• Title/Summary/Keyword: Secure Data management

Search Result 754, Processing Time 0.026 seconds

A Study on Secure Group Key Management Based on Agent for Multicast Data Transmission (멀티캐스트 전송을 위한 에이전트 기반의 안전한 그룹 키 관리방안 연구)

  • Kim, Bo-Seung;Kim, Jung-Jae;Zhang, Feng-De;Shin, Yong-Tae
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.12 no.1
    • /
    • pp.436-444
    • /
    • 2011
  • As practical use degree of multicasting increase, security for multicast is recognized as an important issue. Previous research in the area of secure multicast has mainly focused on group key management. The most important thing about the security of multicast is that only authorized members of this group will be able to access the data. The member of access to multicast communication is to use cryptography with a common shared session encryption key. We propose decentralized group key management based on agent for dynamic multicast with large groups and frequent joins or leaves in this paper. Whole group divide to several subgroup using agent technology and each agent manage members of each subgroup. Also, when rekeying updates that using one-way hash function can prevent the key exposure, and reduce the key distribution delay.

Configuration Management for Multi-Level Security Information Technology Systems (IT 시스템의 다중 수준 보안을 위한 관리 환경 연구)

  • Kim, Jeom-Goo
    • Convergence Security Journal
    • /
    • v.10 no.4
    • /
    • pp.39-48
    • /
    • 2010
  • In a complex, secure IT system environment there will be groups of data that be segregated from one another, yet reside on the same system. Users of the system will have varying degrees of access to specific data. The Configuration Management(CM) of the information architecture, the physical architecture, user privileges and application security policies increases the complexity for operations, maintenance and security staff. This pager describes(current work to merge the capabilities of a network CM toll with those of a Computer Aided System Engineering(CASE) tool. The rigour of Systems Engineering(SE) modelling techniques can be used to deal with the complexities of multi-level information security. The SE logical and physical models of the same system are readily tailorable to document the critical components of both the information architecture and physical architecture that needs to be managed. Linking a user-friendly, physical CM tool with the extended capabilities of a CASE tool provide the basis for improved configuration management of secure IT systems.

A Study on the Zone-Key based Secure Routing Scheme in MANET (MANET에서 영역-키 기반 보안 라우팅 기법에 관한 연구)

  • Yang, Hwan Seok;Kim, Young Sun
    • Convergence Security Journal
    • /
    • v.20 no.5
    • /
    • pp.33-39
    • /
    • 2020
  • In MANET consisting of only mobile nodes, all nodes serve as routes. However, the dynamic topology due to frequent movement of nodes degrades routing performance and is also cause of many security vulnerabilities. Therefore, security must be applied to routing techniques that can influence the performance of MANET. In this paper, we propose a technique for efficiently responding to various routing attacks and safe data transmission through application of zone-key based security routing techniques. A zone-based network structure was used, and a management node that manages member nodes in each zone was used in the proposed technique. In addition, the damage from the attacking node was minimized by issuing a key to each node and applying this to a routing technique. The zone management node issues a key for encryption routing information and manages the issuance information. A member node that wants to transmit data encrypts routing in formation using a key issued from the zone management node, and then performs path discovery using this. The improved performance of the proposed technique was confirmed through a comparative experiment with the CBSR and ARNA technique, excellent performance was confirmed through experiments.

A Study on the Reliability Improvement of Guided Missile (유도탄의 신뢰성 향상 방안 고찰)

  • Kim, Bohyeon;Hwang, Kyeonghwan;Hur, Jangwook
    • Journal of Applied Reliability
    • /
    • v.16 no.3
    • /
    • pp.208-215
    • /
    • 2016
  • Purpose: ASRP for the domestic development guided missiles requires not only for the reliability evaluation of the products in storage but also for the life cycle management of the products including development prototypes and initial production items. Methods: For this purpose, it should be performed to build a performance database before and after the accelerated aging test with shelf life items including development prototypes and initial production items, based on which the lifetime prediction should also be carried out. In addition, HILS must be applied for the acceptance test with the initial and follow-up production items, and also for ASRP for the long-term storage products in order to secure systematic quality assurance. Results: The results for the life cycle reliability Improving of domestic development of guided missiles are DB building of prescription Item performance, active application of HILS, Management associated with guided missiles life cycle and to Secure technology data about the introduction of foreign guided missiles. Conclusion: Furthermore, it is demanded that DTaQ, the managing agency of ASRP, actively take part in the process to maintain reliability engagement consistency over the life cycle of guided missiles.

Biometric Image Cryptographic Algorithm Based on the Property of Wavelet Transform Coefficient (웨이브렛 변환 계수의 특성을 이용한 생체 영상 암호화 알고리즘)

  • Shin, Jonghong
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.12 no.2
    • /
    • pp.41-49
    • /
    • 2016
  • Lossless encryption methods are more applicable than lossy encryption methods when marginal distortion is not tolerable. In this research, the author propose a novel lossless symmetric key encryption/decryption technique. In the proposed algorithm, the image is transformed into the frequency domain using the lifting wavelet transform, then the image sub-bands are encrypted in a such way that guarantees a secure, reliable, and an unbreakable form. The encryption involves scattering the distinguishable frequency data in the image using a reversible weighting factor amongst the rest of the frequencies. The algorithm is designed to shuffle and reverse the sign of each frequency in the transformed image before the image frequencies are transformed back to the pixel domain. The results show a total deviation in pixel values between the original and encrypted image. The decryption algorithm reverses the encryption process and restores the image to its original form. The proposed algorithm is evaluated using standard security and statistical methods; results show that the proposed work is resistant to most known attacks and more secure than other algorithms in the cryptography domain.

Difference of Risk-relievers between High Risk and Low Risk in Online Purchasing

  • Fang, Hua-Long;Kwon, Sun-Dong;Bae, Kee-Su
    • Journal of Information Technology Applications and Management
    • /
    • v.21 no.3
    • /
    • pp.135-156
    • /
    • 2014
  • The Online business model for purchasing agent service is getting more popular. However, consumers perceive more risk when buying products from foreign online purchasing agents (FOPA) than from common online sellers (COS). This study focuses on finding out how consumers manage risk when they perceive risk and what different risk-reliever strategies they use when buying from high-risk FOPA and low-risk COS. This study has proved the following two. First, when consumers perceive risk at online purchasing, they tend to select risk-reliever strategies, such as the use of communication media, online assurance mark, seller's record, and secure payment to mitigate risk. With the application of those risk-reliever strategies, they built trust with the seller. Second, risk-perception of FOPA influences usage of communication media and check of online assurance mark more strongly than that of COS. On the contrary, risk-perception of COS influences the check of seller record more strongly than that of FOPA. This study helps to explain why FOPA is proliferating, despite its inherent high risk due to the fact that buyers and sellers are separated in time and space and that buyers and sellers have different social and cultural backgrounds. This study also helps managers of E-commerce to relieve consumer's risk-perception and to build trust.

An Effective Group Management Method for Secure Multicast Transmission (안전한 멀티캐스트 전송을 위한 효율적인 그룹 관리 방법)

  • Ko Hoon;Jang Uijin;Kim Sunho;Shin Yongtae
    • Journal of KIISE:Information Networking
    • /
    • v.33 no.1
    • /
    • pp.9-15
    • /
    • 2006
  • While a lot of important information is being sent and received on the Internet, the information could be exposed to many threats, and the more the Multicast Service is various and generalized, the more the service range is widened. When a new member joins in or leaves from the Multicast Group, the Group Key, which the existing member use for, should be newly updated. The existing method had a problem that the performance was depreciated by the key exchanging. This paper proposes the effective group management mechanism for a secure transmission of the Multicast Data on the Multicast Group.

Smart Plant Disease Management Using Agrometeorological Big Data (농업기상 빅데이터를 활용한 스마트 식물병 관리)

  • Kim, Kwang-Hyung;Lee, Junhyuk
    • Research in Plant Disease
    • /
    • v.26 no.3
    • /
    • pp.121-133
    • /
    • 2020
  • Climate change, increased extreme weather and climate events, and rapidly changing socio-economic environment threaten agriculture and thus food security of our society. Therefore, it is urgent to shift from conventional farming to smart agriculture using big data and artificial intelligence to secure sustainable growth. In order to efficiently manage plant diseases through smart agriculture, agricultural big data that can be utilized with various advanced technologies must be secured first. In this review, we will first learn about agrometeorological big data consisted of meteorological, environmental, and agricultural data that the plant pathology communities can contribute for smart plant disease management. We will then present each sequential components of the smart plant disease management, which are prediction, monitoring and diagnosis, control, prevention and risk management of plant diseases. This review will give us an appraisal of where we are at the moment, what has been prepared so far, what is lacking, and how to move forward for the preparation of smart plant disease management.

A Password-Based Searchable Encryption using Smart Cards (스마트 카드를 이용한 패스워드 기반의 검색 가능한 암호화 기술)

  • Lee, Dong-Kun;Rhee, Hyun-Sook;Lim, Jong-In
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.49 no.3
    • /
    • pp.56-61
    • /
    • 2012
  • User authentication is a necessity to set up secure system which only an authorized user can use various resource on the Internet. Encryption is to provide data privacy. Also, searchable encryption is to provide both data privacy and efficient management of data by searching with a keyword. The public key based searchable encryption requires in advance the authentication of user's public key as well as the secure management of a publlic/private key of a user, respectively. In cloud, it is purpose to use cloud various resources by using various devices, meanwhile, it is not sufficient resource that some devices manage public/private keys and certificates and it is not easy to implement these clients. To solve this problem, we propose a password-based saerchable encryption using smart cards which are temper-resistant devices.

A Secure Index Management Scheme for Providing Data Sharing in Cloud Storage

  • Lee, Sun-Ho;Lee, Im-Yeong
    • Journal of Information Processing Systems
    • /
    • v.9 no.2
    • /
    • pp.287-300
    • /
    • 2013
  • Cloud storage is provided as a service in order to keep pace with the increasing use of digital information. It can be used to store data via networks and various devices and is easy to access. Unlike existing removable storage, many users can use cloud storage because it has no storage capacity limit and does not require a storage medium. Cloud storage reliability has become a topic of importance, as many users employ it for saving great volumes of data. For protection against unethical administrators and attackers, a variety of cryptography systems, such as searchable encryption and proxy re-encryption, are being applied to cloud storage systems. However, the existing searchable encryption technology is inconvenient to use in a cloud storage environment where users upload their data. This is because this data is shared with others, as necessary, and the users with whom the data is shared change frequently. In this paper, we propose a searchable re-encryption scheme in which a user can safely share data with others by generating a searchable encryption index and then re-encrypt it.