• 제목/요약/키워드: Secure Storage

검색결과 397건 처리시간 0.029초

저장온도 및 종자 처리가 봄파종 인삼 출아와 생장에 미치는 영향 (Effects of Storage Temperature and Seed Treatment on Emergence and Growth Properties of Panax ginseng at Spring-sowing)

  • 서수정;유진;장인복;문지원;이성우;장인배
    • 한국약용작물학회지
    • /
    • 제26권5호
    • /
    • pp.401-407
    • /
    • 2018
  • Background: In Korea, seeds of Panax ginseng C. A. Meyer need to be stored under cold temperature and high humidity condition for months to break physiological dormancy, making storage difficult until spring-sowing. This study was conducted to test the effects of seed storage conditions and seed treatment on the emergence of seedling after spring-sowing in a nursery greenhouse. Methods and Results: After dehiscence, endocarp dried seeds in mild or completely, and wet seeds were stored in $2^{\circ}C$ and $-3.5^{\circ}C$ during winter. Storage at $-3.5^{\circ}C$ resulted in a lower emergence rate (ER) than that at $2^{\circ}C$, and additional cold ($2^{\circ}C$) treatment before or after storage at $-3.5^{\circ}C$ increased the ER. Endocarp dehydration prevented pre-germination at $2^{\circ}C$ storage and increased the ER of seeds stored at $-3.5^{\circ}C$. ER was also dependent on the batch of seeds. However, seed treatments before sowing had only limited effects on ER. Root loss was the main reason for damping-off; prolonged cold storage of seeds increased damping-off, as the detection of pathogens was not high. Conclusions: This study showed that storage conditions such as temperature and moisture content of seeds, affect the ER after spring-sowing and vitality of seedlings, suggesting further attention on seed control for secure seedling stands after spring-sowing.

클라우드 스토리지에서의 중요데이터 보호 (Securing Sensitive Data in Cloud Storage)

  • 이셜리;이훈재
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2011년도 춘계학술발표대회
    • /
    • pp.871-874
    • /
    • 2011
  • The fast emerging of network technology and the high demand of computing resources have prompted many organizations to outsource their storage and computing needs. Cloud based storage services such as Microsoft's Azure and Amazon's S3 allow customers to store and retrieve any amount of data, at anytime from anywhere via internet. The scalable and dynamic of the cloud storage services help their customer to reduce IT administration and maintenance costs. No doubt, cloud based storage services brought a lot of benefits to its customer by significantly reducing cost through optimization increased operating and economic efficiencies. However without appropriate security and privacy solution in place, it could become major issues to the organization. As data get produced, transferred and stored at off premise and multi tenant cloud based storage, it becomes vulnerable to unauthorized disclosure and unauthorized modification. An attacker able to change or modify data while data inflight or when data is stored on disk, so it is very important to secure data during its entire life-cycle. The traditional cryptography primitives for the purpose of data security protection cannot be directly adopted due to user's lose control of data under off premises cloud server. Secondly cloud based storage is not just a third party data warehouse, the data stored in cloud are frequently update by the users and lastly cloud computing is running in a simultaneous, cooperated and distributed manner. In our proposed mechanism we protect the integrity, authentication and confidentiality of cloud based data with the encrypt- then-upload concept. We modified and applied proxy re-encryption protocol in our proposed scheme. The whole process does not reveal the clear data to any third party including the cloud provider at any stage, this helps to make sure only the authorized user who own corresponding token able to access the data as well as preventing data from being shared without any permission from data owner. Besides, preventing the cloud storage providers from unauthorized access and making illegal authorization to access the data, our scheme also protect the data integrity by using hash function.

On Identifying Operational Risk Factors and Establishing ALARP-Based Mitigation Measures using the Systems Engineering Process for Parcel Storage Devices Utilizing Active Loading Technology

  • Mi Rye Kim;Young Min Kim
    • 시스템엔지니어링학술지
    • /
    • 제19권2호
    • /
    • pp.59-73
    • /
    • 2023
  • Due to the steady growth of the online shopping market and contact-free consumption, the volume of parcels in South Korea continues to increase. However, there is a lack of manpower for delivery workers to handle the growing parcel volume, leading to frequent accidents related to delivery work. As a result, the government and local authorities strive to enhance last-mile logistics efficiency. As one of these measures, unmanned parcel storage lockers are installed and utilized to handle last-mile deliveries. However, the existing parcel storage involves the inconvenience of couriers having to put each parcel in each locker, and this is somewhat insufficient to relieve the workload of delivery workers. In this study, we propose parcel storage devices that use active loading technology to minimize the workload of delivery workers, extract operation risk factors to apply this system to actual sites, and establish risk reduction methods based on the ALARP concept. Through this study, we have laid the groundwork for improving the safety of the system by identifying and proposing mitigation measures for the risk factors associated with the proposed parcel storage devices utilizing active loading technology. When applied in practical settings in the future, this foundation will contribute to the development of a more efficient and secure system. By applying the ALARP concept, a systems engineering technique used in this research, to the development and maintenance of storage devices leveraging active loading technology, it is thought to make the development process more systematic and structured. Furthermore, through the risk management of the proposed system, it is anticipated that a systematic approach to quality management can be employed to minimize defects and provide a stable system. This is expected to be more useful than the existing unmanned parcel storage devices.

관개용 댐의 효율적 저수관리를 통한 밭 관개 용수 확보 (Security of Upland Irrigation Water through the Effective Storage Management of Irrigation Dams)

  • 이주용;김선주;김필식
    • 한국농공학회논문집
    • /
    • 제48권2호
    • /
    • pp.13-23
    • /
    • 2006
  • In Korea, upland irrigation generally depends on the ground water or natural rainfall since irrigation water supplied from dams is mainly used for paddy irrigation, and only limited amount of irrigation water is supplied to the upland area. For the stable security of upland irrigation water, storage level of irrigation dams was simulated by the periods. A year was divided into 4 periods considering the irrigation characteristics. Through the periodical management of storage level, water utilization efficiency in irrigation dams could be enhanced and it makes available to secure extra available water from existing dams without new development of water resources. Two study areas, Seongju and Donghwa dam, were selected for this study. Runoff from the watersheds was simulated by the modified tank model and the irrigation water to upland crops was calculated by the Penman-Monteith method. The analyzed results showed that relatively sufficient extra available water could be secured for the main upland crops in Seongju area. In case of Donghwa area, water supply to non-irrigated upland was possible in normal years but extra water was necessary in drought years such as 1998 and 2001.

클라우드 컴퓨팅에서 ECC 암호를 적용한 안전한 데이터 스토리지 스킴 (An Efficient and Secure Data Storage Scheme using ECC in Cloud Computing)

  • 은효춘;논 티라난;이훈재
    • 인터넷정보학회논문지
    • /
    • 제15권2호
    • /
    • pp.49-58
    • /
    • 2014
  • 인터넷의 빠른 발전과 더불어 클라우드 컴퓨팅 기술은 가장 기술개발이 시급한 분야가 되고 있다. 클라우드 컴퓨팅은 고객들이 인터넷을 통하여 가상 자원을 제공받게 되며, 가장 시급하게 해결해야할 문제 중의 하나로 클라우드 스토리지를 들 수 있다. 클라우드 컴퓨팅분야의 급격한 증가는 클라우드 스토리지에서 심각한 보안문제를 불러일으키고 있다. 본 논문에서는 인터넷을 통하여 안전하게 데이터를 저장할 수 있고 보안 접근통제가 가능하고 또한 안전하지 않은 인터넷을 통하여 안전하게 다중 사용자끼리 데이터를 공유할 수 있는 스킴을 제안한다. 데이터 스토리지 보안 스킴의 효율을 높이기 위하여 ECC 암호를 데이터 보호 및 인증과정에서 적용한다.

MA포장재 이용한 지역별 사과의 품질 안전성에 관한 연구 (A Study on the Quality Safety of Apples by Region Using MA Packaging Materials)

  • 홍상태
    • 대한안전경영과학회지
    • /
    • 제22권2호
    • /
    • pp.1-6
    • /
    • 2020
  • Apples are one of the most produced fruits in Korea, with 2,423,000 tons of fruits produced in Korea in 2018, of which 365,000 tons (MAF, 2018) account for about 15% of the total production. For quality safety after harvesting apples, the application of MA(modified atmosphere) packaging technology (Mostofi et. al., 2008) is being actively studied. In addition, the effects of functional packaging materials that have added functions such as fireproof, antibacterial, high-blocking, degradability, and far-infrared radiation have been studied (Chung et al., 2009). In addition, there are reports of the effects of quality changes (Park et al., 2007) and MA storage methods on the quality of apples by packing apples with functional MA films((Park et al., 2004). But there are only few reports on quality safety by analyzing the correlation between the change of reducing sugar and total sugar and preference during storage by packing Geochang, Yeongju, and Yesan apples in functional MA film. Therefore, this study aims to propose a method to secure the quality safety of apples by investigating the effect of sugar change on the preference of apples during storage by packing apples in three regions in functional MA films.

Systems to prevent the load resistance loss of pallet racks exposed to cyclic external force

  • Heo, Gwanghee;Kim, Chunggil;Baek, Eunrim;Jeon, Seunggon
    • Structural Engineering and Mechanics
    • /
    • 제83권6호
    • /
    • pp.745-756
    • /
    • 2022
  • This study aims to determine the cause of the load resistance loss in storage racks that can be attributed to external forces such as earthquakes and to improve safety by developing reinforcement systems that can prevent load resistance loss. To this end, a static cyclic loading test was performed on pallet racks commonly used in logistics warehouses. The test results indicated that a pallet rack exposed to an external force loses more than 50% of its load resistance owing to the damage caused to column-beam joints. Three reinforcement systems were developed for preventing load resistance loss in storage racks exposed to an external force and for performing differentiated target functions: column reinforcement device, seismic damper, and viscoelastic damper. Shake table testing was performed to evaluate the earthquake response and verify the performance of these reinforcement systems. The results confirmed that, the maximum displacement, which causes the loss of load resistance and the permanent deformation of racks under external force, is reduced using the developed reinforcement devices. Thus, the appropriate selection of the developed reinforcement devices by users can help secure the safety of the storage racks.

퍼스널 클라우드 환경에서 사용자 관리를 위한 보안 프레임워크의 설계 및 평가 (Design and Evaluation of Secure Framework for User Management in Personal Cloud Environments)

  • 진병욱;김종화;차시호;전문석
    • 디지털산업정보학회논문지
    • /
    • 제12권1호
    • /
    • pp.81-87
    • /
    • 2016
  • Cloud computing technologies are utilized and merged in various domains. Cloud computing technology-based personal cloud service technologies provide mobility and free access by using user centered storages and smart devices such like smart phones and table PCs. Therefore, we should overcome limits on the storage by solving the capacity problems of devices to provide security services in the personal cloud environments It can be addressable to provide the convenience of various security technologies. However, there are some security threats inherited from existing cloud environments and the possibilities of information leakage when devices are lost or stolen. Therefore, we designed a framework for providing secure cloud services by adding objects, such as user authorization, access tokens, set permissions by key generation, and key management assignments, for user management in personal cloud environments. We analyzed the stability of the proposed framework in terms of irreverent use and abuse, access to insiders, and data loss or leakage. And we evaluated the proposed framework in terms of the security with access control requirements in personal cloud environments.

Secure Authentication Approach Based New Mobility Management Schemes for Mobile Communication

  • Abdelkader, Ghazli;Naima, Hadj Said;Adda, Ali Pacha
    • Journal of Information Processing Systems
    • /
    • 제13권1호
    • /
    • pp.152-173
    • /
    • 2017
  • Mobile phones are the most common communication devices in history. For this reason, the number of mobile subscribers will increase dramatically in the future. Therefore, the determining the location of a mobile station will become more and more difficult. The mobile station must be authenticated to inform the network of its current location even when the user switches it on or when its location is changed. The most basic weakness in the GSM authentication protocol is the unilateral authentication process where the customer is verified by the system, yet the system is not confirmed by the customer. This creates numerous security issues, including powerlessness against man-in-the-middle attacks, vast bandwidth consumption between VLR and HLR, storage space overhead in VLR, and computation costs in VLR and HLR. In this paper, we propose a secure authentication mechanism based new mobility management method to improve the location management in the GSM network, which suffers from a lot off drawbacks, such as transmission cost and database overload. Numerical analysis is done for both conventional and modified versions and compared together. The numerical results show that our protocol scheme is more secure and that it reduces mobility management costs the most in the GSM network.

폐쇄망에서의 안전하고 효율적인 소프트웨어 패키지 관리 방안 (Secure and Efficient Package Management Techniques in Closed Networks)

  • 안건희;안상혁;임동균;정수환;김재우;신영주
    • 정보처리학회논문지:컴퓨터 및 통신 시스템
    • /
    • 제11권4호
    • /
    • pp.119-126
    • /
    • 2022
  • 본 연구는 폐쇄망에서 효율적이고 안전하게 패키지 관리 시스템을 사용하기 위해서 고려해야 할 할 중요 요소들과 그 방법론 들을 제시하는 것을 목적으로 한다. 관련 선행 연구의 분석을 통해 기존 패키지 관리에서 보안성을 위해 고려해야 할 사항들을 살펴보고, 이를 바탕으로 폐쇄망이라는 특수한 상황에서 고려해야 할 세부 방법들을 제안한다. 구체적으로, 새로운 패키지 관리 도구의 개발, 물리적 저장매체 활용, 로컬 백업 저장소 활용, 패키지 업데이트 및 다운그레이드 일괄 처리의 방법을 제안한다.