• Title/Summary/Keyword: directory access control

Search Result 11, Processing Time 0.032 seconds

Security Treats about Union File System and Responce Methodology (유니온 파일시스템에 대한 보안 위협 및 대응 방법)

  • Han, Sung-Hwa
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.10a
    • /
    • pp.445-446
    • /
    • 2021
  • Union file system is a technology that can be used as a single file system by integrating various files and directories. It has the advantage of maintaining the source file/directory used for integration, so it is used in many applications like container platform. When using the union file system, the user accesses the write-able layer, to which the security technology provided by the operating system can be applied. However, there is a disadvantage in that it is difficult to apply a separate security technology to the source file and directory used to create the union file system. In this study, we intend to propose an access control mechanism to deny security threats to source file/directory that may occur when using the union file system. In order to verify the effectiveness of the access control mechanism, it was confirmed that the access control mechanism proposed in this study can protect the source file/directory while maintaining the advantages of the union file system.

  • PDF

Content-Based Indexing and Retrieval in Large Image Databases

  • Cha, Guang-Ho;Chung, Chin-Wan
    • Journal of Electrical Engineering and information Science
    • /
    • v.1 no.2
    • /
    • pp.134-144
    • /
    • 1996
  • In this paper, we propose a new access method, called the HG-tree, to support indexing and retrieval by image content in large image databases. Image content is represented by a point in a multidimensional feature space. The types of queries considered are the range query and the nearest-neighbor query, both in a multidimensional space. Our goals are twofold: increasing the storage utilization and decreasing the area covered by the directory regions of the index tree. The high storage utilization and the small directory area reduce the number of nodes that have to be touched during the query processing. The first goal is achieved by absorbing splitting if possible, and when splitting is necessary, converting two nodes to three. The second goal is achieved by maintaining the area occupied by the directory region minimally on the directory nodes. We note that there is a trade-off between the two design goals, but the HG-tree is so flexible that it can control the trade-off. We present the design of our access method and associated algorithms. In addition, we report the results of a series of tests, comparing the proposed access method with the buddy-tree, which is one of the most successful point access methods for a multidimensional space. The results show the superiority of our method.

  • PDF

The design of AIN SDF Server about the application of the X.500 for supporting the SCF/SDF in AIN (AIN에서 SCF/SDF 인터페이스에 X.500 적용을 위한 AIN SDF Server 설계)

  • Park, Mun-Seong;O, Ju-Byeong;Jin, Byeong-Un;Kim, Hye-Gyu;Park, Seong-Yeol
    • The Transactions of the Korea Information Processing Society
    • /
    • v.2 no.5
    • /
    • pp.655-666
    • /
    • 1995
  • Advanced Intelligent Network(AIN) and X.500 directory service have similarity in between. X.500 capabilities and the requirements for the Service Control Function(SCF) to Service Data Function(SDF) in AIN. As an interface, SCF can be mapping as a Directory User Agent(DUA) and SDF can be mapping as a Directory System Agent(DSA). Based on the concepts, X.500 directory can be applied to AIN. In this paper we suggest to apply the X.500 DSP to the SDF/SDF interface to perform a distribution function. Also we show that the SCF-SDF/SDF-SDF relationship can be possible under applying X.500 DAP/DSP within the set of Capability Set 1 (CS1),CS2 and CS3. Finally, based on the above contents, we introduce the designed schematic of AIN SDF Server System for a distributed processing in AIN and design the X.500 schema of Universal Personal Telecommunication(UPT) service for supporting AIN SDF Server.

  • PDF

Developing File Security for Windows Operating System (윈도우 운영체제에서 파일 보안 기능 개발)

  • Jang, Seung-Ju
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.6
    • /
    • pp.1423-1428
    • /
    • 2010
  • This paper designs file security function on Windows O.S. Whenever you use Windows O.S, you need to protect some file data. This paper designs these security protection functions. This paper proposes two security functions on Windows O.S. One is file security. the other is directory access protection. To check the proposed functions well, I experiment the above functions on the Windows O.S. By this experiment, I confirmed that the proposed function worked well.

An Effective Technique for Protecting Application Data using Security Enhanced (SE) Android in Rooted Android Phones (루팅된 안드로이드 폰에서 SEAndroid를 이용한 효과적인 앱 데이터 보호 기법)

  • Jeong, Youn-sik;Cho, Seong-je
    • Journal of KIISE
    • /
    • v.44 no.4
    • /
    • pp.352-362
    • /
    • 2017
  • This paper analyzes security threats in Security Enhanced (SE) Android and proposes a new technique to efficiently protect application data including private information on rooted Android phones. On an unrooted device, application data can be accessed by the application itself according to the access control models. However, on a rooted device, a root-privileged shell can disable part or all of the access control model enforcement procedures. Therefore, a root-privileged shell can directly access sensitive data of other applications, and a malicious application can leak the data of other applications outside the device. To address this problem, the proposed technique allows only some specific processes to access to the data of other applications including private information by modifying the existing SEAndroid Linux Security Module (LSM) Hook function. Also, a new domain type of process is added to the target system to enforce stronger security rules. In addition, the proposed technique separates the directory type of a newly installed application and the directory type of previously installed applications. Experimental results show that the proposed technique can effectively protect the data of each application and incur performance overhead up to or less than 2 seconds.

Overlay2 file system's Source Protection Methodology (Overlay2 파일 시스템의 소스 보호 방법에 관한 연구)

  • Han, Sung-Hwa
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.10
    • /
    • pp.1397-1402
    • /
    • 2021
  • The overlay2 file system is one of the union file systems that mounts multiple directories into one. The source directory used for this overlay2 file system mount has a characteristic that it operates independently of the write-able layer after mounting, so it is often used for container platforms for application delivery. However, the overlay2 file system has a security vulnerability that the write-able layer is also modified when file in the source directory is modified. In this study, I proposed the overlay2 file system protection technology to remove the security vulnerabilities of the overlay2 file system. As a result of empirically implementing the proposed overlay2 file system protection technology and verifying the function, the protection technology proposed in this study was verified to be effective. However, since the method proposed in this study is a passive protection method, a follow-up study is needed to automatically protect it at the operating system level.

The Directory Service System for Efficient Shared-Object Access in Collaborative-Authoring (공동저작에서의 효율적인 공유객체 액세스를 위한 디렉토리 서비스 시스템)

  • 전재우;오삼권
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 1999.10b
    • /
    • pp.233-235
    • /
    • 1999
  • 공동저작 관리 시스템은 효율적인 공동저작을 위해 공유객체관리기능, 세션관리기능, 텔리포인팅(telepointing) 기능, 그리고 공동저작 인지(collaboration awareness) 기능들을 제공해야 한다. 이 중 공유객체관리기능은 저작자로 하여금 등록된 공유객체들을 편리하게 액세스 할 수 있도록 하고 저작에 필요한 공유객체들을 등록, 변경, 그리고 삭제할 수 있도록 함으로써 작업효율을 증대시킬 수 있는 핵심기능이다. 최근의 연구는 주로 등록된 공유객체의 변경 및 불필요한 정보전송으로 인한 작업지연, 그리고 공유객체 액세스 권한의 효율적인 관리를 위한 플로어 제어(floor control)에 그 초점을 맞추고 있으나 공유객체관리를 위한 기법이나 구조에 관한 연구는 미흡하다. 편리한 공동저작을 위해서는 분산환경의 특징상 가 저작자들의 시스템에 자연스럽게 분산되어 있는 공유객체들을 저작자나 공유객체들의 실제 위치에 상관없이 액세스할 수 있도록 하고, 저작자로 하여금 공유객체의 등록 시에 유일명 부여(unique naming)를 가능하게 하여 필요한 공유객체를 쉽게 검색할 수 있도록 해야 한다. 이를 위해 본 논문은 공유객체 디렉토리 서비스(shared-object directory service)를 제안한다. 공유객체 디렉토리 서비스는 일반 디렉토리(normal directory)와 세션 디렉토리(session directory)를 저작자에게 제공하여 공유객체의 등록시에 유일명 부여를 가능하게 하고 필요한 공유객체 검색을 용이하게 한다.

  • PDF

Design of a Policy based Privacy Protection System using Encryption Techniques (암호기법을 이용한 정책기반 프라이버시보호시스템설계)

  • Mun Hyung-Jin;Li Yong-Zhen;Lee Dong-Heui;Lee Sang-Ho;Lee Keon-Myung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.2
    • /
    • pp.33-43
    • /
    • 2006
  • In order to provide the efficient personalized services, the organizations and the companies collect and manage the personal information. However, there have been increasing privacy concerns since the personal information might be misused and spread over in public by the database administrators or the information users. Even in the systems in which organizations or companies control access to personal information according to their access policy in order to protect personal information, it is not easy to fully reflect the information subjects' intention on the access control to their own Personal information. This paper proposes a policy-based access control mechanism for the personal information which prevents unauthorized information users from illegally accessing the personal information and enables the information subjects to control access over their own information. In the proposed mechanism, the individuals' personal information which is encrypted with different keys is stored into the directory repository. For the access control, information subjects set up their own access control policy for their personal information and the policies are used to provide legal information users with the access keys.

Implementation of a DB-Based Virtual File System for Lightweight IoT Clouds (경량 사물 인터넷 클라우드를 위한 DB 기반 가상 파일 시스템 구현)

  • Lee, Hyung-Bong;Kwon, Ki-Hyeon
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.3 no.10
    • /
    • pp.311-322
    • /
    • 2014
  • IoT(Internet of Things) is a concept of connected internet pursuing direct access to devices or sensors in fused environment of personal, industrial and public area. In IoT environment, it is possible to access realtime data, and the data format and topology of devices are diverse. Also, there are bidirectional communications between users and devices to control actuators in IoT. In this point, IoT is different from the conventional internet in which data are produced by human desktops and gathered in server systems by way of one-sided simple internet communications. For the cloud or portal service of IoT, there should be a file management framework supporting systematic naming service and unified data access interface encompassing the variety of IoT things. This paper implements a DB-based virtual file system maintaining attributes of IoT things in a UNIX-styled file system view. Users who logged in the virtual shell are able to explore IoT things by navigating the virtual file system, and able to access IoT things directly via UNIX-styled file I O APIs. The implemented virtual file system is lightweight and flexible because it maintains only directory structure and descriptors for the distributed IoT things. The result of a test for the virtual shell primitives such as mkdir() or chdir() shows the smooth functionality of the virtual file system, Also, the exploring performance of the file system is better than that of Window file system in case of adopting a simple directory cache mechanism.

A Mechanism for Policy-based QoS Control on COPS Interface in NGN (NGN 에서 COPS 를 이용한 정책(Policy) 기반 QoS 제어 메커니즘)

  • Song, Sung-Han;Kim, Yang-Jung;Lee, Dong-Kyu;Chong, Il-Young
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2007.05a
    • /
    • pp.1342-1345
    • /
    • 2007
  • 현재 NGN 망에서 강조되는 QoS 보장 기술은 인터넷에서 QoS(Quality of Service) 제공을 위해 해당 응용 서비스 마다 자원을 예약하거나 할당하는 기능을 수행하며, 이 때, 효율적인 종단간의 QoS 보장을 위해서는 전체적으로 자원관리를 할 필요가 생긴다. 정책(Policy) 기반 QoS 기술 관리는 이 경우에 수행이 된다. NGN 망에서의 정책 기반 QoS 기술을 위해서는 정책 기반 QoS 관리 기술 구조 및 프로토콜에 대한 총괄적인 이해가 우선되어야 한다. 즉, 정책 결정 및 정책 실행과 관련한 정책 기반 QoS 관리 기술 구조와 프로토콜 관련한 COPS(Common Open Policy Service)와 LDAP(Light Weight Directory Access Protocol)을 중심으로 이해가 되어야 하고, 이를 토대로 해서 정책 기반 QoS 관리 기술 서비스가 제공 될 수 있다.