• Title/Summary/Keyword: Secure Storage

Search Result 404, Processing Time 0.025 seconds

Secure Scalar Multiplication with Simultaneous Inversion Algorithm in Hyperelliptic Curve Cryptosystem (초 타원 곡선 암호시스템에서 동시 역원 알고리즘을 가진 안전한 스칼라 곱셈)

  • Park, Taek-Jin
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.4 no.4
    • /
    • pp.318-326
    • /
    • 2011
  • Public key cryptosystem applications are very difficult in Ubiquitos environments due to computational complexity, memory and power constrains. HECC offers the same of levels of security with much shorter bit-lengths than RSA or ECC. Scalar multiplication is the core operation in HECC. T.Lange proposed inverse free scalar multiplication on genus 2 HECC. However, further coordinate must be access to SCA and need more storage space. This paper developed secure scalar multiplication algorithm with simultaneous inversion algorithm in HECC. To improve the over all performance and security, the proposed algorithm adopt the comparable technique of the simultaneous inversion algorithm. The proposed algorithm is resistant to DPA and SPA.

A Study on Performance Assessment of Dry Floors Applied to Long-life Housing (장수명주택에 적용되는 건식바닥의 성능평가에 관한 연구)

  • Seo, Dong-Goo;Lee, Jong-Ho;Kim, Soo-Am;Shin, Yun-Ho;Hwang, Eun-Kyoung
    • Journal of the Architectural Institute of Korea Structure & Construction
    • /
    • v.35 no.5
    • /
    • pp.133-143
    • /
    • 2019
  • Various problems regarding the wet floor method such as its complicated process and waste of thermal storage have been raised, but the usage of dry floor recommended for long-life housing has declined due to lack of confidence on the performance of dry floor. The purpose of this study is to secure the credibility of dry floor. Under this purpose, this study considered precedent studies and established directions to secure the performance of long-life housing infill, and thus, 9 performance items (Impact sound, Smoothness, thermal comfort, sensation hardness while walking, falling safety, impact resistance, local compression load, local strength and strain at heating) were drawn. In addition, the experiment was carried out for 5 performances except for legal performance, some dry floor performances and whole spatial performance. As a result, an appropriate result from all performances except was obtained. The performance of dry floor was verified for each item from these results and it is expected to use such results as basic data on dry floor in the future.

A Fully Distributed Secure Approach using Nondeterministic Encryption for Database Security in Cloud

  • Srinu Banothu;A. Govardhan;Karnam Madhavi
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.1
    • /
    • pp.140-150
    • /
    • 2024
  • Database-as-a-Service is one of the prime services provided by Cloud Computing. It provides data storage and management services to individuals, enterprises and organizations on pay and uses basis. In which any enterprise or organization can outsource its databases to the Cloud Service Provider (CSP) and query the data whenever and wherever required through any devices connected to the internet. The advantage of this service is that enterprises or organizations can reduce the cost of establishing and maintaining infrastructure locally. However, there exist some database security, privacychallenges and query performance issues to access data, to overcome these issues, in our recent research, developed a database security model using a deterministic encryption scheme, which improved query execution performance and database security level.As this model is implemented using a deterministic encryption scheme, it may suffer from chosen plain text attack, to overcome this issue. In this paper, we proposed a new model for cloud database security using nondeterministic encryption, order preserving encryption, homomorphic encryptionand database distribution schemes, andour proposed model supports execution of queries with equality check, range condition and aggregate operations on encrypted cloud database without decryption. This model is more secure with optimal query execution performance.

A Study on Japanese Experience to Secure the Interim Storage Facility for Nuclear Spent Fuel (일본의 사용후핵연료 중간저장 시설 확보 경험에 관한 연구 - 아오모리현 무쯔시 사례 -)

  • Kim, Kyung-Min
    • Journal of Nuclear Fuel Cycle and Waste Technology(JNFCWT)
    • /
    • v.5 no.4
    • /
    • pp.351-357
    • /
    • 2007
  • The Japanese Government selected Mutsu, Aomori Prefecture as a provisional spent-fuel repository site. This comes as a result of the prefecture's five-year campaign to host the site since 2000. Korea stores spent nuclear fuel within sites of nuclear power plants, and expects the storage capacity to reach its limit by the year 2016. This compels Korea to learn the cases of Japan. Having successfully hosted Gyeongju as a site for low-to-intermediate-level nuclear waste repository, Korea has already learned the potential process of hosting spent fuel storage site. The striking difference between the two countries in the process of hosting the site is that the Korean government had to offer the local city a large amount of subsidy for hosting through competitive citizens' referendum among candidate cities while it was the leadership of the local municipality that enabled the controversial decision in Japan. It is also a distinguishable characteristics of Japan that not a huge subsidy is provided to the local host city. I hope this study offers an idea to Korea's future effort to select a spent-fuel host site.

  • PDF

On-Site Transport and Storage of Spent Nuclear Fuel at Kori NPP by KN-12 Transport Cask (KN-12 운반용기를 이용한 고리 사용후핵연료 소내수송.저장)

  • Chung, Sung-Hwan;Baeg, Chang-Yeal;Choi, Byung-Il;Yang, Ke-Hyung;Lee, Dae-Ki
    • Journal of Nuclear Fuel Cycle and Waste Technology(JNFCWT)
    • /
    • v.4 no.1
    • /
    • pp.51-58
    • /
    • 2006
  • Since 2002, more than 400 PWR spent nuclear fuel assemblies have been transported and stored on-site using transport casks in order to secure the storage capacity of PWR spent nuclear fuel of Kori nuclear power plant. The complete on-site transport system, which includes KN-12 transport casks, the related equipment and transport vehicles, had been developed and provided. KN-12 transport casks were designed, fabricated and licensed in accordance with Korean and IAEA's transport regulations, and the related equipment was also provided in accordance with the related regulations. The on-site transport and storage operation using two KN-12 casks and the related equipment has been conducted, and the strict Quality Control and Radiation Safety Management through the whole process has been carried out so as to achieve the required safety and reliability of the on-site transport of spent nuclear fuel.

  • PDF

Development of a Tool for Predicting the Occurrence Time of BLEVE in Small LPG Storage Tanks (LPG소형저장탱크 BLEVE 발생 시점 예측 툴 개발)

  • Chae, Chung Keun;Lee, Jae Hun;Chae, Seung Been;Kim, Yong Gyu;Han, Shin Tak
    • Journal of the Korean Society of Safety
    • /
    • v.35 no.4
    • /
    • pp.74-83
    • /
    • 2020
  • In Korea, about 110,000 LPG small storage tanks of less than three tons have been installed in restaurants, houses and factories, and are used as LPG supply facilities for cooking, heating and industrial use. In the case of combustible liquefied gas storage tanks, the tank may rupture due to the temperature increase of the tank steel plate (approximately 600℃) even when the safety valve is operating normally, causing large-scale damage in an instant. Therefore, in the event of a fire near the LPG small storage tank, it is necessary to accurately predict the timing of the BLEVE(Boiling Liquid Expanding Vapour Explosion) outbreak in order to secure golden time for lifesaving and safely carry out fire extinguishing activities. In this study, we have first investigated the results of a prior study on the prediction of the occurrence of BLEVE in the horizontal tanks. And we have developed thermodynamic models and simulation program on the prediction of BLEVE that can be applied to vertical tanks used in Korea, have studied the effects of the safety valve's ability to vent, heat flux strength of external fires, size of tanks, and gas remaining in tanks on the time of BLEVE occurrence and have suggested future utilization measures.

A Study on the Properties of Hwangto Permeable Block Using Ferro Nickel Slag (페로니켈슬래그를 혼입한 황토투수블럭 물성에 관한 연구)

  • Kim, Soon-Ho
    • Journal of the Korea Institute of Building Construction
    • /
    • v.22 no.6
    • /
    • pp.607-618
    • /
    • 2022
  • This study involves the development of a Hwangto permeable block for rainwater storage tanks. The permeable products that form continuous voids between Hwangto binders and aggregates are fine milled slag powder, which is an industrial by-product generated during the production of Hwangto and iron, and ferro nickel slag. The properties of Hwangto permeable blocks were studied using recycled resource aggregates. The target quality is based on KSF 2394. The Hwangto permeable block for a rainwater storage tank is made of water-permeable material, and the permeability of the Hwangto permeable block itself is 0.1mm/sec or higher, with a physical performance of over 5.0MPa in flexural strength and over 20.0MPa in compressive strength. The physical properties of Hwangto permeable block for rainwater storage tanks were researched and developed. In order to prevent flooding due to heavy rain in summer and the urban heat island phenomenon due to depletion of ground water, continuous pores are formed in the block to secure a permeability function to prevent rainwater from accumulating in the pavement of the floor, and to prevent slippage for comfortable and safe storage.

A Study on Efficient and Secure user Authentication System based on Smart-card (효율적이고 안전한 스마트카드 기반 사용자 인증 시스템 연구)

  • Byun, Jin-Wook
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.48 no.2
    • /
    • pp.105-115
    • /
    • 2011
  • User authentication service is an absolutely necessary condition while securely implementing an IT service system. It allows for valid users to securely log-in the system and even to access valid resources from database. For efficiently and securely authenticating users, smart-card has been used as a popular tool because of its convenience and popularity. Furthermore the smart-card can maintain its own power for computation and storage, which makes it easier to be used in all types of authenticating environment that usually needs temporary storage and additional computation for authenticating users and server. First, in 1981, Lamport has designed an authentication service protocol based on user's smart-card. However it has been criticized in aspects of efficiency and security because it uses hash chains and the revealment of server's secret values are not considered. Over the years, many smart-card based authentication service protocol have been designed. Very recently, Xu, Zhu, Feng have suggested a provable and secure smart-card based authentication protocol. In this paper, first, we define all types of attacks in the smart-card based authentication service. According to the defined attacks, however, the protocol by Xu, Zhu, Feng is weak against an attack that an attacker with secret values of server is able to impersonate a valid user without knowing password and secret values of user. An efficient and secure countermeasure is suggested, then the security is analyzed.

A Scheme for Secure Storage and Retrieval of (ID, Password) Pairs Using Smart Cards as Secure and Portable Storages (안전한 휴대 저장장치로서의 스마트카드를 활용한 (ID, 패스워드) 쌍들의 안전한 저장 및 검색 기법)

  • Park, Jun-Cheol
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39B no.6
    • /
    • pp.333-340
    • /
    • 2014
  • Despite the security weakness of reusing passwords, many Internet users are likely to use a single ID and password on various sites to avoid the inconvenience of remembering multiple credentials. This paper proposes a scheme for securely storing, retrieving, and updating randomly chosen (ID, password) pairs by using smart cards as secure and portable storages. The scheme makes a user free from remembering her (ID, password) pairs for Internet accesses. By splitting and scattering the (ID, password) pairs of a user across the user's smart card memory and a remote server's storage, it can protect the logon credentials even from the theft or loss of the smart card. Also, a user, if deemed necessary, can issue and let the server to delete all information belonging to the user. Hence even an attacker who cracked the smart card memory would not be able to obtain any (ID, password) pair of the victim thereafter. The scheme requires a user to input a site information and pass-phrase to her smart card to obtain the logon credentials, but it should be an acceptable overhead considering the benefits of not remembering the freely chosen (ID, password) pairs at all.

Performance Analysis of Docker Container Migration Using Secure Copy in Mobile Edge Computing (모바일 엣지 컴퓨팅 환경에서 안전 복사를 활용한 도커 컨테이너 마이그레이션 성능 분석)

  • Byeon, Wonjun;Lim, Han-wool;Yun, Joobeom
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.5
    • /
    • pp.901-909
    • /
    • 2021
  • Since mobile devices have limited computational resources, it tends to use the cloud to compute or store data. As real-time becomes more important due to 5G, many studies have been conducted on edge clouds that computes at locations closer to users than central clouds. The farther the user's physical distance from the edge cloud connected to base station is, the slower the network transmits. So applications should be migrated and re-run to nearby edge cloud for smooth service use. We run applications in docker containers, which is independent of the host operating system and has a relatively light images size compared to the virtual machine. Existing migration studies have been experimented by using network simulators. It uses fixed values, so it is different from the results in the real-world environment. In addition, the method of migrating images through shared storage was used, which poses a risk of packet content exposure. In this paper, Containers are migrated with Secure CoPy(SCP) method, a data encryption transmission, by establishing an edge computing environment in a real-world environment. It compares migration time with Network File System, one of the shared storage methods, and analyzes network packets to verify safety.