• Title/Summary/Keyword: Trusted environment

Search Result 122, Processing Time 0.031 seconds

The Design of a Multimedia Data Management and Monitoring System for using License Agent (라이센스 에이젼트를 이용한 멀티미디어 데이터관리 및 감시 시스템 설계)

  • Cho, Hyun-Seob;Ryu, In-Ho
    • Proceedings of the KIEE Conference
    • /
    • 2007.07a
    • /
    • pp.1662-1664
    • /
    • 2007
  • As the logistic environment of digital contents is rapidly changing, the protection of the digital rights for digital content has been recognized as one of critical issues. Digital Right Management(DRM) has taken much interest Internet Service Provider(ISP), authors and publishers of digital content as an interested approach to create a trusted environment for access and use of digital resources. This paper propose an interested digital rights protection scheme using license agent to address problems facing contemporary DRM approached : static digital rights management, and limited application to on-line environment. We introduce a dynamic mission control technology to realize dynamic digital rights management. And we incorporate license agent to on- and off-line monitoring and tracking. The proposed system prevent illegal access and use by using PKI security method, real time action monitoring for user, data security for itself.

  • PDF

An Analysis of the Factors Affecting in Consumption Increase of Environment-Friendly Agricultural Products (친환경농산물 소비확대에 영향을 미치는 요인 분석)

  • Park, Geun-Ah;Song, Kyung-Hwan
    • Korean Journal of Organic Agriculture
    • /
    • v.22 no.3
    • /
    • pp.381-395
    • /
    • 2014
  • The objective of the study to investigate factors affecting consumers' consumption extension toward environment-friendly agricultural products in Suncheon city. The main results of the analysis are as follows. First, the main reason that consumers purchase environment-friendly agricultural products is "concerns of pesticides." Second, NAQS is highly trusted of a certificate institution. Third, the results show that consumers is satisfied such as safety, freshness, nutrition, whereas price, package design and taste are dissatisfied. Fourth, the factors affecting increase in the consumption of environmental-friendly agricultural products, have been analyzed in the variables noted of whether Sex, marital status, purchase experience, Private Certificate Authority faulty.

Visual Monitoring System of Multi-Hosts Behavior for Trustworthiness with Mobile Cloud

  • Song, Eun-Ha;Kim, Hyun-Woo;Jeong, Young-Sik
    • Journal of Information Processing Systems
    • /
    • v.8 no.2
    • /
    • pp.347-358
    • /
    • 2012
  • Recently, security researches have been processed on the method to cover a broader range of hacking attacks at the low level in the perspective of hardware. This system security applies not only to individuals' computer systems but also to cloud environments. "Cloud" concerns operations on the web. Therefore it is exposed to a lot of risks and the security of its spaces where data is stored is vulnerable. Accordingly, in order to reduce threat factors to security, the TCG proposed a highly reliable platform based on a semiconductor-chip, the TPM. However, there have been no technologies up to date that enables a real-time visual monitoring of the security status of a PC that is operated based on the TPM. And the TPB has provided the function in a visual method to monitor system status and resources only for the system behavior of a single host. Therefore, this paper will propose a m-TMS (Mobile Trusted Monitoring System) that monitors the trusted state of a computing environment in which a TPM chip-based TPB is mounted and the current status of its system resources in a mobile device environment resulting from the development of network service technology. The m-TMS is provided to users so that system resources of CPU, RAM, and process, which are the monitoring objects in a computer system, may be monitored. Moreover, converting and detouring single entities like a PC or target addresses, which are attack pattern methods that pose a threat to the computer system security, are combined. The branch instruction trace function is monitored using a BiT Profiling tool through which processes attacked or those suspected of being attacked may be traced, thereby enabling users to actively respond.

An Off-line Dictionary Attack on Command Authorization in TPM and its Countermeasure (TPM에서 명령어 인가에 대한 오프라인 사전 공격과 대응책)

  • Oh, Doo-Hwan;Choi, Doo-Sik;Kim, Ki-Hyun;Ha, Jae-Cheol
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.12 no.4
    • /
    • pp.1876-1883
    • /
    • 2011
  • The TPM is a hardware chip for making a trusted environment on computing system. We previously need a command authorization process to use principal TPM commands. The command authorization is used to verify an user who knows a usage secret to TPM chip. Since the user uses a simple password to compute usage secret, an attacker can retrieve the password by evasdropping messages between user and TPM chip and applying off-line dictionary attack. In this paper, we simulate the off-line dictionary attack in real PC environment adopted a TPM chip and propose a novel countermeasure to defeat this attack. Our proposed method is very efficient due to its simplicity and adaptability without any modification of TPM command structures.

Improving Efficiency of Encrypted Data Deduplication with SGX (SGX를 활용한 암호화된 데이터 중복제거의 효율성 개선)

  • Koo, Dongyoung
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.11 no.8
    • /
    • pp.259-268
    • /
    • 2022
  • With prosperous usage of cloud services to improve management efficiency due to the explosive increase in data volume, various cryptographic techniques are being applied in order to preserve data privacy. In spite of the vast computing resources of cloud systems, decrease in storage efficiency caused by redundancy of data outsourced from multiple users acts as a factor that significantly reduces service efficiency. Among several approaches on privacy-preserving data deduplication over encrypted data, in this paper, the research results for improving efficiency of encrypted data deduplication using trusted execution environment (TEE) published in the recent USENIX ATC are analysed in terms of security and efficiency of the participating entities. We present a way to improve the stability of a key-managing server by integrating it with individual clients, resulting in secure deduplication without independent key servers. The experimental results show that the communication efficiency of the proposed approach can be improved by about 30% with the effect of a distributed key server while providing robust security guarantees as the same level of the previous research.

Determinants of Access to Green Finance in Vietnam: An Empirical Research

  • LE, Lam Hai;PHAM, Anh Hoang Thi
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.8 no.9
    • /
    • pp.79-89
    • /
    • 2021
  • Green finance plays an important role in environmental protection missions and fighting climate change. The Environment Fund in Vietnam is the main channel of preferential capital offered to firms for environmental protection. Unfortunately, it was previously unknown which criteria influenced these companies' ability to obtain green financing. Using a survey method, we collected data through a structured questionnaire of 203 respondents that represent firms that had received concessional loans from 26 Environment Funds. A Multiple Linear Regression model was used to examine the determinants of access to concessional loans for environmental protection. We found relationships between age, size, ownership type, and industry sector, and access to green finance. Third-party guarantees were a significant factor in financing through Environment Funds. Moreover, we found commercial environmental projects face fewer green financing obstacles. Surprisingly, showing audited financial statements does not mitigate the information asymmetry between firms and these financial institutions. These findings suggest that Environment Funds should classify environmental project types to develop appropriate lending policies. In emerging markets, enterprises need to build a trusted relationship with financial institutions so that they can replace asset-based lending techniques, thereby increasing the firms' accessibility to green finance.

Extended 3-Party Mutual Authentication Protocols for the Virtual Home Environment in Next Generation Mobile Networks (차세대 이동통신 네트워크의 Virtual Home Environment 구조에 적용 가능한 3자간 상호 인증 프로토콜)

  • Jeong, Jong-Min;Lee, Goo-Yeon;Lee, Yong
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.40 no.4
    • /
    • pp.22-29
    • /
    • 2003
  • In the virtual home environment (VHE), which was proposed to offer global roaming and personal service environment portability, user's profiles and service logics are conveyed from home network to visited network to provide services at the visited network. Because user's profiles and service logics may contain confidential information, some procedures for mutual authentication among entities for offering confidence are needed. For these issues, we propose and analyze three 3-Party mutual authentication Protocols adaptable to the VHE in 3G ; password based mutual authentication protocol, mutual authentication protocol with CHAP and key exchange and mutual authentication protocol with trusted third party.

Fundamental Considerations: Impact of Sensor Characteristics, Application Environments in Wireless Sensor Networks

  • Choi, Dongmin;Chung, Ilyong
    • Journal of Korea Multimedia Society
    • /
    • v.17 no.4
    • /
    • pp.441-457
    • /
    • 2014
  • Observed from the recent performance evaluation of clustering schemes in wireless sensor networks, we found that most of them did not consider various sensor characteristics and its application environment. Without considering these, the performance evaluation results are difficult to be trusted because these networks are application-specific. In this paper, for the fair evaluation, we measured several clustering scheme's performance variations in accordance with sensor data pattern, number of sensors per node, density of points of interest (data density) and sensor coverage. According to the experiment result, we can conclude that clustering methods are easily influenced by POI variation. Network lifetime and data accuracy are also slightly influenced by sensor coverage and number of sensors. Therefore, in the case of the clustering scheme that did not consider various conditions, fair evaluation cannot be expected.

Method for Delegating Remote Attestation Verification and Establishing a Secure Channel (대리자를 통한 원격증명 검증 및 보안 연결 성립 방법)

  • Lee, Kyeong-Ryong;Cho, Yeong-Pil;You, Jun-seung;Paek, Yun-Heung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2021.11a
    • /
    • pp.267-269
    • /
    • 2021
  • Trusted Execution Environment(TEE) is an execution environment provided by CPU hardware to gain guarantee that the execution context is as expected by the execution requester. Remote attestation of the execution context naturally arises from the concept of TEEs. Many implementations of TEEs use cryptographic remote attestation methods. Though the implementation of attestation may be simple, the implementation of verification may be very complex and heavy. By using a server delegating the verification process of attestation information, one may produce lightweight binaries that may verify peers and establish a secure channel with verified peers.

The Design of License Agent Rights Protection (디지털 저작권 보호를 위한 라이센스 에이전트의 설계)

  • 이광형;이근왕;김희숙
    • Proceedings of the Korea Information Assurance Society Conference
    • /
    • 2004.05a
    • /
    • pp.275-282
    • /
    • 2004
  • As the logistic environment of digital contents is rapidly changing, the protection of the digital rights for digital content has been recognized as one of critical issues. Digital Right Management(DRM) has taken much interest Internet Service Provider(ISP), authors and publishers of digital content as an interested approach to create a trusted environment for access and use of digital resources. This paper propose an interested digital rights protection scheme using license agent to address problems facing contemporary DRM approached : static digital rights management, and limited application to on-line environment. We introduce a dynamic mission control technology to realize dynamic digital rights management. And we incorporate license agent to on- and off-line monitoring and tracking. The proposed system prevent illegal access and use by using PBD security method real time action monitoring for user, data security for itself.

  • PDF