• Title/Summary/Keyword: Secure Storage

Search Result 397, Processing Time 0.03 seconds

Delegated Provision of Personal Information and Storage of Provided Information on a Blockchain Ensuring Data Confidentiality (개인정보의 위임 제공 및 데이터 기밀성을 보장하는 블록체인에 제공 정보의 저장)

  • Jun-Cheol, Park
    • Smart Media Journal
    • /
    • v.11 no.10
    • /
    • pp.76-88
    • /
    • 2022
  • Personal information leakage is very harmful as it can lead to additional attacks using leaked information as well as privacy invasion, and it is primarily caused by hacking server databases of institutions that collect and store personal information. We propose a scheme that allows a service-requesting user to authorize a secure delegated transfer of his personal information to the service provider via a reliable authority and enables only the two parties of the service to retrieve the provided information stored on a blockchain ensuring data confidentiality. It thus eliminates the necessity of storing customer information in the service provider's own database. As a result, the service provider can serve customers without requiring membership registration or storing personal information in the database, so that information leakage through the server database can be completely blocked. In addition, the scheme is free from the risk of information leakage and subsequent attacks through smartphones because it does not require a user's smartphone to store any authentication credential or personal information of its owner.

A Study on the Improvement of Research Support System for National R&D Projects Using Blockchain (블록체인을 활용한 국가연구개발사업 연구지원시스템 개선 방안 연구)

  • Donghwan Lee;Seungwook Park
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.28 no.2
    • /
    • pp.47-60
    • /
    • 2023
  • This study proposed to adopt consortium blockchain for the database in the research support system of national R&D projects in order to increase efficiency, to reduce administrative burden, and to promote transparent research environment focusing on servicing researchers. Specifically, storage methods were classified according to data characteristics. First, data that requires integrity and transparency is stored in the blockchain, Second, confidentiality and data that require modification and deletion are stored in the database, Third, data that requires confidentiality, integrity, and transparency at the same time stores the original in the database, and the hash value of the data is separately stored in the blockchain. If research support system adopts blockchain, it is possible to operate the system stably, to share quick exchange of information between research institutes, to reduce administrative burden, to improve transparency of process, to resolve asymmetry of information, and to secure integrity, confidentiality, and availability of data.

Integration of Blockchain and Cloud Computing in Telemedicine and Healthcare

  • Asma Albassam;Fatima Almutairi;Nouf Majoun;Reem Althukair;Zahra Alturaiki;Atta Rahman;Dania AlKhulaifi;Maqsood Mahmud
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.6
    • /
    • pp.17-26
    • /
    • 2023
  • Blockchain technology has emerged as one of the most crucial solutions in numerous industries, including healthcare. The combination of blockchain technology and cloud computing results in improving access to high-quality telemedicine and healthcare services. In addition to developments in healthcare, the operational strategy outlined in Vision 2030 is extremely essential to the improvement of the standard of healthcare in Saudi Arabia. The purpose of this survey is to give a thorough analysis of the current state of healthcare technologies that are based on blockchain and cloud computing. We highlight some of the unanswered research questions in this rapidly expanding area and provide some context for them. Furthermore, we demonstrate how blockchain technology can completely alter the medical field and keep health records private; how medical jobs can detect the most critical, dangerous errors with blockchain industries. As it contributes to develop concerns about data manipulation and allows for a new kind of secure data storage pattern to be implemented in healthcare especially in telemedicine fields is discussed diagrammatically.

A Design of Industrial Safety Service using LoRa Gateway Networks (LoRa 게이트웨이 네트워크를 활용한 산업안전서비스 설계)

  • Chang, Moon-soo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.10a
    • /
    • pp.313-316
    • /
    • 2021
  • In the IoT(IoT: Internet of Things) environment, network configuration is essential to collect data generated from objects. Various communication methods are used to process data of objects, and wireless communication methods such as Bluetooth and WiFi are mainly used. In order to collect data of objects, a communication module must be installed to collect data generated from sensors or edge devices in real time. And in order to deliver data to the database, a software architecture must be configured. Data generated from objects can be stored and managed in a database in real time, and data necessary for industrial safety can be extracted and utilized for industrial safety service applications. In this paper, a network environment was constructed using a LoRa(LoRa: Long Range) gateway to collect object data, and a client/server data collection model was designed to collect object data transmitted from the LoRa module. In order to secure the resources necessary for data collection and storage management without data leakage, data collection should be possible in real time. As an application service, location data required for industrial safety can be stored and managed in a database in real time.

  • PDF

A study on improvement of policy of artificial intelligence for national defense considering the US third offset strategy (미국의 제3차 상쇄전략을 고려한 국방 인공지능 정책 발전방안)

  • Se Hoon Lee;Seunghoon Lee
    • Industry Promotion Research
    • /
    • v.8 no.1
    • /
    • pp.35-45
    • /
    • 2023
  • This paper addressed the analysis of the trend and direction of the US defense strategy based on their third offset strategy and presented the practical policy implication of ensuring the security of South Korea appropriately in the future national defense environment. The countermeasures for the development ability of advanced weapon systems and secure core technologies for Korea were presented in consideration of the US third offset strategy for the future national defense environment. First, to carry out the innovation of national defense in Korea based on artificial intelligence(AI), the long-term basis strategy for the operation of the unmanned robot and autonomous weapon system should be suggested. Second, the platform for AI has to be developed to obtain the development of algorithms and computing abilities for securing the collection/storage/management of national defense data. Lastly, advanced components and core technologies are identified, which the Korean government can join to develop with the US on a basis of the Korea-US alliance, and the technical cooperation with the US should be stronger.

Design and Implementation of Bigdata Platform for Vessel Traffic Service (해상교통 관제 빅데이터 체계의 설계 및 구현)

  • Hye-Jin Kim;Jaeyong Oh
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.29 no.7
    • /
    • pp.887-892
    • /
    • 2023
  • Vessel traffic service(VTS) centers are equipped with RADAR, AIS(Automatic Identification System), weather sensors, and VHF(Very High Frequency). VTS operators use this equipment to observe the movement of ships operating in the VTS area and provide information. The VTS data generated by these various devices is highly valuable for analyzing maritime traffic situation. However, owing to a lack of compatibility between system manufacturers or policy issues, they are often not systematically managed. Therefore, we developed the VTS Bigdata Platform that could efficiently collect, store, and manage control data collected by the VTS, and this paper describes its design and implementation. A microservice architecture was applied to secure operational stability that was one of the important issues in the development of the platform. In addition, the performance of the platform could be improved by dualizing the storage for real-time navigation information. The implemented system was tested using real maritime data to check its performance, identify additional improvements, and consider its feasibility in a real VTS environment.

On the Parcel Loading System of Naive Bayes-LSTM Model Based Predictive Maintenance Platform for Operational Safety and Reliability (Naive Bayes-LSTM 기반 예지정비 플랫폼 적용을 통한 화물 상차 시스템의 운영 안전성 및 신뢰성 확보 연구)

  • Sunwoo Hwang;Jinoh Kim;Junwoo Choi;Youngmin Kim
    • Journal of the Korea Safety Management & Science
    • /
    • v.25 no.4
    • /
    • pp.141-151
    • /
    • 2023
  • Recently, due to the expansion of the logistics industry, demand for logistics automation equipment is increasing. The modern logistics industry is a high-tech industry that combines various technologies. In general, as various technologies are grafted, the complexity of the system increases, and the occurrence rate of defects and failures also increases. As such, it is time for a predictive maintenance model specialized for logistics automation equipment. In this paper, in order to secure the operational safety and reliability of the parcel loading system, a predictive maintenance platform was implemented based on the Naive Bayes-LSTM(Long Short Term Memory) model. The predictive maintenance platform presented in this paper works by collecting data and receiving data based on a RabbitMQ, loading data in an InMemory method using a Redis, and managing snapshot DB in real time. Also, in this paper, as a verification of the Naive Bayes-LSTM predictive maintenance platform, the function of measuring the time for data collection/storage/processing and determining outliers/normal values was confirmed. The predictive maintenance platform can contribute to securing reliability and safety by identifying potential failures and defects that may occur in the operation of the parcel loading system in the future.

An Experiment Study on Electric Vehicle Fire and Fire Response Procedures (전기차 화재 실험 및 대응방안에 관한 연구)

  • Ki-Hun Nam;Jun-Sik Lee
    • Journal of the Korean Society of Industry Convergence
    • /
    • v.27 no.1
    • /
    • pp.63-70
    • /
    • 2024
  • Lithium-ion batteries (LIB) are widely used in various sectors, such as transportation (e.g., electric vehicles (EV)) and energy (e.g., energy storage facilities) due to their high energy density, broad operating temperature (-20 ℃ ~ 60 ℃), and high capacities. LIBs are powerful but fragile on external factors, including pressure, physical damage, overheating, and overcharging, that cause thermal runaway causing fires and explosions. During a LIB fire, a large amount of oxygen is generated from the decomposition of ionogenic materials. A water fire extinguisher that helps with cooling and suffocating must be essentially required at the same time. In fact, however, it is difficult to suppress LIB fires in the case of EVs because a LIB is installed with a battery pack housing that interrupts direct extinguishing by water. Thus, this study aims to investigate effective fire extinguishing measurements for LIB fires by using an EV. Relevant documents, including research articles and reports, were reviewed to identify effective ways of LIBs fire extinguishing. A real-scale fire experiment generating thermal runaway was carried out to figure out the combustion characteristics of EVs. This study revealed that the most effective fire extinguishing measurements for LIB fires are applying fire blankets and water tanks. However, there is still a lack of adequate regulation and guidelines for LIB fire extinguishment. Taking this into account, developing functional fire extinguishment measurements and available regulatory instruments is an urgent issue to secure the safety of firefighters and citizens.

Performance Analysis and Comparison of Stream Ciphers for Secure Sensor Networks (안전한 센서 네트워크를 위한 스트림 암호의 성능 비교 분석)

  • Yun, Min;Na, Hyoung-Jun;Lee, Mun-Kyu;Park, Kun-Soo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.5
    • /
    • pp.3-16
    • /
    • 2008
  • A Wireless Sensor Network (WSN for short) is a wireless network consisting of distributed small devices which are called sensor nodes or motes. Recently, there has been an extensive research on WSN and also on its security. For secure storage and secure transmission of the sensed information, sensor nodes should be equipped with cryptographic algorithms. Moreover, these algorithms should be efficiently implemented since sensor nodes are highly resource-constrained devices. There are already some existing algorithms applicable to sensor nodes, including public key ciphers such as TinyECC and standard block ciphers such as AES. Stream ciphers, however, are still to be analyzed, since they were only recently standardized in the eSTREAM project. In this paper, we implement over the MicaZ platform nine software-based stream ciphers out of the ten in the second and final phases of the eSTREAM project, and we evaluate their performance. Especially, we apply several optimization techniques to six ciphers including SOSEMANUK, Salsa20 and Rabbit, which have survived after the final phase of the eSTREAM project. We also present the implementation results of hardware-oriented stream ciphers and AES-CFB fur reference. According to our experiment, the encryption speeds of these software-based stream ciphers are in the range of 31-406Kbps, thus most of these ciphers are fairly acceptable fur sensor nodes. In particular, the survivors, SOSEMANUK, Salsa20 and Rabbit, show the throughputs of 406Kbps, 176Kbps and 121Kbps using 70KB, 14KB and 22KB of ROM and 2811B, 799B and 755B of RAM, respectively. From the viewpoint of encryption speed, the performances of these ciphers are much better than that of the software-based AES, which shows the speed of 106Kbps.

Study on stability test of in process sample of recombinant Protein A (재조합 단백질 A 제조공정시료의 안정성실험에 관한 연구)

  • Kim, Yoo Gon;Lee, Woo Jong;Won, Chan Hee;Shin, Chul Soo
    • Analytical Science and Technology
    • /
    • v.25 no.6
    • /
    • pp.483-491
    • /
    • 2012
  • This study is to investigate the issues on how to secure stability during the purification process for the production of recombinant protein A. The final recombinant protein A is produced by passing through the cation exchange column (SP) and the anion-exchange column (Q) during the production process, for which the samples produced by the step-by-step processes can be exposed to trouble in securing stable storage in case the next process cannot be taken within the proper time period. Accordingly, this study aims to evaluate the proper storage conditions and length of time when storing samples produced in the production process. That is, in this study, how to store fair samples, how long the storage period should be set up, and how to evaluate the security of its quality depending on time are dealt with. The items to be experimented with were enodotoxin, SDS-PAGE, HPLC purity and concentration. Experimental results showed that after passing the cation exchange column, when stored at $4^{\circ}C$ or room temperature, SDS-PAGE showed a major band, endotoxin is 5.0 Eu/mg or less, and concentration is on average of 8.21 to 8.24 mg/mL and RSD% 0.10~0.62%. In addition, HLPC purity showed somewhat stable results; at the HPLC purity 214 nm, the average is 99.24% to 99.37% and RSD% is 0.22~0.29%, while the average is 89.72% to 89.80% and RSD% 0.62~1.26% at 280 nm. On the contrary, after passing the anion exchange column, when stored at $4^{\circ}C$ or room temperature, SDS-PAGE revealed the major band, endotoxin is 0.5 Eu/mg or less, and concentration is on average of 5.59 mg/mL and RSD% 0.03~0.10%. when it comes to HLPC purity, the result showed that at the HPLC purity 214 nm, the average is 99.74% and RSD% is 0.10~0.11%, while the average is 96.16% to 96.85% and RSD% 0.72~1.13%. In conclusion, the stability of fair samples of recombinant protein A during the manufacturing process could be obtained without substance decomposition for 7~8 days at $4^{\circ}C$ or 20~21 days at room temperature.