• 제목/요약/키워드: User-based Security Management

검색결과 388건 처리시간 0.023초

Biometric 정보를 기반으로 하는 사용자 인증 스킴의 안전성 분석 (Security Analysis of a Biometric-Based User Authentication Scheme)

  • 이영숙
    • 디지털산업정보학회논문지
    • /
    • 제10권1호
    • /
    • pp.81-87
    • /
    • 2014
  • Password-based authentication using smart card provides two factor authentications, namely a successful login requires the client to have a valid smart card and a correct password. While it provides stronger security guarantees than only password authentication, it could also fail if both authentication factors are compromised ((1) the user's smart card was stolen and (2) the user's password was exposed). In this case, there is no way to prevent the adversary from impersonating the user. Now, the new technology of biometrics is becoming a popular method for designing a more secure authentication scheme. In terms of physiological and behavior human characteristics, biometric information is used as a form of authentication factor. Biometric information, such as fingerprints, faces, voice, irises, hand geometry, and palmprints can be used to verify their identities. In this article, we review the biometric-based authentication scheme by Cheng et al. and provide a security analysis on the scheme. Our analysis shows that Cheng et al.'s scheme does not guarantee any kind of authentication, either server-to-user authentication or user-to-server authentication. The contribution of the current work is to demonstrate these by mounting two attacks, a server impersonation attack and a user impersonation attack, on Cheng et al.'s scheme. In addition, we propose the enhanced authentication scheme that eliminates the security vulnerabilities of Cheng et al.'s scheme.

RBAC을 이용한 정보유출 방지를 위한 보안성이 강화된 문서 DRM 구현 (An Implementation Method of Improved Document DRM for Preventing Information Leakage using RBAC Approach)

  • 최영현;엄정호;정태명
    • 디지털산업정보학회논문지
    • /
    • 제7권4호
    • /
    • pp.57-66
    • /
    • 2011
  • We implemented the document DRM applying role based access control(RBAC) mechanism for preventing the information leakage of a document which is transmitted in network environment. It must prevent to access document not related to user role and duty, and must allow operation to document for improving security, considering user role and security level according to a document importance. We improved the security of document DRM by adding to the access control module applying RBAC for satisfying security requirements. Though the user access document, our system allows operation authorizations to document by the user's role & security level and the security attribute of RBAC. Our system prevents indiscriminate access to the documents by user who is not associated with the role, and prevents damage the confidentiality and integrity.

ID 연계 기반의 인터넷 ID Management System: e-IDMS (Internet ID Management System based on ID Federation: e-IDMS)

  • 조영섭;진승헌;문필주;정교일
    • 대한전자공학회논문지TC
    • /
    • 제43권7호
    • /
    • pp.104-114
    • /
    • 2006
  • 인터넷 서비스를 이용하기 위해서 사용자는 일반적으로 가입절차를 수행하고 서비스를 위한 id(identifier)를 등록하게 된다. 그러나 인터넷의 활용이 증가함에 따라, 사용자는 많은 id를 가지게 되었으며 이것은 사용자가 인터넷 서비스를 이용할 때마다, 매번 인증을 받아야 한다는 문제를 발생시키고 있다 또한 여러 사이트에 산재되어 관리되지 않은 id들은 사용자 개인정보의 침해 가능성을 높이고 있다. 본 논문에서는 이와 같은 문제를 해결하기 위해 ETRI에서 개발한 ID(IDentity) 연계 기반의 인터넷 ID 관리 시스템인 e-IDMS에 대하여 기술한다. e-IDMS는 ID 연계를 기반으로 복합 인증, 인터넷 SSG, ID 정보 관리, ID 정보 공유, 개인정보 보호 및 대화형 질의 기능을 제공한다. e-IDMS는 공공기관 통합 ID 관리 시스템 구축에 활용되고 있다.

퍼스널 클라우드 환경에서 사용자 관리를 위한 보안 프레임워크의 설계 및 평가 (Design and Evaluation of Secure Framework for User Management in Personal Cloud Environments)

  • 진병욱;김종화;차시호;전문석
    • 디지털산업정보학회논문지
    • /
    • 제12권1호
    • /
    • pp.81-87
    • /
    • 2016
  • Cloud computing technologies are utilized and merged in various domains. Cloud computing technology-based personal cloud service technologies provide mobility and free access by using user centered storages and smart devices such like smart phones and table PCs. Therefore, we should overcome limits on the storage by solving the capacity problems of devices to provide security services in the personal cloud environments It can be addressable to provide the convenience of various security technologies. However, there are some security threats inherited from existing cloud environments and the possibilities of information leakage when devices are lost or stolen. Therefore, we designed a framework for providing secure cloud services by adding objects, such as user authorization, access tokens, set permissions by key generation, and key management assignments, for user management in personal cloud environments. We analyzed the stability of the proposed framework in terms of irreverent use and abuse, access to insiders, and data loss or leakage. And we evaluated the proposed framework in terms of the security with access control requirements in personal cloud environments.

의료 ICT융합 환경에서 안전한 사용자 관리를 위한 인증시스템 설계 및 구현: 중소형 의료기관을 중심으로 (Design and Implement of Authentication System for Secure User Management for Secure on Medical ICT Convergence Environment)

  • 김양훈;최연정
    • 융합보안논문지
    • /
    • 제19권3호
    • /
    • pp.29-36
    • /
    • 2019
  • 전통적인 산업과 ICT의 융합은 ICT에서 나타나는 보안 위협 및 취약점과 기존 산업의 특수한 산업 종속적인 문제점이 혼합되어 새로운 보안위협 및 취약점이 나타나고 있다. 특히, 의료ICT융합산업에서는 의료정보시스템을 중심으로 사용자 인증에 대한 다양한 문제가 파생되어, 오남용, 보안취약점에 악용되고 있는 실정이다. 이에 따라, 본 연구에서는 의료 ICT 융합환경에서 안전한 사용자 관리를 위한 사용자 인증시스템을 설계하고 프로토타입을 구현하였다. 구체적으로, 의료정보시스템을 중심으로 개인화 기기를 활용하여 사용자 인증을 수행함으로써 ID 공유로 나타나는 오남용과 보안 취약점을 해결하고, 개별 ID/PW 방식 인증의 불편함을 해소하기 위한 방안을 설계 및 프로타입을 구현하였다.

Concept of the Cloud Type Virtual Policy Based Network Management Scheme for the Whole Internet

  • Kazuya, Odagiri;Shogo, Shimizu;Naohiro, Ishii
    • International Journal of Computer Science & Network Security
    • /
    • 제23권1호
    • /
    • pp.71-77
    • /
    • 2023
  • In the current Internet system, there are many problems using anonymity of the network communication such as personal information leaks and crimes using the Internet system. This is why TCP/IP protocol used in Internet system does not have the user identification information on the communication data, and it is difficult to supervise the user performing the above acts immediately. As a study for solving the above problem, there is the study of Policy Based Network Management (PBNM). This is the scheme for managing a whole Local Area Network (LAN) through communication control for every user. In this PBNM, two types of schemes exist. As one scheme, we have studied theoretically about the Destination Addressing Control System (DACS) Scheme with affinity with existing internet. By applying this DACS Scheme to Internet system management, we will realize the policy-based Internet system management. In this paper, to realize it, concept of the Internet PBNM Scheme is proposed as the final step.

PMI기반의 RBAC를 이용한 NEIS의 DB 보안 구현 (An Implementation of NEIS′DB Security Using RBAC based on PMI)

  • 유두규;문봉근;전문석
    • 정보보호학회논문지
    • /
    • 제14권6호
    • /
    • pp.31-45
    • /
    • 2004
  • 공개키기반구조(PKI)는 강한 인증을 제공한다. 새로운 인증기술로서 권한기반구조(PMI)는 사용자의 속성 정보를 제공한다. PM의 중요한 기능은 인증이 이루어진 이후에 보다 상세화된 권한과 역할을 부여하는 것이다. 즉, 전자서명에 의하여 사용자를 인증하고 권한을 부여한다. 본 논문은 DB 보안을 위해 PMI 기반의 역할기반접근제어(RBAC)를 제안하였다. RBAC는 보안 관리에 대하여 보이지 않는 유연성을 제공한다. 기존의 교육행정정보시스템(NEIS)은 PKI 인증 방식을 사용하여 속성에 따른 접근 인증을 제공하지 못하였다. 또한, 평문 데이터의 전송으로 정보 인권의 사회적 문제가 발생하였다. 제안된 시스템(RENIS)은 속성인증서(AC)를 이용한 RBAC 인증 기능을 가지며, 보안 관리자에서 사용자의 AC에 저장된 역할과 역한 DB의 역할인증서를 검증하여 접근제어를 허가하고 전자서명에 의한 DB 암호화를 제안한다.

Basic System Design in the PBNM Scheme for Multiple Domains as Cyber Physical System Using Data Science and AI

  • Kazuya Odagiri;Shogo Shimizu;Naohiro Ishii
    • International Journal of Computer Science & Network Security
    • /
    • 제23권11호
    • /
    • pp.1-7
    • /
    • 2023
  • In the current Internet system, there are many problems using anonymity of the network communication such as personal information leaks and crimes using the Internet system. This is why TCP/IP protocol used in Internet system does not have the user identification information on the communication data, and it is difficult to supervise the user performing the above acts immediately. As a study for solving the above problem, there is the study of Policy Based Network Management (PBNM). This is the scheme for managing a whole Local Area Network (LAN) through communication control for every user. In this PBNM, two types of schemes exist. As one scheme, we have studied theoretically about the Destination Addressing Control System (DACS) Scheme with affinity with existing internet. By applying this DACS Scheme to Internet system management, we will realize the policy-based Internet system management. In this paper, basic system design for PBNM scheme for multi-domain management utilizing data science and AI is proposed.

WSN 환경에서 Biometric 정보를 이용한 사용자 인증 스킴의 안전성 분석 (Security Analysis to an Biometric Authentication Protocol for Wireless Sensor Networks)

  • 이영숙
    • 디지털산업정보학회논문지
    • /
    • 제11권1호
    • /
    • pp.59-67
    • /
    • 2015
  • A novel authentication mechanism is biometric authentication where users are identified by their measurable human characteristics, such as fingerprint, voiceprint, and iris scan. The technology of biometrics is becoming a popular method for engineers to design a more secure user authentication scheme. In terms of physiological and behavioral human characteristics, biometrics is used as a form of identity access management and access control, and it services to identity individuals in groups that are under surveillance. In this article, we review the biometric-based authentication protocol by Althobati et al. and provide a security analysis on the scheme. Our analysis shows that Althobati et al.'s scheme does not guarantee server-to-user authentication. The contribution of the current work is to demonstrate this by mounting threat of data integrity and bypassing the gateway node on Althobati et al.'s scheme. In addition, we analysis the security vulnerabilities of Althobati et al.'s protocol.

An Interactive Multi-Factor User Authentication Framework in Cloud Computing

  • Elsayed Mostafa;M.M. Hassan;Wael Said
    • International Journal of Computer Science & Network Security
    • /
    • 제23권8호
    • /
    • pp.63-76
    • /
    • 2023
  • Identity and access management in cloud computing is one of the leading significant issues that require various security countermeasures to preserve user privacy. An authentication mechanism is a leading solution to authenticate and verify the identities of cloud users while accessing cloud applications. Building a secured and flexible authentication mechanism in a cloud computing platform is challenging. Authentication techniques can be combined with other security techniques such as intrusion detection systems to maintain a verifiable layer of security. In this paper, we provide an interactive, flexible, and reliable multi-factor authentication mechanisms that are primarily based on a proposed Authentication Method Selector (AMS) technique. The basic idea of AMS is to rely on the user's previous authentication information and user behavior which can be embedded with additional authentication methods according to the organization's requirements. In AMS, the administrator has the ability to add the appropriate authentication method based on the requirements of the organization. Based on these requirements, the administrator will activate and initialize the authentication method that has been added to the authentication pool. An intrusion detection component has been added to apply the users' location and users' default web browser feature. The AMS and intrusion detection components provide a security enhancement to increase the accuracy and efficiency of cloud user identity verification.