• 제목/요약/키워드: Service based Access Control

검색결과 459건 처리시간 0.028초

상황인식 보안 서비스를 이용한 개선된 접근제어 (Improved Access Control using Context-Aware Security Service)

  • 양석환;정목동
    • 한국멀티미디어학회논문지
    • /
    • 제13권1호
    • /
    • pp.133-142
    • /
    • 2010
  • 유비쿼터스 기술의 보편화에 따라 유비쿼터스 환경의 보안 취약성을 해결하기 위한 보안기술의 연구가 주목받고 있다. 그러나 현재의 대다수 보안 시스템은 고정된 규칙을 기반으로 하는 것으로서, 유비쿼터스 기반 사용자의 다양한 상황에 제대로 대응하지 못하는 문제점이 있다. 또한 기존의 상황인식 보안 연구는 ACL (Access Control List) 혹은 RBAC (Role-Based Access Control) 계열의 연구가 많이 수행되고 있으나 보안정책의 관리에 대한 오버헤드가 크고, 또한 예상하지 못한 상황에 대한 대응이 어렵다는 문제점을 보이고 있다. 이에 본 논문에서는 FCM (Fuzzy C-Means) 클러스터링 알고리즘과 퍼지 결정트리를 이용하여 다양한 상황을 인식하고 적절한 보안기능을 제공하는 상황인식 보안 서비스를 제안한다. 제안 모델은 기존의 RBAC 계열의 시스템이 가진 고정 규칙에 따른 문제나 충돌 문제, 관리상의 오버헤드를 개선할 수 있음을 확인할 수 있다. 제안 모델은 헬쓰케어 시스템이나 응급구호 시스템 등 상황 인식을 통하여 사용자의 상황에 적합한 서비스를 제공하는 다양한 애플리케이션에 응용 가능할 것으로 기대된다.

WiFi 무선 네트워크 기반의 제어 시스템 (WiFi Wireless Network based Control System)

  • 정의훈;임중권
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국정보통신학회 2013년도 춘계학술대회
    • /
    • pp.575-577
    • /
    • 2013
  • WiFi 무선 통신 기능을 갖춘 스마트폰을 비롯한 각종 가전 도구들이 시장에서 일반화되면서 WiFi AP(access point)를 통해서 무선 랜을 구축하고자 하는 수요가 증가하고 있다. 또한 최근 들어 AP의 가격이 저렴화 되면서 AP를 이용하여 주차 위치를 알려주는 등 다양한 서비스를 제공하려는 시도들이 생겨나고 있다. 본 논문에서는 제어 기능과 위치 정보 제공 기능을 갖춘 AP를 기반으로 하는 제어 시스템을 개발한다. 제안하는 제어 시스템은 외부 장치 제어 기능과 스마트폰 위치 확인 기능이 있는 AP와 AP들을 제어하고 수집된 정보들을 처리하는 AP 서버, 사용자들에게 서비스를 제공하기 위한 스마트폰용 응용 프로그램으로 구성된다.

  • PDF

스마트 홈에서 프라이버시 보호를 위한 사용자 동적 접근제어 (User Dynamic Access Control for Privacy Protection in Smart Home)

  • 조도은;김시정
    • Journal of Platform Technology
    • /
    • 제6권3호
    • /
    • pp.17-22
    • /
    • 2018
  • 스마트 홈이란 집 안의 냉난방에서부터 조명, 주방, 보안에 이르기까지 가정에 있는 다양한 장치들을 네트워크에 연결해서 집안의 모든 정보를 모니터링 및 제어할 수 있는 기술을 의미한다. 스마트 홈 기술의 발전으로 집안 기기의 사용은 편리 해졌지만 반면 정보보안 측면의 해저드가 공존한다. 권한이 없는 방문자가 집안의 기기에 임의로 접근해서 정보 조회나 기기를 제어하는 프라이버시 및 보안 문제는 스마트 홈에 있어 해결해야 할 중요한 문제이다. 본 논문에서는 스마트 홈에서 프라이버시 보호를 위한 사용자 동적 접근 제어 기법을 제안하고자 한다. 제안된 시스템은 스마트 홈서비스 사용자의 상황정보를 자동 판별하여 사용자의 역할을 정의하고 서비스 접근 범위를 동적으로 제어함으로써 사용자의 프라이버시를 보호하고 스마트 디바이스 간의 효과적인 서비스를 제공한다. 제안된 스마트 홈에서의 동적 접근 제어 방법은 스마트 홈 기기에 대한 개인정보 보호를 위한 향상된 보안서비스를 제공할 것으로 기대된다.

Verification Control Algorithm of Data Integrity Verification in Remote Data sharing

  • Xu, Guangwei;Li, Shan;Lai, Miaolin;Gan, Yanglan;Feng, Xiangyang;Huang, Qiubo;Li, Li;Li, Wei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제16권2호
    • /
    • pp.565-586
    • /
    • 2022
  • Cloud storage's elastic expansibility not only provides flexible services for data owners to store their data remotely, but also reduces storage operation and management costs of their data sharing. The data outsourced remotely in the storage space of cloud service provider also brings data security concerns about data integrity. Data integrity verification has become an important technology for detecting the integrity of remote shared data. However, users without data access rights to verify the data integrity will cause unnecessary overhead to data owner and cloud service provider. Especially malicious users who constantly launch data integrity verification will greatly waste service resources. Since data owner is a consumer purchasing cloud services, he needs to bear both the cost of data storage and that of data verification. This paper proposes a verification control algorithm in data integrity verification for remotely outsourced data. It designs an attribute-based encryption verification control algorithm for multiple verifiers. Moreover, data owner and cloud service provider construct a common access structure together and generate a verification sentinel to verify the authority of verifiers according to the access structure. Finally, since cloud service provider cannot know the access structure and the sentry generation operation, it can only authenticate verifiers with satisfying access policy to verify the data integrity for the corresponding outsourced data. Theoretical analysis and experimental results show that the proposed algorithm achieves fine-grained access control to multiple verifiers for the data integrity verification.

A Survey of State-of-the-Art Multi-Authority Attribute Based Encryption Schemes in Cloud Environment

  • Reetu, Gupta;Priyesh, Kanungo;Nirmal, Dagdee
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제17권1호
    • /
    • pp.145-164
    • /
    • 2023
  • Cloud computing offers a platform that is both adaptable and scalable, making it ideal for outsourcing data for sharing. Various organizations outsource their data on cloud storage servers for availing management and sharing services. When the organizations outsource the data, they lose direct control on the data. This raises the privacy and security concerns. Cryptographic encryption methods can secure the data from the intruders as well as cloud service providers. Data owners may also specify access control policies such that only the users, who satisfy the policies, can access the data. Attribute based access control techniques are more suitable for the cloud environment as they cover large number of users coming from various domains. Multi-authority attribute-based encryption (MA-ABE) technique is one of the propitious attribute based access control technique, which allows data owner to enforce access policies on encrypted data. The main aim of this paper is to comprehensively survey various state-of-the-art MA-ABE schemes to explore different features such as attribute and key management techniques, access policy structure and its expressiveness, revocation of access rights, policy updating techniques, privacy preservation techniques, fast decryption and computation outsourcing, proxy re-encryption etc. Moreover, the paper presents feature-wise comparison of all the pertinent schemes in the field. Finally, some research challenges and directions are summarized that need to be addressed in near future.

A Trusted Sharing Model for Patient Records based on Permissioned Blockchain

  • Kim, Kyoung-jin;Hong, Seng-phil
    • 인터넷정보학회논문지
    • /
    • 제18권6호
    • /
    • pp.75-84
    • /
    • 2017
  • As there has been growing interests in PHR-based personalized health management project, various institutions recently explore safe methods of recording personal medical and health information. In particular, innovative medical solution can be realized when medical researchers and medical service institutes can generally get access to patient data. As EMR data is extremely sensitive, there has been no progress in clinical information exchange. Moreover, patients cannot get access to their own health data and exchange it with researchers or service institutions. It can be operated in terms of technology, yet policy environment are affected by state laws as well as Privacy and Security Policy. Blockchain technology-independent, in transaction, and under test-is introduced in the medical industry in order to settle these problems. In other words, medical organizations can grant preliminary approval on patient information exchange by using the safely encrypted and distributed Blockchain ledger and can be managed independently and completely by individuals. More apparently, medical researchers can gain access to information, thereby contributing to the scientific advance in rare diseases or minor groups in the world. In this paper, we focused on how to manage personal medical information and its protective use and proposes medical treatment exchange system for patients based on a permissioned Blockchain network for the safe PHR operation. Trusted Model for Sharing Medical Data (TMSMD), that is proposed model, is based on exchanging information as patients rely on hospitals as well as among hospitals. And introduce medical treatment exchange system for patients based on a permissioned Blockchain network. This system is a model that encrypts and records patients' medical information by using this permissioned Blockchain and further enhances the security due to its restricted counterfeit. This provides service to share medical information uploaded on the permissioned Blockchain to approved users through role-based access control. In addition, this paper presents methods with smart contracts if medical institutions request patient information complying with domestic laws by using the distributed Blockchain ledger and eventually granting preliminary approval for sharing information. This service will provide an independent information transaction and the Blockchain technology under test will be adopted in the medical industry.

광대역 CDMA망에서 이동 멀티미디어 서비스 제공을 위한 액세스 제어 방법 (Access Control Scheme for supporting Mobile multimedia Service in CDMA Networks)

  • 최승식;조동호
    • 한국통신학회논문지
    • /
    • 제24권12A호
    • /
    • pp.1844-1851
    • /
    • 1999
  • 본 논문에서는 광대역 CDMA망에서 음성, 비디오, 데이터와 같은 멀티미디어 서비스를 제공하기 위해서 다양한 서비스 특성에 적합한 액세스 제어 방법을 제안한다. 즉 서비스별로 다른 Eb/No 값을 이용함으로써 서비스의 BER을 조절하고 음성과 비디오의 전송률이 시간에 따라 변하는 특성을 이용하여 데이터의 전송률을 제어하는 방법을 제안하였다. 또한 각 방법에 대한 시뮬레이션과 분석을 수행하였다. 성능 분석결과 제안된 액세스 방법을 사용할 경우 데이터에 대한 지연을 통해 전체적인 outage 발생확률을 감소시킴을 알 수 있었다.

  • PDF

Worst-case Delay Analysis of Time-Triggered 802.15.4 for Wireless Industrial Environments

  • Kim, Hyun-Hee;Lee, Kyung-Chang
    • 한국산업융합학회 논문집
    • /
    • 제20권3호
    • /
    • pp.205-212
    • /
    • 2017
  • This paper focuses on worst-case delay analysis of the time-triggered IEEE 802.15.4 protocol to satisfy the industrial quality-of-service (QoS) performance. The IEEE 802.15.4 protocol is considered to be unsuitable for industrial networks because its medium access control method is contention-based CSMA/CA, which exhibits unstable performance with an unbounded delay distribution under heavy traffic. To avoid these limitations, this paper presents a time-triggered version of the nonbeacon-enabled network of IEEE 802.15.4 that relies on a time division multiplexing access (TDMA) method implemented in the application layer without any modification of specification. The timing analysis of this time-triggered IEEE 802.15.4 was executed, and the worst-case transmission delay was calculated. Based on this analysis, the time-triggered IEEE 802.15.4 is a promising alternative for wireless industrial networking.

확장 멀티캐스트를 이용한 다중레벨 전자상거래 보안에 관한 연구 (A Study on the Multilevel Electronic Commerce Security using Scalable Multicast)

  • 서장원
    • 한국전자거래학회지
    • /
    • 제7권1호
    • /
    • pp.66-74
    • /
    • 2002
  • Through the increment of requirement for EC(Electronic Commerce) oriented communication services, security multicast communications is becoming more important. However, multicast to EC environment is much different from unicast concept most network security protocols. On the network security, using mandatory access control of multilevel architecture which assigns a specific meaning to each subject, so we accomplish access control. In this way, access control security based on the information security level is proposed. A security protocol based on the architecture proposed in this paper would be utilized in security multicast communications, group key management service and leveled security service through multilevel EC security policy, Also we discuss and propose the security level scaleability and key management method on the network.

  • PDF

Fully secure non-monotonic access structure CP-ABE scheme

  • Yang, Dan;Wang, Baocang;Ban, Xuehua
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제12권3호
    • /
    • pp.1315-1329
    • /
    • 2018
  • Ciphertext-policy attribute-based encryption (CP-ABE) associates ciphertext with access policies. Only when the user's attributes satisfy the ciphertext's policy, they can be capable to decrypt the ciphertext. Expressivity and security are the two directions for the research of CP-ABE. Most of the existing schemes only consider monotonic access structures are selectively secure, resulting in lower expressivity and lower security. Therefore, fully secure CP-ABE schemes with non-monotonic access structure are desired. In the existing fully secure non-monotonic access structure CP-ABE schemes, the attributes that are set is bounded and a one-use constraint is required by these projects on attributes, and efficiency will be lost. In this paper, to overcome the flaw referred to above, we propose a new fully secure non-monotonic access structure CP-ABE. Our proposition enforces no constraints on the scale of the attributes that are set and permits attributes' unrestricted utilization. Furthermore, the scheme's public parameters are composed of a constant number of group elements. We further compare the performance of our scheme with former non-monotonic access structure ABE schemes. It is shown that our scheme has relatively lower computation cost and stronger security.