• Title/Summary/Keyword: Secure Data management

Search Result 765, Processing Time 0.027 seconds

An Empirical Study on the Impact of Quality Oriented Corporate Culture on Sustainability Management Performances (공급사슬 내에서 품질지향적 기업문화가 지속가능경영성과에 미치는 영향에 관한 실증연구)

  • Woo, Moo-Jin;Park, Jong-Woo;Jung, Byeong-Yeong
    • Journal of Distribution Science
    • /
    • v.12 no.6
    • /
    • pp.31-39
    • /
    • 2014
  • Purpose - Environmental issues, climatic changes, and greenhouse gases are problems to be solved at a global level. With an increased emphasis on the environmental and social responsibility of the management of companies, the manner in which companies approach quality-oriented culture and their individual sustainability management are being discussed as truly important issues to help them secure their competitiveness and growth strategies. This study proposes strategic directions to help manufacturers not only in expanding their competitive quality-oriented company culture but also in strengthening their sustainability management abilities. This study conducts a literature review and empirical research to examine how significantly the variables of a quality-oriented company culture, customer-centered management, and process-centered and supply chain management-centered cooperation affect sustainability management performance in relation to economic profitability, environmental integrity, and social responsibility. Research design, data, and methodology - To verify research models and hypotheses, the study examined 170 companies using a questionnaire survey conducted over six weeks, and involved the performance of data analysis on 146 samples. Questionnaire responses were calibrated based on a Likert scale. The study used the Smart PLS 2.0 program designed for PLS (partial least squares), an analysis instrument of SEM (structural equation modeling). The study then verified empirical research hypotheses working on reliability analysis, validity analysis, factorial analysis, and path analysis. Results - Among the nine hypotheses, four are accepted and the rest are rejected. A quality-oriented company culture focusing on customer-centered management significantly influenced the maintainability management performance of environmental integrity and social responsibility, while economic profitability was dismissed. A process-focused quality-oriented company culture was significantly concerned with economic profitability but not with environmental integrity or social responsibility. A supply-chain cooperative company culture had a significant effect on economic profitability but not on environmental integrity or social responsibility. Conclusion - This study proposes strategic directions to help manufacturers expand their competitive quality-oriented company culture as well as strengthen abilities with sustainability management. It conducts a literature review and empirical research to examine how significantly the variables of quality-oriented company culture, customer-centered management, and process-centered and supply chain management-centered cooperation affect sustainability management performance in relation to economic profitability, environmental integrity, and social responsibility. There are two main conclusions. First, companies should consider the need for social responsibility management and environmental transparent management-focused maintainability management as avenues to create new markets and business, thereby helping the companies secure a reputation for having a customer and process-centered quality-oriented company culture by creating shared values between supply chains and enabling win-win situations through cooperation. Second, we are marching towards a creative win-win era from a society of conflicts and ruptures. Companies should understand that social responsibility management and supply chain management (SCM)-focused cooperation are the foundations of sustainable development, as they try to improve their culture while pursuing both win-win relationships with interested parties and equity in various conflictive relations.

Ruzicka Indexed Regressive Homomorphic Ephemeral Key Benaloh Cryptography for Secure Data Aggregation in WSN

  • Saravanakumar Pichumani;T. V. P. Sundararajan;Rajesh Kumar Dhanaraj;Yunyoung Nam;Seifedine Kadry
    • Journal of Internet Technology
    • /
    • v.22 no.6
    • /
    • pp.1287-1297
    • /
    • 2021
  • Data aggregation is the significant process in which the information is gathered and combines data to decrease the amount of data transmission in the WSN. The sensor devices are susceptible to node attacks and security issues such as data confidentiality and data privacy are extremely important. A novel technique called Ruzicka Index Regressive Homomorphic Ephemeral Key Benaloh Cryptography (RIRHEKBC) technique is introduced for enhancing the security of data aggregation and data privacy in WSN. By applying the Ruzicka Index Regressive Homomorphic Ephemeral Key Benaloh Cryptography, Ephemeral private and public keys are generated for each sensor node in the network. After the key generation, the sender node performs the encryption using the receiver public key and sends it to the data aggregator. After receiving the encrypted data, the receiver node uses the private key for decrypting the ciphertext. The key matching is performed during the data decryption using Ruzicka Indexive regression function. Once the key is matched, then the receiver collects the original data with higher security. The simulation result proves that the proposed RIRHEKBC technique increases the security of data aggregation and minimizes the packet drop, and delay than the state-of-the- art methods.

Applying Asymmetric Key Encryption to Secure Internet based SCADA

  • Robles, Rosslin John;Kim, Tai-hoon
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.4 no.2
    • /
    • pp.17-21
    • /
    • 2012
  • As an acronym for Supervisory Control and Data Acquisition, SCADA is a concept that is used to refer to the management and procurement of data that can be used in developing process management criteria. The use of the term SCADA varies, depending on location. Conventionally, SCADA is connected only in a limited private network. In current times, there are also demands of connecting SCADA through the internet. The internet SCADA facility has brought a lot of advantages in terms of control, data generation and viewing. With these advantages, come the security issues regarding web SCADA. In this paper, we discuss web SCADA and its connectivity along with the issues regarding security and suggests a web SCADA security solution using asymmetric-key encryption.

A Study on Outworn Aircraft Management Scheme Using Market Basket Analysis (장바구니 분석을 이용한 노후 항공기 관리방안 연구)

  • Jung, Chi-Young;Lee, Jae-Young
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.13 no.1
    • /
    • pp.77-83
    • /
    • 2010
  • In this paper, we proposed new outworn aircraft management procedure. ROKAF has both good management skill and information system, AMMIS, regarding aircraft maintenance based on all kinds of aircraft's defects. To optimize and secure aircraft's operation, management of the outworn aircraft is very important for ROKAF. With respect to these outworn aircraft's defects and maintenance, we analyzed defects occurrence pattern of outworn aircraft by using AMMIS data and Market Basket Analysis, and found the specified association rules for each defect. By using these association rules, we developed new management procedure for outworn aircraft based on the results of affinity analysis. The management procedure in this paper will also be used to optimal operation and maintenance of other aircraft and weapon systems.

Secure and Efficient Storage of Video Data in a CCTV Environment

  • Kim, Won-Bin;Lee, Im-Yeong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.6
    • /
    • pp.3238-3257
    • /
    • 2019
  • Closed-circuit television (CCTV) technology continuously captures and stores video streams. Users are typically required by policy to store all the captured video for a certain period. Accordingly, increasing the number of CCTV operation cycles and photographing positions expands the amount of data to be stored. However, expanding the available storage space for video data incurs increased costs. In recent years, this problem has been addressed with cloud storage solutions, which enable multiple users and devices to access and store data simultaneously. However, because of the large amount of data to be stored, a vast storage space is required. Consequently, cloud storage administrators need a way to store data more efficiently. To save storage space, deduplication technology has been proposed to prevent duplicate storage of the same data. However, because cloud storage is hosted on remote servers, data encryption technology must be applied to address data exposure issues. Although deduplication techniques for encrypted data have been studied, there have been various security vulnerabilities. We attempted to solve this problem by addressing various issues such as poison attacks, property forgery, and ownership management while removing the redundant data and handling the data more securely.

A Fully Distributed Secure Approach using Nondeterministic Encryption for Database Security in Cloud

  • Srinu Banothu;A. Govardhan;Karnam Madhavi
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.1
    • /
    • pp.140-150
    • /
    • 2024
  • Database-as-a-Service is one of the prime services provided by Cloud Computing. It provides data storage and management services to individuals, enterprises and organizations on pay and uses basis. In which any enterprise or organization can outsource its databases to the Cloud Service Provider (CSP) and query the data whenever and wherever required through any devices connected to the internet. The advantage of this service is that enterprises or organizations can reduce the cost of establishing and maintaining infrastructure locally. However, there exist some database security, privacychallenges and query performance issues to access data, to overcome these issues, in our recent research, developed a database security model using a deterministic encryption scheme, which improved query execution performance and database security level.As this model is implemented using a deterministic encryption scheme, it may suffer from chosen plain text attack, to overcome this issue. In this paper, we proposed a new model for cloud database security using nondeterministic encryption, order preserving encryption, homomorphic encryptionand database distribution schemes, andour proposed model supports execution of queries with equality check, range condition and aggregate operations on encrypted cloud database without decryption. This model is more secure with optimal query execution performance.

Secure Distributed Data Management Architecture for Consumer Protection of Smart Grid (스마트 그리드의 소비자 보호를 위한 안전한 분산 데이터 관리 구조)

  • Park, Nam-Je;Song, You-Jin;Park, Kwang-Yong
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.9
    • /
    • pp.57-67
    • /
    • 2010
  • Smart grid technology can expand energy efficiency into the home by monitoring consumer energy usage in real time and communicating with household devices that respond to demands to shut off during periods of non-use, allowing individual consumers to control their electricity usage more effectively. But, the information collected on a smart grid will form a library of personal information, the mishandling of which could be highly invasive of consumer privacy. There will be major concerns if consumer-focused principles of transparency and control are not treated as essential design principles from beginning to end. In this paper, using. All-Or-Nothing Transform encryption mode for providing smart grid security, we propose efficient distributed data Management based on XOR operation. The contribution of this paper is to provide a secure algorithm that manages efficiently distributed data in the field of private data in smart grid environment.

Economic Valuation of Public Sector Data: A Case Study on Small Business Credit Guarantee Data (공공부문 데이터의 경제적 가치평가 연구: 소상공인 신용보증 데이터 사례)

  • Kim, Dong Sung;Kim, Jong Woo;Lee, Hong Joo;Kang, Man Su
    • Knowledge Management Research
    • /
    • v.18 no.1
    • /
    • pp.67-81
    • /
    • 2017
  • As the important breakthrough continues in the field of machine learning and artificial intelligence recently, there has been a growing interest in the analysis and the utilization of the big data which constitutes a foundation for the field. In this background, while the economic value of the data held by the corporates and public institutions is well recognized, the research on the evaluation of its economic value is still insufficient. Therefore, in this study, as a part of the economic value evaluation of the data, we have conducted the economic value measurement of the data generated through the small business guarantee program of Korean Federation of Credit Guarantee Foundations (KOREG). To this end, by examining the previous research related to the economic value measurement of the data and intangible assets at home and abroad, we established the evaluation methods and conducted the empirical analysis. For the data value measurements in this paper, we used 'cost-based approach', 'revenue-based approach', and 'market-based approach'. In order to secure the reliability of the measured result of economic values generated through each approach, we conducted expert verification with the employees. Also, we derived the major considerations and issues in regards to the economic value measurement of the data. These will be able to contribute to the empirical methods for economic value measurement of the data in the future.

The extension of the IDEA Methodology for a multilevel secure schema design (다단계 보안 스키마 설계를 위한 IDEA 방법론의 확장)

  • Kim, Jung-Jong;Park, Woon-Jae;Sim, Gab-Sig
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.3
    • /
    • pp.879-890
    • /
    • 2000
  • Designing a multilevel database application is a complex process, and the entities and their associated security levels must be represented using an appropriate model unambiguously. It is also important to capture the semantics of a multilevel databse application as accurate and complete as possible. Owing to the focus of the IDEA Methodology for designing the non-secure database applications on the data-intensive systems, the Object Model describes the static structure of the objects in an application and their relationships. That is, the Object Model in the IDEA Methodology is an extended Entity-Relationship model giving a static description of objects. The IDEA Methodology has not been developed the multilevel secure database applications, but by using an existing methodology we could take advantage of the various techniques that have already been developed for that methodology. That is, this way is easier to design the multilevel secure schema than to develop a new model from scratch. This paper adds the security features 새? Object Model in the IDEA Methodology, and presents the transformation from this model to a multilevel secure object oriented schema. This schema will be the preliminary work which can be the general scheme for the automatic mapping to the various commercial multilevel secure database management system such as Informix-Online/Secure, Trusted ORACLE, and Sybase Secure SQL Server.

  • PDF

Study on the Measurement of Management Performance based on BSC: Examining Japanese Food Manufacturers

  • Park, Chul-Ju;Jeong, Tae-Seok
    • Journal of Distribution Science
    • /
    • v.10 no.11
    • /
    • pp.11-20
    • /
    • 2012
  • Purpose - This study attempts to measure the management performance of a food manufacturer using the BSC as one of the main business management techniques used to achieve the vision of a corporation. Research design, data, methodology - The measurement of business performance of a Japanese food manufacturer was conducted from four perspectives of BSC. Matsui (2005) developed the 'Cross-analysis chart'. Results - First, there were many cases where a minor wastage of raw materials was related to increasing costs. Second, the food manufacturer should try to recover the investment cost through significantly increasing the rate of the facility's operations. Third, reducing personnel expenses could be an important issue in labor-intensive manufacturing. Fourth, customer management was very important in the food manufacturing business. Finally, the food manufacturer should actively consider proposals influencing the food culture to secure high profits in the future. Conclusions - There were many limitations in applying these results to Korean food manufacturers, as this study applied to and analyzed the results in the context of the Japanese food manufacturer.

  • PDF