• 제목/요약/키워드: Secure Storage

검색결과 402건 처리시간 0.024초

Improving Security and Privacy-Preserving in Multi-Authorities Ciphertext-Policy Attribute-Based Encryption

  • Hu, Shengzhou;Li, Jiguo;Zhang, Yichen
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제12권10호
    • /
    • pp.5100-5119
    • /
    • 2018
  • Most of existing privacy-preserving multi-authorities attribute-based encryption schemes (PP-MA-ABE) only considers the privacy of the user identity (ID). However, in many occasions information leakage is caused by the disclosing of his/her some sensitive attributes. In this paper, we propose a collusion-resisting ciphertext-policy PP-MA-ABE (CRPP-MACP-ABE) scheme with hiding both user's ID and attributes in the cloud storage system. We present a method to depict anonymous users and introduce a managerial role denoted by IDM for the management of user's anonymous identity certificate ($AID_{Cred}$). The scheme uses $AID_{Cred}$ to realize privacy-preserving of the user, namely, by verifying which attribute authorities (AAs) obtain the blinded public attribute keys, pseudonyms involved in the $AID_{Cred}$ and then distributes corresponding private keys for the user. We use different pseudonyms of the user to resist the collusion attack launched by viciousAAs. In addition, we utilize IDM to cooperate with multiple authorities in producing consistent private key for the user to avoid the collusion attack launched by vicious users. The proposed CRPP-MACP-ABE scheme is proved secure. Some computation and communication costs in our scheme are finished in preparation phase (i.e. user registration). Compared with the existing schemes, our scheme is more efficient.

클라우드 간의 콘텐츠 동적협업 서비스 플랫폼 기술 (Service Platform Technology of Dynamic Contents Collaboration of Clouds)

  • 홍요훈;;노정규
    • 한국위성정보통신학회논문지
    • /
    • 제11권2호
    • /
    • pp.1-7
    • /
    • 2016
  • 본 논문에서는 콘텐츠 수집 및 저작도구를 통하여 콘텐츠를 보안 스토리지에 등록하면 스마트폰, 스마트패드, PC 등에서 콘텐츠를 공통의 경험으로 사용할 수 있는 콘텐츠 저작, 관리, 배포 기술을 제안하였다. 현재 많은 사람들이 다양한 유형의 콘텐츠를 대량으로 생산 및 소비하고 있는데, 향후에는 IoT(사물인터넷) 기술이 확대되면서 실시간 콘텐츠와 과거 콘텐츠가 함께 공존할 것으로 예상된다. 따라서 콘텐츠 저작 및 협업 시스템에서 글로벌 서비스와 경쟁할 수 있는 차별화된 서비스를 개발하여 새로운 시장을 창출할 필요가 있다. 이에 본 연구에서는 협업을 통해 만들어진 양질의 콘텐츠를 기반으로 클라우드 시장을 선점하기 위한 저작서비스 플랫폼을 구현하였다.

프라이버시 보존형 소스기반 중복제거 기술 방법 제안 (Privacy Preserving source Based Deuplication Method)

  • 남승수;서창호;이주영;김종현;김익균
    • 스마트미디어저널
    • /
    • 제4권4호
    • /
    • pp.33-38
    • /
    • 2015
  • 부 스토리지에 민감한 데이터를 저장할 경우 평문상태의 데이터는 기밀성 문제가 발생하기 때문에 중복처리를 통한 스토리지 효율성 제공뿐만 아니라 데이터 암호화를 통한 기밀성 보장이 필요하다. 최근 네트워크 대역폭의 효율적인 사용을 위해 클라이언트측 중복제거 기술이 주목을 받으면서 다양한 클라이언트 측 중복제거 기술들이 제안되었지만 아직까지 안전성에 대한 문제가 남아있다. 본 논문에서는 암호화를 통해 데이터의 기밀성을 보장하고 소유권 증명을 이용해 데이터 접근제어를 제공하여 신뢰할 수 없는 서버와 악의적인 사용자로부터 프라이버시를 보존할 수 있는 안전한 클라이언트 측 소스기반 중복제거 기술을 제안한다.

Attribute-Based Data Sharing with Flexible and Direct Revocation in Cloud Computing

  • Zhang, Yinghui;Chen, Xiaofeng;Li, Jin;Li, Hui;Li, Fenghua
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제8권11호
    • /
    • pp.4028-4049
    • /
    • 2014
  • Attribute-based encryption (ABE) is a promising cryptographic primitive for implementing fine-grained data sharing in cloud computing. However, before ABE can be widely deployed in practical cloud storage systems, a challenging issue with regard to attributes and user revocation has to be addressed. To our knowledge, most of the existing ABE schemes fail to support flexible and direct revocation owing to the burdensome update of attribute secret keys and all the ciphertexts. Aiming at tackling the challenge above, we formalize the notion of ciphertext-policy ABE supporting flexible and direct revocation (FDR-CP-ABE), and present a concrete construction. The proposed scheme supports direct attribute and user revocation. To achieve this goal, we introduce an auxiliary function to determine the ciphertexts involved in revocation events, and then only update these involved ciphertexts by adopting the technique of broadcast encryption. Furthermore, our construction is proven secure in the standard model. Theoretical analysis and experimental results indicate that FDR-CP-ABE outperforms the previous revocation-related methods.

프라이버시 보존형 소스기반 중복제거 방법 (Privacy Preserving Source Based Deduplicaton Method)

  • 남승수;서창호
    • 디지털융복합연구
    • /
    • 제14권2호
    • /
    • pp.175-181
    • /
    • 2016
  • 클라우드 스토리지에 민감한 데이터를 저장할 경우 평문상태의 데이터는 기밀성 문제가 발생하기 때문에 중복처리를 통한 스토리지 효율성 제공뿐만 아니라 데이터 암호화를 통한 기밀성 보장이 필요하다. 최근 네트워크 대역폭의 효율적인 사용을 위해 클라이언트 측 중복제거 기술이 주목을 받으면서 다양한 클라이언트 측 중복제거 기술들이 제안되었지만 아직까지 안전성에 대한 문제가 남아있다. 본 논문에서는 암호화를 통해 데이터의 기밀성을 보장하고 소유권 증명을 이용해 데이터 접근제어를 제공하여 신뢰할 수 없는 서버와 악의적인 사용자로부터 프라이버시를 보존할 수 있는 안전한 클라이언트 측 소스기반 중복제거 기술을 제안한다.

FAHP 기법에 의한 농업용저수지의 추가저수량 확보사업 우선순위 결정 (Prioritization for Water Storage Increase of Agricultural Reservoir using FAHP Method)

  • 최은혁;배상수;지홍기
    • 한국수자원학회논문집
    • /
    • 제46권2호
    • /
    • pp.171-182
    • /
    • 2013
  • 본 논문은 퍼지집합이론을 이용한 다기준 의사결정(MCDM) 과정에 관한 연구이며, 농업용 저수지의 수자원계획 평가에 관한 가장 합리적이고 효율적인 방법을 찾기 위해 FAHP를 이용하여 각각의 대안들에 대한 우선순위를 정하였다. 농업용 저수지의 추가저수량 확보를 위해 의사결정자 및 수혜자가 동시에 만족하는 조건을 조사하여 6개의 주 기준을 설정하고 이에 따른 10개의 대안을 설정하여 우선순위를 결정하고자 하였으며, 우선순위를 결정에서의 불확실성과 모호성을 규명하기 위해 퍼지수와 언어변수를 정의하였다. 또한 적절한 의사결정모형의 제시를 위해 의사결정 방법에 따른 분석결과를 비교 검토하였으며 FAHP 기법 적용의 타당성을 논의하였다.

Raspberry Pi기반 Node-Red를 이용한 Low Cost 클라우드 서버 시스템 구현 (Development of Low Cost Cloud Server System using Node-Red based on Raspberry Pi)

  • 린즈밍;이양원;김철원
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국정보통신학회 2018년도 추계학술대회
    • /
    • pp.261-264
    • /
    • 2018
  • 사물인터넷의 응용분야가 다변화 되면서 센서의 정보를 실시간으로 서버에 저장할 필요성이 높아지고 있다. 그러나 일반인이 서버를 구축해서 데이터를 수집하기 위해서는 기존의 PC와 저장공간을 확보하기 위해서는 많은 비용이 소요된다. 본 논문에서는 쉽게 낮은 가격으로 쉽게 클라우드 시스템을 구축할 수 있는 방안을 제시한다. 본 시스템은 Raspberry 오픈 하드웨어와 오픈소스인 Node-Red를 이용하여 간단하게 클라우드 시스템을 구축하는 방법을 제안하고 구현하는 과정을 제시한다.

  • PDF

중소기업의 e-비즈니스가 수익성에 미치는 영향에 관한 연구 (A Study on the Impact of the E-Business of SMEs on Profitability)

  • 노경호
    • 경영과정보연구
    • /
    • 제18권
    • /
    • pp.133-161
    • /
    • 2006
  • E-business has received much attention from entrepreneurs, executives, investors, and industry observers recently. The Internet is flourishing and the World Wide Web is growing at an exponential rate. In recent years, information has become the critical commodity needed for success in the changing global economic order. Accordingly, business organizations have come to the conclusion that they require an extensive data repository in order to acquire a competitive advantage in a dynamically change market. This rich assortment of data must further be delivered and deliverable enterprise-wide in a secure and cost-efficient manner. Information technology(IT) has created the E-business as a vitally important mechanism for the storage, dissemination, and even the analysis data. The E-business has become increasingly important to a growing number of organizations in Korea in relatively short order. The present study is an attempt to develop a more through understanding of the potential and actual impact of the B-business on organizational functions and activities. Expecially, it also consists of an effort to assess the impact of the E-business on profitability. The research also addresses the issue of how the E-business affects profitability and shapes or modifies business activities. The results of literature review and study revealed that middle managers believe that the extent of the I-business use is significantly related to improvements in overall organizational functions and activities. While communication, decision-making, productivity, work collaboration, and business activities are all enhanced by E-business use, profitability appears to be most dramatically improved by Intranet use.

  • PDF

기업 인트라넷의 도입이 협력작업에 미치는 영향에 관한 연구 (A Study on the Influence of the Corporate Intranet on Work Collaboration)

  • 노경호
    • 경영과정보연구
    • /
    • 제14권
    • /
    • pp.1-24
    • /
    • 2004
  • The Internet is flourishing and the World Wide Web is growing at an exponential rate. A fundamental concept of Intranet, the so-called second wave, was introduced only a few years ago. Intranets have been embraced by corporate users of information services and made substantial inroads in strategic vision documents and procurement practices. Business organizations have come to the conclusion that they require an extensive data repository in order to acquire a competitive advantage in a dynamically change market. This rich assortment of data must further be delivered and deliverable enterprise-wide in a secure and cost-efficient manner. Information technology(IT) has created the Intranet as a vitally important mechanism for the storage, dissemination, and even the analysis data. The present study is an attempt to develop a more through understanding of the potential and actual impact of the Intranet on organizational functions and activities. Expecially, it also consists of an effort to assess the impact of the Intranet on work collaboration. The research also addresses the issue of how the Intranet affects work collaboration and shapes or modifies business activities. The results of literature review and study revealed that middle managers believe that the extent of the Intranet use is significantly related to improvements in overall organizational functions and activities. While communication, decision-making, productivity, work collaboration, and business activities are all enhanced by Intranet use, Work Collaboration appears to be most dramatically improved by Intranet use.

  • PDF

Privacy-Preserving H.264 Video Encryption Scheme

  • Choi, Su-Gil;Han, Jong-Wook;Cho, Hyun-Sook
    • ETRI Journal
    • /
    • 제33권6호
    • /
    • pp.935-944
    • /
    • 2011
  • As a growing number of individuals are exposed to surveillance cameras, the need to prevent captured videos from being used inappropriately has increased. Privacy-related information can be protected through video encryption during transmission or storage, and several algorithms have been proposed for such purposes. However, the simple way of evaluating the security by counting the number of brute-force trials is not proper for measuring the security of video encryption algorithms, considering that attackers can devise specially crafted attacks for specific purposes by exploiting the characteristics of the target video codec. In this paper, we introduce a new attack for recovering contour information from encrypted H.264 video. The attack can thus be used to extract face outlines for the purpose of personal identification. We analyze the security of previous video encryption schemes against the proposed attack and show that the security of these schemes is lower than expected in terms of privacy protection. To enhance security, an advanced block shuffling method is proposed, an analysis of which shows that it is more secure than the previous method and can be an improvement against the proposed attack.