• Title/Summary/Keyword: Server Security

Search Result 1,256, Processing Time 0.029 seconds

Searchable Encrypted String for Query Support on Different Encrypted Data Types

  • Azizi, Shahrzad;Mohammadpur, Davud
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.10
    • /
    • pp.4198-4213
    • /
    • 2020
  • Data encryption, particularly application-level data encryption, is a common solution to protect data confidentiality and deal with security threats. Application-level encryption is a process in which data is encrypted before being sent to the database. However, cryptography transforms data and makes the query difficult to execute. Various studies have been carried out to find ways in order to implement a searchable encrypted database. In the current paper, we provide a new encrypting method and querying on encrypted data (ZSDB) for different data types. It is worth mentioning that the proposed method is based on secret sharing. ZSDB provides data confidentiality by dividing sensitive data into two parts and using the additional server as Dictionary Server. In addition, it supports required operations on various types of data, especially LIKE operator functioning on string data type. ZSDB dedicates the largest volume of execution tasks on queries to the server. Therefore, the data owner only needs to encrypt and decrypt data.

Development of a Gateway System for Social Network Services

  • Kwon, Dongwoo;Jung, Insik;Lee, Shinho;Kim, Hyeonwoo;Ju, Hongtaek
    • Journal of Communications and Networks
    • /
    • v.17 no.2
    • /
    • pp.118-125
    • /
    • 2015
  • In this paper, we propose a method to reduce mobile social network services (SNSs) traffic using a mobile integrated SNS gateway (MISG) to improve network communication performance between the mobile client and SNS servers. The gateway connects the client and SNS servers using the contents adapter and the web service adapter and helps to improve communication performance using its cache engine. An integrated SNS application, the user's client, communicates with the gateway server using integrated SNS protocol. In addition, the gateway can alert the client to new SNS contents because of the broker server implemented by the message queuing telemetry transport protocol. We design and develop the modules of the gateway server and the integrated SNS application. We then measure the performance of MISG in terms of content response time and describe the result of the experiment.

OpenVSLAM-based Cooperative Mobile AR System Architecture (OpenVSLAM 기반의 협력형 모바일 SLAM 시스템 설계)

  • Kook, Joongjin
    • Journal of the Semiconductor & Display Technology
    • /
    • v.21 no.1
    • /
    • pp.136-141
    • /
    • 2022
  • In this paper, we designed, implemented, and verified the SLAM system that can be used on mobile devices. Mobile SLAM is composed of a stand-alone type that directly performs SLAM operation on a mobile device, and a mapping server type that additionally configures a mapping server based on FastAPI to perform SLAM operation on the server and transmits data for map visualization to a mobile device. The mobile SLAM system proposed in this paper is to mix the two types in order to make SLAM operation and map generation more efficient. The stand-alone type SLAM system was configured as an Android app by porting the OpenVSLAM library to the Unity engine, and the map generation and performance were evaluated on desktop PCs and mobile devices. The mobile SLAM system in this paper is an open source project, so it is expected to help develop AR contents based on SLAM in a mobile environment.

A Study on android emulator detection for mobile game security (모바일 게임 보안을 위한 안드로이드 에뮬레이터 탐지방법에 관한 연구)

  • Yoon, Jongseong;Lee, Sangjin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.5
    • /
    • pp.1067-1075
    • /
    • 2015
  • With the recent increase of the number of mobile game users, the side effects such as the manipulation of game points, levels and game speed and payment fraud are emerging. Especially, the emulators which make it possible for mobile applications to run on PC is a great threat to mobile game security since debugging specific game application or automating the game playing can be done easier with them. Therefore, we research the efficient ways to detect widely used Android Emulators such as BlueStacks, GenyMotion, Andy, YouWave and ARC Welder from the perspective of client(app), game server and network to reduce threat to mobile game security.

Security Micro-web Page Based Battlefiled Smart Map (보안 마이크로 웹페이지 기반 전장 스마트 지도)

  • Heo, Jun;Ha, Sunju;Cha, Shin;Eun, Seongbae
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.12 no.4
    • /
    • pp.259-266
    • /
    • 2017
  • GPS was developed for military purposes. As a result, it is used as a military important means such as guided weapons and strategy / tactics. However, GPS depends on the communication infrastructure and is affected by interference signals. In this paper, we propose a secure micro - web page - based smart map that can enhance security without relying on communication infrastructure on the battlefield. The proposed system consists of general smartphone, security QR, central server and smart map. Only use the network when downloading the security key and SmartMap before the task starts. During operation, the smartphone transmits and receives data using a secure QR. The security QR inserts the security code to prevent forgery and falsification and confirms whether the data is authentic by checking whether the smart phone is forged or not. As a result of implementation, we solved communication security problem of existing technology by using location based service without relying on communication infrastructure.

A Dynamic Security Service using Access Control Model in Distributed Framework Support for u-Healthcare (u-헬스케어 지원 분산 프레임워크에서 접근 제어 모델을 이용한 동적 보안 서비스)

  • Jeong, Chang-Won;Kim, Dong-Ho;Kim, Myung-Hee;Joo, Su-Chong
    • Journal of Internet Computing and Services
    • /
    • v.8 no.6
    • /
    • pp.29-42
    • /
    • 2007
  • This paper describes a security object designed to support a dynamic security service for application services in u-healthcare computing environments in which domains are used to object groups for specifying security policies, In particular, we focus on security object for distributed framework support for u-healthcare including policy, role for security and operations use to access control. And then, by using the DPD-Tool. we showed the access right grant procedure of objects which are server programs, the developing process of client program. Also, we verified the executablility of security service supporting by distributed framework support for u-healthcare use to the mobile monitoring application developing procedure implemented through DPD-Tools.

  • PDF

Design and Implementation of USIM Security Module for the Wireless Network Interworking (무선 네트워크 연동을 위한 USIM 보안 모듈 설계 및 구현)

  • Kim, Choon-Soo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.2
    • /
    • pp.41-49
    • /
    • 2007
  • USIM(UMTS Subscriber Identity Module) technology that accept 3GPP(3rd Generation Partnership Project) standards for information security supports security function in 3GPP. Supported security functions of USIM are confidentiality of user identity, mutual authentication and key agreement between end user and network, confidentiality of user data and data integrity. It is very important technology in wireless network. It makes secure environment that user and service provider can use securely mobile service in network. In this paper, design and implementation USIM security module that supports common network access method and authentication protocol in 3GPP and WLAN(Wireless LAN) and AAA (3A-Authentication Authorization Accounting) server system based RADIUS.

A Study on Vulnerability Prevention Mechanism Due to Logout Problem Using OAuth (OAuth를 이용한 로그아웃 문제로 인한 취약점 방지 기법에 대한 연구)

  • Kim, Jinouk;Park, Jungsoo;Nguyen-Vu, Long;Jung, Souhwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.1
    • /
    • pp.5-14
    • /
    • 2017
  • Many web services which use OAuth Protocol offer users to log in using their personal profile information given by resource servers. This method reduces the inconvenience of the users to register for new membership. However, at the time a user finishes using OAuth client web service, even if he logs out of the client web service, the resource server remained in the login state may cause the problem of leaking personal information. In this paper, we propose a solution to mitigate the threat by providing an additional security behavior check: when a user requests to log out of the Web Client service, he or she can make decision whether or not to log out of the resource server via confirmation notification regarding the state of the resource server. By utilizing the proposed method, users who log in through the OAuth Protocol in the public PC environment like department stores, libraries, printing companies, etc. can prevent the leakage of personal information issues that may arise from forgetting to check the other OAuth related services. To verify our study, we implement a Client Web Service that uses OAuth 2.0 protocol and integrate it with our security behavior check. The result shows that with this additional function, users will have a better security when dealing with resource authorization in OAuth 2.0 implementation.

A Design of Information Security Education training Databank System for Preventing Computer Security incident (침해사고 예방을 위한 정보보안 교육훈련 문제은행 시스템)

  • Mo, Eun-Su;Lee, Jae-Pil;Lee, Jae-Gwang;Lee, Jun-Hyeon;Lee, Jae-Kwang
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.05a
    • /
    • pp.277-280
    • /
    • 2015
  • Smishing, Phishing personal privacy caused by Incident accidents such as Phishing information security has become a hot topic. Such incidents have privacy in personal information management occurs due to a lack of user awareness. This paper is based on the existing structure of the XML Tag question bank used a different Key-Value Structure-based JSON. JSON is an advantage that does not depend on the language in the text-based interchange format. The proposed system is divided into information security sector High, Middle and Low grade. and Provides service to the user through the free space and the smart device and the PC to the constraints of time. The use of open source Apache Load Balancing technology for reliable service. It also handles the user's web page without any training sessions Require server verification result of the training(training server). The result is sent to the training server using jQuery Ajax. and The resulting data are stored in the database based on the user ID. Also to be used as a training statistical indicators. In this paper, we design a level training system to enhance the user's information security awareness.

  • PDF

Web Server Implementation via OpenWRT-based Wired/Wireless Router (OpenWRT 기반 유무선 공유기를 통한 웹 서버 구축)

  • Ha, Seung-Eup;Min, Jun-Ki;Ban, Tae-Hak;Jung, Hoe-Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.10a
    • /
    • pp.1055-1057
    • /
    • 2013
  • Routers currently used in homes and institutions have a function of multiple computers to connect to the Internet with a single IP address. It is possible only through setting or establishing a separate operation in a used PC or server to function as a web/printer server, web hard, and P2P. In this paper, by utilizing the OpenWRT Linux-based through the construction of the Web server through a router OpenWRT of (Open Wireless Router) base, to build a server simple compact, low power consumption, low cost, to operate by reliability to provide Internet telephony and multimedia services high securely over the server security, which is based on the setting of policy and various firewall at the same time the configuration of the network utilizing OpenWRT router that can be enhanced, to construct a Web server through a router multi functional can receive the provision of services using the program PC and mobile APP.

  • PDF