• 제목/요약/키워드: Security science

검색결과 6,086건 처리시간 0.03초

Message Security Level Integration with IoTES: A Design Dependent Encryption Selection Model for IoT Devices

  • Saleh, Matasem;Jhanjhi, NZ;Abdullah, Azween;Saher, Raazia
    • International Journal of Computer Science & Network Security
    • /
    • 제22권8호
    • /
    • pp.328-342
    • /
    • 2022
  • The Internet of Things (IoT) is a technology that offers lucrative services in various industries to facilitate human communities. Important information on people and their surroundings has been gathered to ensure the availability of these services. This data is vulnerable to cybersecurity since it is sent over the internet and kept in third-party databases. Implementation of data encryption is an integral approach for IoT device designers to protect IoT data. For a variety of reasons, IoT device designers have been unable to discover appropriate encryption to use. The static support provided by research and concerned organizations to assist designers in picking appropriate encryption costs a significant amount of time and effort. IoTES is a web app that uses machine language to address a lack of support from researchers and organizations, as ML has been shown to improve data-driven human decision-making. IoTES still has some weaknesses, which are highlighted in this research. To improve the support, these shortcomings must be addressed. This study proposes the "IoTES with Security" model by adding support for the security level provided by the encryption algorithm to the traditional IoTES model. We evaluated our technique for encryption algorithms with available security levels and compared the accuracy of our model with traditional IoTES. Our model improves IoTES by helping users make security-oriented decisions while choosing the appropriate algorithm for their IoT data.

Data Security on Cloud by Cryptographic Methods Using Machine Learning Techniques

  • Gadde, Swetha;Amutharaj, J.;Usha, S.
    • International Journal of Computer Science & Network Security
    • /
    • 제22권5호
    • /
    • pp.342-347
    • /
    • 2022
  • On Cloud, the important data of the user that is protected on remote servers can be accessed via internet. Due to rapid shift in technology nowadays, there is a swift increase in the confidential and pivotal data. This comes up with the requirement of data security of the user's data. Data is of different type and each need discrete degree of conservation. The idea of data security data science permits building the computing procedure more applicable and bright as compared to conventional ones in the estate of data security. Our focus with this paper is to enhance the safety of data on the cloud and also to obliterate the problems associated with the data security. In our suggested plan, some basic solutions of security like cryptographic techniques and authentication are allotted in cloud computing world. This paper put your heads together about how machine learning techniques is used in data security in both offensive and defensive ventures, including analysis on cyber-attacks focused at machine learning techniques. The machine learning technique is based on the Supervised, UnSupervised, Semi-Supervised and Reinforcement Learning. Although numerous research has been done on this topic but in reference with the future scope a lot more investigation is required to be carried out in this field to determine how the data can be secured more firmly on cloud in respect with the Machine Learning Techniques and cryptographic methods.

Optimized Security Algorithm for IEC 61850 based Power Utility System

  • Yang, Hyo-Sik;Kim, Sang-Sig;Jang, Hyuk-Soo
    • Journal of Electrical Engineering and Technology
    • /
    • 제7권3호
    • /
    • pp.443-450
    • /
    • 2012
  • As power grids are integrated into one big umbrella (i.e., Smart Grid), communication network plays a key role in reliable and stable operation of power grids. For successful operation of smart grid, interoperability and security issues must be resolved. Security means providing network system integrity, authentication, and confidentiality service. For a cyber-attack to a power grid system, which may jeopardize the national security, vulnerability of communication infrastructure has a serious impact on the power grid network. While security aspects of power grid network have been studied much, security mechanisms are rarely adopted in power gird communication network. For security issues, strict timing requirements are defined in IEC 61850 for mission critical messages (i.e., GOOSE). In this paper, we apply security algorithms (i.e., MD-5, SHA-1, and RSA) and measure their processing time and transmission delay of secured mission critical messages. The results show the algorithms satisfying the timing requirements defined in IEC 61850 and we observer the algorithm that is optimal for secure communication of mission critical messages. Numerical analysis shows that SHA-1 is preferable for secure GOOSE message sending.

Security Improvement of File System Filter Driver in Windows Embedded OS

  • Seong, Yeon Sang;Cho, Chaeho;Jun, Young Pyo;Won, Yoojae
    • Journal of Information Processing Systems
    • /
    • 제17권4호
    • /
    • pp.834-850
    • /
    • 2021
  • IT security companies have been releasing file system filter driver security solutions based on the whitelist, which are being used by several enterprises in the relevant industries. However, in February 2019, a whitelist vulnerability was discovered in Microsoft Edge browser, which allows malicious code to be executed unknown to users. If a hacker had inserted a program that executed malicious code into the whitelist, it would have resulted in considerable damage. File system filter driver security solutions based on the whitelist are discretionary access control (DAC) models. Hence, the whitelist is vulnerable because it only considers the target subject to be accessed, without taking into account the access rights of the file target object. In this study, we propose an industrial device security system for Windows to address this vulnerability, which improves the security of the security policy by determining not only the access rights of the subject but also those of the object through the application of the mandatory access control (MAC) policy in the Windows industrial operating system. The access control method does not base the security policy on the whitelist; instead, by investigating the setting of the security policy not only for the subject but also the object, we propose a method that provides improved stability, compared to the conventional whitelist method.

A Fully Distributed Secure Approach using Nondeterministic Encryption for Database Security in Cloud

  • Srinu Banothu;A. Govardhan;Karnam Madhavi
    • International Journal of Computer Science & Network Security
    • /
    • 제24권1호
    • /
    • pp.140-150
    • /
    • 2024
  • Database-as-a-Service is one of the prime services provided by Cloud Computing. It provides data storage and management services to individuals, enterprises and organizations on pay and uses basis. In which any enterprise or organization can outsource its databases to the Cloud Service Provider (CSP) and query the data whenever and wherever required through any devices connected to the internet. The advantage of this service is that enterprises or organizations can reduce the cost of establishing and maintaining infrastructure locally. However, there exist some database security, privacychallenges and query performance issues to access data, to overcome these issues, in our recent research, developed a database security model using a deterministic encryption scheme, which improved query execution performance and database security level.As this model is implemented using a deterministic encryption scheme, it may suffer from chosen plain text attack, to overcome this issue. In this paper, we proposed a new model for cloud database security using nondeterministic encryption, order preserving encryption, homomorphic encryptionand database distribution schemes, andour proposed model supports execution of queries with equality check, range condition and aggregate operations on encrypted cloud database without decryption. This model is more secure with optimal query execution performance.

Problems and countermeasures of the private security industry according to the current situation

  • Park, Su-Hyeon;Choi, Dong-Jae
    • 한국컴퓨터정보학회논문지
    • /
    • 제25권12호
    • /
    • pp.315-320
    • /
    • 2020
  • 이 연구는 목적은 경찰청, 경비협회 등에서 제공하는 최근 3년 동안의 민간경비업체·경비원, 규모별 경비업체, 일반·특수(신임교육), 자격제도 현황의 분석 및 해석을 통해 우리나라 민간경비업의 이론적 바탕을 제공하고 민간경비업을 해석하기 위한 새로운 시각을 제공하는 것이다. 결과적으로 현황을 통해 살펴 본 민간경비업은 수도권·시설경비의 집중, 비정상적인 신변보호업체 대비 신변보호원의 수, 특수경비업의 정규직 전환이였고, 신임교육에서는 일반경비원은 아직 지속적인 교육 증가, 반면에 특수경비원의 교육은 한계점이 나타났다. 자격제도에서는 경비지도사의 자격증의 활용성과 신변보호사 자격증의 활용과 홍보가 부족한 것으로 나타났다. 이러한 민간경비업의 현황들로 살펴본 특징들의 대응방안은 다음과 같다. 첫 번째, 민간경비업의 균형발전과 업무구분의 명확성이다. 두 번째, 민간경비 교육과 교육기관의 질을 높여야 한다. 세 번째, 자격제도의 현실화와 적극적인 홍보이다.

경호학의 정체성과 미래에 대한 발전 방안 (Development Plan for the Identity and Future of Security Science)

  • 권혁빈;박준석
    • 시큐리티연구
    • /
    • 제50호
    • /
    • pp.145-172
    • /
    • 2017
  • 2015년 8월 교육부는 사회적 수요에 따른 맞춤형 인재 양성을 위한 질적 구조개혁과 재도약 가능성이 있는 대학의 자율적 노력에 대한 적극적인 지원을 위해 대학을 평가하여 결과에 따른 등급별 감축 비율 권고 등 정원감축에 노력을 가하겠다고 발표했다. 이는 학령인구 급감에 대비한 선제적 구조개혁이며, 사회적으로 필요로 하는 맞춤형 인재를 양성할 수 있도록 경쟁력 있는 대학으로 탈바꿈하기 위한 하나의 대책마련으로 사료된다. 국내의 경호학과가 1996년 최초 설립 후 미래 4차 혁명 시대에 대비하기 위한 교육과정의 변화가 필요하며 교육목표, 취업진로에 방향이 정체되어 있다. 이에 따라서 과감하게 시대에 맞게 관련자격증과 교육과정, 국가직무능력표준(NCS), 전문교육과정이 앞으로 도입되어야 한다. 그 한 예로 한세대학교, 중앙대학교, 극동대학교에는 산업보안학과가 생겼고 경기대학교, 성신여자대학교에는 융합보안학과가 생겨나는 추세이다. 대학원의 경우 건국대에 안보재난대학원, 정보정책대학원, 형사사법대학원, 가천대 국가안보대학원, 성균관대 국가전략 대학원 등이 생겨나고 있는 현실에서 경호학으로만 안주해서는 안 되는 시점이다. 본 논문에서는 현재 각 주요 대학의 경호관련, 경찰관련, 산업보안관련, 군사관련 학과들의 교과과정 및 교과목을 중심으로 분석하였다. 학과 간의 통 폐합과 시대적 요청에 따른 변화를 미리 예측하여 향후에 대비할 필요가 있겠다. 전문대학에서 국가직무능력표준(NCS)을 적용하고 있는 시점에서 4년제 대학과 전문대학과의 유기적인 협조와 산학관의 상호협력을 절실히 모색해야하는 시점으로 본다.

  • PDF

Value Complexity of Virtual Communities and Information Security in the Postmodern World: Semantic Focus and Language Innovations

  • Khrypko, Svitlana;ALEKSANDROVA, Olena;Stoliarchuk, lesia;Ishchuk, Olena;OBLOVA, Liudmyla;Pavlovska, Olena;Andrii, Bezuhlyi
    • International Journal of Computer Science & Network Security
    • /
    • 제21권12spc호
    • /
    • pp.712-718
    • /
    • 2021
  • Virtual communities are studied to analyze their characteristic features, types, and tole to modern society. The article is aimed at creating a classification of virtual communities according to specific characteristics, which can be used to model the interaction, and necessity of components that are important for the community. The classification of virtual communities will contribute to their better performance and satisfy the users' needs in information. The study reveals the value structure of virtual communities, educational and communicative influence, and the possible threats these communities may bring to society and security.

The Security and Privacy Issues of Fog Computing

  • Sultan Algarni;Khalid Almarhabi;Ahmed M. Alghamdi;Asem Alradadi
    • International Journal of Computer Science & Network Security
    • /
    • 제23권4호
    • /
    • pp.25-31
    • /
    • 2023
  • Fog computing diversifies cloud computing by using edge devices to provide computing, data storage, communication, management, and control services. As it has a decentralised infrastructure that is capable of amalgamating with cloud computing as well as providing real-time data analysis, it is an emerging method of using multidisciplinary domains for a variety of applications; such as the IoT, Big Data, and smart cities. This present study provides an overview of the security and privacy concerns of fog computing. It also examines its fundamentals and architecture as well as the current trends, challenges, and potential methods of overcoming issues in fog computing.

Performance Analysis of Blockchain Consensus Protocols-A Review

  • Amina Yaqoob;Alma Shamas;Jawad Ibrahim
    • International Journal of Computer Science & Network Security
    • /
    • 제23권6호
    • /
    • pp.181-192
    • /
    • 2023
  • Blockchain system brought innovation in the area of accounting, credit monitoring and trade secrets. Consensus algorithm that considered the central component of blockchain, significantly influences performance and security of blockchain system. In this paper we presented four consensus protocols specifically as Proof of Work (PoW), Proof of Stake (PoS), Delegated Proof of Stake (DPoS) and Practical Byzantine Fault-Tolerance (PBFT), we also reviewed different security threats that affect the performance of Consensus Protocols and precisely enlist their counter measures. Further we evaluated the performance of these Consensus Protocols in tabular form based on different parameters. At the end we discussed a comprehensive comparison of Consensus protocols in terms of Throughput, Latency and Scalability. We presume that our results can be beneficial to blockchain system and token economists, practitioners and researchers.