• Title/Summary/Keyword: Security Environment Contents

Search Result 209, Processing Time 0.027 seconds

A Study on the Security Processor Design based on Pseudo-Random Number in Web Streaming Environment

  • Lee, Seon-Keun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.6
    • /
    • pp.73-79
    • /
    • 2020
  • Nowadays, with the rapid spread of streaming services in the internet world, security vulnerabilities are also increasing rapidly. For streaming security, this paper proposes a PN(pseudo-random noise) distributed structure-based security processor for web streaming contents(SP-WSC). The proposed SP-WSC is basically a PN distributed code algorithm designed for web streaming characteristics, so it can secure various multimedia contents. The proposed SP-WSC is independent of the security vulnerability of the web server. Therefore, SP-WSC can work regardless of the vulnerability of the web server. That is, the SP-WSC protects the multimedia contents by increasing the defense against external unauthorized signals. Incidentally it also suggests way to reduce buffering due to traffic overload.

Implementation of One-Person Media Live System in Closed Network Environment (폐쇄망 환경에서 1인 미디어 라이브 시스템 구현)

  • Kim, Dae-Jin
    • Journal of Digital Contents Society
    • /
    • v.18 no.8
    • /
    • pp.1523-1527
    • /
    • 2017
  • Recently, there have been a growing number of services for users to shoot content by themselves and to broadcast this data to a large number through the Internet. One-person media live services are popular in life, and similar services are becoming common. Most of these services are for general users. However, depending on the service model or the situation, there are cases where the object of streaming is limited depending on the security-sensitive service environment. Especially, in the case of closed networks such as military, government, and security organizations, these specialized services are needed. Therefore, in this paper, we implemented a live media system in a closed network environment. We study system components suitable for service environment and study how to develop components.

Research of Security Methods based on Mobile Internet (모바일 인터넷 상의 보안 기법 연구)

  • 이원구;이재광
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2004.05a
    • /
    • pp.296-300
    • /
    • 2004
  • In this paper, we discuss about mobile Internet security. The past few years have seen unprecedented growth in the number of wireless user, applications, and network access technologies. Wireless Internet is similar to wired internet, but it has some constrained wireless environment. So many internet technologies for wireless are developing now

  • PDF

Analysis on Development Methodology of Modern Secure boot: Focusing on Platform Environment (현대의 보안부팅 개발 방식 분석: 플랫폼 환경을 중심으로)

  • Kim, Jin-Woo;Lee, Sang-Gil;Lee, Jeong-Guk;Lee, Sang-Han;Shin, Dong-Woo;Lee, Cheol-Hoon
    • The Journal of the Korea Contents Association
    • /
    • v.20 no.2
    • /
    • pp.15-26
    • /
    • 2020
  • Secure boot is security technology that verifies the integrity of the computer system in boot stage and controls the boot process accordingly. The computer system can establish a secure execution environment from the threat of various malwares by security boot and also supports the recovery when system in emergency case. Recently, Secure boot has been adopted by various modern computer manufacturers to protect users' information from hacker attacks and to prevent abuse of their products by malicious users. In this paper, we classify security boot developed by various companies and organizations by platform, and analyze the design and development purpose of each security boot and investigate the limitation of design. It can be used as a reference for system security designers in various information of security boot development method and security design of system.

Design and Implementation of Secure Distribution System for Broadcasting Contents (방송 콘텐츠를 위한 안전한 유통 시스템 설계 및 구현)

  • Lee, Jin-Heung;Lee, Hea-Ju;Shin, Sang-Uk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.2
    • /
    • pp.19-27
    • /
    • 2007
  • Broadcasting contents protection system for HDTV has many difficult to apply file encryption technology that using the existing DRM systems. Therefore, this system has to be processed as accommodative about broadcasting contents format such as TS and PS and so on. Also, this system must support efficient encryption technology and random access mode. In addition, this system must have suitable key distribution mechanism in broadcasting environment. In this paper, we propose and implement encryption/key distribution scheme applicable to encoder/decoder without changing the existing MPEG system.

A Study on Evaluation Method of IDC in the Wire/Wireless Integrated Environment (유.무선 통합환경에서의 IDC 평가방법에 관한 연구)

  • Lee, Jea-Pyuing;Park, Jin-Seok;Lee, Man-Woo;Kim, Sun-Gohn
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2006.11a
    • /
    • pp.599-603
    • /
    • 2006
  • Korea Information Security Agency has executed the certification system for the information security management since 2002 and examines the conformance of the IDCs'total management system including the technical and the physical protection measure. However, this certification system has the standard only for the IDC in the wire/wireless segregated and the evaluation method for the wire/wireless integrated has not been suggested yet. This paper is on the basis of "Accumulation Information Communication Facility Secure Principle", guidelines of Wireless LAN security operation, the existing principles and recommendations of the information security and the data on IDC environment. And the paper suggests the IDC network model in the wire/wireless integrated and the IDC evaluation method.

  • PDF

Trusted Certificate Validation Scheme for Open LBS Application Based on XML Web Services

  • Moon, Ki-Young;Park, Nam-Je;Chung, Kyo-Il;Sohn, Sung-Won;Ryou, Jae-Cheol
    • Journal of Information Processing Systems
    • /
    • v.1 no.1 s.1
    • /
    • pp.86-95
    • /
    • 2005
  • Location-based services or LBS refer to value-added service by processing information utilizing mobile user location. With the rapidly increasing wireless Internet subscribers and world LBS market, the various location based applications are introduced such as buddy finder, proximity and security services. As the killer application of the wireless Internet, the LBS have reconsidered technology about location determination technology, LBS middleware server for various application, and diverse contents processing technology. However, there are fears that this new wealth of personal location information will lead to new security risks, to the invasion of the privacy of people and organizations. This paper describes a novel security approach on open LBS service to validate certificate based on current LBS platform environment using XKMS (XML Key Management Specification) and SAML (Security Assertion Markup Language), XACML (extensible Access Control Markup Language) in XML security mechanism.

SVC and CAS Combining Scheme for Support Multi-Device Watching Environment (다중기기 시청환경을 지원하기 위한 SVC와 CAS 결합 기법)

  • Son, Junggab;Oh, Heekuck;Kim, SangJin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.6
    • /
    • pp.1111-1120
    • /
    • 2013
  • CAS used in IPTV or DTV has an environment of sending single type of contents through single streaming. But it can be improved to support users' various video applications through single streaming by combining with SVC. For such an environment, efficiency should be firstly considered, and hierarchical key management methods for billing policy by service levels should be applied. This study aims to look into considerations to apply SVC to CAS and propose SVC encryption in CAS environment. The security of the proposed scheme is based on the safety of CAS and oneway hash function. If the proposed scheme is applied, scalability can be efficiently provided even in the encrypted contents and it is possible to bill users according to picture quality. In addition, the test results show that SVC contents given by streaming service with the average less than 10%overhead can be safely protected against illegal uses.

An Analysis of Security Threats and Vulnerabilities for Information Protection in Smartwork Environment (스마트워크 환경에서 정보보호를 위한 보안위협 및 취약점 분석)

  • Kim, Hee-Wan
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2014.11a
    • /
    • pp.291-292
    • /
    • 2014
  • 본 연구에서는 스마트워크 환경에서 정보보호를 위하여 사용자와 서비스 제공자 입장에서 정보보호 요구사항을 분석하고, 정보보호 요구사항을 바탕으로 스마트워크 도입 및 운영 관점에서의 보안 위협 및 취약점을 분석하여 대안을 찾고자 한다.

  • PDF

A Study on E-trade Security Issue and Strategy in Ubiquitous Computing Environment (유비쿼터스 컴퓨팅 환경 하에서의 전자무역 보안 쟁점과 전략에 관한 소고)

  • Jung, Sung-Hoon;Kang, Jang-Mook;Lee, Chun-Su
    • International Commerce and Information Review
    • /
    • v.7 no.3
    • /
    • pp.135-156
    • /
    • 2005
  • The rapidly developed environment by ubiquitous computing make the paradigm from e-trade to u-trade. The purpose of the study is to find out issue and the strategic suggestions that could link together between the e-trade and ubiquitous computing in side of information security. The study include the contents as follows; firstly, the technical explanations under the ubiquitous computing, secondly, e-trade's risks in security technology and lastly, issue and strategic suggestions how link them together in integrated view.

  • PDF