• Title/Summary/Keyword: Secure cloud

Search Result 283, Processing Time 0.023 seconds

A Study on Increasing Security Following Mutual Interaction and Integration of Dualized Security Category between Information Security and Personal Information Protection (정보보안과 개인정보보호 간의 이원화 보안범주의 상호연계 및 통합에 따른 보안성 증대에 대한 연구)

  • Seo, Woo-Seok
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.13 no.3
    • /
    • pp.601-608
    • /
    • 2018
  • While the legislation on the protection of personal information in public institutions was enacted and amended, the guidelines and laws on information security were focused, contracted and realized with focus on specific institutions. Mutual laws and guidelines have been applied and realized for the dual purpose of securing both the asset of macroscopic information and the asset of personally identification information, which are mutually different media information. However, in a bid to present the definition and direction of the fourth industrial revolution in 2017, a variety of products and solutions for security designed to ensure the best safety line of the 21st century, and the third technology with the comprehensive coverage for all these fields, a number of solutions and technologies, including IOT(: Internet of Things), ICT Internet of Things(: ICT), ICT Cloud, and AI (: Artificial Intelligence) are pouring into the security market as if plastic doll toys were manufactured in massive scale into the market. With the rising need for guaranteeing the interrelation for securities with dualistic physical, administrative, logical and psychological differences, that is, information security and personal information security that are classified into two main categories and for the enhanced security for integrated management and technical application, the study aims to acquire the optimal security by analyzing the interrelationship between the two cases and applying it to the study results.

Intercomparison between Temperature and Humidity Sensors of Radiosonde by Different Manufacturers in the ESSAY (Experiment on Snow Storms At Yeongdong) Campaign (대설관측실험(Experiment on Snow Storms At Yeongdong: ESSAY) 기간 중 두 제조사 라디오존데 기온과 습도 센서 상호 비교)

  • Seo, Won-Seok;Eun, Seung-Hee;Kim, Byung-Gon;Seong, Dae-Kyeong;Lee, Gyu-Min;Jeon, Hye-Rim;Choi, Byoung-Cheol;Ko, A-reum;Chang, Ki-Ho;Yang, Seung-Gu
    • Atmosphere
    • /
    • v.26 no.2
    • /
    • pp.347-356
    • /
    • 2016
  • Radiosonde is an observation equipment that measures pressure (geopotential height), temperature, relative humidity and wind by being launched up from the ground. Radiosonde data which serves as an important element of weather forecast and research often causes a bias in a model output due to accuracy and sensitivity between the different manufacturers. Although Korean Meteorological Administration (KMA) and several institutes have conducted routine and intensive radiosonde observations, very few studies have been done before on the characteristics of radiosonde performance. Analyzing radiosonde observation data without proper understanding of the unique nature of those sensors may lead to a significant bias in the analysis of results. To evaluate performance and reliability of radiosonde, we analyzed the differences between two sensors made by the different manufacturers, which have been used in the campaign of Experiment on Snow Storm At Yeongdong (ESSAY). We improved a couple of methods to launch the balloon being attached with the sensors. Further we examined cloud-layer impacts on temperature and humidity differences for the analysis of both sensors' performance among various weather conditions, and also compared daytime and nighttime profiles to understand temporal dependence of meteorological sensors. The overall results showed that there are small but consistent biases in both temperature and humidity between different manufactured sensors, which could eventually secure reliable precisions of both sensors, irrespective of accuracy. This study would contribute to an improved sounding of atmospheric vertical states through development and improvement of the meteorological sensors.

Verification of precipitation enhancement by weather modification experiments using radar data (레이더 자료를 이용한 기상조절 실험에 의한 강수 증가 검증 연구)

  • Ro, Yonghun;Cha, Joo-Wan;Chae, Sanghee
    • Journal of Korea Water Resources Association
    • /
    • v.53 no.11
    • /
    • pp.999-1013
    • /
    • 2020
  • Weather modification research has been actively performed worldwide, but a technology that can more quantitatively prove the research effects are needed. In this study, the seeding effect, the efficiency of precipitation enhancement in weather modification experiment, was verified using the radar data. Also, the effects of seeding material on hydrometeor change was analyzed. For this, radar data, weather conditions, and numerical simulation data for diffusion were applied. First, a method to analyze the seeding effect in three steps was proposed: before seeding, during seeding, and after seeding. The proposed method was applied to three cases of weather modification experiments conducted in Gangwon-do and the West Sea regions. As a result, when there is no natural precipitation, the radar reflectivity detected in the area where precipitation change is expected was determined as the seeding effect. When natural precipitation occurs, the seeding effect was determined by excluding the effect of natural precipitation from the maximum reflectivity detected. For the application results, it was found that the precipitation intensity increased by 0.1 mm/h through the seeding effect. In addition, it was confirmed that ice crystals, supercooled water droplets, and mixed-phase precipitation were distributed in the seeding cloud. The results of these weather modification research can be used to secure water resources as well as for future study of cloud physics.

Application of Terrestrial LiDAR to Monitor Unstable Blocks in Rock Slope (암반사면 위험블록 모니터링을 위한 지상 LiDAR의 활용)

  • Song, Young-Suk;Lee, Choon-Oh;Oh, Hyun-Joo;Pak, Jun-Hou
    • The Journal of Engineering Geology
    • /
    • v.29 no.3
    • /
    • pp.251-264
    • /
    • 2019
  • The displacement monitoring of unstable block at the rock slope located in the Cheonbuldong valley of Seoraksan National Park was carried out using Terrestrial LiDAR. The rock slopes around Guimyeonam and Oryeon waterfall where rockfall has occurred or is expected to occur are selected as the monitoring section. The displacement monitoring of unstable block at the rock slope in the selected area was performed 5 times for about 7 months using Terrestrial LiDAR. As a result of analyzing the displacement based on the Terrestrial LiDAR scanning, the error of displacement was highly influenced by the interpolation of the obstruction section and the difference of plants growth. To minimize the external influences causing the error, the displacement of unstable block should be detected at the real scanning point. As the result of analyzing the displacement of unstable rock at the rock slope using the Terrestrial LiDAR data, the amount of displacement was very small. Because the amount of displacement was less than the range of error, it was difficult to judge the actual displacement occurred. Meanwhile, it is important to select a section without vegetation to monitor the precise displacement of unstable rock at the rock slope using Terrestrial LiDAR. Also, the PointCloud removal and the mesh model analysis in a vegetation section were the most important work to secure reliability of data.

Georeferencing of GPR image data using HD map construction method (정밀 도로 지도 구축 방법을 이용한 GPR 영상 데이터 지오레퍼런싱)

  • Shin, Jinsoo;Won, Jonghyun;Lee, Seeyoung
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.39 no.6
    • /
    • pp.507-513
    • /
    • 2021
  • GPR (Ground Penetrating RADAR) is a sensor that inspects the pavement state of roads, sinkholes, and underground pipes. It is widely used in road management. MMS (Mobile Mapping System) creates a detailed and accurate road map of the road surface and its surroundings. If both types of data are built in the same area, it is efficient to construct both ground and underground spatial information at the same time. In addition, since it is possible to grasp the road and important facilities around the road, the location of underground pipelines, etc. without special technology, an intuitive understanding of the site is also possible, which is a useful tool in managing the road or facilities. However, overseas equipment to which this latest technology is applied is expensive and does not fit the domestic situation. LiDAR (Light Detection And Raging) and GNSS/INS (Global Navigation Satellite System / Inertial Navigation System) were synchronized in order to replace overseas developed equipment and to secure original technology to develop domestic equipment in the future, and GPR data was also synchronized to the same GNSS/INS. We developed software that performs georeferencing using the location and attitude information from GNSS/INS at the time of acquiring synchronized GPR data. The experiments were conducted on the road site by dividing the open sky and the non-open sky. The road and surrounding facilities on the ground could be easily checked through the 3D point cloud data acquired through LiDAR. Georeferenced GPR data could also be viewed with a 3D viewer along with point cloud data, and the location of underground facilities could be easily and quickly confirmed through GPR data.

Service Management Scheme using Security Identification Information adopt to Big Data Environment (빅데이터 환경에 적합한 보안 인식 정보를 이용한 서비스 관리 기법)

  • Jeong, Yoon-Su;Han, Kun-Hee
    • Journal of Digital Convergence
    • /
    • v.11 no.12
    • /
    • pp.393-399
    • /
    • 2013
  • Recently, the quantity and type of data that is being processed in cloud environment are varied. A method for easy access in different network in a heterogeneous environment of big data stored in the device is required. This paper propose security management method for smoothly access to big data in other network environment conjunction with attribute information between big data and user. The proposed method has a high level of safety even if user-generated random bit signal is modulated. The proposed method is sufficient to deliver any number of bits the user to share information used to secure recognition. Also, the security awareness information bit sequence generated by a third party to avoid unnecessary exposure value by passing a hash chain of the user anonymity is to be guaranteed to receive.

The Design and Implementation of an Emergency Video Call Integrated Management System based on VoIP (VoIP기반 승강기 비상 화상통화 통합 관리 시스템 설계 및 구현)

  • Kim, Woon-Yong;Kim, SoonGohn
    • Journal of the Korea Convergence Society
    • /
    • v.8 no.12
    • /
    • pp.93-99
    • /
    • 2017
  • The elevator system combines various convergence technologies with the development of ICT technology. Emergency call devices which are safety related devices is applied as an obligation of the elevator and those scope also varies. In this paper, we propose an integrated model that overcomes the limitations of existing voice emergency call devices and efficiently manages and manages video call based service structures in VoIP based on wired and wireless environments. This method effectively manages and operates various lift data and video records in the elevator between the manager, the server and the user. And also It is possible to secure the quality of video call in VoIP and cloud service environment and increase the reliability of safety management and enhance various service environment by creating an integrated structure utilizing various data and additional services in the elevator.

A Single Re-encryption key based Conditional Proxy Re-Encryption Scheme (조건값의 개수에 독립적인 조건부 프록시 재암호화 기법)

  • Son, Junggab;Oh, Heekuck;Kim, SangJin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.2
    • /
    • pp.147-155
    • /
    • 2013
  • Proxy re-encryption scheme has advantage where plaintext does not get exposed during re-encryption process. This scheme is popular for sharing server-saved data in case of cloud computing or mobile office that uses server to save data. Since previous proxy re-encryption schemes can use re-encryption key over and over again, it may abuse re-encryption. To solve this problem, conditional proxy re-encryption scheme was proposed. But, it is computationally expensive generate the same number of re-encryption key with the number of condition values. In this paper, we propose an efficient conditional proxy re-encryption scheme in terms of re-encryption key generation. The proposed scheme uses only encryption and decryption process. Therefore it has advantage to generate one re-encryption key for one person. The proposed scheme is secure against chosen-ciphertext attack.

Software Engineering Research Trends Meta Analyzing for Safety Software Development on IoT Environment (IoT 환경에서 안전한 소프트웨어 개발을 위한 소프트웨어공학 메타분석)

  • Kim, Yanghoon;Park, Wonhyung;Kim, Guk-boh
    • Convergence Security Journal
    • /
    • v.15 no.4
    • /
    • pp.11-18
    • /
    • 2015
  • The new environments arrive such as ICT convergence, cloud computing, and big data, etc., how to take advanta ge of the existing software engineering technologies has become an important key. In addition, the importance of re quirement analysis for secure software and design phase has been shown in the IoT environment While the existing studies have focused on the utilization of the technique applied to IoT environment, the studies for enhancing analys is and design, the prerequisite steps for safely appling these techniques to the site, have been insufficient. So, we tr y to organize research trends based on software engineering and analyze their relationship in this paper. In detail, w e classify the research trends of software engineering to perform research trends meta-analysis, and analyze an ann ual development by years. The flow of the major research is identified by analyzing the correlation of the key word s. We propose the strategies for enhancing the utilization of software engineering techniques to develop high-quality software in the IoT environment.

OTP-Based Dynamic Authentication Framework for Virtual Machine Migration (가상머신 마이그레이션을 위한 OTP 기반 동적인증 프레임워크)

  • Lee, Eun-Ji;Park, Choon-Sik;Kwak, Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.2
    • /
    • pp.315-327
    • /
    • 2017
  • Security threats such as unauthorized access and data tampering can occur during the virtual machine migration process. In particular, since virtual machine migration requires users to transfer important data and infrastructure information, it is relatively risky to other cloud services in case of security threats. For this reason, there is a need for dynamic authentication for virtual machine migration. Therefore, this paper proposes an OTP-based dynamic authentication framework to improve the vulnerabilities of the existing authentication mechanism for virtual machine migration. It consists of a virtual machine migration request module and an operation module. The request module includes an OTP-based user authentication process and a migration request process to a data center when a user requests a migration. The operation module includes a secure key exchange process between the data centers using SPEKE and a TOTP-based mutual authentication process between the data center and the physical server.