• 제목/요약/키워드: Secured data storage

검색결과 24건 처리시간 0.027초

DNA Based Cloud Storage Security Framework Using Fuzzy Decision Making Technique

  • Majumdar, Abhishek;Biswas, Arpita;Baishnab, Krishna Lal;Sood, Sandeep K.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제13권7호
    • /
    • pp.3794-3820
    • /
    • 2019
  • In recent years, a cloud environment with the ability to detect illegal behaviours along with a secured data storage capability is much needed. This study presents a cloud storage framework, wherein a 128-bit encryption key has been generated by combining deoxyribonucleic acid (DNA) cryptography and the Hill Cipher algorithm to make the framework unbreakable and ensure a better and secured distributed cloud storage environment. Moreover, the study proposes a DNA-based encryption technique, followed by a 256-bit secure socket layer (SSL) to secure data storage. The 256-bit SSL provides secured connections during data transmission. The data herein are classified based on different qualitative security parameters obtained using a specialized fuzzy-based classification technique. The model also has an additional advantage of being able to decide on selecting suitable storage servers from an existing pool of storage servers. A fuzzy-based technique for order of preference by similarity to ideal solution (TOPSIS) multi-criteria decision-making (MCDM) model has been employed for this, which can decide on the set of suitable storage servers on which the data must be stored and results in a reduction in execution time by keeping up the level of security to an improved grade.

클라우드 컴퓨팅에서 ECC 암호를 적용한 안전한 데이터 스토리지 스킴 (An Efficient and Secure Data Storage Scheme using ECC in Cloud Computing)

  • 은효춘;논 티라난;이훈재
    • 인터넷정보학회논문지
    • /
    • 제15권2호
    • /
    • pp.49-58
    • /
    • 2014
  • 인터넷의 빠른 발전과 더불어 클라우드 컴퓨팅 기술은 가장 기술개발이 시급한 분야가 되고 있다. 클라우드 컴퓨팅은 고객들이 인터넷을 통하여 가상 자원을 제공받게 되며, 가장 시급하게 해결해야할 문제 중의 하나로 클라우드 스토리지를 들 수 있다. 클라우드 컴퓨팅분야의 급격한 증가는 클라우드 스토리지에서 심각한 보안문제를 불러일으키고 있다. 본 논문에서는 인터넷을 통하여 안전하게 데이터를 저장할 수 있고 보안 접근통제가 가능하고 또한 안전하지 않은 인터넷을 통하여 안전하게 다중 사용자끼리 데이터를 공유할 수 있는 스킴을 제안한다. 데이터 스토리지 보안 스킴의 효율을 높이기 위하여 ECC 암호를 데이터 보호 및 인증과정에서 적용한다.

Blockchain-based Data Storage Security Architecture for e-Health Care Systems: A Case of Government of Tanzania Hospital Management Information System

  • Mnyawi, Richard;Kombe, Cleverence;Sam, Anael;Nyambo, Devotha
    • International Journal of Computer Science & Network Security
    • /
    • 제22권3호
    • /
    • pp.364-374
    • /
    • 2022
  • Health information systems (HIS) are facing security challenges on data privacy and confidentiality. These challenges are based on centralized system architecture creating a target for malicious attacks. Blockchain technology has emerged as a trending technology with the potential to improve data security. Despite the effectiveness of this technology, still HIS are suffering from a lack of data privacy and confidentiality. This paper presents a blockchain-based data storage security architecture integrated with an e-Health care system to improve its security. The study employed a qualitative research method where data were collected using interviews and document analysis. Execute-order-validate Fabric's storage security architecture was implemented through private data collection, which is the combination of the actual private data stored in a private state, and a hash of that private data to guarantee data privacy. The key findings of this research show that data privacy and confidentiality are attained through a private data policy. Network peers are decentralized with blockchain only for hash storage to avoid storage challenges. Cost-effectiveness is achieved through data storage within a database of a Hyperledger Fabric. The overall performance of Fabric is higher than Ethereum. Ethereum's low performance is due to its execute-validate architecture which has high computation power with transaction inconsistencies. E-Health care system administrators should be trained and engaged with blockchain architectural designs for health data storage security. Health policymakers should be aware of blockchain technology and make use of the findings. The scientific contribution of this study is based on; cost-effectiveness of secured data storage, the use of hashes of network data stored in each node, and low energy consumption of Fabric leading to high performance.

문화재 보존을 위한 박물관 수장고의 공간계획 지침 연구 (A Study on the Design Guidelines of a Storage for Conservation of Relics in a Museum)

  • 정성욱
    • 한국실내디자인학회논문집
    • /
    • 제15권3호
    • /
    • pp.144-154
    • /
    • 2006
  • Except the time when relics of a museum are exhibited or loaned to the public, they are stored in a storage. In addition, it is common view that collections are exhibited a few of total stored collections in a museum. Therefore, the environmental condition of a storage is an important factor. Hereby, the purpose of this study is to suggest the design guidelines of a storage for conservation of relics in a museum. The results from this study are as follows briefly. First, location of storages has to be located and centralized above ground against preservation environment and additional renovation. Second, for storage size, It is reasonable to secure long-term experimental data after planning about 20% of whole section in present domestic situation. Third, in order to prevent environmental deterioration due to short storage floor space, adequate storage height has to be secured against a mezzanine deck and spare storages need to be planned. Where a mezzanine deck is designed, detailed plans have to be supported for equal micro climate in a storage. Fourth, in respect of environmental control of storages, finish materials with adjustment ability on relative humidity have to be used after the system is installed jointly direct and indirect way by air chamber, considering domestic condition for management of intermittent ventilation.

Design and Structural Safety Evaluation of the High Burn-up PWR Spent Nuclear Fuel for Storage Cask

  • Taehyung Na;Youngoh Lee;Yeji Kim;Donghee Lee;Taehyeon Kim;Kiyoung Kim;Yongdeog Kim
    • 방사성폐기물학회지
    • /
    • 제22권2호
    • /
    • pp.201-210
    • /
    • 2024
  • Because most spent nuclear fuel storage casks have been designed for low burnup fuel, a safety-significant high burnup dry storage cask must be developed for nuclear facilities in Korea to store the increasing high burnup and damaged fuels. More than 20% of fuels generated by PWRs comprise high burnup fuels. This study conducted a structural safety evaluation of the preliminary designs for a high burnup storage cask with 21 spent nuclear fuels and evaluated feasible loading conditions under normal, off-normal, and accident conditions. Two types of metal and concrete storage casks were used in the evaluation. Structural integrity was assessed by comparing load combinations and stress intensity limits under each condition. Evaluation results showed that the storage cask had secured structural integrity as it satisfied the stress intensity limit under normal, off-normal, and accident conditions. These results can be used as baseline data for the detailed design of high burnup storage casks.

반발경도법을 이용한 LNG 저장탱크 콘크리트의 압축강도 추정식 개발 (The Development of Compressive Strength Estimation Equation for LNG Storage Tank using Rebound Hardness Method)

  • 김정훈;김영구;조영도
    • 한국가스학회지
    • /
    • 제21권3호
    • /
    • pp.26-32
    • /
    • 2017
  • LNG 저장탱크의 외조 콘크리트는 방호벽 기능을 하는 프리스트레스 콘크리트 구조물이다. 콘크리트 구조물이 열화가 되어 안전성이 확보되지 않는 경우 구조물 붕괴 등의 위험성이 존재하게 된다. 정밀안전진단시 비파괴검사로 반발경도 및 초음파 속도 측정을 통해 구조물의 안전성과 직접적으로 관련되어 있는 콘크리트 압축강도를 추정식으로 예측할 수 있다. 그러나, LNG 저장탱크는 비파괴검사 데이터와 실제 압축강도에 대한 추정식이 부재하다. 이 연구는 LNG 저장탱크에 대해 보다 정확한 실제 강도를 측정하기 위해 Pilot LNG 저장탱크벽체로부터 코어를 채취하였다. 코어를 채취하기 전 해당위치에 일반적인 비파괴시험 방법인 반발경도 검사를 4개의 다른 영역에 각 3군데 위치에서 이루어졌다. 채취한 콘크리트 코어에 대해 압축강도 시험결과의 실제 압축강도 데이터와 반발경도 데이터를 이용하여 LNG 저장탱크의 압축강도 추정식을 개발하였다.

신뢰할 수 없는 DRM 클라이언트 시스템 하에서 키 보호를 위한 Secure Storage Device의 연구 (A Study on the Secure Storage Device for Protecting Cryptographic Keys in Untrusted DRM Client Systems)

  • 이기정;권태경;황성운;윤기송
    • 정보보호학회논문지
    • /
    • 제14권2호
    • /
    • pp.3-13
    • /
    • 2004
  • DRM (Digital Rights Management)$^{(1)(2)}$ 은 디지털 컨텐츠의 불법 사용방지를 위한 기술로서 인터넷과 같은 전송 매체를 통해 디지털 컨텐츠가 배포될 때 DRM의 복제 방지 기능을 사용해서 디지털 컨텐츠의 안전한 배포 및 판매를 촉진시키기 위한 기술이다. 이러한 DRM 환경 하에서 디지털 컨텐츠 저작권자의 가장 큰 요구 사항인 저작권 보호와 컨텐츠 보호를 위한 핵심 기능을 수행하는 DRM Client 시스템은 신뢰할 수 없는 사용자 환경에 설치되어 향후 배포되는 디지털 컨텐츠들에 대한 착인 및 플레이(실행)를 지속적으로 처리하게 되며, 이러한 처리 과정 중에 DRM Client 시스템은 사용자에 대한 인증이나 암호화된 디지털 컨텐츠 데이터의 복호화 및 디지털 컨텐츠 사용규칙을 명시한 라이센스에 관한 데이터를 처리하며 이러한 데이터는 사용자가 접근 못하도록 안전하게 보호되어야 한다. 본 논문은 이러한 사용자 인증키, 암호키, 라이센스 데이터를 DRM Client 시스템 하에서 안전하게 보호할 수 있는 Secure Storage Device (SSD)를 구현하여 소개하는데 그 목적이 있다.

비대칭 형상을 갖는 슬림형 듀얼 렌즈 액추에이터의 개선 (Improvement of Asymmetric Dual Lens Actuator with slim thickness)

  • 우정현;임재경;윤준호;박노철;박영필;박경수
    • 정보저장시스템학회논문집
    • /
    • 제7권1호
    • /
    • pp.13-18
    • /
    • 2011
  • As a standard of optical disk drive (ODD) was determined to Blu-ray diks (BD), researches for securing slim drive thickness, high data transfer rate and high capacity have been progressed. The actuator for applying BD is also required to have high performances, such as compatibility, slim thickness and 3-axis motion. In this paper, an asymmetric dual lens actuator is proposed to satisfy abovementioned performances. To design the actuator in a limited space, stress analysis and design of experiment (DOE) are performed to reduce weight of moving part and increase driving force and flexible mode frequency. Consequently, the final model, which is satisfied with specifications, is secured.

Selective Encryption Algorithm for Vector Map using Geometric Objects in Frequency Domain

  • Pham, Ngoc-Giao;Kwon, Ki-Ryong;Lee, Suk-Hwan;Woo, Chong-Ho
    • 한국멀티미디어학회논문지
    • /
    • 제20권8호
    • /
    • pp.1312-1320
    • /
    • 2017
  • Recently, vector map data is developed and used in many domains widely. In the most cases, vector map data contains confidential information which must be kept away from unauthorized users. Moreover, the production process of vector maps is considerably complex and consumes a lot of money and human resources. Therefore, the secured storage and transmission are necessary to prevent the illegal copying and distribution from hacker. This paper presents a selective encryption algorithm using geometric objects in frequency domain for vector map data. In the proposed algorithm, polyline and polygon data in vector map is the target of the selective encryption process. Experimental results verified that proposed algorithm is effectively and adaptive the requirements of security.

Fusion of Blockchain-IoT network to improve supply chain traceability using Ethermint Smart chain: A Review

  • George, Geethu Mary;Jayashree, LS
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제16권11호
    • /
    • pp.3694-3722
    • /
    • 2022
  • In today's globalized world, there is no transparency in exchanging data and information between producers and consumers. However, these tasks experience many challenges, such as administrative barriers, confidential data leakage, and extensive time delays. To overcome these challenges, we propose a decentralized, secured, and verified smart chain framework using Ethereum Smart Contract which employs Inter Planetary File Systems (IPFS) and MongoDB as storage systems to automate the process and exchange information into blocks using the Tendermint algorithm. The proposed work promotes complete traceability of the product, ensures data integrity and transparency in addition to providing security to their personal information using the Lelantos mode of shipping. The Tendermint algorithm helps to speed up the process of validating and authenticating the transaction quickly. More so in this time of pandemic, it is easier to meet the needs of customers through the Ethermint Smart Chain, which increases customer satisfaction, thus boosting their confidence. Moreover, Smart contracts help to exploit more international transaction services and provide an instant block time finality of around 5 sec using Ethermint. The paper concludes with a description of product storage and distribution adopting the Ethermint technique. The proposed system was executed based on the Ethereum-Tendermint Smart chain. Experiments were conducted on variable block sizes and the number of transactions. The experimental results indicate that the proposed system seems to perform better than existing blockchain-based systems. Two configuration files were used, the first one was to describe the storage part, including its topology. The second one was a modified file to include the test rounds that Caliper should execute, including the running time and the workload content. Our findings indicate this is a promising technology for food supply chain storage and distribution.