• 제목/요약/키워드: Secure Data management

검색결과 748건 처리시간 0.027초

부부의 애착유형과 결혼적응에 관한 연구 (A Study on the Attachment Style and Marital Adjustment)

  • 이숙;우희정;노명희;최정미
    • 대한가정학회지
    • /
    • 제37권8호
    • /
    • pp.43-54
    • /
    • 1999
  • This study was designed 1) to explore the adult attachment factors, 2) to investigated the individual attachment styles and combined attachment patterns for 362 wives and husbands,3) and to know the effects of the relation to marital adjustment. The inventories were KAAQ(Korean Adult Attachment Questionnare), KMAQ(Korean Marital Adjustment Questionnare), and the Socio-demographic questionnaires. The data analysis methods were frequencies, percentiles, Cronbach'${\alpha}$, Factor Analysis, and F-test. The resets were as follows; 1. 3 factors were found in adult attachment. 2. 3 styles of adult attachment(secure, anxious/ambicalent, avoidant) were found. Secure style was most frequent. Also for 9 combined attachment patters, secure pattern was found the most frequent one. 3. Marital adjustment was highest with secure attachment style, anxious/ambivalent was next , and avoidant was the lowest. About combined attachment patterns, a pair of secure style showed the highest marital adjustment, and a pair of avoidant was the lowest.

  • PDF

NDynamic Framework for Secure VM Migration over Cloud Computing

  • Rathod, Suresh B.;Reddy, V. Krishna
    • Journal of Information Processing Systems
    • /
    • 제13권3호
    • /
    • pp.476-490
    • /
    • 2017
  • In the centralized cloud controlled environment, the decision-making and monitoring play crucial role where in the host controller (HC) manages the resources across hosts in data center (DC). HC does virtual machine (VM) and physical hosts management. The VM management includes VM creation, monitoring, and migration. If HC down, the services hosted by various hosts in DC can't be accessed outside the DC. Decentralized VM management avoids centralized failure by considering one of the hosts from DC as HC that helps in maintaining DC in running state. Each host in DC has many VM's with the threshold limit beyond which it can't provide service. To maintain threshold, the host's in DC does VM migration across various hosts. The data in migration is in the form of plaintext, the intruder can analyze packet movement and can control hosts traffic. The incorporation of security mechanism on hosts in DC helps protecting data in migration. This paper discusses an approach for dynamic HC selection, VM selection and secure VM migration over cloud environment.

안전한 멀티캐스트 서비스 제공을 위한 효율적인 그룹 관리 메커니즘 및 구조 (Efficient Group Management Mechanism and Architecture for Secure Multicast)

  • 은상아;조태남;채기준;이상호;박원주;나재훈
    • 정보처리학회논문지C
    • /
    • 제9C권3호
    • /
    • pp.323-330
    • /
    • 2002
  • 멀티캐스트 서비스들이 점차 다양해지고, 서비스 사용자의 폭도 넓어지고 있다. 이에 비례하여 공격자들의 주목을 받게되고 정보의 누출 가능성도 높아진다. 따라서 멀티캐스트 서비스 활용과 동시에 그에 대한 보안 연구도 함께 이루어져야 한다. 본 논문에서는 멤버의 동적인 가입 탈퇴가 발생하는 그룹에서 효율적인 그룹 관리를 적용하여 안전한 멀티캐스트 서비스를 제공할 수 있는 구조를 제안한다. 제안한 구조는 한 명의 송신자와 다수의 수신자로 구성된 멀티캐스트 통신 상황에서, 보안 측면을 고려하여 많은 이용자들에게 안전한 멀티캐스트 서비스를 제공할 수 있다. 시뮬레이션을 통하여 기존의 구조와 성능을 비교·분석한 결과, 제안하는 구조는 멤버 관리가 효율적이고, 전송 지연을 줄이면서 보다 안전하게 데이터를 전송할 수 있다는 것을 알 수 있었다.

A Forward & Backward Secure Key Management in Wireless Sensor Networks for PCS/SCADA

  • Park, Dong-Gook
    • Journal of information and communication convergence engineering
    • /
    • 제7권2호
    • /
    • pp.98-106
    • /
    • 2009
  • Process Control Systems (PCSs) or Supervisory Control and Data Acquisition (SCADA) systems have recently been added to the already wide collection of wireless sensor networks applications. The PCS/SCADA environment is somewhat more amenable to the use of heavy cryptographic mechanisms such as public key cryptography than other sensor application environments. The sensor nodes in the environment, however, are still open to devastating attacks such as node capture, which makes designing a secure key management challenging. In this paper, a key management scheme is proposed to defeat node capture attack by offering both forward and backward secrecies. Our scheme overcomes the pitfalls which Nilsson et al.'s scheme suffers from, and is not more expensive than their scheme.

MANET의 멀티캐스트 환경에서 신뢰성 향상을 위한 계층기반 암호 프로토콜 기법 연구 (A Study on Hierarchy-based Secure Encryption Protocol for Trust Improvement on Multicast Environment of MANET)

  • 양환석
    • 디지털산업정보학회논문지
    • /
    • 제13권3호
    • /
    • pp.43-51
    • /
    • 2017
  • MANET consists of only wireless nodes having limited processing capability. It processes routing and data transmission through cooperation among each other. And it is exposed to many attack threats due to the dynamic topology by movement of nodes and multi-hop communication. Therefore, the reliability of transmitted data between nodes must be improved and security of integrity must be high. In this paper, we propose a method to increase the reliability of transmitted data by providing a secure cryptography protocol. The proposed method used a hierarchical structure to provide smooth cryptographic services. The cluster authentication node issues the cluster authentication key pair and unique key to the nodes. The nodes performs the encryption through two steps of encryption using cluster public key and block encryption using unique key. Because of this, the robustness against data forgery attacks was heightened. The superior performance of the proposed method can be confirmed through comparative experiment with the existing security routing method.

The Design of Router Security Management System for Secure Networking

  • Jo, Su-Hyung;Kim, Ki-Young;Lee, Sang-Ho
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 제어로봇시스템학회 2005년도 ICCAS
    • /
    • pp.1594-1597
    • /
    • 2005
  • A rapid development and a wide use of the Internet have expanded a network environment. Further, the network environment has become more complex due to a simple and convenient network connection and various services of the Internet. However, the Internet has been constantly exposed to the danger of various network attacks such as a virus, a hacking, a system intrusion, a system manager authority acquisition, an intrusion cover-up and the like. As a result, a network security technology such as a virus vaccine, a firewall, an integrated security management, an intrusion detection system, and the like are required in order to handle the security problems of Internet. Accordingly, a router, which is a key component of the Internet, controls a data packet flow in a network and determines an optimal path thereof so as to reach an appropriate destination. An error of the router or an attack against the router can damage an entire network. This paper relates to a method for RSMS (router security management system) for secure networking based on a security policy. Security router provides functions of a packet filtering, an authentication, an access control, an intrusion analysis and an audit trail in a kernel region. Security policy has the definition of security function against a network intrusion.

  • PDF

가중치 테이블 기반 안전한 e-비즈니스 데이터 분할 복원 방식 (Secure Sharing and Recovering Scheme of e-Business Data Based on Weight Table)

  • 송유진;김진석
    • 정보처리학회논문지C
    • /
    • 제16C권1호
    • /
    • pp.27-36
    • /
    • 2009
  • 최근의 개인정보 노출의 가장 큰 원인은 정당한 개인정보 관리자 즉, 내부자에 의한 부정 이용이다. 관리자는 사용자의 기밀문서를 몰래 복사하거나 고쳐 쓰는 것도 가능하다. 이러한 민감한 개인 및 기업 데이터의 안전한 관리 대책으로서 기밀정보의 안전한 분산 저장관리 기능이 요구되고 있다. 한편, 개인정보를 제공하는 경우, 정보 소유자가 프라이버시 데이터를 누구에게 얼마만큼 가중치(weight)을 두고 공개할지를 정해야 한다. 따라서 참여자의 중요도에 따라 개인정보 열람에 대한 권한의 가중치를 다르게 지정할 수 있는 구조가 요구된다. 본 논문에서는 개인정보를 권한의 가중치에 따라 안전하게 관리할 수 있는 새로운 데이터 관리 기법을 위한 Digit-independent 알고리즘을 새롭게 제안한다. 제안된 알고리즘을 근거로 데이터의 수집과 단순한 연산만으로 고속 연산처리가 가능하여 대량의 프라이버시 데이터에 적용할 수 있는 데이터 관리기법으로서 가중치 테이블 기반의 Digit-independent 알고리즘을 이용한 데이터 분할 복원 방식을 제안한다. 제안 방식은 유비쿼터스 환경에서 e-비즈니스 데이터의 안전한 관리 및 저장에 활용될 수 있을 것이다.

Sharing Information for Event Analysis over the Wide Internet

  • Nagao, Masahiro;Koide, Kazuhide;Satoh, Akihiro;Keeni, Glenn Mansfield;Shiratori, Norio
    • Journal of Communications and Networks
    • /
    • 제12권4호
    • /
    • pp.382-394
    • /
    • 2010
  • Cross-domain event information sharing is a topic of great interest in the area of event based network management. In this work we use data sets which represent actual attacks in the operational Internet. We analyze the data sets to understand the dynamics of the attacks and then go onto show the effectiveness of sharing incident related information to contain these attacks. We describe universal data acquisition system for event based management (UniDAS), a novel system for secure and automated cross-domain event information sharing. The system uses a generic, structured data format based on a standardized incident object description and exchange format (IODEF). IODEF is an XML-based extensible data format for security incident information exchange. We propose a simple and effective security model for IODEF and apply it to the secure and automated generic event information sharing system UniDAS. We present the system we have developed and evaluate its effectiveness.

클라우드 컴퓨팅 환경에서의 안전한 로그 시스템 설계 (Design of Secure Log System in Cloud Computing Environment)

  • 이병도;신상욱
    • 한국멀티미디어학회논문지
    • /
    • 제19권2호
    • /
    • pp.300-307
    • /
    • 2016
  • Cloud computing that provide a elastic computing service is more complex compared to the existing computing systems. Accordingly, it has become increasingly important to maintain the stability and reliability of the computing system. And troubleshooting and real-time monitoring to address these challenges must be performed essentially. For these goals, the handling of the log data is needed, but this task in cloud computing environment may be more difficult compared to the traditional logging system. In addition, there are another challenges in order to have the admissibility of the collected log data in court. In this paper, we design secure logging service that provides the management and reliability of log data in a cloud computing environment and then analyze the proposed system.

퍼스널 클라우드 환경에서 사용자 관리를 위한 보안 프레임워크의 설계 및 평가 (Design and Evaluation of Secure Framework for User Management in Personal Cloud Environments)

  • 진병욱;김종화;차시호;전문석
    • 디지털산업정보학회논문지
    • /
    • 제12권1호
    • /
    • pp.81-87
    • /
    • 2016
  • Cloud computing technologies are utilized and merged in various domains. Cloud computing technology-based personal cloud service technologies provide mobility and free access by using user centered storages and smart devices such like smart phones and table PCs. Therefore, we should overcome limits on the storage by solving the capacity problems of devices to provide security services in the personal cloud environments It can be addressable to provide the convenience of various security technologies. However, there are some security threats inherited from existing cloud environments and the possibilities of information leakage when devices are lost or stolen. Therefore, we designed a framework for providing secure cloud services by adding objects, such as user authorization, access tokens, set permissions by key generation, and key management assignments, for user management in personal cloud environments. We analyzed the stability of the proposed framework in terms of irreverent use and abuse, access to insiders, and data loss or leakage. And we evaluated the proposed framework in terms of the security with access control requirements in personal cloud environments.