• Title/Summary/Keyword: confidentiality

Search Result 698, Processing Time 0.02 seconds

IoT MQTT Security Protocol Design Using Chaotic Signals (혼돈신호를 이용한 IoT의 MQTT 보안 프로토콜 설계)

  • Yim, Geo-Su
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.11 no.6
    • /
    • pp.778-783
    • /
    • 2018
  • With the rapid advancement of information and communication technology and industrial technologies, a hyper-connected society is being realized to connect human beings, all programs and things via the Internet. IoT (Internet of Thing), which connects a thing and another thing, and things and human beings, gathers information to realize the hyper-connected society. MQTT (Message Queuing Telemetry Transport) is a push-technology-based light message transmission protocol that was developed to be optimized to the limited communication environment such as IoT. In pursuing the hyper-connected society, IoT's sensor environment information is now being used as a wide range of information on people's diseases and health management. Thus, security problems of such MQTT include not only the leak of environmental information but also the personal information infringement. To resolve such MQTT security problems, we have designed a new security MQTT communication by applying the initial-value sensitivity and pseudorandomness of the chaotic system to the integrity and confidentiality. The encryption method using our proposed chaotic system offers a simple structure and a small amount of calculation, and it is deemed to be suitable to the limited communication environment such as IoT.

IoT and Wireless Sensor Network Monitoring for Campus Security (캠퍼스 보안을 위한 IoT 및 무선 센서 네트워크 모니터링)

  • Mateen, Ahmed;Zhu, Qingsheng;Afsar, Salman;Usman, Muhammad
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.18 no.6
    • /
    • pp.33-41
    • /
    • 2018
  • The idea of the Internet of Things as a platform on the Smart Campus has become increasingly popular. It requires an infrastructure consisting of communication networks, sensor nodes and gateways to connect to the Internet. Each sensor node is responsible for gathering data from the environment. This document outlines a network of wireless sensors on the Internet for the application of Smart Campus monitoring. Wireless sensor network Monitoring have become a complete solution to using a low power implementation and integrated systems. The numerous restrictions however result from the low communication range, the limited computing power, the lack of availability of the network protocol, the lack of programming security and the security failures in the areas of confidentiality, integrity and availability. A new security technique and its functionality for WSNM nodes developed. Development in the research of a secure network and suggestions for avoiding denial of service (DOS) and complexity attacks. These systems if properly implemented can provide an energy efficiency mechanism through pre-allocation and a new key from key management models with a secure routine algorithm.

A Study on Confidential Records Management System in Japan (일본의 비밀기록관리 체제에 대한 연구 특정비밀보호법 제정·시행을 둘러싼 논의를 중심으로)

  • Nam, Kyeong-ho
    • The Korean Journal of Archival Studies
    • /
    • no.56
    • /
    • pp.113-145
    • /
    • 2018
  • Japan has enacted the Public Records and Archives Management Law from 2011 in order to prevent mismanagement of records management and to fulfill accountability to the public. However, in 2013, The Designated Secrets Protection Act was enacted before the Public Records and Archives Management Law brought changes to administrative institutions. The Designated Secrets Protection Act have raised concerns that the public's right to know and the transparency of administration are being retreated, especially the development of freedom of information and records management systems. This article analyzed the background of the establishment of Designated Secrets Protection Act and the contents of legal composition. It also identified the possibility of human rights abuse in the aptitude assessment system, the lack of independent monitoring agencies, the impossibility of internal accusations, and the possibility of wide confidentiality designation. Furthermore, analyzed how the problem affects Japanese records management and freedom of information system. Through this, I suggested the improvement of the system of the secret level records management system in Korea, the establishment of the clear purpose of the secret record management, the application of the Tshwane principle, and the establishment of the independent and professional monitoring agency.

Implementation and Analysis Performance of CCM-UW based AES, ARIA Blockcipher for Underwater Environment (수중무선통신 환경에 적합한 AES, ARIA 블록암호 기반 CCM-UW 구현 및 성능 분석)

  • Lee, Jae-Hoon;Park, Minha;Yun, Nam-Yeol;Yi, Okyeon;Park, Soo-Hyun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.05a
    • /
    • pp.115-118
    • /
    • 2014
  • Underwater Wireless Communication System can be useful for research of quality of water, ocean resources exploration, analysis ocean environment and so on. However, there exist security threats including data loss, data forgery, and another variety of security threats, because of characteristics of water, various geographical factors, intended attack, etc. To solve these problem, in this paper, we propose a CCM-UW mode of operation modified form of CCM mode of operation, providing data confidentiality, integrity, origin authentication and anti-attack prevent, for the Underwater Wireless Communication System. By implementing CCM-UW in MACA protocol(Underwater Wireless Communication MAC Protocol) and measuring speed of communication, we confirm the applicability of the security and analyze the communication environment impact.

  • PDF

Main Issues and Implications of ICC's 2019 Updated Note to Parties and Arbitral Tribunals on the Conduct of the Arbitration under the ICC Rules of Arbitration: A Focus on ICC's Policy on the Publication of Information Regarding Arbitral Tribunals and Awards (2019년 개정 ICC 중재 진행에 관한 당사자 및 중재판정부 지침의 주요내용과 시사점: ICC의 중재판정부 정보 공개 및 중재판정의 발간 정책을 중심으로)

  • Ahn, Keon-Hyung
    • Journal of Arbitration Studies
    • /
    • v.29 no.2
    • /
    • pp.65-88
    • /
    • 2019
  • The ICC International Court of Arbitration ('the ICC') has published the Note to Parties and Arbitral Tribunals on the Conduct of the Arbitration under the ICC Rules of Arbitration ('2019 Revised Note) which came into force on the 1st of January 2019. The 2019 Revised Note is aimed at providing parties and arbitral tribunals with practical guidance regarding the conduct of arbitrations pursuant to the ICC Arbitration Rules as well as the practices of the ICC. Unless otherwise stipulated, the 2019 Revised Note applies to all ICC arbitration cases, regardless of the version of the ICC Arbitration Rules, in accordance with which they are conducted. The most noteworthy amendment is the introduction of provisions on a new mandatory transparency system by setting forth the publication of the arbitration case data and arbitral awards, maintaining the rule stipulating the provision of information regarding arbitral tribunal under the ICC 2016 Note. Among others, the 2019 Revised Note provides that parties and arbitrators in ICC arbitrations accept that ICC awards made as of the 1st of January 2019 may be published, excluding some exceptions. Under this circumstance, this paper i) explains five amendments of the 2019 ICC Revised Note, ii) examines major issues regarding the publication of information of arbitral tribunal and awards, iii) makes a comparative analysis of that attitude of 11 international arbitration institutions, and lastly iv) suggests recommendations for the Korean arbitration community.

A Study on the Cryptography Technology for Computing Stored and Encrypted Information without Key Leakage (키 유출 없이 저장되고 암호화된 정보를 계산할 수 있는 암호기술에 관한 연구)

  • Mun, Hyung-Jin;Hwang, Yoon-Cheol
    • Journal of Industrial Convergence
    • /
    • v.17 no.1
    • /
    • pp.1-6
    • /
    • 2019
  • Various cryptographic technologies have been proposed from ancient times and are developing in various ways to ensure the confidentiality of information. Due to exponentially increasing computer power, the encryption key is gradually increasing for security. Technology are being developed; however, security is guaranteed only in a short period of time. With the advent of the 4th Industrial Revolution, encryption technology is required in various fields. Recently, encryption technology using homomorphic encryption has attracted attention. Security threats arise due to the exposure of keys and plain texts used in the decryption processing for the operation of encrypted information. The homomorphic encryption can compute the data of the cipher text and secure process the information without exposing the plain text. When using the homomorphic encryption in processing big data like stored personal information in various services, security threats can be avoided because there is no exposure to key usage and decrypted information.

Cloud of Things (CoTs): Security Threats and Attacks

  • Almtrafi, Sara Mutlaq;Alkhudadi, Bdour Abduallatif;Alsuwat, Hatim;Alsuwat, Emad
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.8
    • /
    • pp.229-237
    • /
    • 2021
  • Cloud of things (CoTs) is a newer idea which combines cloud computing (CC) with the Internet of Things (IoT). IoT capable of comprehensively producing data, and cloud computing can be presented pathways that allow for the progression towards specific destinations. Integrating these technologies leads to the formation of a separate element referred to as the Cloud of Things (CoTs). It helps implement ideas that make businesses more efficient. This technology is useful for monitoring a device or a machine and managing or connecting them. Since there are a substantial amount of machines that can run the IoT, there is now more data available from the IoT that would have to be stored on a local basis for a provisional period, and this is impossible. CoTs is used to help manage and analyze data to additionally create usable information by permitting and applying the development of advanced technology. However, combining these elements has a few drawbacks in terms of how secure the process is. This investigation aims to recent study literature from the past 3 years that talk about how secure the technology is in terms of protecting by authentication, reliability, availability, confidentiality, and access control. Additionally, this investigation includes a discussion regarding some kinds of potential attacks when using Cloud of Things. It will also cover what the various authors recommend and conclude with as well as how the situation can be approached to prevent an attack.

IPA Assessment of Hospital Social Responsibility Activities (의료기관 사회적 책임(HSR)활동의 IPA 평가)

  • Cho, Kyoung Won;Sagong, Mi
    • The Korean Journal of Health Service Management
    • /
    • v.12 no.4
    • /
    • pp.1-15
    • /
    • 2018
  • Objectives: We analyzed the importance and performance of hospital social responsibility (HSR) according to the characteristics of hospitals, and presented strategies for HSR activities. Methods: An online HSR questionnaire was sent to hospitals nationwide from October 12 to 26, 2018. The 206 responses received were analyzed in accordance with the IPA to assess the performance and importance of HSR. Results: There was a statistically significant difference between the employees and hospitals regarding the importance and performance of HSR activities. In the area of "sustained maintenance", items related to consumer issues such as "compliance with personal information processing policy", "patient confidentiality", "fair information provision", and "system for patient safety and infection prevention" were derived. In the area of "'high priority for improvement", there were three common items between hospitals and general hospitals: "regular donations and support from local communities", "active cooperation with related institutions", and "compliance with process-related laws and regulations". In the area of "low priority", four items were derived: "support for employee participation in community activities", "efforts to hire local residents", "education and cultural programs for local communities", and "transparent support for political activities". In the area of "sublation of excessive efforts", two items of "employee welfare efforts" and "efforts to improve labor relations", were commonly found in hospitals and general hospitals. Conclusions: It is necessary to improve the management efficiency of hospitals by the systematic allocation of manpower and resources through the establishment of four regional strategies based on the results of IPA analysis.

A Study on the Appropriability Mechanism by Industry: Focus on China Industry (산업별 전유 메커니즘에 관한 연구: 중국 기업을 중심으로)

  • Park, Eun-Mi;Seo, Joung-Hae
    • Journal of Digital Convergence
    • /
    • v.19 no.2
    • /
    • pp.161-168
    • /
    • 2021
  • The corporate environment is undergoing many changes as the transition to a knowledge-based economy accelerates. Many changes are taking place in China, including the strategy of Chinese manufacturer 2025. It has no role in the manufacturing plant and is striving to lead the industry based on advanced technology. Therefore, the purpose of this research is to understand one's own mechanism as a result of technological innovation of Chinese companies. Therefore, in this study, based on the previous study, in the Delphi survey, eight factors were finally derived, and the eight factors were surveyed by practitioners of Chinese companies about their own mechanism. As a result of analysis, the importance of one's mechanism based on the industry as a whole is patent, design registration, lead time, confidentiality, complementary manufacturing, complementary sales and services, design complexity, learning curve effect / economies of scale. In turn, its importance appeared. The results of this study may help corporate practitioners develop their intellectual property strategic plans through their own mechanisms that are tailored to their company.

Survey Research for Evaluation of Real-time Non-face-to-face Medical Education in Clinical Korean Medicine (임상한의학 실시간 비대면교육의 평가를 위한 설문조사 연구)

  • Yang, Seung-Bo
    • The Journal of Internal Korean Medicine
    • /
    • v.41 no.6
    • /
    • pp.984-992
    • /
    • 2020
  • Objectives: This survey research was conducted to evaluate real-time non-face-to-face education in clinical Korean medicine conducted during the COVID-19 outbreak. Methods: This study was conducted with all 3rd and 4th grade students of the Department of Korean Medicine, Gachon University. The Korean Internal Medicine (Pulmonary) lecture course was held from April 1st to July 1st, 2020 for one semester. The lectures were conducted through real-time non-face-to-face education using the Cisco Webex program, and the lectures were mainly conducted by sharing a PowerPoint summarizing textbook. The questionnaire consisted of 3 parts and a total of 18 questions. The survey was conducted anonymously to ensure the confidentiality of all responses. Results: The overall score for real-time non-face-to-face education was 74.69±18.15 points. The efficiency of real-time non-face-to-face education was 2.12±0.78 points, and opinions on the expansion of future use were 2.08±0.91 points and were generally positive. The ratio of non-face-to-face education and face-to-face education in future clinical Korean medicine theory lectures was about 63:27, with a higher proportion of non-face-to-face education. Conclusions: Promoting clinical Korean medicine as a non-face-to-face education has generally been positively evaluated in terms of efficiency and overall, and its use should be expanded in the future. In particular, it will be necessary to use non-face-to-face education in the theory classes of clinical Korean medicine. However, technical problems involving internet, video, equipment, and communication tools will need to be improved in the future.