• Title/Summary/Keyword: Secure cloud

Search Result 283, Processing Time 0.028 seconds

A Study on Secure Data Sharing Method for Cloud Storage Structure (클라우드 스토리지 구조를 고려한 안전한 데이터 공유 방법에 대한 연구)

  • Lee, Sun-Ho;Lee, Im-Yeong
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2012.11a
    • /
    • pp.984-986
    • /
    • 2012
  • 디지털 정보량의 증가 추세에 맞추어 네트워크를 통해 자신의 데이터를 원격 저장소에 저장하고, 이를 다양한 디바이스를 통해 언제 어디서나 접근할 수 있는 클라우드스토리지 서비스가 등장하게 되었다. 이는 기존에 데이터를 휴대하기 위해 사용되던 이동식 저장매체와 달리 저장용량의 크기 제한이 없고, 저장매체를 소지해야 하는 문제점이 없어 많은 사용자로부터 사용되고 있다. 이러한 클라우드 스토리지에 여러 사용자의 데이터가 저장됨에 따라 클라우드 스토리지의 신뢰성 문제가 이슈화 되고 있다. 비윤리적인 관리자 및 공격자로부터 클라우드에 저장된 데이터를 안전하게 보호하기 위해 다양한 암호 기술을 클라우드 스토리지에 적용하려는 연구가 진행되고 있다. 하지만 기존의 검색가능 암호기술은 사용자가 저장하고자 하는 데이터를 직접 업로드하고, 해당 자료를 필요에 따라 공유 하고, 공유대상이 변화되는 클라우드 스토리지 환경에서 비효율성을 가지고 있어 실제 서비스에 적용하기 힘든 단점을 가지고 있다. 따라서 본 논문에서는 클라우드 컴퓨팅 환경을 고려하여 검색 가능한 암호화 색인 생성 및 이를 재암호화해 다른 사용자와 안전하게 공유할 수 있는 색인 관리 기법을 제안한다.

User Authentication Mechanism based on Authentication Information using One-time Sessions (일회용 세션을 활용한 인증정보 기반의 사용자 인증 방안)

  • Park, Yeong Su;Lee, Byoung Yup
    • The Journal of the Korea Contents Association
    • /
    • v.19 no.7
    • /
    • pp.421-426
    • /
    • 2019
  • Nowadays, various type of technologies are used for user authentication, such as knowledge based(ID/PW, etc.) authentication, biometric based(Iris/fingerprint/vein recognition) authentication, ownership based(OTP, security card, etc.) authentication. ID/PW authentication technology, a knowledge based authentication, despite the advantages of low in implementation and maintenance costs and being familiar to users, there are disadvantages of vulnerable to hacking attacks, Other authentication methods solve the vulnerability in ID/PW authentication technology, but they have high initial investment cost and maintenance cost and troublesome problem of reissuance. In this paper, we proposed to improve security and convenience over existing ID/PW based authentication technology, and to secure user authentication without restriction on the devices used for authentication.

A VPC-based SaaS Framework for Secure Collaboration (안전한 협업을 위한 VPC 기반 SaaS 프레임워크)

  • Lee, Jaekyung;Son, Junggab;Eun, Hasoo;Oh, Heekuck
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2013.11a
    • /
    • pp.849-852
    • /
    • 2013
  • 클라우드 컴퓨팅은 인터넷 기술을 기반으로 하드웨어, 소프트웨어 등의 가상화된 컴퓨팅 자원을 제공하는 기술로 제공되는 서비스의 수준에 따라 IaaS(Infrastructure as a Service), PaaS(Platform as a Service), SaaS(Software as a Service), 세 가지 유형으로 분류된다. 최근에는 기업이나 조직에서 이들 유형 중 SaaS 도입에 대한 관심이 증가하고 있다. 이는 SaaS를 이용하면 기업이나 조직 간의 협업 시스템을 구축하기가 쉬워 업무 효율을 증진시킬 수 있기 때문이다. 하지만 SaaS는 서비스 제공자가 접근 권한을 가지고 있기 때문에 문서에 포함된 정보가 노출될 가능성이 있다. 이러한 문제를 해결하기 위해 본 논문에서는 VPC(Virtual Private Cloud)를 기반으로 하는 SaaS 프레임워크를 제안한다. 제안하는 프레임워크는 VPC 내부에서 SaaS를 운영하기 때문에 서비스 제공자의 개입을 최소화할 수 있으며, 독자적인 인증 관리 시스템과 모니터링 기능을 두어 SaaS에 대한 모든 접근을 관리할 수 있다.

Sharing and Privacy in PHRs: Efficient Policy Hiding and Update Attribute-based Encryption

  • Liu, Zhenhua;Ji, Jiaqi;Yin, Fangfang;Wang, Baocang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.1
    • /
    • pp.323-342
    • /
    • 2021
  • Personal health records (PHRs) is an electronic medical system that enables patients to acquire, manage and share their health data. Nevertheless, data confidentiality and user privacy in PHRs have not been handled completely. As a fine-grained access control over health data, ciphertext-policy attribute-based encryption (CP-ABE) has an ability to guarantee data confidentiality. However, existing CP-ABE solutions for PHRs are facing some new challenges in access control, such as policy privacy disclosure and dynamic policy update. In terms of addressing these problems, we propose a privacy protection and dynamic share system (PPADS) based on CP-ABE for PHRs, which supports full policy hiding and flexible access control. In the system, attribute information of access policy is fully hidden by attribute bloom filter. Moreover, data user produces a transforming key for the PHRs Cloud to change access policy dynamically. Furthermore, relied on security analysis, PPADS is selectively secure under standard model. Finally, the performance comparisons and simulation results demonstrate that PPADS is suitable for PHRs.

Safe clinical photography: best practice guidelines for risk management and mitigation

  • Chandawarkar, Rajiv;Nadkarni, Prakash
    • Archives of Plastic Surgery
    • /
    • v.48 no.3
    • /
    • pp.295-304
    • /
    • 2021
  • Clinical photography is an essential component of patient care in plastic surgery. The use of unsecured smartphone cameras, digital cameras, social media, instant messaging, and commercially available cloud-based storage devices threatens patients' data safety. This paper Identifies potential risks of clinical photography and heightens awareness of safe clinical photography. Specifically, we evaluated existing risk-mitigation strategies globally, comparing them to industry standards in similar settings, and formulated a framework for developing a risk-mitigation plan for avoiding data breaches by identifying the safest methods of picture taking, transfer to storage, retrieval, and use, both within and outside the organization. Since threats evolve constantly, the framework must evolve too. Based on a literature search of both PubMed and the web (via Google) with key phrases and child terms (for PubMed), the risks and consequences of data breaches in individual processes in clinical photography are identified. Current clinical-photography practices are described. Lastly, we evaluate current risk mitigation strategies for clinical photography by examining guidelines from professional organizations, governmental agencies, and non-healthcare industries. Combining lessons learned from the steps above into a comprehensive framework that could contribute to national/international guidelines on safe clinical photography, we provide recommendations for best practice guidelines. It is imperative that best practice guidelines for the simple, safe, and secure capture, transfer, storage, and retrieval of clinical photographs be co-developed through cooperative efforts between providers, hospital administrators, clinical informaticians, IT governance structures, and national professional organizations. This would significantly safeguard patient data security and provide the privacy that patients deserve and expect.

MECHA: Multithreaded and Efficient Cryptographic Hardware Access (MECHA: 다중 스레드 및 효율적인 암호화 하드웨어 액세스)

  • Pratama Derry;Laksmono Agus Mahardika Ari;Iqbal Muhammad;Howon Kim
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2023.05a
    • /
    • pp.339-341
    • /
    • 2023
  • This paper presents a multithread and efficient cryptographic hardware access (MECHA) for efficient and fast cryptographic operations that eliminates the need for context switching. Utilizing a UNIX domain socket, MECHA manages multiple requests from multiple applications simultaneously, resulting in faster processing and improved efficiency. We comprise several key components, including the Server thread, Client thread, Transceiver thread, and a pair of Sender and Receiver queues. MECHA design is portable and can be used with any communication protocol, with experimental results demonstrating a 83% increase in the speed of concurrent cryptographic requests compared to conventional interface design. MECHA architecture has significant potential in the field of secure communication applications ranging from cloud computing to the IoT, offering a faster and more efficient solution for managing multiple cryptographic operation requests concurrently.

Proposal an Alternative Data Pipeline to Secure the Timeliness for Official Statistical Indicators (공식발표 통계지표의 적시성 확보를 위한 대안 데이터 파이프라인 구축제안)

  • Yongbok Cho;Dowan Kim
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.28 no.5
    • /
    • pp.89-108
    • /
    • 2023
  • This study provides a comprehensive analysis of recent studies conducted on the topic of nowcasting in order to enhance the accuracy and promptness of official statistical data. Furthermore, we propose an alternative approach involving the utilization of real-time data and its corresponding collection methods to effectively operate a real-time nowcasting model capable of accurately capturing the current economic condition. We explore high-frequency real-time data that can predict economic indicators in both the public and private sectors and propose a pipeline for data collection processing and modeling that is based on cloud platforms. Furthermore we validate the essential elements required for the implementation of real-time nowcasting, as well as their data management protocols to ensure the reliability and consistency needed for accurate forecasting of official statistical indicators.

A Study on Localization Technique Using Extended Kalman Filter for Model-Scale Autonomous Marine Mobility (모형 스케일 자율운항 해양 이동체의 확장칼만필터 기반 측위 기법에 관한 연구)

  • Youngjun You
    • Journal of the Society of Naval Architects of Korea
    • /
    • v.61 no.2
    • /
    • pp.98-105
    • /
    • 2024
  • Due to the low accuracy of measured data obtained from low-cost GNSS and IMU devices, it was hard to secure the required accuracy of the measured position and heading angle for autonomous navigation which was conducted by a model-scale marine mobility. In this paper, a localization technique using the Extended Kalman Filter (EKF) is proposed for coping with the issue. First of all, a position and heading angle estimator is developed using EKF with the assumption of a point mass model. Second, the measured data from GNSS and IMU, including position, heading angle, and velocity are used for the estimator. In addition, the heading angle is additionally obtained by comparing the LiDAR point cloud with map information for a temporal water tank. The newly acquired heading angle is integrated into the estimator as an additional measurement to correct the inaccuracy in the heading angle measured from the IMU. The effectiveness of the proposed approach is investigated using data acquired from preliminary tests of the model-scale autonomous marine mobility.

A Study on the Strengthening of Smart Factory Security in OT (Operational Technology) Environment (OT(Operational Technology) 환경에서 스마트팩토리 보안 강화 방안에 관한 연구)

  • Young Ho Kim;Kwang-Kyu Seo
    • Journal of the Semiconductor & Display Technology
    • /
    • v.23 no.2
    • /
    • pp.123-128
    • /
    • 2024
  • Major countries are trying to expand the construction of smart factories by introducing ICT such as the Internet of Things, cloud, and big data into the manufacturing sector to secure national-level manufacturing competitiveness in the era of the 4th industrial revolution. In addition, Germany is pushing for Industry 4.0 to build a fully automatic production system through the Internet of Things, and China is pushing for the expansion of smart factories to enhance the country's industrial competitiveness through Made in China 2025, Japan's intelligent manufacturing system, and the Korean government's manufacturing innovation 3.0. In this study, considering the increasing security connectivity of smart factories, we would like to identify security threats in the external connection part of smart factories and suggest security enhancement measures based on domestic and international standard security models to respond to the identified security threats. Eventually the proposed method can be applied by accurately identifying the smart factory security status, diagnosing vulnerabilities, establishing appropriate improvement plans, and expanding security strategies to respond to security threats.

  • PDF

kNN Query Processing Algorithm based on the Encrypted Index for Hiding Data Access Patterns (데이터 접근 패턴 은닉을 지원하는 암호화 인덱스 기반 kNN 질의처리 알고리즘)

  • Kim, Hyeong-Il;Kim, Hyeong-Jin;Shin, Youngsung;Chang, Jae-woo
    • Journal of KIISE
    • /
    • v.43 no.12
    • /
    • pp.1437-1457
    • /
    • 2016
  • In outsourced databases, the cloud provides an authorized user with querying services on the outsourced database. However, sensitive data, such as financial or medical records, should be encrypted before being outsourced to the cloud. Meanwhile, k-Nearest Neighbor (kNN) query is the typical query type which is widely used in many fields and the result of the kNN query is closely related to the interest and preference of the user. Therefore, studies on secure kNN query processing algorithms that preserve both the data privacy and the query privacy have been proposed. However, existing algorithms either suffer from high computation cost or leak data access patterns because retrieved index nodes and query results are disclosed. To solve these problems, in this paper we propose a new kNN query processing algorithm on the encrypted database. Our algorithm preserves both data privacy and query privacy. It also hides data access patterns while supporting efficient query processing. To achieve this, we devise an encrypted index search scheme which can perform data filtering without revealing data access patterns. Through the performance analysis, we verify that our proposed algorithm shows better performance than the existing algorithms in terms of query processing times.