• Title/Summary/Keyword: Security Technology Policy

Search Result 686, Processing Time 0.023 seconds

Study on Hybrid Type Cloud System (하이브리드형 클라우드 시스템에 관한 연구)

  • Jang, Jae-Youl;Kim, Do-Moon;Choi, Chul-Jae
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.11 no.6
    • /
    • pp.611-618
    • /
    • 2016
  • The suggested paper studies communications network and system technology, designing data to sync to both USB memories and cloud storages at the same time, which would allow users to safely keep and manage data even in case of network troubles, affecting cloud storages, and/or loss of physical USB memories, resulting in lost data in the physical memory. The need of secure data management policy for cloud storage users form the basis of this study, offering solutions to network failures and loss of physical storage by creating hybrid cloud system. To provide convenience to windows users, the UI design should integrate that of windows explorer to maximize security and convenience.

Enhanced Privacy Preservation of Cloud Data by using ElGamal Elliptic Curve (EGEC) Homomorphic Encryption Scheme

  • vedaraj, M.;Ezhumalai, P.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.11
    • /
    • pp.4522-4536
    • /
    • 2020
  • Nowadays, cloud is the fastest emerging technology in the IT industry. We can store and retrieve data from the cloud. The most frequently occurring problems in the cloud are security and privacy preservation of data. For improving its security, secret information must be protected from various illegal accesses. Numerous traditional cryptography algorithms have been used to increase the privacy in preserving cloud data. Still, there are some problems in privacy protection because of its reduced security. Thus, this article proposes an ElGamal Elliptic Curve (EGEC) Homomorphic encryption scheme for safeguarding the confidentiality of data stored in a cloud. The Users who hold a data can encipher the input data using the proposed EGEC encryption scheme. The homomorphic operations are computed on encrypted data. Whenever user sends data access permission requests to the cloud data storage. The Cloud Service Provider (CSP) validates the user access policy and provides the encrypted data to the user. ElGamal Elliptic Curve (EGEC) decryption was used to generate an original input data. The proposed EGEC homomorphic encryption scheme can be tested using different performance metrics such as execution time, encryption time, decryption time, memory usage, encryption throughput, and decryption throughput. However, efficacy of the ElGamal Elliptic Curve (EGEC) Homomorphic Encryption approach is explained by the comparison study of conventional approaches.

Understanding the Trilemma in Inter-Korea Economic Cooperation (남북한 경제협력의 불가능 삼각정리와 실천적 협력방안)

  • Han, Hongyul
    • Analyses & Alternatives
    • /
    • v.2 no.1
    • /
    • pp.5-29
    • /
    • 2018
  • Models of South-North Korean economic integration have the problem of circular reasoning. While many studies argue that South-North Korean economic integration would contribute to alleviate security risks in the Korean peninsular, they emphasize the success of any economic model of inter-Korean economic integration is subject to favorable geo-political and security environment. It is a failure in distinguishing between goals and constraints. After identifying three major goals of South-North Korean economic cooperation, this study shows the trilemma among the goals; they are 1) formation of a complete economic community, 2) maintaining independent sovereignty of the two Koreas, 3) promotion of mutual economic interests. The trilemma suggests that it is theoretically impossible to achieve the above three goals at the same time. Only two goals are achievable simultaneously. This study argues that the most practical option is to pursue the combination of goals 2) and 3) considering the complex political and security environment around the Korean peninsular. Recognizing that North Korea is the least developed country in the Northeast Asia region, South Korea's initiatives for inter-Korean economic cooperation should focus on assisting industrialization and integration of the North Korea economy into the Northeast Asian regional production sharing structure. In view of the 'flying geese model' of the sequential industrialization in the region, the least developed economic status of North Korea can partially be explained by its failure to participate in the production network in the region as well as lack of effective implementation of appropriate industrial policy. Therefore, promotion of industrialization of North Korea should be the immediate goal of economic cooperation between North and South Korea. It is an interesting fact that North Korea has rapidly expanded its apparel exports in recent years. It could mean that the North Korean economy is actively responding to the dynamics of international comparative advantage structure, although the production activities are limited to exports to China since the closure of the Gaesung Industrial Complex. The recent increase in apparel export is a starting point for incorporating the Easy Import Substitution fulfilling both domestic and neighboring regional demand of North Korea. It could help integrate North Korea's industry into the production network of Northeast Asia. An immediate policy implication is that the economic cooperation between the two Koreas should focus on facilitating this process and supporting North Korea's industrial policy through South Korea's contribution of capital, technology, and service intermediary inputs.

  • PDF

Development of Vision-Based Monitering System Technology for Traffic (교통량 분석 및 감시를 위한 영상 기반 관측 시스템 기술 개발)

  • Hong, Gwang-Soo;Eom, Tae-Jung;Kim, Byung-Gyu
    • Convergence Security Journal
    • /
    • v.11 no.4
    • /
    • pp.59-66
    • /
    • 2011
  • Recently, it is very important to establish and predict a traffic policy for expanding social infra structure like road, because the number of cars is significantly increasing. In this paper, we propose and develop an automated system technology based on vision sensor (CCTV) which can provide an efficient information for the traffic policy establishment and expanding the social infra structure. First, the CCTV image is captured as an input of the developed system. With this image, we propose a scheme for extracting vehicles on the road and classifying small-type, large-type vehicles based on color, motion, and geometric features. Also, we develop a DB (database) system for supplying a whole information of traffic for a specified period. Based on the proposed system, we verify 90.1% of recognition ratio in real-time traffic monitering environment.

Real-time hacking, detection and tracking ICT Convergence Security Solutions Test and Evaluation (실시간 해킹, 탐지 및 추적관리 ICT 융합 보안 솔루션 시험평가)

  • Kim, Seung-Bum;Yang, Hae-Sool
    • Journal of Digital Convergence
    • /
    • v.13 no.4
    • /
    • pp.235-246
    • /
    • 2015
  • Understanding the various unspecified hacking and repeated cyber DDoS attacks, finally was able to find a solution in the methods of attacks. Freely researching approach that combines the attacker and defender, offensive and defensive techniques can be called a challenge to discover the potential in whimsy. In this paper we test and evaluate "KWON-GA", global white hackers team has made by many years of experiences in infiltration and diagnosis under guise of offence is the best defence. And it is knowledge information ICT Convergence security solution which is developed for the purpose of defence, it provide customization policy that can be fit to customer's system environment with needed techniques and it is processed with unique proprietary technology so that it's not possible to scan. And even if it has leaked internally it's impossible to analyze so hackers can't analyze vulnerability, also it can't be abused as hacking tools.

Security Level Decision Problem in MLP-based Secure OS (다중등급 보안 운영체제에서의 보안 등급 결정 문제)

  • Kang, Jung-Min;Shin, Wook;Park, Chun-Gu;Lee, Dong-Ik;Lee, Kyeong-Ho
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2001.10b
    • /
    • pp.943-946
    • /
    • 2001
  • 대부분의 안전한 운영체제는 주체와 객체에 보안 등급을 부여하여 운영하는 다중등급 정책(MLP: Multi-Level Policy)을 수용하고 있으며, BLP 모델은 이 정책을 표현하는 검증된 대표적인 모델이다. 하지만 이러한 다중 등급 보안 운영체제들은 접근 주체인 프로세스가 접근 객체로서 존재하는 등급화 된 프로그램을 실행 시 새로운 프로세스를 위한 보안 등급을 부여해야 하는데, 접근 주체와 접근 객체의 보안 등급이 다를 경우 보안 등급 결정 문제가 발생하며 정보보호의 목적에 위배되는 결과가 발생한다. 이에 본 논문에서는 위에 언급된 문제를 해결할 수 있는 방안을 BLP 모델 측면에서 고찰한다.

  • PDF

Environmental footprint impacts of nuclear energy consumption: The role of environmental technology and globalization in ten largest ecological footprint countries

  • Sadiq, Muhammad;Wen, Fenghua;Dagestani, Abd Alwahed
    • Nuclear Engineering and Technology
    • /
    • v.54 no.10
    • /
    • pp.3672-3681
    • /
    • 2022
  • This study investigates the environmental footprint impacts of nuclear energy consumption in the presence of environmental technology and globalization of the ten largest ecological footprint countries from 1990 up to 2017. By considering a set of methods that can help solve the issue of cross-sectional dependence, we employ the Lagrange multiplier bootstrap cointegration method, Driscoll-Kraay standard errors for long-run estimation and feasible generalized least squares (FGLS) and panel-corrected standard errors (PCSE) for robustness. The finding revealed significant negative effects of nuclear energy consumption, environmental-related technology, population density and significant positive effects of globalization and economic growth on ecological footprint. These results are also robust by assessing the long-run impacts of predictors on carbon footprint and CO2 emissions as alternate ecological measures. These conclusions provide the profound significance of nuclear energy consumption for environmentally sustainable development in the top ten ecological footprint countries and serve as an important reference for ecological security for other countries globally.

A Study on Increasing Security Following Mutual Interaction and Integration of Dualized Security Category between Information Security and Personal Information Protection (정보보안과 개인정보보호 간의 이원화 보안범주의 상호연계 및 통합에 따른 보안성 증대에 대한 연구)

  • Seo, Woo-Seok
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.13 no.3
    • /
    • pp.601-608
    • /
    • 2018
  • While the legislation on the protection of personal information in public institutions was enacted and amended, the guidelines and laws on information security were focused, contracted and realized with focus on specific institutions. Mutual laws and guidelines have been applied and realized for the dual purpose of securing both the asset of macroscopic information and the asset of personally identification information, which are mutually different media information. However, in a bid to present the definition and direction of the fourth industrial revolution in 2017, a variety of products and solutions for security designed to ensure the best safety line of the 21st century, and the third technology with the comprehensive coverage for all these fields, a number of solutions and technologies, including IOT(: Internet of Things), ICT Internet of Things(: ICT), ICT Cloud, and AI (: Artificial Intelligence) are pouring into the security market as if plastic doll toys were manufactured in massive scale into the market. With the rising need for guaranteeing the interrelation for securities with dualistic physical, administrative, logical and psychological differences, that is, information security and personal information security that are classified into two main categories and for the enhanced security for integrated management and technical application, the study aims to acquire the optimal security by analyzing the interrelationship between the two cases and applying it to the study results.

Military Use of Satellite and Control of Civil Use (인공위성에 대한 군사적 활용 및 통제방안)

  • Kang, Han-Cheol
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.20 no.2
    • /
    • pp.159-234
    • /
    • 2005
  • As so clearly have been demonstrated in the Gulf War and Iraq Freedom Fight, along with the civilian space exploration and development, the 'militarization' of aerospace technology and the 'battlefield-worthiness' of space are becoming more and more at issue. Korean peninsula, the last major theatre where the 4 world powers' national interests stand face to face, no doubt is in dire need for understanding and organizing necessary legislations for establishing national security from any space threats, such as satellite imaging, as well as countering against such threats. Compare to United States, Japan and China that have already declared the national security as the purpose of the space development, and equipped themselves with necessary legislations, Korea's legislations fall short of fully appreciating and effectively responding to the significance of military use of outer space and its control. This article will review legislations of leading countries' of space law and space technologies from two different perspectives. After briefly summarizing the problems of Korea's current legislations, particularly with the National Space Development Act (proposal), drafted by Ministry of Science and Technology, in mind, this article reviews and offers certain legislative directions to which Korea should pursuel for national security of outer space.

  • PDF

Biofuel Utilization and Implications in ASEAN Based on Case Analysis of Developed Countries (선진국 사례분석을 통한 ASEAN 국가의 바이오연료 활용 방안 및 시사점)

  • Heo, Su Jung;Choi, Joon Weon
    • Journal of the Korean Wood Science and Technology
    • /
    • v.46 no.5
    • /
    • pp.577-596
    • /
    • 2018
  • ASEAN countries consist of vast coastal areas and thousands of islands that are vulnerable to the effects of climate change on sea level rise. It is believed that this will play an important role in reducing greenhouse gas emissions globally in order to minimize the damage suffered by ASEAN countries. To overcome this issue, biofuels have been used to minimize the impact on the environment by replacing fossil fuels and to reduce greenhouse gas emissions. In those cases of United States, Brazil and Europe, where biofuels are highly utilized, research, development and investment in this field have been actively conducted in the past. In ASEAN countries, however, it has not been a long time since the biofuel policies were established. To overcome this problem, we investigated the renewable fuel policy in the United States, Brazil and the European Union. Based on this, we suggested the utilization plan and prospect of biofuel policy in ASEAN countries.