• Title/Summary/Keyword: Security Information Sharing

Search Result 534, Processing Time 0.031 seconds

Data Sharing in the Digital Identity Wallet (전자 ID 지갑에서 데이터 전송)

  • Jong-Hyuk Roh;Seung-hun Jin
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2008.11a
    • /
    • pp.1521-1524
    • /
    • 2008
  • 사용자 중심의 Identity 관리 기술은 기존에 사이트에서 관리하던 사용자 Identity 를 사용자가 직접 제어할 수 있도록 해주는 기술이다. 본 논문에서는 사용자 중심의 Identity 관리 기술 중 하나인 전자 ID 지갑을 소개하고 전자 ID 지갑의 주요 서비스인 Identity 공유 및 동기화 기술을 설명한다. 그리고 Identity 공유 시 필요한 링크 계약을 설명한다.

Future Smart Communication Networks: A Survey of Security issues in Developing a Smart City

  • AlEisa, Hussah N.
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.2
    • /
    • pp.139-144
    • /
    • 2022
  • The smart cities are evolving constantly and are responsible for the current transformation of cities and countries into a completely connected network of information and technology This interconnected network of a huge number of smart devices is capable of exchanging complex information and provides tremendous support including enhanced quality of life within urban locations. Unfortunately this set-up is vulnerable to security attacks and requires the widespread ubiquitous network to authorize access through privacy and thus offer security in order to ensure civilian participation in a country. The smart network should benefit the individuals of the country by developing potential strategies to protect the smart cities and their participating entities from the unauthorized attacks. Trustworthy data sharing strategies based on the utilization of advanced technology features via smart communication network could solve some issues of privacy and security. This paper presents the challenges and issues related to protection and highlights the important aspects of securing the smart cities and its components. It also presents the role of cloud security for building a secure smart city.

An Access Control using SPKI Certificate in Web Environment (웹 환경에서 SPKI 인증서를 이용한 접근 제어)

  • Kim, Jeom-Goo
    • Convergence Security Journal
    • /
    • v.6 no.4
    • /
    • pp.11-19
    • /
    • 2006
  • Web service is giving an equal privilege to all user for sharing their resources. Under this situation, a lot of vulnerability against the various attacks through the Internet is possible, more sophisticated security services are necessary. In this paper, we propose an access control scheme using SPKI (Simple Public Infrastructure). The scheme designates an access control by providing the certificate to users who request a connection for resource sharing and limits the resource usage of information provider according to the access right that is given to their own rights.

  • PDF

A Double-blockchain Architecture for Secure Storage and Transaction on the Internet of Things Networks (IoT 네트워크에서 스토리지와 트랜잭션 보호를 위한 이중 블록체인 구조)

  • Park, jongsoon;Park, chankil
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.17 no.4
    • /
    • pp.43-52
    • /
    • 2021
  • IoT applications are quickly spread in many fields. Blockchain methods(BC), defined as a distributed sharing mechanism, offer excellent support for IoT evolution. The BC provides a secure way for communication between IoT devices. However, the IoT environments are threatened by hacker attacks and malicious intrusions. The IoT applications security are faced with three challenges: intrusions and attacks detection, secure communication, and compressed storage information. This paper proposed a system based on double-blockchain to improve the communication transactions' safety and enhance the information compression method for the stored data. Information security is enhanced by using an Ellipse Curve Cryptography(ECC) considered in a double-blockchain case. The data compression is ensured by the Compressed Sensing(CS) method. The conducted experimentation reveals that the proposed method is more accurate in security and storage performance than previous related works.

Secure and Scalable Key Aggregation Scheme for Cloud Storage

  • Park, YoHan;Park, YoungHo
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.20 no.2
    • /
    • pp.11-18
    • /
    • 2015
  • As the communication technology and mobile devices develop, the need for the efficient and secure remote storage is required. And recently, many companies support cloud storages to meet the requirements of the customers. Especially in the business field where various companies collaborate, data sharing is an essential functionality to enhance their work performance. However, existing researches have not fully satisfied the requirement either efficiency and security. This paper suggests efficient and secure data sharing scheme for cloud storage by using secret sharing scheme. Proposed scheme can be applied to business collaborations and team projects.

A Study on the Blockchain based Knowledge Sharing Platform (블록체인 기반의 지식공유 플랫폼 연구)

  • Kim, Hyeob
    • The Journal of Society for e-Business Studies
    • /
    • v.27 no.1
    • /
    • pp.95-109
    • /
    • 2022
  • A blockchain based platform can ensure data integrity, reliability, and security by applying distributed processing and encryption technology for transaction records. In the existing knowledge sharing platform, the created knowledge could not be shared or utilized sufficiently due to information asymmetry and centralization. However little research has been done so far on this area. In this study, we will examine case studies and development potentials for blockchain based knowledge sharing platforms based on previous studies of blockchain technology, token economy, knowledge sharing, motivation theory, and social exchange theory. Blockchain based platforms can contribute to the activation of knowledge sharing, by resolving information asymmetry, simplifying unnecessary work procedures through unified knowledge sharing flow and excluded centralization of authority by decentralization, and strengthening access and utilization of the knowledge produced by the platform.

Incentive Mechanism based on Game Theory in Kad Network (Kad 네트워크에서 게임 이론을 바탕으로 한 인센티브 메커니즘)

  • Wang, Xu;Ni, Yongqing;Nyang, Dae-Hun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.3
    • /
    • pp.43-52
    • /
    • 2010
  • The Kad network is a peer-to-peer (P2P) network which implements the Kademlia P2P overlay protocol. Nowadays, the Kad network has attracted wide concern as a popular architecture for file sharing systems. Meanwhile, many problems have been coming out in these file sharing systems such as freeriding of users, uploading fake files, spreading viruses, and so on. In order to overcome these problems, we propose an incentive mechanism based on game theory, it establishes a more stable and efficient network environment for Kad users. Users who share valuable resources receive rewards by increasing their credits, while others who supply useless or harmful files are punished. This incentive mechanism in Kad network can be used to detect and prevent malicious behaviors of users and encourage honest interaction among users.

A Novel Key Sharing Fuzzy Vault Scheme

  • You, Lin;Wang, Yuna;Chen, Yulei;Deng, Qi;Zhang, Huanhuan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.9
    • /
    • pp.4585-4602
    • /
    • 2016
  • A novel key sharing fuzzy vault scheme is proposed based on the classic fuzzy vault and the Diffie-Hellman key exchange protocol. In this proposed scheme, two users cooperatively build their fuzzy vault for their shared key using their own biometrics. Either of the users can use their own biometrics to unlock the fuzzy vault with the help of the other to get their shared key without risk of disclosure of their biometrics. Thus, they can unlock the fuzzy vault cooperatively. The security of our scheme is based on the security of the classic fuzzy vault scheme, one-way hash function and the discrete logarithm problem in a given finite group.

Zone-Based Self-Organized Clustering with Byzantine Agreement in MANET

  • Sung, Soon-Hwa
    • Journal of Communications and Networks
    • /
    • v.10 no.2
    • /
    • pp.221-227
    • /
    • 2008
  • The proposed zone-based self-organized clustering broadcasts neighbor information to only a zone with the same ID. Besides, the zone-based self-organized clustering with unique IDs can communicate securely even if the state transition of nodes in zone-based self-organized clustering is threatened by corrupted nodes. For this security, the Byzantine agreement protocol with proactive asynchronous verifiable secret sharing (AVSS) is considered. As a result of simulation, an efficiency and a security of the proposed clustering are better than those of a traditional clustering. Therefore, this paper describes a new and extended self-organized clustering that securely seeks to minimize the interference in mobile ad hoc networks (MANETs).

Identity-Based Secret Sharing (식별정보 기반 비밀 분산)

  • Chung, Young-Seok;Moon, Jong-Cheol;Lee, Sang-Hwan;Lee, Rae;Seo, In-Seok;Won, Dong-Ho
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2005.11a
    • /
    • pp.897-900
    • /
    • 2005
  • 본 논문에서는 식별 정보 기반의 비밀 분산 방식을 제안한다. 본 방식에서는 비밀 정보를 분할한 부분 정보에 딜러와 참가자의 식별정보가 포함된다. 각 식별정보는 비밀 분할 및 복원 과정에서 딜러와 참가자, 참가자와 참가자 간 상대방을 인증하는데 사용된다. 또한 참가자 간에는 상호 부분 정보의 송 수신 외에 딜러와의 통신 등 별도의 통신 과정 없이 부분 정보의 검증이 이루어진다.

  • PDF