• Title/Summary/Keyword: Secure Data management

Search Result 757, Processing Time 0.028 seconds

The Key Tree Model for Group Key Management (그룹키 관리를 위한 키트리 모델)

  • Han, Keun-Hee;Jeong, Tae-Eui;Yun, Yeo-Wung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2000.10a
    • /
    • pp.837-840
    • /
    • 2000
  • For secure communications in using multicast applications such as Cable-TV, It is essential for us to manage shared keys to encrypt/decrypt data through crypto algorithm as DES, which is called Group Key Management. In GKM, It is a hot issue that reduces the number of join/leave operation and subgroup key in key tree model. In this paper, we propose optimized mechanism of group key management required for providing multicast security.

  • PDF

The Variation of Slope Stability by Ground Water Level in Railway Lines (지하수위에 따른 철도사면의 안정성 변화)

  • Kim, Hyun-Ki;Shin, Min-Ho;Shin, Ji-Soo
    • Proceedings of the KSR Conference
    • /
    • 2008.11b
    • /
    • pp.789-795
    • /
    • 2008
  • Slope stability is affected by various factors. For safety management of slopes, monitoring systems have been widely constructed along railway lines. The representative data from the systems are variations of ground profile such like ground water level and pore water pressure etc. and direct displacement measured by ground clinometer and tension wire sensor. Slopes are mainly effected by rainfall and rainfall causes the decrease of factor of safety(FOS). Because FOS varies linearly by the variation of ground water level and pore pressure, it has a weak point that could not define the time and proper warning sign to secure the safety of the train. In this study, alternative of FOS such as reliability index and probability of failure is applied to slope stability analysis introducing the reliability concept. FOS, reliability index, probability of failure and velocity of probability of failure of the slopes by variation of ground water level are investigated for setting up the specification of safety management of slopes. By executing case study of a slope(ILLO-IMSUNGLI), it is showed to be applied to specification of safety management.

  • PDF

Key Update Protocols in Hierarchical Sensor Networks (계층적 센서 네트워크에서 안전한 통신을 위한 키 갱신 프로토콜)

  • Lee, Joo-Young;Park, So-Young;Lee, Sang-Ho
    • The KIPS Transactions:PartC
    • /
    • v.13C no.5 s.108
    • /
    • pp.541-548
    • /
    • 2006
  • Sensor network is a network for realizing the ubiquitous computing circumstances, which aggregates data by means of observation or detection deployed at the inaccessible places with the capacities of sensing and communication. To realize this circumstance, data which sensor nodes gathered from sensor networks are delivered to users, in which it is required to encrypt the data for the guarantee of secure communications. Therefore, it is needed to design key management scheme for encoding appropriate to the sensor nodes which feature continual data transfer, limited capacity of computation and storage and battery usage. We propose a key management scheme which is appropriate to sensor networks organizing hierarchical architecture. Because sensor nodes send data to their parent node, we can reduce routing energy. We assume that sensor nodes have different security levels by their levels in hierarchy. Our key management scheme provides different key establishment protocols according to the security levels of the sensor nodes. We reduce the number of sensor nodes which share the same key for encryption so that we reduce the damage by key exposure. Also, we propose key update protocols which take different terms for each level to update established keys efficiently for secure data encoding.

Workflow Design on Product Data Management System Using Object-Oriented Modeling Technique (객체지향 방법론을 이용한 제품정보관리(PDM) 시스템에서의 워크플로우 설계)

  • 최종윤;최경희;안병하
    • The Journal of Society for e-Business Studies
    • /
    • v.4 no.1
    • /
    • pp.145-157
    • /
    • 1999
  • The challenge is to maximize the time-to-market benefits of concurrent engineering while maintaining control of data and distributing it automatically to the people who need it when they need it. The way PDM systems cope with this challenge is that master data is held only once in a secure vault where its integrity can be assured and all changes to it monitored, controlled and recorded. The structure of PDM is various from vendor, but they have common module. That is PDM and it is most important. The goal is to design the workflow in PDM using object-oriented modeling method. The past methods have concentrated on the flow between workflow engine and agent, but this paper will focus on task. We will model task as individual object. This paper uses OMT(Object Modeling Technique) by James Rumbaugh for base modeling tool and uses DCOM(Distributed Component Object Model) for base ORB(Object Request Broker). Research object is to design the static object model, to design state change by dynamic model and to design data transition by functional model.

  • PDF

New Security Layer for OverLay Networks

  • Imai, Hideki;Shin, Seong-Han;Kobara, Kazukuni
    • Journal of Communications and Networks
    • /
    • v.11 no.3
    • /
    • pp.211-228
    • /
    • 2009
  • After clarifying the underlying problems in a secure network storage, we introduce two important requirements, leakageresilience and availability in higher levels respectively, for data keys that are used to protect remotely-stored data. As a main contribution of this paper, we give a new security layer for overlay networks by proposing a leakage-resilient authentication and data management system. In this system, we specifically propose a single mode and a cluster mode where the latter provides a higher level of both leakage-resilience and availability for the data key.

A Low Power Wireless Communication-based Air Pollutants Measuring System (저전력 무선통신 기반 대기오염 측정시스템)

  • Kang, Jeong Gee;Lee, Bong Hwan
    • Journal of Information Technology Applications and Management
    • /
    • v.28 no.6
    • /
    • pp.87-95
    • /
    • 2021
  • Recently interest for air pollution is gradually increasing. However, according to the environmental assessment of air quality, the level of air pollution in the nation is quite serious, and air pollutants measuring facilities are also not enough. In this paper, a secure air pollutants sensor system based low power wireless communication is designed and implemented. The proposed system is composed of three parts: air pollutants measuring sensors module, LoRa-based data transmission module, and monitoring module. In the air pollutants measuring module, the MSP430 board with six big air pollutants measuring sensors are used. The air pollutants sensing data is transmitted to the control server in the monitoring system using LoRa transmission module. The received sensing data is stored in the database of the monitoring system, and visualized in real-time on the map of the sensor locations. The implemented air pollutant sensor system can be used for measuring the level of air quality conveniently in our daily lives.

A Review on Preserving Data Confidentiality in Blockchain-based IoT-Supply Chain Systems

  • Omimah Alsaedi;Omar Batarfi;Mohammed Dahab
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.11
    • /
    • pp.110-116
    • /
    • 2023
  • Data confidentiality refers to the characteristic that information kept undisclosed or hidden from unauthorized parties. It considered a key security requirement in current supply chain management (SCM) systems. Currently, academia and industry tend to adopt blockchain and IoT technologies in order to develop efficient and secure SCM systems. However, providing confidential data sharing among these technologies is quite challenging due to the limitations associated with blockchain and IoT devices. This review paper illustrates the importance of preserving data confidentiality in SCM systems by highlighting the state of the art on confidentiality-preserving methodologies in the context of blockchain based IoT-SCM systems and the challenges associated with it.

Research on systematization and advancement of shipbuilding production management for flexible and agile response for high value offshore platform

  • Song, Young-Joo;Woo, Jong-Hun;Shin, Jong-Gye
    • International Journal of Naval Architecture and Ocean Engineering
    • /
    • v.3 no.3
    • /
    • pp.181-192
    • /
    • 2011
  • Recently, the speed of change related with enterprise management is getting faster than ever owing to the competition among companies, technique diffusion, shortening of product lifecycle, excessive supply of market. For the example, the compliance condition (such as delivery date, product quality, etc.) from the ship owner is getting complicated and the needs for the new product such as FPSO, FSRU are coming to fore. This paradigm shift emphasize the rapid response rather than the competitive price, flexibility and agility rather than effective and optimal perspective for the domestic shipbuilding company. So, domestic shipbuilding companies have to secure agile and flexible ship production environment that could respond change of market and requirements of customers in order to continue a competitive edge in the world market. In this paper, I'm going to define a standard shipbuilding production management system by investigating the environment of domestic major shipbuilding companies. Also, I'm going to propose a unified ship production management and system for the operation of unified management through detail analysis of the activities and the data flow of ship production management. And, the system functions for the strategic approach of ship production management are investigated through the business administration tools such as performance pyramid, VDT and BSC. Lastly, the research of applying strategic KPI to the digital shipyard as virtual execution platform is conducted.

Contemporary Safety Management of Virtual Golf in South Korea

  • MOON, Bo Ra;LEE, Seung Min;SEO, Won Jae
    • Journal of Sport and Applied Science
    • /
    • v.6 no.1
    • /
    • pp.1-4
    • /
    • 2022
  • Purpose: The purpose of this study is to provide implications for virtual golf safety management in Korea through the literature review of current safety issues of virtual golf industry. Research design, data, and methodology: This study employed a qualitative approach to review prior studies and related documents presenting current safety perspectives of virtual sports facility management. First, the study reviewed the experiences of virtual golf players and safety criteria suggested from previous literatures. Second, two experts in sport facility management reviewed the manuscript including implications and provided their opinions including major implications and insights for virtual sport industry. Views of experts were added to the final manuscript. Results: This study found that installation standards and safety and hygiene standards by industry are enacted for the safety management of sports facilities, however, there is a need for standards to be adjusted because the contents are general, abstract, and lack detail, thus causing difficultly to secure effectiveness. Conclusions: For virtual golf courses, it is necessary to develop a safety inspection checklist that suits the characteristics of indoor virtual golf. In this line, safety criteria need to be developed with the consideration of characteristics of screen golf to establish an efficient safety management system and create a safe use environment.

Privacy-Preserving Kth Element Score over Vertically Partitioned Data on Multi-Party (다자 간 환경에서 수직 분할된 데이터에서 프라이버시 보존 k번째 항목의 score 계산)

  • Hong, Jun Hee;Jung, Jay Yeol;Jeong, Ik Rae
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.6
    • /
    • pp.1079-1090
    • /
    • 2014
  • Data mining is a technique to get the useful information that can be utilized for marketing and pattern analysis by processing the data that we have. However, when we use this technique, data provider's personal data can be leaked by accident. To protect these data from leakage, there were several techniques have been studied to preserve privacy. Vertically partitioned data is a state called that the data is separately provided to various number of user. On these vertically partitioned data, there was some methods developed to distinguishing kth element and (k+1) th element by using score. However, in previous method, we can only use on two-party case, so in this paper, we propose the extended technique by using paillier cryptosystem which can use on multi-party case.