• Title/Summary/Keyword: file recovery

Search Result 115, Processing Time 0.021 seconds

Distributed Access Privilege Management for Secure Cloud Business (안전한 클라우드 비즈니스를 위한 접근권한 분산관리)

  • Song, You-Jin;Do, Jeong-Min
    • The KIPS Transactions:PartC
    • /
    • v.18C no.6
    • /
    • pp.369-378
    • /
    • 2011
  • To ensure data confidentiality and fine-grained access control in business environment, system model using KP-ABE(Key Policy-Attribute Based Encryption) and PRE(Proxy Re-Encryption) has been proposed recently. However, in previous study, data confidentiality has been effected by decryption right concentrated on cloud server. Also, Yu's work does not consider a access privilege management, so existing work become dangerous to collusion attack between malicious user and cloud server. To resolve this problem, we propose secure system model against collusion attack through dividing data file into header which is sent to privilege manager group and body which is sent to cloud server. And we construct the model of access privilege management using AONT based XOR threshold Secret Sharing, In addition, our scheme enable to grant weight for access privilege using XOR Share. In chapter 4, we differentiate existing scheme and proposed scheme.

Hybrid TCP PEP Scheme, Mixture of Error Recovery Method and the TCP Hybla in Satellite Communications (위성통신에서 에러 복구 방법과 TCP Hybla를 결합한 Hybrid TCP PEP 기법)

  • Lee, Seunglyong;Kim, Jong-Mu;Oh, Ji-Hoon;Kim, Jae-Hyun
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.53 no.11
    • /
    • pp.15-22
    • /
    • 2016
  • In satellite communication, transmission performance is degraded due to long propagation delay and relatively high data loss compared to terrestrial network. In this paper, We propose Hybrid TCP PEP scheme with XOR coding and Hybla TCP, which reduces the transmission performance degradation due to the transmission delay time. Experimental results show that the proposed method improves the file transfer rate by more than 10% in the environment with high channel error rate. Therefore, Hybrid TCP, which is a mixture of XOR coding method and TCP Hybla, is considered to contribute to the improvement of transmission speed in satellite communication when applied to connection split PEP.

The Method of Recovery for Deleted Record of Realm Database (Realm 데이터베이스의 삭제된 레코드 복구 기법)

  • Kim, Junki;Han, Jaehyeok;Choi, Jong-Hyun;Lee, Sangjin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.3
    • /
    • pp.625-633
    • /
    • 2018
  • Realm is an open source database developed to replace SQLite, which is commonly used in mobile devices. The data stored in the database must be checked during the digital forensic analysis process for mobile devices because it can help to understand the behavior of the user and whether the mobile device is operating or not. In addition, since the user can intentionally use anti-forensic techniques such as deleting data stored in the database, research on how to recover deleted records is needed. In this paper, we propose a method to recover records that have not been overwritten after deletion based on the analysis of the structure and record and deletion process of the Realm database file.

Carving deleted voice data in mobile (삭제된 휴대폰 음성 데이터 복원 방법론)

  • Kim, Sang-Dae;Byun, Keun-Duck;Lee, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.1
    • /
    • pp.57-65
    • /
    • 2012
  • People leave voicemails or record phone conversations in their daily cell phone use. Sometimes important voice data is deleted by the user accidently, or purposely to cover up criminal activity. In these cases, deleted voice data must be able to be recovered for forensics, since the voice data can be used as evidence in a criminal case. Because cell phones store data that is easily fragmented in flash memory, voice data recovery is very difficult. However, if there are identifiable patterns for the deleted voice data, we can recover a significant amount of it by researching images of it. There are several types of voice data, such as QCP, AMR, MP4, etc.. This study researches the data recovery solutions for EVRC codec and AMR codec in QCP file, Qualcumm's voice data format in cell phone.

분산 환경하에서의 데이타관리 분류체계에 대한 연구

  • 박주석;편흥렬
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 1994.04a
    • /
    • pp.49-57
    • /
    • 1994
  • 진정한 의미의 다운사이징을 구현하기 위해서는 필요한 분산데이타베이스의 구현은 현재 여러가지 기술적인 문제점들을 안고 있다. 따라서 동시성 제어(concurrency control)와 갱신 (update propagation), 복구(recovery), 질의어 처리(query processing), 카달로그 관리(catalog management)등과 같은 분산 환경에서의 데이타베이스에 관련된 기술적인 문제점들을 해결하기 위해서는 어떠한 최적의 방법들을 개발해야만 한다. 이러한 방법들의 개발은 관계형 데이타베이스의 데이타관리 분류체계를 통한 대안들의 선택과 운용에 의해 가능할 것이다. 분산 환경하에서 사용되어질 수 있는 관계형 데이타베이스의 데이타관리 분류체계를 availability, expression, currency의 관점에서 Basic table과 view로 구분하여 정립해 보았다. Basic table은 current update가 필수적이므로 availability와 expression의 관점에서 분류하였고, view는 physical file의 존재성 유무와 시간적 실행의 차이를 기준으로 분류하였다. 그리고 이러한 분류기준에 따른 특성들을 분산데이타베이스 구축에 이용하는 방법들에 대해 이야기 하였다. 다시 말해 non-current materialized view 뿐만 아니라 current materialized view를 동시에 지원하는 하나의 distributed view update architecture를 개발하는 것에 대해 하나의 방법으로 제시하였다. 즉 immediate update와 deferred update는 current view를 이용하고 periodical update는 non-current view를 이용하여 100%의 distributed data resources를 관리 할 수 있는 효율적인 distributed system를 개발하는 것을 제시하였다. 본 논문은 데이타베이스론의 입장에서 아직 정립되어 있지 않은 분산 환경하에서의 관계형 데이타베이스의 데이타관리의 분류체계를 나름대로 정립하였다는데 그 의의가 있다. 또한 이것의 응용은 현재 분산데이타베이스 구축에 있어 나타나는 기술적인 문제점들을 어느정도 보완할 수 있다는 점에서 그 중요성이 있다.

A Study of Construct Dictionary File for Password Recovery in Digital Forensics Investigation (디지털 포렌식 관점에서 패스워드 복구를 위한 사전 파일 구축 방안 연구)

  • Lim, Jong-Min;Kwon, Hyuk-Don;Choi, Jae-Min;Lee, Sang-Jin
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2008.02a
    • /
    • pp.155-158
    • /
    • 2008
  • 기술이 발전함에 따라 컴퓨터 범죄는 점차 증가하고 있으며, 용의자는 사건의 증거가 될 수 있는 파일들에 대해 패스워드 기능을 제공하는 응용프로그램을 활용하여 증거물에 대해 의도적인 접근을 막고 있다. 이로 인해 수사관은 암호화된 파일들에 대해 접근이 매우 어려운 상황이며, 해결 방안으로써 패스워드 복구 프로그램이 대안이 될 수 있다. 하지만 대다수의 패스워드 복구 프로그램들은 단순한 전수조사 공격 방식을 지원하거나 국가별 특징을 고려하지 않은 영문용 사전파일을 적용하여 복구하고 있기 때문에, 국내수사 환경에서 패스워드 검색에 한계가 따르고 있다. 따라서 수사관이 암호화된 파일에 대해 효율적으로 검색할 수 있는 방안이 필요하며, 이를 통해 빠른 시간 내에 증거물을 복구할 수 있는 방안이 강구되어야 한다. 본 논문에서는 최근 국내외 사전구축 사례 및 동향을 조사함으로써 효율적인 패스워드 사전 파일을 구축할 수 있는 방안을 제시하며, 이와 함께 용의자의 개인적인 정보를 이용하여 최적화된 사전파일을 생성할 수 있는 방안에 대해 설명한다.

  • PDF

An Efficient Design and Implementation of an MdbULPS in a Cloud-Computing Environment

  • Kim, Myoungjin;Cui, Yun;Lee, Hanku
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.8
    • /
    • pp.3182-3202
    • /
    • 2015
  • Flexibly expanding the storage capacity required to process a large amount of rapidly increasing unstructured log data is difficult in a conventional computing environment. In addition, implementing a log processing system providing features that categorize and analyze unstructured log data is extremely difficult. To overcome such limitations, we propose and design a MongoDB-based unstructured log processing system (MdbULPS) for collecting, categorizing, and analyzing log data generated from banks. The proposed system includes a Hadoop-based analysis module for reliable parallel-distributed processing of massive log data. Furthermore, because the Hadoop distributed file system (HDFS) stores data by generating replicas of collected log data in block units, the proposed system offers automatic system recovery against system failures and data loss. Finally, by establishing a distributed database using the NoSQL-based MongoDB, the proposed system provides methods of effectively processing unstructured log data. To evaluate the proposed system, we conducted three different performance tests on a local test bed including twelve nodes: comparing our system with a MySQL-based approach, comparing it with an Hbase-based approach, and changing the chunk size option. From the experiments, we found that our system showed better performance in processing unstructured log data.

A Study on the Preservation Policy for Maintaining the Integrity of Digital Contents (디지털 콘텐츠의 무결성 유지를 위한 장기적인 보존 정책에 관한 연구)

  • Jung, Young-Mi;Yoon, Hwa-Mook;Kim, Jeong-Taek
    • Journal of Information Management
    • /
    • v.41 no.4
    • /
    • pp.205-226
    • /
    • 2010
  • Assuring that the integrity of digital contents is reliably maintained is an important component of long-term digital preservation. The purpose of this study was to examine and analysis the best practices of digital preservation policy and provide the basis theory for establishing a preservation policy for maintaining the integrity of digital contents. In order to achieve the purpose of the study, we examined the digital archiving practices for maintaining the integrity of digital contents. Especially, we focused on the storage media and file formats, the media and format conversion, disaster prevention and recovery, management and handling, inspection and monitoring, and security policies.

The Recovery and Analysis of Digital Data in Digital Multifunction Copiers with a Digital Forensics Perspective (디지털포렌식 관점에서의 디지털복합기내 데이터 복구 및 분석)

  • Park, Il-Shin;Kang, Cheul-Hoon;Choi, Sung-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.6
    • /
    • pp.23-32
    • /
    • 2010
  • Caused by the development of IT environment, the frequency of using the embedded machines is increasing in our regular life. A typical example of these embedded machines is a Multi Function Copier and it has various functions; it is used as copier, scanner, fax machine, and file server. We would like to check the existence of and the way to abstract the data that may have been saved through using the scanner of the multi function printer and discuss how to use those data as the evidence.

Analysis of the Physical Properties of Ground before and after Low Flowing Grouting (저유동성 그라우팅 시공전후 지반의 물성변화 분석)

  • Seo, Seok-Hyun;Lee, Jung-Sang;Kang, Won-Dong;Jung, Euiyoup
    • Journal of the Korean Geosynthetics Society
    • /
    • v.18 no.4
    • /
    • pp.115-127
    • /
    • 2019
  • The low-flow grouting injection technique, the target construction method for this study, is a method of pouring mortar into the ground by non-emission replacement principle, which can be expected to increase the density of the ground, and, in some cases, be used as a base file using the strength of the high injection solids, along with low noise, low pollution, and high durability. To verify that the dynamic characteristics of the ground are improved by the low-flow injection technique, the test work was conducted on the site and physical tests were performed, and the quality of the improvement formed in the ground was verified through the indoor test on the core and core recovery rate was analyzed. The density logs test layer calculated the volume density of the ground layer by using the Compton scattering of gamma-rays, and the sonic logs was tested on the ground around the drill hole using a detector consisting of sonar and receiver devices inside the drill hole. As a result of the measurement of the change in physical properties (density and sonic logs) before and after grouting, both properties were basically increased after infusion of grout agent. However, the variation in density increase was greater than the increase in speed after grouting, and the ground density measurement method was thought to be effective in measuring the fill effect of the filler. Strength and core recovery rates were measured from specimens taken after the age of 28 days, and the results of the test results of the diffusion and strength test of the improved products were verified to satisfy the design criteria, thereby satisfying the seismic performance reinforcement.