• Title/Summary/Keyword: Trust Network

Search Result 512, Processing Time 0.027 seconds

Study on Zero Trust Architecture for File Security (데이터 보안을 위한 제로 트러스트 아키텍처에 대한 연구)

  • Han, Sung-Hwa;Han, Joo-Yeon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.10a
    • /
    • pp.443-444
    • /
    • 2021
  • Security threats to information services are increasingly being developed, and the frequency and damage caused by security threats are also increasing. In particular, security threats occurring inside the organization are increasing significantly, and the size of the damage is also large. A zero trust model has been proposed as a way to improve such a security environment. In the zero trust model, a subject who has access to information resources is regarded as a malicious attacker. Subjects can access information resources after verification through identification and authentication processes. However, the initially proposed zero trust model basically focuses on the network and does not consider the security environment for systems or data. In this study, we proposed a zero trust-based access control mechanism that extends the existing zero trust model to the file system. As a result of the study, it was confirmed that the proposed file access control mechanism can be applied to implement the zero trust model.

  • PDF

An Effect of SNS Performance and Arts Information Service Quality on Initial Trust and Prosumer Activity: Focusing on Dance Performance (SNS 공연예술 정보서비스품질이 초기신뢰와 프로슈머 활동에 미치는 영향: 무용공연을 중심으로)

  • Park, Sun-Woo;Cho, Chul-Ho
    • Journal of Korean Society for Quality Management
    • /
    • v.44 no.1
    • /
    • pp.199-214
    • /
    • 2016
  • Purpose: The present study was designed to examine the casual relationships among performance and arts information service quality, initial trust, user satisfaction, reuse intention and prosumer activity in social network service(SNS). Also, we intended to explore significant factors on use performance of SNS through causal model analysis in the viewpoint of total effect. Methods: As a survey tool, questionnaire has obtained validity and reliability through literature survey, exploratory survey and pretest and sample 403 was selected. For statistical treatment of pretest and main analysis, SPSS18.0 and AMOS18.0 were employed and structural equation model was employed as analysis method. Results: Result of this study shows as follows. Two factors (precision and reciprocal action) have an effect on user satisfaction, initial trust, reuse intention and prosumer activity. We found that with an importance of initial trust, prosumer activity can be a useful and significant factor in causal relationship of SNS. Conclusion: The present study shows that two factors(precision and reciprocal action) in via of initial trust, were important factors that related companies have to emphasize to raise performance, And also we confirmed new factor 'prosumer activity' through this study. However, the present study has some limitations to be studied in the future.

A Study on Applying Zero Trust Architecture: Focusing on Implementing Remote Work System (제로 트러스트 아키텍처 적용 방안에 대한 연구: 재택근무 시스템 구성을 중심으로)

  • Jaewoo Do;Keumseok Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.6
    • /
    • pp.1001-1020
    • /
    • 2023
  • As massive increase in remote work since COVID-19, the boundaries between the inside and outside of corporate networks have become blurred. As a result, traditional perimeter security has stagnated business productivity and made it difficult to manage risks such as information leakage. The zero trust architecture model has emerged, but it is difficult to apply to IT environments composed of various companies. Therefore, using the remote work system configuration as an example, we presented a configuration and methodology that can apply zero trust models even in various network environments such as on-premise, cloud, and network separation. Through this, we aim to contribute to the creation of a safe and convenient cyber environment by providing guidance to companies that want to apply zero trust architecture, an intelligent system that actively responds to cyber threats.

Building On/off Attacks Detector for Effective Trust Evaluation in Cloud Services Environment

  • SALAH T. ALSHAMMARI;AIIAD ALBESHRI;KHALID ALSUBHI
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.7
    • /
    • pp.101-107
    • /
    • 2024
  • Cloud computing is a widely used technology that has changed the way people and organizations store and access information. This technology is quite versatile, which is why extensive amounts of data can be stored in the cloud. Furthermore, businesses can access various services over the cloud without having to install applications. However, the cloud computing services are provided over a public domain, which means that both trusted and non-trusted users can access the services. Though there are several advantages of cloud computing services, especially to business owners, various challenges are also posed in terms of the privacy and security of information and online services. A kind of threat that is widely faced in the cloud environment is the on/off attack. In this kind of attack, a few entities exhibit proper behavior for a given time period to develop a highly a positive reputation and gather trust, after which they exhibit deception. A viable solution is provided by the given trust model for preventing the attacks. This method works by providing effective security to the cloud services by identifying malicious and inappropriate behaviors through the application of trust algorithms that can identify on-off attacks.

Analysis on the Perception of the Cyber Dysfunction in the Intelligent Information Society According to the Introduction of the Bright Internet Trust Network (Bright Internet 신뢰네트워크 도입에 따른 지능정보사회의 사이버 역기능 해소에 대한 인식 분석)

  • Gyoo Gun Lim;Jae Ik Ahn
    • Information Systems Review
    • /
    • v.22 no.3
    • /
    • pp.99-118
    • /
    • 2020
  • At present, our society is developing into the intelligent information society in the wave of the 4th industrial revolution, and this change will have the positive effect of innovating all industry fields. However, due to the duality of technology, there will be positive and negative effects. With intelligence, threats to cyber dysfunction such as hacking, terrorism, privacy infringement, and illegal content distribution will become more serious. Until now, the security system of the Internet has been a proactive security system, but in recent years, a proposal for a trust network, a preventive security system, has been introduced. Therefore, this study aims to analyze the possibility of resolving cyber dysfunction of intelligent information society about Bright Internet, one of trust network technologies. This study defines the cyber dysfunction of the intelligent information society and analyzes the perceptions of changes in the cyber dysfunction of the intelligent information society on the introduction of the five principles of the Bright Internet. The change of cyber dysfunction severity of the intelligent information society due to the introduction of the trust network is analyzed to reflect the technical and social demands. This work will guide the structure of the trust network and the direction of practical technological introduction and its influence.

A Study on Secure Routing Technique using Trust Model in Mobile Ad-hoc Network (신뢰 모델을 이용한 보안 라우팅 기법에 관한 연구)

  • Yang, Hwan Seok
    • Convergence Security Journal
    • /
    • v.17 no.4
    • /
    • pp.11-16
    • /
    • 2017
  • MANET composed of only mobile node is applied to various environments because of its advantage which can construct network quickly in emergency situation. However, many routing vulnerabilities are exposed due to the dynamic topology and link failures by the movement of nodes. It can significantly degrade network performance. In this paper, we propose a secure routing protocol based on trust model. The domain-based network structure is used for efficient trust evaluation and management of nodes in the proposed technique. The reliability evaluation of nodes was performed by the discard ratio of control packet and data packet of the nodes. The abnormal nodes are detected by performing traffic check and inspecting of nodes on a path that generates excessive traffic in order to increase the efficiency of routing. It is confirmed through experiments of the proposed technique that data transmission is performed securely even if an attack exists on the path.

A Study of Consumer Attitude and Purchasing Behavior toward Agricultural Products using Social Network Service (소셜 네트워크 서비스를 이용한 농식품 구매의 소비자태도와 행동에 대한 연구)

  • Chung, Soo-Yeon;Kim, Gi-Hwan;Yang, Sung-Bum;Oh, Sang-Heon;Hwang, Dea-Yong;Kim, Young-Chul;Lee, Seog-Won
    • The Korean Journal of Food And Nutrition
    • /
    • v.25 no.3
    • /
    • pp.650-655
    • /
    • 2012
  • This purposes of this study were to explain consumer attitudes and purchasing behaviors towards agricultural products using a social network service and to determine the influencing factors such as experience, technology ability, innovation, self-efficacy, perception of usefulness, perception of trust, attitude, purpose of purchase and individual characteristics on them. We analyzed the survey data set, using the 'logit model', 'simultaneous equation model', and 'LISREL-Type model' In this study, the results obtained are summarized as follows. The result for the comprehensive statement of "Trust" was the biggest influence on the purchase agricultural products using the social network service. Therefore, in order to expand agricultural e-commerce using SNS, trust should be to the fore of marketing and publicity campaigns, in order to promote and stabilize the market.

A Secure and Efficient Cloud Resource Allocation Scheme with Trust Evaluation Mechanism Based on Combinatorial Double Auction

  • Xia, Yunhao;Hong, Hanshu;Lin, Guofeng;Sun, Zhixin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.9
    • /
    • pp.4197-4219
    • /
    • 2017
  • Cloud computing is a new service to provide dynamic, scalable virtual resource services via the Internet. Cloud market is available to multiple cloud computing resource providers and users communicate with each other and participate in market transactions. However, since cloud computing is facing with more and more security issues, how to complete the allocation process effectively and securely become a problem urgently to be solved. In this paper, we firstly analyze the cloud resource allocation problem and propose a mathematic model based on combinatorial double auction. Secondly, we introduce a trust evaluation mechanism into our model and combine genetic algorithm with simulated annealing algorithm to increase the efficiency and security of cloud service. Finally, by doing the overall simulation, we prove that our model is highly effective in the allocation of cloud resources.

Studying a Framework on Building Consumer Trust in Mobile Travel and Tourism Content (모바일 관광컨텐츠의 고객신뢰도 구축을 위한 프래임웍에 관한 연구)

  • Jeon, Hyo-Jae;Jo, Nam-Jae
    • 한국디지털정책학회:학술대회논문집
    • /
    • 2005.11a
    • /
    • pp.425-433
    • /
    • 2005
  • The purpose of this paper is to study a framework on building and continuing consumer trust in mobile travel and tourism content (M-TTC). Trust development life cycle in e-commerce is a trust-oriented building flow of online consumer. Travel information and content in mobile commerce is a initiative and immature step in the ubiquitous era. Travel and tourism industry is information intensive and network business between the bricks and clicks, the public and private, and the virtual and physical. A framework of travel and tourism content in m-commerce based on Siau and Shen (2003) and in perspective of information cities by Ferguson, et al. (2004) proposes conceptual components to build information and content for continuous consumer trust. The main results of the paper by focus group research methodology focus on building a conceptual m-trust model of mobile content in travel and tourism industry. Additionally, it shows what the important factor is and how the trustworthy improves continuously to the public, mobile vendors, and technological aspects.

  • PDF

Trust Center based on Key Management Scheme in Sensor Networks (센서 네트워크 환경에서의 Trust Center 기반 키 관리 기법 설계)

  • Lee, Hyub-Gun;Lee, Kyoung-Hwa;Shin, Yong-Tae
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2009.11a
    • /
    • pp.633-634
    • /
    • 2009
  • 센서 네트워크(Sensor Network)는 유비쿼터스 컴퓨팅 환경 구현을 위한 기반 네트워크 기술로 다양한 분야에 활용되고 있다. 그러나 센서 네크워크의 구조적 특징으로 인해 보안에 취약하다는 단점이 있다. 본 논문에서는 센서 네트워크 환경에서 안전한 통신을 위한 Trust Center 기반 키 관리 기법을 설계하였다. 신규 노드 인증을 위한 키 관리 절차를 크게 키 생성, 키 분배, 키 갱신으로 구분하였다. 특히 키 분배 절차를 Trust Center 와 센서 노드 간의 키 분배, 센서 노드 간의 키 분배, Trust Center 간의 키 분배로 세분화시켜 Trust Center 가 신규 노드 인증시 이전의 인증 정보를 재사용함으로서 키 관리의 효율성을 높였다.