• Title/Summary/Keyword: Server Security Architecture

Search Result 103, Processing Time 0.027 seconds

Design and Implementation of Security Frame work for Application Server with Components

  • 김행곤;강전근
    • Journal of the Korea Computer Industry Society
    • /
    • v.5 no.4
    • /
    • pp.531-540
    • /
    • 2004
  • Development of Web service application requires the interoperability between various heterogeneous systems, extensibility to allow modification of business environment not of user interface, maintainability, flexibility and reusability As the properties of CBD (Component Based Development) have gradually become clear, attention has started to turn the smooth technology and methodology to solve the existing problems and issues the dynamic responds for the distributed web environments. In this paper, we identify some of the major architectural affecting CBD and describe the Design and Implementation of Security Framework for Application Server with Components. We identify the candidate components, model it using UML and layer it on the architecture. The frameworks will Provide the various security functions, such as incorporating with legacy security systems, supporting of J2EE, JAAS and Kerberos and assisting in increasing the tailorability of component.

  • PDF

An efficient and anonymous Chaotic Map based authenticated key agreement for multi-server architecture

  • Irshad, Azeem;Ahmad, Hafiz Farooq;Alzahrani, Bander A.;Sher, Muhammad;Chaudhry, Shehzad Ashraf
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.12
    • /
    • pp.5572-5595
    • /
    • 2016
  • Multi-server authentication enables the subscribers to enjoy an assortment of services from various service providers based on a single registration from any registration centre. Previously, a subscriber had to register from each service provider individually to avail respective services relying on single server authentication. In the past, a number of multi-server authentication techniques can be witnessed that employed lightweight and even computationally intensive cryptographic operations. In line with this, Zhu has presented a chaotic map based multi-server authentication scheme recently, which is not only vulnerable to denial-of-service attack, stolen-verifier attack, but also lacks anonymity. This research aims at improving the Zhu's protocol in terms of cost and efficiency. Moreover, the comparative study is presented for the performance of improved model against the existing scheme, and the security of proposed model is formally proved using BAN Logic.

OpenVSLAM-based Cooperative Mobile AR System Architecture (OpenVSLAM 기반의 협력형 모바일 SLAM 시스템 설계)

  • Kook, Joongjin
    • Journal of the Semiconductor & Display Technology
    • /
    • v.21 no.1
    • /
    • pp.136-141
    • /
    • 2022
  • In this paper, we designed, implemented, and verified the SLAM system that can be used on mobile devices. Mobile SLAM is composed of a stand-alone type that directly performs SLAM operation on a mobile device, and a mapping server type that additionally configures a mapping server based on FastAPI to perform SLAM operation on the server and transmits data for map visualization to a mobile device. The mobile SLAM system proposed in this paper is to mix the two types in order to make SLAM operation and map generation more efficient. The stand-alone type SLAM system was configured as an Android app by porting the OpenVSLAM library to the Unity engine, and the map generation and performance were evaluated on desktop PCs and mobile devices. The mobile SLAM system in this paper is an open source project, so it is expected to help develop AR contents based on SLAM in a mobile environment.

OPEN LBS PLATFORM ARCHITECTURE

  • Choi, Hae-Ock
    • Proceedings of the KSRS Conference
    • /
    • 2002.10a
    • /
    • pp.854-859
    • /
    • 2002
  • Location Based Services, or LBS refers to value-added service by processing information utilizing mobile user location. With the rapidly increasing wireless internet subscribers and world LBS market, the various location based applications are introduced such as buddy finder, proximity and security services. As the killer application of the wireless internet, the LBS has preconsidered technology about location determination technology, LBS middleware server for various application, and diverse contents processing technology. This paper describes the open architecture for LBS platform ensuring interoperability among the wireless networks and various location-based application services and the functional requirements for the LBS platform. The LBS platform in a narrow sense provides a standard interfaces for location management and network management for location services as follows, positioning (location acquisition through network or/and handset), location managing, location based functions, profile management, authentication and security, location based billing, information roaming between carriers and the system monitoring independent to specific network or ISP/CPs(Content Providers).

  • PDF

A Gateway Architecture for effective call session control in IMS Network (IMS에서 호 세션 제어의 효율성을 높이기 위한 Gateway 구조)

  • Lim, Na-Seok;Kim, Kang-Seok;Yeh, Hong-Jin;Kim, Hak-Beom
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2011.06d
    • /
    • pp.183-185
    • /
    • 2011
  • 차세대 이동통신은 고품질의 멀티미디어 서비스가 요구되고, 이중 서비스간의 호환이 주요한 특징이 된다. 이러한 이동통신의 과도기적인 위치에 IMS가 서비스 된다. IMS는 기존의 통신망을 토대로 다양한 망과 연계를 한다. 하지만 AS(Application Server)의 서비스가 다양해지면서 S-CSCF(Serving-Call Session Control Function)는 역할 과중이 발생한다. 따라서 S-CSCF와 AS 사이에 Gateway를 설계하여 S-CSCF의 기능을 분담한다. 그리고 사용자 서비스 기반의 로드 밸런싱을 통하여 속도를 향상한다. 논문은 IMS 모델에서 S-CSCF의 역할을 분석한 후, Gateway의 구조와 설계 모델을 제시한다.

A Novel Methodology for Auditing the Threats in Cloud Computing - A Perspective based on Cloud Storage

  • Nasreen Sultana Quadri;Kusum Yadav;Yogesh Kumar Sharma
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.2
    • /
    • pp.124-128
    • /
    • 2024
  • Cloud computing is a technology for delivering information in which resources are retrieved from the internet through a web-based tools and applications, rather than a direct connection with the server. It is a new emerging computing based technology in which any individual or organization can remotely store or access the information. The structure of cloud computing allows to store and access various information as long as an electronic device has access to the web. Even though various merits are provided by the cloud from the cloud provides to cloud users, it suffers from various flaws in security. Due to these flaws, data integrity and confidentiality has become a challenging task for both the storage and retrieval process. This paper proposes a novel approach for data protection by an improved auditing based methodology in cloud computing especially in the process of cloud storage. The proposed methodology is proved to be more efficient in auditing the threats while storing data in the cloud computing architecture.

Implementation of a Video Distribution Server to Enhance QoS of Network Cameras for the Video Surveillance System (영상 감시용 네트워크카메라의 서비스 품질 향상을 위한 영상분배서버 구현)

  • Jeong, Tae-Young;Yim, Kang-Bin
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.45 no.9
    • /
    • pp.67-74
    • /
    • 2008
  • This paper proposes, designs and implements an architecture of a server involved with the network camera based video surveillance systems to solve common problems including lack of inter-network operability at the video information sharing, drawback of bandwidth and processing-overhead caused by increase of the number of users, and difficulty of continuous monitoring over changes of network configurations. The proposed saver was designed to manage and service numerous network cameras and users as well as solving the existing problems by providing video distribution facility. Through the empirical study after applying the implemented server to a real video surveillance system we proved that the server can provide reasonable service quality while it processes several hundreds of simultaneous user connections under persisting more than one hundred connections to network cameras. We expect the developed video distribution server to enhance service quality of the large scale video surveillance systems for citizen-wide services such as traffic reporting informatics or natural calamities supporting.

Design of Network-based Game Using the GoF Design Patterns

  • Kim Jong-Soo;Kim Tai-Suk
    • Journal of Korea Multimedia Society
    • /
    • v.9 no.6
    • /
    • pp.742-749
    • /
    • 2006
  • In the network-based game where it uses the Internet infrastructure, the implementation is possible with the various methods. Such Applications are developed in the multi-tired architecture. There are many cases for the server to be separated from the hardware or the software. In this case, a lot of applications make the distributed process possible and are made as the multi-tiered architecture to develop the reusability of the existing software module. Especially, it is mostly general to separate for the case of a database server to a new tier. One of the important points of multi-tiered server side applications is security and because of this, it is difficult to share the related data about the design skill. Using design patterns, it gives help in reusing the existing written-code for the design of the game that needs a lot of money and time. Design Patterns are related to the software reuse. For the development of more efficient games, if well-defined design patterns are provided to the developers, then it would make more easy advanced game API and make possible the framework for the game development based on the API Through the analysis of the general network-based game currently servicing in the Internet, in this paper, we discuss how to implement a business logic tier using database system among the server side architectures. The main objective of this article is to show an efficient APIs(Application Programming Interfaces) design method which can be used to manage the data that must be saved to the database system among the packets that client/server have to be exchange.

  • PDF

A User Authentication Scheme using Blockchain in Smart Grid-based Edge Computing Environments (스마트 그리드 기반 엣지 컴퓨팅 환경에서 블록체인을 이용한 사용자 인증 기법)

  • Hakjun Lee;Youngsook Lee
    • Convergence Security Journal
    • /
    • v.22 no.1
    • /
    • pp.71-79
    • /
    • 2022
  • The smart grid system has emerged to maximize energy efficiency through real-time information exchange between power providers and consumers by combining information technology and power supply systems. The authentication schemes using blockchain in a smart grid system have been proposed, which utilize an edge server's architecture to collect and store electric power-related information and process data between a central cloud server and smart grid-IoT devices. Although authentication schemes are being proposed to enhance security in the smart grid environment, many vulnerabilities are still reported. This paper presents a new mutual authentication scheme to guarantee users' privacy and anonymity in a smart grid based on edge computing using blockchain. In the proposed scheme, we use the smart contract for the key management's efficiency, such as updating and discarding key materials. Finally, we prove that the proposed scheme not only securely establishes a session key between the smart grid-IoT device of the user and the edge server but also guarantees anonymity.

Development of a Secure Electronic Payment System based on the Analysis of Current Korean Electronic Payment Systems (우리나라 전자지불시스템 현황 분석을 통한 안전한 전자지불시스템의 연구)

  • 송용욱;이재규;황재훈
    • Journal of Information Technology Applications and Management
    • /
    • v.10 no.3
    • /
    • pp.93-108
    • /
    • 2003
  • As Electronic Commerce is popularized, crimes related to Electronic Commerce are also increasing, Electronic shopping malls and payment gateways focus their attention on network security of payment information or the sizes of encryption keys, In real world, however, the payment-related crimes in electronic shopping malls are not based on the security hole of encryption mechanism of the payment systems, but on the customers carelessness or the insecurity of server systems of merchants or financial institutes. So, this research analyzes the structure of current electronic payment systems, investigates the payment-related crimes, addresses the structural problems of the Korean electronic payment systems, and suggests an alternative general architecture for secure payment systems by incorporating the concept of separation of order information and payment information.

  • PDF