• 제목/요약/키워드: Security Framework

검색결과 1,071건 처리시간 0.034초

Agent Based Information Security Framework for Hybrid Cloud Computing

  • Tariq, Muhammad Imran
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제13권1호
    • /
    • pp.406-434
    • /
    • 2019
  • In general, an information security approach estimates the risk, where the risk is to occur due to an unusual event, and the associated consequences for cloud organization. Information Security and Risk Management (ISRA) practices vary among cloud organizations and disciplines. There are several approaches to compare existing risk management methods for cloud organizations but their scope is limited considering stereo type criteria, rather than developing an agent based task that considers all aspects of the associated risk. It is the lack of considering all existing renowned risk management frameworks, their proper comparison, and agent techniques that motivates this research. This paper proposes Agent Based Information Security Framework for Hybrid Cloud Computing as an all-inclusive method including cloud related methods to review and compare existing different renowned methods for cloud computing risk issues and by adding new tasks from surveyed methods. The concepts of software agent and intelligent agent have been introduced that fetch/collect accurate information used in framework and to develop a decision system that facilitates the organization to take decision against threat agent on the basis of information provided by the security agents. The scope of this research primarily considers risk assessment methods that focus on assets, potential threats, vulnerabilities and their associated measures to calculate consequences. After in-depth comparison of renowned ISRA methods with ABISF, we have found that ISO/IEC 27005:2011 is the most appropriate approach among existing ISRA methods. The proposed framework was implemented using fuzzy inference system based upon fuzzy set theory, and MATLAB(R) fuzzy logic rules were used to test the framework. The fuzzy results confirm that proposed framework could be used for information security in cloud computing environment.

네트워크 취약점 검색공격 탐지 시스템을 위한 안전한 통신 프레임워크 설계 (A Secure Communication Framework for the Detection System of Network Vulnerability Scan Attacks)

  • 유일선;김종은;조경산
    • 정보처리학회논문지C
    • /
    • 제10C권1호
    • /
    • pp.1-10
    • /
    • 2003
  • 본 논문에서는 취약점 검색공격 탐지시스템 DS-NVSA(Detection System of Network Vulnerability Scan Attacks)에서 서버와 에이전트들 사이의 상호연동을 위한 안전한 통신 프레임워크를 제안한다. 기존 시스템과의 상호연동을 위하여 제안 프레임워크는 IETF의 IDWG에서 제안한 IDMEF와 IAP를 확장 적용하였다. 또한 공개키 기반의 환경을 지원하지 못하는 네트워크 시스템을 위해 대칭키 기반의 암호화 통신 프로토콜 SKTLS(Symmetric Key based Transport Layer Security Protocol)를 제시하였다. 제안된 프레임워크는 DS-NVSA 이외에도 기존의 이기종 침입탐지 시스템의 제사용과 탐지 영역의 확대를 제공하며, 또한 기업내 통합 보안환경시스템 ESM(Enterprise Security Management) 시스템에도 적용될 수 있다.

The ISDF Framework: Towards Secure Software Development

  • Alkussayer, Abdulaziz;Allen, William H.
    • Journal of Information Processing Systems
    • /
    • 제6권1호
    • /
    • pp.91-106
    • /
    • 2010
  • The rapid growth of communication and globalization has changed the software engineering process. Security has become a crucial component of any software system. However, software developers often lack the knowledge and skills needed to develop secure software. Clearly, the creation of secure software requires more than simply mandating the use of a secure software development lifecycle; the components produced by each stage of the lifecycle must be correctly implemented for the resulting system to achieve its intended goals. This study demonstrates that a more effective approach to the development of secure software can result from the integration of carefully selected security patterns into appropriate stages of the software development lifecycle to ensure that security designs are correctly implemented. The goal of this study is to provide developers with an Integrated Security Development Framework (ISDF) that can assist them in building more secure software.

Secure Healthcare Management: Protecting Sensitive Information from Unauthorized Users

  • Ko, Hye-Kyeong
    • International Journal of Internet, Broadcasting and Communication
    • /
    • 제13권1호
    • /
    • pp.82-89
    • /
    • 2021
  • Recently, applications are increasing the importance of security for published documents. This paper deals with data-publishing where the publishers must state sensitive information that they need to protect. If a document containing such sensitive information is accidentally posted, users can use common-sense reasoning to infer unauthorized information. In recent studied of peer-to-peer databases, studies on the security of data of various unique groups are conducted. In this paper, we propose a security framework that fundamentally blocks user inference about sensitive information that may be leaked by XML constraints and prevents sensitive information from leaking from general user. The proposed framework protects sensitive information disclosed through encryption technology. Moreover, the proposed framework is query view security without any three types of XML constraints. As a result of the experiment, the proposed framework has mathematically proved a way to prevent leakage of user information through data inference more than the existing method.

RFID 시스템의 보안 프레임 구조를 위한 설계 방법에 대한 분석 (Research and Design of a Security Framework for RFID System)

  • 김정태
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국해양정보통신학회 2011년도 춘계학술대회
    • /
    • pp.657-659
    • /
    • 2011
  • Given the security and privacy problems in the application of Radio Frequency Identification(RFID), this paper is proposed a kind of novel security framework, aiming to find a better mechanism in security and privacy problems. This paper reviews the relative work of RFID security mechanisms, then, the overall design scheme and modularized implementation of a secure RFID system based on trusted computing technologies is presented.

  • PDF

A Novel Abnormal Behavior Detection Framework to Maximize the Availability in Smart Grid

  • Shin, Incheol
    • 스마트미디어저널
    • /
    • 제6권3호
    • /
    • pp.95-102
    • /
    • 2017
  • A large volume of research has been devoted to the development of security tools for protecting the Smart Grid systems, however the most of them have not taken the Availability, Integrity, Confidentiality (AIC) security triad model, not like CIA triad model in traditional Information Technology (IT) systems, into account the security measures for the electricity control systems. Thus, this study would propose a novel security framework, an abnormal behavior detection system, to maximize the availability of the control systems by considering a unique set of characteristics of the systems.

TriSec: A Secure Data Framework for Wireless Sensor Networks Using Authenticated Encryption

  • Kumar, Pardeep;Cho, Sang-Il;Lee, Dea-Seok;Lee, Young-Dong;Lee, Hoon-Jae
    • Journal of information and communication convergence engineering
    • /
    • 제8권2호
    • /
    • pp.129-135
    • /
    • 2010
  • Wireless sensor networks (WSNs) are an emerging technology and offers economically viable monitoring solution to many challenging applications. However, deploying new technology in hostile environment, without considering security in mind has often proved to be unreasonably unsecured. Apparently, security techniques face many critical challenges in WSNs like data security and secrecy due to its hostile deployment nature. In order to resolve security in WSNs, we propose a novel and efficient secure framework called TriSec: a secure data framework for wireless sensor networks to attain high level of security. TriSec provides data confidentiality, authentication and data integrity to sensor networks. TriSec supports node-to-node encryption using PingPong-128 stream cipher based-privacy. A new PingPong-MAC (PP-MAC) is incorporated with PingPong stream cipher to make TriSec framework more secure. PingPong-128 is fast keystream generation and it is very suitable for sensor network environment. We have implemented the proposed scheme on wireless sensor platform and our result shows their feasibility.

홈 게이트웨이에 기반한 가입자망에서의 인증 프레임워크 (The Authentication Framework in Access Network based on Home Gateway)

  • 윤화묵;최병선;이성현;이재광;이원구
    • 한국콘텐츠학회논문지
    • /
    • 제5권4호
    • /
    • pp.160-168
    • /
    • 2005
  • 현재, 홈 네트워크 보안에 있어 정보기기의 다양성과 기기간 자원의 공유 등으로 고려해야 할 요구사항은 더욱 복잡하고 다양한 특성을 지니게 된다. 따라서 홈 네트워크를 구성하는 다양한 통신매체나 프로토콜 등과 관계없이 요구되는 보안 기능을 만족할 수 있는 보안 프레임워크가 정립되어야 한다. 이에 본 논문에서는 향후 유비쿼터스 컴퓨팅 환경에 근접한 홈 네트워크 모델에서 활용될 수 있는 보안기술을 가지고, 여러 가지의 제안된 메커니즘을 통해 모바일 호스트(사용자)가 댁내의 디바이스에 대해 안전하게 제어할 수 있는 보안 프레임워크를 구성하고, 성능을 검증하였다.

  • PDF

Data Firewall: A TPM-based Security Framework for Protecting Data in Thick Client Mobile Environment

  • Park, Woo-Ram;Park, Chan-Ik
    • Journal of Computing Science and Engineering
    • /
    • 제5권4호
    • /
    • pp.331-337
    • /
    • 2011
  • Recently, Virtual Desktop Infrastructure (VDI) has been widely adopted to ensure secure protection of enterprise data and provide users with a centrally managed execution environment. However, user experiences may be restricted due to the limited functionalities of thin clients in VDI. If thick client devices like laptops are used, then data leakage may be possible due to malicious software installed in thick client mobile devices. In this paper, we present Data Firewall, a security framework to manage and protect security-sensitive data in thick client mobile devices. Data Firewall consists of three components: Virtual Machine (VM) image management, client VM integrity attestation, and key management for Protected Storage. There are two types of execution VMs managed by Data Firewall: Normal VM and Secure VM. In Normal VM, a user can execute any applications installed in the laptop in the same manner as before. A user can access security-sensitive data only in the Secure VM, for which the integrity should be checked prior to access being granted. All the security-sensitive data are stored in the space called Protected Storage for which the access keys are managed by Data Firewall. Key management and exchange between client and server are handled via Trusted Platform Module (TPM) in the framework. We have analyzed the security characteristics and built a prototype to show the performance overhead of the proposed framework.

사이버 보안 연구 프레임워크로써의 Emulab 활용 동향 연구 (Research on the Trend of Utilizing Emulab as Cyber Security Research Framework)

  • 이만희;석우진
    • 정보보호학회논문지
    • /
    • 제23권6호
    • /
    • pp.1169-1180
    • /
    • 2013
  • Emulab은 미국 Utah 대학에서 개발된 연구 프레임워크로써 연구자들에게 필요한 시스템을 원하는 네트워크 구조로 연결하여 주는 On-demand 서비스를 그 핵심으로 하고 있다. 특히 Emulab은 시뮬레이션 또는 가상화 기술을 사용하지 않고 실제 시스템에 운영체제를 구동시킴으로써 연구의 검증환경을 실제 환경에 가깝게 하는 것이 특징이다. 이로 인해 Emulab은 사이버 보안 분야뿐만 아니라 네트워크 분야 등에서도 다양하게 활용되고 있었지만 국내에는 활용된 바가 거의 없었다. 최근 한국과학기술정보연구원(KISTI)에서 소규모 Emulab을 자체적으로 구축 운영함에 따라 국내에서도 Emulab을 활용한 연구가 활성화 될 것으로 기대된다. 이를 기점으로 본 논문은 Emulab을 국내에 소개하고, 사이버 보안 연구 프레임워크로써의 Emulab 활용 동향을 소개한다.