• Title/Summary/Keyword: Trusted environment

Search Result 122, Processing Time 0.021 seconds

Development of Framework for Trusted Financial Service in N-Screen Environment (N-스크린 환경 내 신뢰할 수 있는 금융프레임워크 개발)

  • Kim, Kyong-Jin;Seo, Dong-Su;Hong, Seng-Phil
    • Journal of Internet Computing and Services
    • /
    • v.13 no.3
    • /
    • pp.127-137
    • /
    • 2012
  • With the spread of the new technologies like a smart phone, a smart pad, N-Screen service for financial transaction quickly became commonplace through the Internet. Although it has been developed related technologies and policies since the N-Screen has been provided in Korea, infrastructure for financial services is still lacking. It also has many potential problems including phishing or malware attacks, privacy information exposure & breaches, etc. This work suggests the financial security framework in the side of information protection through threat vulnerability analysis. Further, we examine the possibility of effective application methods based on political technical design.

Design and Performance Evaluation of Attributed Intrusion Detection System Model using Pattern Extracting Agent (패턴 추출 에이전트를 이용한 분산 침입 탐지 시스템 모델 설계 및 성능 평가)

  • 정종근;편석범;이윤배
    • Journal of the Institute of Electronics Engineers of Korea TE
    • /
    • v.37 no.5
    • /
    • pp.117-124
    • /
    • 2000
  • As network security is coming up with significant problem after the major Internet sites were hacked nowadays, IDS (Intrusion Detection System) is considered as a next generation security solution for more trusted network and system security We propose the new IDS model which can detect intrusion in the expanded distribute environment in host level, drawback of existing IDS, and implement prototype. We used pattern extraction agent so that we extract automatically audit file needed in intrusion detection even in other Platforms.

  • PDF

Trusted Information Sharing Model in Collaborative Systems (협업 환경 내 신뢰할수 있는 정보 공유 모델)

  • Hong, Seng-Phil;Kim, Jae-Hyoun
    • Journal of Internet Computing and Services
    • /
    • v.8 no.1
    • /
    • pp.99-113
    • /
    • 2007
  • In the rapidly changing e-business environment, organizations need to share information, process business transactions, and enhance collaborations with relevant entities by taking advantage of the various technologies. However, there are always the security issues that need to be handled in order for the e-business operations to be run efficiently. In this research, we suggest the new security authorization model for safety flexible supporting the needs of e-business (e-marketplace) in an organization. This proposed model provides the scalable of access control policy among multi-domains, and preservation of flexible authorization management in distributed system environments. For servers to take the access control policy and enforcement decisions, we also describe the feasible authorization architecture is concerned with how they might seek advice and guideline from formal access control model.

  • PDF

Research on Hemp Fabrics Produced at Boseong (보성 삼베 연구)

  • 고부자
    • The Research Journal of the Costume Culture
    • /
    • v.12 no.1
    • /
    • pp.168-181
    • /
    • 2004
  • This research on the present state of production and circulation of boseong-sambae, based on the materials, has been collected and arranged through the survey for one you, 2003. Boseong-sambae, the hemp fabric produced at Boseong, hold 35% of nationwide production volume and 50% of circulation volume. The products of hemp include hemp fabrics, shroud, contemporary Korean dresses and other household articles. Dried hemp skin, hemp thread and hemp fabrics are traded at the fair held in every five days, mostly by direct transactions which is trusted between the producers and consumers. A bolt of boseong-sambae includes 20 ja(a Korean foot, 60cm in length) of hemp fabrics in breadth of 35cm. The price of a bolt is approximately 2∼3 hundred thousand won. They are endeavoring to revive hemp fabric that the image was lost due to the cheap and coarse fabrics woven with Chinese thread since the latter half of 1990's. The advanced countries have invested positively in this business because hemp is an environment friendly material. Thus, a strong national support is demanded in this field facing a crisis due to the inundating of coarse hemp products from China, and the aging problem of the initiate, the reason of the discontinuation of the inherited technique. Through this research understanding tire present station and the problem of hemp production, the future research will be followed expecting the Renaissance of the Korean traditional hemp fabrics.

  • PDF

Enhanced OLSR for Defense against DOS Attack in Ad Hoc Networks

  • Marimuthu, Mohanapriya;Krishnamurthi, Ilango
    • Journal of Communications and Networks
    • /
    • v.15 no.1
    • /
    • pp.31-37
    • /
    • 2013
  • Mobile ad hoc networks (MANET) refers to a network designed for special applications for which it is difficult to use a backbone network. In MANETs, applications are mostly involved with sensitive and secret information. Since MANET assumes a trusted environment for routing, security is a major issue. In this paper we analyze the vulnerabilities of a pro-active routing protocol called optimized link state routing (OLSR) against a specific type of denial-of-service (DOS) attack called node isolation attack. Analyzing the attack, we propose a mechanism called enhanced OLSR (EOLSR) protocol which is a trust based technique to secure the OLSR nodes against the attack. Our technique is capable of finding whether a node is advertising correct topology information or not by verifying its Hello packets, thus detecting node isolation attacks. The experiment results show that our protocol is able to achieve routing security with 45% increase in packet delivery ratio and 44% reduction in packet loss rate when compared to standard OLSR under node isolation attack. Our technique is light weight because it doesn't involve high computational complexity for securing the network.

Efficient Top-k Join Processing over Encrypted Data in a Cloud Environment

  • Kim, Jong Wook
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.10
    • /
    • pp.5153-5170
    • /
    • 2016
  • The benefit of the scalability and flexibility inherent in cloud computing motivates clients to upload data and computation to public cloud servers. Because data is placed on public clouds, which are very likely to reside outside of the trusted domain of clients, this strategy introduces concerns regarding the security of sensitive client data. Thus, to provide sufficient security for the data stored in the cloud, it is essential to encrypt sensitive data before the data are uploaded onto cloud servers. Although data encryption is considered the most effective solution for protecting sensitive data from unauthorized users, it imposes a significant amount of overhead during the query processing phase, due to the limitations of directly executing operations against encrypted data. Recently, substantial research work that addresses the execution of SQL queries against encrypted data has been conducted. However, there has been little research on top-k join query processing over encrypted data within the cloud computing environments. In this paper, we develop an efficient algorithm that processes a top-k join query against encrypted cloud data. The proposed top-k join processing algorithm is, at an early phase, able to prune unpromising data sets which are guaranteed not to produce top-k highest scores. The experiment results show that the proposed approach provides significant performance gains over the naive solution.

Efficient and Dynamic Authenticated Dictionary Design Using RSA One-way Accumulator (RSA 일방향 어큐뮬레이터를 이용한 효율적이고 동적인 인증 딕셔너리 설계)

  • Kim, Soon-Seok;Lee, Yong-Hee;Lee, Kang-Woo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.4
    • /
    • pp.651-660
    • /
    • 2008
  • The widespread use of public networks, such as the Internet, for the exchange of sensitive data that need a severe security, like legally valid documents and business transactions. At the same time public-key certificates used for sensitive data interchange form the viewpoint of data integrity and authentication. But there are some weakness of data transfer capacity and security in public key infrastructure(PKI) environment. This paper use the RSA one-way accumulator to realize an efficient and dynamic authenticated dictionary, where untrusted directories provide cryptographically verifiable answers to membership queries on a set maintained by a trusted source.

An Implementation of Secure boot Using TPM in Embedded System (TPM을 활용한 임베디드 시스템 환경의 보안 부팅 구현)

  • Kim, Jin-Woo;Lee, Sang-Gil;Ko, Jae-Yong;Lee, Cheol-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.5
    • /
    • pp.949-960
    • /
    • 2019
  • Due to miniaturization of electronic devices and development of IoT(Internet of Things), embedded system have been used in various field. Meanwhile, there is a potential vulnerability by the insufficient of system's security. In this paper, we implement secure boot using TPM to protect the integrity of embedded system environment. The Suggestion considers the required availability in the embedded system and detects the system's tampering at secure boot process via TPM. In addition, we have reinforced the confidentiality through AES encryption of the kernel at secure boot.

Role of Pentacyclic Triterpenoids in Chemoprevention and Anticancer Treatment: An Overview on Targets and Underling Mechanisms

  • Ghante, Mahavir H.;Jamkhande, Prasad G.
    • Journal of Pharmacopuncture
    • /
    • v.22 no.2
    • /
    • pp.55-67
    • /
    • 2019
  • The incidences of cancer are continuously increasing worldwide, affecting life of millions of people. Several factors associated with the internal and external environment are responsible for this deadly disease. The key internal determinants like abnormal hormonal regulation, genetic mutations and external determinants such as lifestyle and occupational factors enhances onset of cancer. From the ancient time, plants were remained as the most trusted source of medicine for the treatment of diverse disease conditions. Extensive studies have been performed for the discovery of effective anticancer agent from the plant and still it is going on. Pentacyclic triterpenoids are biologically active phytochemicals having a different range of activities such as anti-inflammatory, hepatoprotective, anti-hypertensive, antiulcerogenic and anti-tumor. These compounds generally contain ursane, oleanane, lupane and friedelane as a chief skeleton of pentacyclic triterpenoids which are generally present in higher plants. Isoprene unit, phytochemical, with good antitumor/anticancer activity is required for the biosynthesis of pentacyclic triterpenoids. Mechanisms such as cytotoxicity, DNA polymerase inhibition, regulation of apoptosis, change in signal transductions, interfere with angiogenesis and dedifferentiation, antiproliferative activity and metastasis inhibition are might be responsible for their anticancer effect. Present review spotlights diverse targets, mechanisms and pathways of pentacyclic triterpenoids responsible for anticancer effect.

Reducing Cybersecurity Risks in Cloud Computing Using A Distributed Key Mechanism

  • Altowaijri, Saleh M.
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.9
    • /
    • pp.1-10
    • /
    • 2021
  • The Internet of things (IoT) is the main advancement in data processing and communication technologies. In IoT, intelligent devices play an exciting role in wireless communication. Although, sensor nodes are low-cost devices for communication and data gathering. However, sensor nodes are more vulnerable to different security threats because these nodes have continuous access to the internet. Therefore, the multiparty security credential-based key generation mechanism provides effective security against several attacks. The key generation-based methods are implemented at sensor nodes, edge nodes, and also at server nodes for secure communication. The main challenging issue in a collaborative key generation scheme is the extensive multiplication. When the number of parties increased the multiplications are more complex. Thus, the computational cost of batch key and multiparty key-based schemes is high. This paper presents a Secure Multipart Key Distribution scheme (SMKD) that provides secure communication among the nodes by generating a multiparty secure key for communication. In this paper, we provide node authentication and session key generation mechanism among mobile nodes, head nodes, and trusted servers. We analyzed the achievements of the SMKD scheme against SPPDA, PPDAS, and PFDA schemes. Thus, the simulation environment is established by employing an NS 2. Simulation results prove that the performance of SMKD is better in terms of communication cost, computational cost, and energy consumption.