• Title/Summary/Keyword: Secure Deletion

Search Result 17, Processing Time 0.023 seconds

A Study on the Synchronization of GFP Signal in NG-SDH System (NG-SDH시스템에서의 GFP 신호동기에 관한 연구)

  • Lee Chang-Ki;Ko Je-Soo
    • The KIPS Transactions:PartC
    • /
    • v.12C no.1 s.97
    • /
    • pp.53-62
    • /
    • 2005
  • The NG-SDH system requires signal synchronization to synchronize incoming ethernet signal with GFP frame. The foreign nation research completes a chipset development until now and it secures a relation technique, but it does not secure a relation technique from domestic. Therefore, in this paper, we presented with signal synchronization method of Ethernet signal through GFP frame. We knew that the synchronized method of Ethernet signal through GFP-F must apply ingress & egress buffer and GFP Idle. We understood that the synchronized method of Ethernet signal through GFP-T must apply GFP Idle and $65B{\_}PAD$, and require maximum 3-bit addition & deletion of idle. Also we showed signal synchronization realization through simulation and obtained MTIE/TDEV characteristics and peak to peak jitter in egress output.

Dynamic Analysis based on AOP for Checking Security Vulnerability (보안 취약점 검사를 위한 AOP 기반의 동적 분석)

  • Seo, Kwang-Ik;Choi, Eun-Man
    • Journal of KIISE:Software and Applications
    • /
    • v.37 no.10
    • /
    • pp.773-778
    • /
    • 2010
  • OWASP announced most of vulnerabilities result from the data injection by user in 2010 after 2007. Because the contaminated input data is determined at runtime, those data should be checked dynamically. To analyze data and its flow at runtime, dynamic analysis method usually inserts instrument into source code. Intermediate code insertion makes it difficult to manage and extend the code so that the instrument code would be spreaded out according to increase of analysis coverage and volume of code under analysis. In addition, the coupling gets strong between instrument modules and target modules. Therefore developers will struggle against modify or extend the analysis code as instrument. To solve these problem, this paper defines vulnerabilities as a concern using AOP, and suggest the flexible and extensible analysis method to insertion and deletion without increase of coupling.

Study on the personal Information Retrieval of Smartphone Messenger Service (스마트폰 메신저 어플리케이션에서의 개인정보보호에 관한 연구)

  • Kang, Sunghoon;Kim, Seungjoo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.1
    • /
    • pp.97-107
    • /
    • 2013
  • The recent increase in smartphone usage has ignited the development of new applications which have changed the way of living in this internet era in the world. Almost all users which have smartphone have used many kinds of applications for lots of part. Especially, Social Network Service is the most popular part for smartphone users. The greater part of smartphone users take messenger service for smartphone. This kinds of applications provide to manage as deactivation of user or change of device. When users take to manage their information, their information would be deleted securely. If secure deletion didn't work correctly and released, their personal information can be easily abused to by others through various means such as internet phishing. In this paper, we analysis that the messenger application's management function keeps on the Personal Information Protection Act and suggest to prevent legally and technically for user's personal information and privacy.

Study on the Starting Time of Attention for Convergent Exploration of Visual Information (시각정보의 수렴적 탐색활동을 위한 주의집중 개시 시간에 관한 연구)

  • Kim, Jong-Ha;Jung, Jae-Young
    • Korean Institute of Interior Design Journal
    • /
    • v.25 no.3
    • /
    • pp.51-59
    • /
    • 2016
  • The technique for Eye-tracking is to trace the movements of pupils so that the eye's exploration response to be digitized. The procedure of Observation Experiment shows a mutual environmental characteristics between men and measuring devices. In order to improve the reliability and to secure the objectivity of the data acquired from eye-tracking, it is very important to analyze the procedures for the experiment to be prepared and the test data to be saved. Based on this viewpoint, the convergent exploration activities at the observation experiment with the objects of sport images were examined to find out what influences the context effect given by experimental environments have on this experiment. In addition, the starting time of attention affecting the reliability of observation data has been estimated. When the observation time is to be subdivided by the unit of second. The attention disperses for the individual characteristics to be appreciated. However, in case of analysis by the overall average, there was the problem that the section of attention dispersed to make it difficult to analyze the subjects' observation features. The study results made it possible to understand the physiological characteristics which were near unconsciousness, when there was an intensive attention for the first 3 seconds and the observation data were shown to be in ordinary range after 4 seconds. The analysis of observation with the focus of the intensive attention enabled the analysis with the first 3 seconds excepted so that it might approach the ordinary range of observation data. The distribution of attention for the first 3 seconds showed the intensive attention, which was on the center. The emergence of intensive attention and the overlapping of the centers can be considered as a context effect due to the correction for the preparing process of experiment. Accordingly, it is thought to be helpful to the security of objectivity and the construction of reliability of eye-tracking data to analyze the observation features shown after the deletion of the data for the first 3 seconds.

A Study on Group Key Generation and Exchange using Hash Collision in M2M Communication Environment (M2M 통신 환경에서 해시 충돌을 이용한 그룹키 생성 및 교환 기법 연구)

  • Song, Jun-Ho;Kim, Sung-Soo;Jun, Moon-Seog
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.19 no.5
    • /
    • pp.9-17
    • /
    • 2019
  • As the IoT environment becomes more popular, the safety of the M2M environment, which establishes the communication environment between objects and objects without human intervention, becomes important. Due to the nature of the wireless communication environment, there is a possibility of exposure to security threats in various aspects such as data exposure, falsification, tampering, deletion and privacy, and secure communication security technology is considered as an important requirement. In this paper, we propose a new method for group key generation and exchange using trap hash collision hash in existing 'M2M communication environment' using hash collision, And a mechanism for confirming the authentication of the device and the gateway after the group key is generated. The proposed method has attack resistance such as spoofing attack, meson attack, and retransmission attack in the group communication section by using the specificity of the collision message and collision hash, and is a technique for proving safety against vulnerability of hash collision.

An Effective Anonymization Management under Delete Operation of Secure Database (안전한 데이터베이스 환경에서 삭제 시 효과적인 데이터 익명화 유지 기법)

  • Byun, Chang-Woo;Kim, Jae-Whan;Lee, Hyang-Jin;Kang, Yeon-Jung;Park, Seog
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.3
    • /
    • pp.69-80
    • /
    • 2007
  • To protect personal information when releasing data, a general privacy-protecting technique is the removal of all the explicit identifiers, such as names and social security numbers. De-identifying data, however, provides no guarantee of anonymity because released information can be linked to publicly available information to identify them and to infer information that was not intended for release. In recent years, two emerging concepts in personal information protection are k-anonymity and $\ell$-diversity, which guarantees privacy against homogeneity and background knowledge attacks. While these solutions are signigicant in static data environment, they are insufficient in dynamic environments because of vulnerability to inference. Specially, the problem appeared in record deletion is to deconstruct the k-anonymity and $\ell$-diversity. In this paper, we present an approach to securely anonymizing a continuously changeable dataset in an efficient manner while assuring high data quality.

A Study on the Improvement of Research Support System for National R&D Projects Using Blockchain (블록체인을 활용한 국가연구개발사업 연구지원시스템 개선 방안 연구)

  • Donghwan Lee;Seungwook Park
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.28 no.2
    • /
    • pp.47-60
    • /
    • 2023
  • This study proposed to adopt consortium blockchain for the database in the research support system of national R&D projects in order to increase efficiency, to reduce administrative burden, and to promote transparent research environment focusing on servicing researchers. Specifically, storage methods were classified according to data characteristics. First, data that requires integrity and transparency is stored in the blockchain, Second, confidentiality and data that require modification and deletion are stored in the database, Third, data that requires confidentiality, integrity, and transparency at the same time stores the original in the database, and the hash value of the data is separately stored in the blockchain. If research support system adopts blockchain, it is possible to operate the system stably, to share quick exchange of information between research institutes, to reduce administrative burden, to improve transparency of process, to resolve asymmetry of information, and to secure integrity, confidentiality, and availability of data.