• Title/Summary/Keyword: Security Environment Contents

Search Result 210, Processing Time 0.025 seconds

User Authentication and Key Distribution on Open IPTV System (개방형 IPTV 환경에서의 사용자 인증 및 키 분배 메커니즘)

  • Jung, Ji-Yeon;Doh, In-Shil;Chae, Ki-Joon
    • The KIPS Transactions:PartC
    • /
    • v.18C no.4
    • /
    • pp.227-236
    • /
    • 2011
  • IPTV(Internet Protocol Television) is one of the typical businesses which are the convergence of Broadcast and Communication. It provides broadcasting service using IP networks. Recently, IPTV service is developed to Mobile IPTV or Open IPTV. Especially, Open IPTV uses open platform so not only service providers but also general users can provide contents to other users. Open IPTV system has many content providers, so existing security solution of IPTV cannot be adopted. In this paper, we suggest user authentication and key distribution mechanism on Open IPTV. Our proposed mechanism is based on Kerberos, so it can support distribution environment such as Open IPTV. We demonstrate that proposed mechanism can guarantee secure transmission of contents and reduce the delay of user authentication on Open IPTV system compared to other authentication mechanisms. We also compare our proposal and other mechanisms in various aspects, and analyze efficiency and safety of proposed mechanism. As a result, we insist that this mechanism satisfies the security requirements for IPTV.

A Study on Integrity Protection of Edge Computing Application Based on Container Technology (컨테이너 기술을 활용한 엣지 컴퓨팅 환경 어플리케이션 무결성 보호에 대한 연구)

  • Lee, Changhoon;Shin, Youngjoo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.6
    • /
    • pp.1205-1214
    • /
    • 2021
  • Edge Computing is used as a solution to the cost problem and transmission delay problem caused by network bandwidth consumption that occurs when IoT/CPS devices are integrated into the cloud by performing artificial intelligence (AI) in an environment close to the data source. Since edge computing runs on devices that provide high-performance computation and network connectivity located in the real world, it is necessary to consider application integrity so that it is not exploited by cyber terrorism that can cause human and material damage. In this paper, we propose a technique to protect the integrity of edge computing applications implemented in a script language that is vulnerable to tampering, such as Python, which is used for implementing artificial intelligence, as container images and then digitally signed. The proposed method is based on the integrity protection technology (Docker Contents Trust) provided by the open source container technology. The Docker Client was modified and used to utilize the whitelist for container signature information so that only containers allowed on edge computing devices can be operated.

Real Time Watermark Embedding/Detecting System for HDTV

  • Hahm Sang Jin;Lee KeunSik;Park KenuSoo
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2004.11a
    • /
    • pp.285-288
    • /
    • 2004
  • High-quality digital broadcasting contents are susceptible to illegal copy and unauthorized redistribution, which makes broadcasters difficult to protect valuable media assets. So, broadcasters and content providers need the technology for copyright protection of professional digital content. Digital watermarking technology is one of the most actively developed solutions for the copyright protection. This paper suggests the requirements of watermarking technology in DTV(Digital TV) environment for copyright protection and shows the developed real-time watermark embedding/detecting system for HD(High Definition)/SD(Standard Definition) video and experimental results of the system against watermark attack tests. Our watermarking system meets the watermarking requirements of invisibility, robustness and security of DTV environment.

  • PDF

An Empirical Study on the Flow Experience Affected by Characteristics of Mobile Internet (모바일 인터넷 특성이 플로우 경험에 미치는 영향에 관한 연구)

  • Yoo, Sang-Jin;Choi, Eun-Bin;Kim, Hyo-Jung
    • Information Systems Review
    • /
    • v.8 no.1
    • /
    • pp.125-139
    • /
    • 2006
  • Recently, as mobile internet users grow rapidly, mobile internet companies are experiencing a fierce competition to capture new customers. Under this business environment, they try to identify factors that make people use mobile internet in order to satisfy customers by providing better and diversified services. There has been enormous effort to analyze customers' behavior in choose and use mobile internet services. However, there is no one best methodology to identify factors to attract customers yet. Thus, the study applied the flow construct proposed by Csikszentmihalyi(1977) and expanded by Hoffman and Novak(1996) to identify environmental factors of internet which has impact on users' mobile internet usage. To implement the study, the following activities have been done: literature reviews on service acceptance model and flow structure, questionnaire survey, suggestion of the flow model on mobile internet, and hypothesis test. For the study, 242 out of 307 samples collected were statistically analyzed using SPSS 10.0, AMOS 4.0 statistics package. The findings of this study are as follows: First, mobile internet environment factors influencing on challenge of flow antecedent were media characteristics(use of convenience, transmission quality), contents characteristics(uniqueness, timeliness, simplicity). Second, mobile internet environment factors influencing on skill of flow antecedent were contents(uniqueness, timeliness, simplicity), charge(definiteness and diversity of charge), usage(security, instant connectivity). Third, challenge of flow antecedent had a significant effect on flow of mobile internet usage. But it was not statistically significant that skill has an influence on flow. This study discovered the relationship between mobile internet environment factors(media characteristics, contents characteristics, charge characteristics, usage characteristics) and flow experience of mobile internet users which would be a valuable insight for marketing strategies. Results shows that challenge of flow antecedent have a significant impact on flow experience in mobile internet environment. Additional, media characteristics, contents characteristics of mobile internet environment factors is positively correlated with challenge of flow antecedent. In other words, mobile internet companies should provide customers with diverse service and take a challenging attitude to get customers show aggressive attitude in mobile internet usage.

Study on Education Content Delivery System in Hybrid P2P based Computing Environment (혼합형 P2P 기반 컴퓨팅환경에서의 교육 컨텐츠 전송 시스템에 대한 연구)

  • Kim, Jin-Il
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.2
    • /
    • pp.658-661
    • /
    • 2005
  • Internet-based client/server architecture of Contents Delivery System suffers from frequent disconnections and security treats caused by dependency of the server or overload. But, We reached the limit to the increase of the server because a contents quality enhance and Internet user explosively increase. Therefore, a P2P based computing methods are used for sloving these issues. In this paper, We implement and design the Education Content Delivery System for cyber education system using idle Computing Power in P2P computing to share computing resources. We implement not only Internet infrastructure but also satellite infrastructure system, and designed to transfer real-time or non real-time contents.

  • PDF

The Design of a Multimedia Data Management and Monitoring System for Digital Rights Protection using License Agent (라이선스 에이전트를 이용한 디지털 저작권 보호를 위한 멀티미디어 데이터 관리 및 감시 시스템의 설계)

  • Park, Jae-Pyo;Lee, Kwang-Hyung;Kim, Won;Jeon, Moon-Seok
    • Journal of the Korea Computer Industry Society
    • /
    • v.5 no.2
    • /
    • pp.281-292
    • /
    • 2004
  • As the logistic environment of digital contents is rapidly changing, the protection of the digital rights for digital content has been recognized as one of critical Issues. Digital Right Management(DRM) has taken much interest Internet Service Provider(ISP), authors and publishers of digital content as an interested approach to create a trusted environment for access and use of digital resources. This paper propose an interested digital rights protection scheme using license agent to address problems facing contemporary DRM approached : static digital rights management, and limited application to on-line environment. We introduce a dynamic mission control technology to realize dynamic digital rights management. And we incorporate license agent to on- and off-line monitoring and tracking. The proposed system prevent illegal access and use by using PKI security method, real time action monitoring for user, data security for itself.

  • PDF

Virtual Go to School (VG2S): University Support Course System with Physical Time and Space Restrictions in a Distance Learning Environment

  • Fujita, Koji
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12
    • /
    • pp.137-142
    • /
    • 2021
  • Distance learning universities provide online course content. The main methods of providing class contents are on-demand and live-streaming. This means that students are not restricted by time or space. The advantage is that students can take the course anytime and anywhere. Therefore, unlike commuting students, there is no commuting time to the campus, and there is no natural process required to take classes. However, despite this convenient situation, the attendance rate and graduation rate of distance learning universities tend to be lower than that of commuting universities. Although the course environment is not the only factor, students cannot obtain a bachelor's degree unless they fulfill the graduation requirements. In both commuter and distance learning universities, taking classes is an important factor in earning credits. There are fewer time and space constraints for distance learning students than for commuting students. It is also easy for distance learning students to take classes at their own timing. There should be more ease of learning than for students who commute to school with restrictions. However, it is easier to take a course at a commuter university that conducts face-to-face classes. I thought that the reason for this was that commuting to school was a part of the process of taking classes for commuting students. Commuting to school was thought to increase the willingness and motivation to take classes. Therefore, I thought that the inconvenient constraints might encourage students to take the course. In this research, I focused on the act of commuting to school by students. These situations are also applied to the distance learning environment. The students have physical time constraints. To achieve this goal, I will implement a course restriction method that aims to promote the willingness and attitude of students. Therefore, in this paper, I have implemented a virtual school system called "virtual go to school (VG2S)" that reflects the actual route to school.

A Study on a Illegal Copy Protection model using Hidden Agent in Embedded Computing Environment (임베디드 컴퓨팅 환경에서 은닉 에이전트를 이용한 불법복사 방지 모델에 관한 연구)

  • Lee, Deok-Gyu;Kim, Tai-Hoon;Yeo, Sang-Soo;Kim, Seok-Soo;Park, Gil-Cheol;Cho, Seong-Eon
    • Journal of Advanced Navigation Technology
    • /
    • v.12 no.2
    • /
    • pp.180-190
    • /
    • 2008
  • There have been researches into digital Watermarking technology or Fingerprinting vigorously to safeguard Protective rights for knowledge and poverty for digital contents. DRM(Digital Rights Management) is not only Protective rights for knowledge and poverty, but also management and systems that are necessary to put out, circulate and use for contents. This paper proposes two kinds of ideas. One is protecting contents from illegal acts such as illegal copies when the contents are in the process of circulation. The other is the protocol that can give users convenience. Hidden Agents are used so that contents are protected from illegal copies and illegal use in the contents and cuts off those illegal acts. The Agent will be installed without any special setup. In addition, it can replace roles of Watermarking as a protection. Therefore, this paper shows the solution of illegal copies that happens frequently.

  • PDF

A Study on Implementation and Design of Scheme to Securely Circulate Digital Contents (디지털콘텐츠의 안전한 유통을 위한 구조 설계 및 구현에 관한 연구)

  • Kim, Yong;Kim, Eun-Jeong
    • Journal of the Korean Society for information Management
    • /
    • v.26 no.2
    • /
    • pp.27-41
    • /
    • 2009
  • With explosive growth in the area of the Internet and IT services, various types of digital contents are generated and circulated, for instance, as converted into digital-typed, secure electronic records or reports, which have high commercial value, e-tickets and so on. However, because those digital contents have commercial value, high-level security should be required for delivery between a consumer and a provider with non face-to-face method in online environment. As a digital contents, an e-ticket is a sort of electronic certificate to assure ticket-holder's proprietary rights of a real ticket. This paper focuses on e-ticket as a typical digital contents which has real commercial value. For secure delivery and use of digital contents in on/off environment, this paper proposes that 1) how to generate e-tickets in a remote e-ticket server, 2) how to authenticate a user and a smart card holding e-tickets for delivery in online environment, 3) how to save an e-ticket transferred through network into a smart card, 4) how to issue and authenticate e-tickets in offline, and 5) how to collect and discard outdated or used e-tickets.

Management, Orchestration and Security in Network Function Virtualization (네트워크 기능 가상화 관리 및 오케스트레이션 기능과 보안)

  • Kim, Hyuncheol
    • Convergence Security Journal
    • /
    • v.16 no.2
    • /
    • pp.19-23
    • /
    • 2016
  • The design, management, and operation of network infrastructure have evolved during the last few years, leveraging on innovative technologies and architectures. With such a huge trend, due to the flexibility and significant economic potential of these technologies, software defined networking (SDN) and network functions virtualization (NFV) are emerging as the most critical key enablers. SDN/NFV enhancing the infrastructure agility, thus network operators and service providers are able to program their own network functions (e.g., gateways, routers, load balancers) on vendor independent hardware substrate. They facilitating the design, delivery and operation of network services in a dynamic and scalable manner. In NFV, the management and orchestration (MANO) orchestrates other specific managers such as the virtual infrastructure manager (VIM) and the VNF Manager (VNFM). In this paper, we examine the contents of these NFV MANO systematically and proposes a security system in a virtualized environment.