• Title/Summary/Keyword: confidential information

Search Result 222, Processing Time 0.029 seconds

Design and implementation of improved authentication mechanism base on mobile DRM using blockchain (블록체인을 이용한 모바일 DRM 기반 개선된 인증 메커니즘 설계 및 구현)

  • Jeon, Jinl-Oh;Seo, Byeong-Min
    • Journal of Digital Convergence
    • /
    • v.19 no.4
    • /
    • pp.133-139
    • /
    • 2021
  • Due to the rapid progress in network technology, many research on content security technologies is also being conducted in the mobile digital content sector. In the meantime, content protection has been immersed in preventing illegal copying, certifying, and issuance/management certificates, but still have many vulnerabilities in managing or authenticating confidential information. This study aims to strengthen confidential information about content based on dual management of content download rights through mobile phone numbers or device numbers. It also protect replay-attack by building a secure mobile DRM system where digital content is safely distributed based on a three-stage user authentication process. In addition, blockchain-based content security enhancements were studied during the primary/secondary process for user authentication for the prevention of piracy and copyright protection. In addition, the client authentication process was further improved through three final stages of authorization in the use of illegal content, considering that legitimate users redistributed their content to third-party.

A Study on Comparison Analysis of Digital Forensic Technology for Preventing Information Leakage (정보유출 방지를 위한 디지털 포렌식 기술 비교분석 연구)

  • Park, Gwangmin;Hong, Seungwan;Kim, Jongpil;Chang, Hangbae
    • Convergence Security Journal
    • /
    • v.16 no.7
    • /
    • pp.93-100
    • /
    • 2016
  • Important evidence or clue in general crime as well as crime relevant to computer has been discovered in digital devices including computer with advance of information technology and turning into a information-oriented society. A leakage of industrial technology and confidential business information is related to digital devices such as computer, smart phone, USB, etc. This paper deal with a current state and comparison analysis of digital forensic technology for developing way of forensic field, so we seek for method of preventing information leakage.

QR Barcode Readability Technique of the JPEG Image Based on Digital Watermarking

  • Seo, Jung Hee;Park, Hung Bok
    • Journal of information and communication convergence engineering
    • /
    • v.16 no.3
    • /
    • pp.179-188
    • /
    • 2018
  • This paper proposes a quick response (QR) barcode watermarking algorithm in order to improve readability of the QR barcode in a JPEG image. The proposed algorithm embeds a watermark in a wavelet based-low frequency band for watermark robustness, and visually extracts a QR barcode after embedding the QR barcode image with confidential information into the original image via imperceptible watermarking technology. The visually extracted QR barcode watermark uses an approach to authenticate the ownership more easily through a common hardware and software-based mobile barcode reader app. Therefore, the QR barcode watermark may improve the ability to easily detect watermarks efficiently as well as imperceptibility and robustness, which is the main watermark requirement by embedding the QR barcode with watermark text information in a digital image and when compare to conventional watermarks.

To Neutralize the Security Systems, Infringement Actions by the Administrator on the Computer Networks (시스템 보안을 무력화 시키는 전산관리자의 시스템 침해 행위 연구)

  • Roo, kyong-ha;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.10a
    • /
    • pp.165-168
    • /
    • 2012
  • In this paper, to remind ourselves that exist in the world what kind of security system is also difficult to defend a system with computerized access system representative of infringement that, Computerized personnel act of infringement cases, and thus the extent of the damage and the severity Revisited, Furthermore, technical measures beyond the limits of the technical security measures in line computerized rights management representative and for infringement prevention measures in Human Resource Management through its own alternative to find.

  • PDF

Efficient Anonymous Broadcast Encryption with Adaptive Security

  • Zhou, Fu-Cai;Lin, Mu-Qing;Zhou, Yang;Li, Yu-Xi
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.11
    • /
    • pp.4680-4700
    • /
    • 2015
  • Broadcast encryption is an efficient way to distribute confidential information to a set of receivers using broadcast channel. It allows the broadcaster to dynamically choose the receiver set during each encryption. However, most broadcast encryption schemes in the literature haven't taken into consideration the receiver's privacy protection, and the scanty privacy preserving solutions are often less efficient, which are not suitable for practical scenarios. In this paper, we propose an efficient dynamic anonymous broadcast encryption scheme that has the shortest ciphertext length. The scheme is constructed over the composite order bilinear groups, and adopts the Lagrange interpolation polynomial to hide the receivers' identities, which yields efficient decryption algorithm. Security proofs show that, the proposed scheme is both secure and anonymous under the threat of adaptive adversaries in standard model.

A Taxonomy of Agent Technologies for Ubiquitous Computing Environments

  • Zhang, Daqiang;Wan, Jiafu;Liu, Qiang;Guan, Xin;Liang, Xuedong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.2
    • /
    • pp.547-565
    • /
    • 2012
  • The design, development and deployment of Mobile Agent (MA) systems for high-level inference and surveillance in wireless sensor networks and RFID systems have drawn increasing attention in the past decade. To answer how the state-of-the-art of MA in a wide range of ubiquitous and sensor environments is, this paper investigates the current progress of MA. It proposes a taxonomy, by which MA systems in ubiquitous computing environments are decomposed and discussed. Then, this paper provides insights into the strengths and weaknesses of existing efforts. Finally, it presents a series of solutions from the viewpoint of various roles of MA in ubiquitous environments and situations.

Combination Methods for Distribution Codes (분산 부호의 결합 기법)

  • Chung, Jin-Ho
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.05a
    • /
    • pp.365-366
    • /
    • 2022
  • The distributed code is a type of linear codes that can be used for coding and federated learning for privacy. In the distributed code, privacy or confidential information is not dependent to each other because the information of each code is not included with other codes. In this paper, we examine the properties of these distributed codes and present techniques for synthesizing new sets of distributed codes from previously known distributed codes. In addition, we propose several scenarios in which combined codes can be used.

  • PDF

Piosk : A Practical Kiosk To Prevent Information Leakage

  • Lee, Suchul;Lee, Sungil;Oh, Hayoung;Han, Seokmin
    • International journal of advanced smart convergence
    • /
    • v.8 no.2
    • /
    • pp.77-87
    • /
    • 2019
  • One of important concerns in information security is to control information flow. It is whether to protect confidential information from being leaked, or to protect trusted information from being tainted. In this paper, we present Piosk (Physical blockage of Information flow Kiosk) that addresses both the problems practically. Piosk can forestall and prevent the leakage of information, and defend inner tangible assets against a variety of malwares as well. When a visitor who carries a re-writable portable storage device, must insert the device into Piosk installed next to the security gate. Then, Piosk scans the device at the very moment, and detects & repairs malicious codes that might be exist. After that, Piosk writes the contents (including sanitized ones) on a new read-only portable device such as a compact disk. By doing so, the leakage of internal information through both insiders and outsiders can be prevented physically. We have designed and prototyped Piosk. The experimental verification of the Piosk prototype implementation reveals that, Piosk can accurately detect every malware at the same detection level as Virus Total and effectively prevent the leakage of internal information. In addition, we compare Piosk with the state-of-the-art methods and describe the special advantages of Piosk over existing methods.

A Monitoring Tool for Personal Information Leakage Prevention in Network Packets (네트워크 패킷 내 개인정보 유출 방지를 위한 모니터링 도구 개발)

  • Ju, Tea Kyung;Hong, Chong Min;Shin, Weon
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.2 no.11
    • /
    • pp.489-494
    • /
    • 2013
  • Personal information has been transmitted in a variety of services of Internet environment, but individual users do not know what information is sent. In this paper, we aim to develop a monitoring tool that continuously monitors personal sensitive information in network packets and informs the user whether or not to leak. So we implement a monitoring tool of personal information and analyze the experiment results. In addition, we introduce a prevention of confidential information in company and a leakage prevention of medical information, for applications that take direct advantage. The results of this study, by contributing to prevent leakage of personal information, can help reduce cyber threats variously targeting personal information of users.

Implementation of preventing screen capture modules for privacy (개인 정보 보호를 위한 화면 캡쳐 방지 모듈 구현)

  • Kwak, Dong-uk;Yun, Dong-young;Lee, Jong-hyeok
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.10a
    • /
    • pp.787-790
    • /
    • 2012
  • Recently due to the development of the information society and the spread of computer, interest for personal information is increased and as policy and technology associated with the development, we have been various attempts to protect your personal information. In this paper, for agencies and departments to computer use and to deal with Important data of individuals, personal information or the company's confidential information, we proposed modules to protect them. As a result, we prevent a public agency or private institutions within that using mean bad or stealing another person's information. When we communicate various information with the systems in the institutions, the module can be prevented critical data and personal information exposure.

  • PDF