu, Ximeng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.5
    • /
    • pp.2646-2659
    • /
    • 2017
  • Equipped with the advantages of flexible access control and fine-grained authentication, attribute based signcryption is diffusely designed for security preservation in many scenarios. However, realizing efficient key evolution and reducing the calculation costs are two challenges which should be given full consideration in attribute based cryptosystem. In this paper, we present a key-policy attribute based signcryption scheme (KP-ABSC) with delegated computation and efficient key updating. In our scheme, an access structure is embedded into user's private key, while ciphertexts corresponds a target attribute set. Only the two are matched can a user decrypt and verify the ciphertexts. When the access privileges have to be altered or key exposure happens, the system will evolve into the next time slice to preserve the forward security. What's more, data receivers can delegate most of the de-signcryption task to data server, which can reduce the calculation on client's side. By performance analysis, our scheme is shown to be secure and more efficient, which makes it a promising method for data protection in data outsourcing systems.

Design of the secure data management system using homomorphic encryption (준동형 암호를 이용한 안전한 데이터 관리 시스템 설계)

  • Cha, Hyun-Jong;Yang, Ho-Kyung;Choi, Kang-Im;Ryou, Hwang-Bin;Shin, Hyo-Young
    • Convergence Security Journal
    • /
    • v.15 no.4
    • /
    • pp.91-97
    • /
    • 2015
  • General companies consider saving the information after enciphering as law. However, if the actual information is saved as enciphered, the decoding process must be conducted when the information is searched or edited in the ser ver. Therefore, process delay time occurs and is less efficient. This kind of work gives burden to the server, so the companies or managers handling the server do not save the information after enciphering. In this paper, the Networ k constructs and realizes an efficient security data management system that ensures safety and haste in operating u sing the homomorphic encryption technology, which collects information and decides quickly, and enables editing the encryption without a decoding process. To ensure the security of the embodied system, the existing encryption algo rithm can be used. Search method to use the keyword search. Additionally, by using a trapdoor, the keyword is not expose and it is changed whenever it is searched, and the formation of the keyword does not get exposed.

A Study on HCI Design based on Tactical Data Link integrated in KDDX Combat Management System for Korean-Type Mobile Fleet Control (차기구축함 전투관리체계에 통합된 전술데이터링크 기반의 한국형 기동함대 통제 HCI 설계에 관한 연구)

  • Song, Ha-Seok
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.12 no.5
    • /
    • pp.482-492
    • /
    • 2019
  • The naval ship consists of a variety of classes, including patrol, frigate, destroyer and landing ship. There are various means of communication between combat ships belonging to the mobile fleet, including voice network, text message network and tactical data link. The operation at the existing mobile fleet level was conducted mainly on voice and text message, and tactical data link were used mainly to share tactical information between combat ships. This study intended to design HCI for commander like as KDDX of fleet level based on tactical data link, a means of communication between ships, to secure operational control of the mobile fleet. Recently, naval ships have been developed in the organization of various sensors, weapons and tactical data links integrated into the combat management system, and this study also designed the HCI based on the tactical data links integrated in the combat management system. The purpose of this study was to secure the operational efficiency of the tactical data link based on the combat management system in operation of the mobile fleet, and to improve the capability of the fleet commander to recognize the battlefield situation awareness.

Research on an Effective Plan for Data Association Among Administrative Organizations for College Information Disclosure (대학정보공시를 위한 관리기관간 자료연계 내실화 방안 연구)

  • Lee, Gwang-Su;Ahn, Seong-Jin;Park, Jin-Sub
    • The Journal of Korean Association of Computer Education
    • /
    • v.13 no.2
    • /
    • pp.71-80
    • /
    • 2010
  • This study has its purpose on analyzing the problems of data connection between general management institution and itemized management institution shown through the college information disclosure project and presenting the plan to substantialize data connection between general management institution and itemized management institution. To make close inquiry into the related problem and induce plans for substantialization, this study analyzed the previous related research data as well as the connection status of information disclosure item of Korea Foundation for the Promotion of Private School, the itemized management institution, to induce problems; induced substantialization plan for data connection of itemized connection institution. As for the substantialization plan based on such, plan to integrate schools and department codes, plan to automatize data connection and plan to secure reliability of information were established. It is anticipated that the plan to substantialize data connection between management institutions reckoned through the result of this study would be used as the basic data for information disclosure project providing various reliable information from Ministry of Education, Science and Technology, General management institution, itemized management institution and college.

  • PDF

Secure and Scalable Blockchain-Based Framework for IoT-Supply Chain Management Systems

  • Omimah, Alsaedi;Omar, Batarfi;Mohammed, Dahab
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.12
    • /
    • pp.37-50
    • /
    • 2022
  • Modern supply chains include multiple activities from collecting raw materials to transferring final products. These activities involve many parties who share a huge amount of valuable data, which makes managing supply chain systems a challenging task. Current supply chain management (SCM) systems adopt digital technologies such as the Internet of Things (IoT) and blockchain for optimization purposes. Although these technologies can significantly enhance SCM systems, they have their own limitations that directly affect SCM systems. Security, performance, and scalability are essential components of SCM systems. Yet, confidentiality and scalability are one of blockchain's main limitations. Moreover, IoT devices are lightweight and have limited power and storage. These limitations should be considered when developing blockchain-based IoT-SCM systems. In this paper, the requirements of efficient supply chain systems are analyzed and the role of both IoT and blockchain technologies in providing each requirement are discussed. The limitations of blockchain and the challenges of IoT integration are investigated. The limitations of current literature in the same field are identified, and a secure and scalable blockchain-based IoT-SCM system is proposed. The proposed solution employs a Hyperledger fabric blockchain platform and tackles confidentiality by implementing private data collection to achieve confidentiality without decreasing performance. Moreover, the proposed framework integrates IoT data to stream live data without consuming its limited resources and implements a dualstorge model to support supply chain scalability. The proposed framework is evaluated in terms of security, throughput, and latency. The results demonstrate that the proposed framework maintains confidentiality, integrity, and availability of on-chain and off-chain supply chain data. It achieved better performance through 31.2% and 18% increases in read operation throughput and write operation throughput, respectively. Furthermore, it decreased the write operation latency by 83.3%.

Practical Attacks on Hybrid Group Key Management for SOHAN

  • Liew, Jiun-Hau;Ong, Ivy;Lee, Sang-Gon;Lim, Hyo-Taek;Lee, Hoon-Jae
    • Journal of information and communication convergence engineering
    • /
    • v.8 no.5
    • /
    • pp.549-553
    • /
    • 2010
  • Lim et al. proposed a Hybrid Group Key Management scheme for Hierarchical Self-Organizing Sensor Network in 2008 to provide a secure way to pass down the group key for cluster-based communication. This paper presents two practical attacks on the scheme proposed by Lim et al. by tampering sensor nodes of a cluster to recover necessary secret keys and by exploiting the IDS employed by the scheme. The first attack enables a long-term but slow data fabrication while other attack causes more severe DoS on the access to cluster sensor nodes.

Security Analysis to an Biometric Authentication Protocol for Wireless Sensor Networks (WSN 환경에서 Biometric 정보를 이용한 사용자 인증 스킴의 안전성 분석)

  • Lee, Youngsook
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.11 no.1
    • /
    • pp.59-67
    • /
    • 2015
  • A novel authentication mechanism is biometric authentication where users are identified by their measurable human characteristics, such as fingerprint, voiceprint, and iris scan. The technology of biometrics is becoming a popular method for engineers to design a more secure user authentication scheme. In terms of physiological and behavioral human characteristics, biometrics is used as a form of identity access management and access control, and it services to identity individuals in groups that are under surveillance. In this article, we review the biometric-based authentication protocol by Althobati et al. and provide a security analysis on the scheme. Our analysis shows that Althobati et al.'s scheme does not guarantee server-to-user authentication. The contribution of the current work is to demonstrate this by mounting threat of data integrity and bypassing the gateway node on Althobati et al.'s scheme. In addition, we analysis the security vulnerabilities of Althobati et al.'s protocol.

Mutual Authentication Scheme between Multiple Instances for Secure Data Share of Virtualized Environment (가상화 환경의 안전한 데이터 공유를 위한 다중 인스턴스간 상호인증 기법)

  • Choi, Dohyeon;Kim, Sangkun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.6
    • /
    • pp.83-94
    • /
    • 2016
  • Recent cloud, big data, there is a problem for the architectural security vulnerability to the server platforms of various fields such as artificial intelligence occurs consistently, but using the virtualization technology. In addition, most secure virtualization technology is known to be dependent on the type is limited and the platform provider. This paper presents a method for mutual authentication for secure data between multiple instances of a shared virtualized environment. The proposed method was designing a security architecture in consideration of the mutual authentication between multiple independent instances, and enhance the safety of a security protocol for sharing data by applying a key chain techniques. Performance analysis results and the existing security architecture demonstrated that protect each virtualized instances of the session and the other way, a compliance effectiveness for each instance of the mutual authentication process.

An Empirical Study on the Impact of Quality Oriented Corporate Culture on Sustainability Management Performances (공급사슬 내에서 품질지향적 기업문화가 지속가능경영성과에 미치는 영향에 관한 실증연구)

  • Woo, Moo-Jin;Park, Jong-Woo;Jung, Byeong-Yeong
    • Journal of Distribution Science
    • /
    • v.12 no.6
    • /
    • pp.31-39
    • /
    • 2014
  • Purpose - Environmental issues, climatic changes, and greenhouse gases are problems to be solved at a global level. With an increased emphasis on the environmental and social responsibility of the management of companies, the manner in which companies approach quality-oriented culture and their individual sustainability management are being discussed as truly important issues to help them secure their competitiveness and growth strategies. This study proposes strategic directions to help manufacturers not only in expanding their competitive quality-oriented company culture but also in strengthening their sustainability management abilities. This study conducts a literature review and empirical research to examine how significantly the variables of a quality-oriented company culture, customer-centered management, and process-centered and supply chain management-centered cooperation affect sustainability management performance in relation to economic profitability, environmental integrity, and social responsibility. Research design, data, and methodology - To verify research models and hypotheses, the study examined 170 companies using a questionnaire survey conducted over six weeks, and involved the performance of data analysis on 146 samples. Questionnaire responses were calibrated based on a Likert scale. The study used the Smart PLS 2.0 program designed for PLS (partial least squares), an analysis instrument of SEM (structural equation modeling). The study then verified empirical research hypotheses working on reliability analysis, validity analysis, factorial analysis, and path analysis. Results - Among the nine hypotheses, four are accepted and the rest are rejected. A quality-oriented company culture focusing on customer-centered management significantly influenced the maintainability management performance of environmental integrity and social responsibility, while economic profitability was dismissed. A process-focused quality-oriented company culture was significantly concerned with economic profitability but not with environmental integrity or social responsibility. A supply-chain cooperative company culture had a significant effect on economic profitability but not on environmental integrity or social responsibility. Conclusion - This study proposes strategic directions to help manufacturers expand their competitive quality-oriented company culture as well as strengthen abilities with sustainability management. It conducts a literature review and empirical research to examine how significantly the variables of quality-oriented company culture, customer-centered management, and process-centered and supply chain management-centered cooperation affect sustainability management performance in relation to economic profitability, environmental integrity, and social responsibility. There are two main conclusions. First, companies should consider the need for social responsibility management and environmental transparent management-focused maintainability management as avenues to create new markets and business, thereby helping the companies secure a reputation for having a customer and process-centered quality-oriented company culture by creating shared values between supply chains and enabling win-win situations through cooperation. Second, we are marching towards a creative win-win era from a society of conflicts and ruptures. Companies should understand that social responsibility management and supply chain management (SCM)-focused cooperation are the foundations of sustainable development, as they try to improve their culture while pursuing both win-win relationships with interested parties and equity in various conflictive relations.