• 제목/요약/키워드: Secure Storage

검색결과 397건 처리시간 0.024초

GENERALIZATION OF KEY DISTRIBUTION PATTERNS FOR EVERY n-PAIR OF USERS

  • Shin, Seon-Ho;Bate, Julia C.
    • Journal of applied mathematics & informatics
    • /
    • 제26권3_4호
    • /
    • pp.563-572
    • /
    • 2008
  • In this paper, we discuss about a generalization of the Key Distribution Pattern which was proposed by C. Mitchell and F. Piper[6]. It is allowing secure communication between every n-pair of users($n\leq2$) in a large network for reducing storage requirements. We further suggest a generalization of K. Quinn's bounds in [9] for the number of subkeys in such general Key Distribution Patterns.

  • PDF

등고선 지도로부터 특징 추출과 레이어 구성 (Feature extraction from contour map and construction of layer)

  • 최관순;이쾌희
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 제어로봇시스템학회 1991년도 한국자동제어학술회의논문집(국내학술편); KOEX, Seoul; 22-24 Oct. 1991
    • /
    • pp.1169-1174
    • /
    • 1991
  • In conventional geographic mapping system, it is needed to input many already existing geographic map into computer system for secure and efficient maintence. Because of large map data, it is required to construct layers from map image for easy display, fast retreval and efficient storage. Thus this paper represents a method of the extracting features from contour map and constructing three layers. The layers are symbol, building, contour line. Experimental results are presented confirming the method's high extraction.

  • PDF

Encrypted holographic storage using double-phase encoding technique

  • Vu, Tien-Viet;Kim, Nam;Jeon, Seok-Hui
    • 한국광학회:학술대회논문집
    • /
    • 한국광학회 2007년도 하계학술발표회 논문집
    • /
    • pp.229-230
    • /
    • 2007
  • Several encryption techniques were successfully applied to secure holographic memory systems.[1,2] In these systems the reference beam, object beam, or both can be encoded optically. Optics provides many degrees of freedom with which the optical beam may be encoded, such as amplitude, phase, wavelength, and polarization.

  • PDF

Review Of Some Cryptographic Algorithms In Cloud Computing

  • Alharbi, Mawaddah Fouad;Aldosari, Fahd;Alharbi, Nawaf Fouad
    • International Journal of Computer Science & Network Security
    • /
    • 제21권9호
    • /
    • pp.41-50
    • /
    • 2021
  • Cloud computing is one of the most expanding technologies nowadays; it offers many benefits that make it more cost-effective and more reliable in the business. This paper highlights the various benefits of cloud computing and discusses different cryptography algorithms being used to secure communications in cloud computing environments. Moreover, this thesis aims to propose some improvements to enhance the security and safety of cloud computing technologies.

An Efficient and Secure Authentication Scheme with Session Key Negotiation for Timely Application of WSNs

  • Jiping Li;Yuanyuan Zhang;Lixiang Shen;Jing Cao;Wenwu Xie;Yi Zheng;Shouyin Liu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제18권3호
    • /
    • pp.801-825
    • /
    • 2024
  • For Internet of Things, it is more preferred to have immediate access to environment information from sensor nodes (SNs) rather than from gateway nodes (GWNs). To fulfill the goal, mutual authentication scheme between user and SNs with session key (SK) negotiation is more suitable. However, this is a challenging task due to the constrained power, computation, communication and storage resources of SNs. Though lots of authentication schemes with SK negotiation have been designed to deal with it, they are still insufficiently secure and/or efficient, and some even have serious vulnerabilities. Therefore, we design an efficient secure authentication scheme with session key negotiation (eSAS2KN) for wireless sensor networks (WSNs) utilizing fuzzy extractor technique, hash function and bitwise exclusive-or lightweight operations. In the eSAS2KN, user and SNs are mutually authenticated with anonymity, and an SK is negotiated for their direct and instant communications subsequently. To prove the security of eSAS2KN, we give detailed informal security analysis, carry out logical verification by applying BAN logic, present formal security proof by employing Real-Or-Random (ROR) model, and implement formal security verification by using AVISPA tool. Finally, computation and communication costs comparison show the eSAS2kN is more efficient and secure for practical application.

농촌지역 공동주택 농가의 공간이용행태에 관한 조사연구 -진주시 근교 농촌지역을 중심으로- (A Study on the Space Usage Behaviors of Farmhouse in Rural Apartment Houses)

  • 김강섭;김석규;이상정
    • 한국농촌건축학회논문집
    • /
    • 제6권1호
    • /
    • pp.42-53
    • /
    • 2004
  • The purpose of this study is to examine the space usage behaviors of dwelling by using field study method and by interviewing residents of apartment houses in rural areas. It has been found that the main occupancy space among the residents of apartment houses in rural area is based on agricultural activities. This study will show that apartment houses in rural areas must, as a necessity, reflect the characteristics and needs of its rural environment. It is certain that the existing "unit plan" is not a suitable method. Residents of rural areas have been able to adjust themselves to their current dwelling space properly. This is, mainly, due to economic factors. The interior space is used for simple everyday activities like loading, deposit and drying things. "Nongmak" is a space used for agricultural work and the balcony is used for storage of various things. In conclusion, this study strongly suggested that secure storage space based on the farmhouse model and rural lifestyle should be necessary. Furthermore, special designed cubic shelves should be placed in utility rooms and balconys. And the design and function of apartment houses in rural areas must reflect the needs of its residents.

  • PDF

제주도 남원읍지역 대용량 빗물이용시설의 적정규모 및 농업용수 공급 가능량 산정 연구 (A Study on the Appropriate Size of Large Rainwater Utilizing Facilities and Estimation of Agricultural Water Availability in Namwon eup, Jeju Island)

  • 김민철;박원배;강봉래
    • 한국지하수토양환경학회지:지하수토양환경
    • /
    • 제25권1호
    • /
    • pp.84-94
    • /
    • 2020
  • Jeju Island is seeking reliable ways to secure alternative water resources using rainwater in order to conserve and manage its groundwater as sustainable water resources. The purpose of this study is to investigate the rainwater storage capability of small-size storage facilities installed at farmhouses in Uigwi and Wimi of Namwon-eup region. The rainwater outflows from the storage facilities in rain events were analyzed. The appropriate size of rainwater utilizing facilities are suggested to be about 5,800 ㎥ in Uigwi area and 4,900 ㎥ in Wimi area based on the calculation from the rainfall frequency and runoff amounts. If those facilities are put into operation in Uigwi and Wimi area, it is estimated approximately 32.3 and 11.5% of total agricultural water can be supplied by the facilities. Wimi area showed low rainwater usage because of less number of facilities relative to the size of farm areas and less intensive underground water usage. It is analyzed that more than 55% of agricultural water can be supplied by rainwater if 70 facilities without the rainwater facilities are connected to the rainwater utilizing facilities.

A Security-Enhanced Identity-Based Batch Provable Data Possession Scheme for Big Data Storage

  • Zhao, Jining;Xu, Chunxiang;Chen, Kefei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제12권9호
    • /
    • pp.4576-4598
    • /
    • 2018
  • In big data age, flexible and affordable cloud storage service greatly enhances productivity for enterprises and individuals, but spontaneously has their outsourced data susceptible to integrity breaches. Provable Data Possession (PDP) as a critical technology, could enable data owners to efficiently verify cloud data integrity, without downloading entire copy. To address challenging integrity problem on multiple clouds for multiple owners, an identity-based batch PDP scheme was presented in ProvSec 2016, which attempted to eliminate public key certificate management issue and reduce computation overheads in a secure and batch method. In this paper, we firstly demonstrate this scheme is insecure so that any clouds who have outsourced data deleted or modified, could efficiently pass integrity verification, simply by utilizing two arbitrary block-tag pairs of one data owner. Specifically, malicious clouds are able to fabricate integrity proofs by 1) universally forging valid tags and 2) recovering data owners' private keys. Secondly, to enhance the security, we propose an improved scheme to withstand these attacks, and prove its security with CDH assumption under random oracle model. Finally, based on simulations and overheads analysis, our batch scheme demonstrates better efficiency compared to an identity based multi-cloud PDP with single owner effort.

지역농업기상지원을 위한 정보화기술 전망 및 활용 (Prospect of Information Technology and Its Application to Regional Agricultural Meteorology)

  • Lee, Byong-Lyol
    • 한국농림기상학회:학술대회논문집
    • /
    • 한국농림기상학회 2003년도 춘계 학술발표논문집
    • /
    • pp.189-201
    • /
    • 2003
  • Grid is a new Information Technology (IT) concept of "super Internet" for high-performance computing: worldwide collections of high-end resources - such as supercomputers, storage, advanced instruments and immerse environments. The Grid is expected to bring together geographically and organizationally dispersed computational resources, such as CPUs, storage systems, communication systems, real-time data sources and instruments, and human collaborators. The term "the Grid" was coined in the mid l990s to denote a proposed distributed computing infrastructure for advanced science and engineering. The term computational Grids refers to infrastructures aimed at allowing users to access and/or aggregate potentially large numbers of powerful and sophisticated resources. More formally, Grids are defined as infrastructure allowing flexible, secure, and coordinated resource sharing among dynamic collections of individuals, institutions and resources referred to as virtual Organizations. GRID is an emerging IT as a kind of next generation Internet technology which will fit very well with Agrometeorological services in the future. I believe that it would contribute to the resource sharing in AgroMeteorology by providing super computing power, virtual storage, and efficient data exchanges, especially for developing countries that are suffering from the lack of resources for their agmet services at national level. Thus, the establishment of CAgM-GRID based on existing RAMINSII is proposed as a part of FWIS of WMO.part of FWIS of WMO.

  • PDF

둑높이기 농업용저수지의 환경용수 방류기준 설정 (Optimizing Rules for Releasing Environmental Water in Enlarged Agricultural Reservoirs)

  • 유승환;이상현;최진용;박태선
    • 한국농공학회논문집
    • /
    • 제54권5호
    • /
    • pp.17-24
    • /
    • 2012
  • The main purposes of the agricultural reservoir enlargement (ARE) project are to secure water supply reliability (WSR) for agriculture and to release environmental water during dry seasons. In this study, an operational rule that will simultaneously satisfy both the above issues was developed. Initial amount of water storage at the beginning of non-irrigation season (1st October) was divided into 3 stages, and the target level of water storage at the beginning of irrigation seasons (1st April) was set up. Required operational curves and release amounts were estimated based on the stages and target water levels. To evaluate the applicability of this rule, the amount of water released for environmental purposes and WSRs were analyzed for three reservoirs (Unam, Jangchi and Topjeong). The ratio between annual amount of release and additional amount of water storage were 1.6, 1.85, and 4.1 for the Unam, Jangchi, Tapjeong reservoirs, respectively. Also, the WSRs of all reservoirs were found to become higher than when the design standard was applied. Therefore, it is considered that the proposed rule is more suitable for the enlarged agricultural reservoirs operation as it satisfies the WSRs while securing the environmental water release.