• Title/Summary/Keyword: forward-secure

Search Result 162, Processing Time 0.026 seconds

Accountable Attribute-based Encryption with Public Auditing and User Revocation in the Personal Health Record System

  • Zhang, Wei;Wu, Yi;Xiong, Hu;Qin, Zhiguang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.1
    • /
    • pp.302-322
    • /
    • 2021
  • In the system of ciphertext policy attribute-based encryption (CP-ABE), only when the attributes of data user meets the access structure established by the encrypter, the data user can perform decryption operation. So CP-ABE has been widely used in personal health record system (PHR). However, the problem of key abuse consists in the CP-ABE system. The semi-trusted authority or the authorized user to access the system may disclose the key because of personal interests, resulting in illegal users accessing the system. Consequently, aiming at two kinds of existing key abuse problems: (1) semi-trusted authority redistributes keys to unauthorized users, (2) authorized users disclose keys to unauthorized users, we put forward a CP-ABE scheme that has authority accountability, user traceability and supports arbitrary monotonous access structures. Specifically, we employ an auditor to make a fair ruling on the malicious behavior of users. Besides, to solve the problem of user leaving from the system, we use an indirect revocation method based on trust tree to implement user revocation. Compared with other existing schemes, we found that our solution achieved user revocation at an acceptable time cost. In addition, our scheme is proved to be fully secure in the standard model.

Security Analysis of Remote Healthcare System in Cloud-based IoT Environment (클라우드 기반 IoT 환경의 원격 헬스케어 시스템에 대한 보안성 분석)

  • Kwon Jaemin;Hong Sewoong;Choi Younsung
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.19 no.1
    • /
    • pp.31-42
    • /
    • 2023
  • As computer performance is leveled upward, the use of IoT systems is gradually expanding. Although IoT systems are used in many fields, it is true that it is difficult to build a safe system due to performance limitations. To overcome these limitations, many researchers have proposed numerous protocols to improve security issues. Among them, Azrour et al. except. We proposed a new efficient and secure authentication protocol for remote healthcare systems in a cloud-based IoT environment, and claimed that the new protocol could solve the security vulnerabilities of the existing protocols and was more efficient. However, in this paper, through the security analysis of the remote healthcare system in the cloud-based IoT environment proposed by Azrour et al., the protocol of this system was found to be vulnerable to Masquerade attack, Lack of Perfect Forward Secrecy, Off-line password guessing attack, and Replay attack.

Efficient Determination of Genomic Variants from Sorghum Genetic Resources by HPC

  • Tae-Ho Lee;Myung-Eun Park;Yun-Ho Oh;Da-Hye Jeon
    • Proceedings of the Korean Society of Crop Science Conference
    • /
    • 2022.10a
    • /
    • pp.241-241
    • /
    • 2022
  • In the digital age, a lot of agricultural R&D is based on data. However, genetic resources are still essential for basic research and agricultural development. Accordingly, many countries are making great efforts to secure various genetic resources. In Korea, the National Agrobiodiversity Center (NAC) has more than 270,000 plant genetic resources so far as part of its efforts. In order to efficiently use the resources for agricultural R&D, it is essential to determine the genotypes of the resources. For this, it is essential to build a system for mass genotyping. For this, sorghum were selected as a model crop considering the genome size, the high-quality reference genome, and the number of resources. To efficiently determine the genotype data from many genetic resources, we developed a GATK pipeline that works efficiently on HPC. The pipeline efficiently and rapidly determined 769 genotypes of 410 genetic resources. Going forward, our team will continue to work to determine genotypes of over a thousand sorghum resources, and the data will be released at the National Agricultural Biotechnology Information Center (NABIC) in order to be used in agricultural R&D.

  • PDF

Enhancing VANET Security: Efficient Communication and Wormhole Attack Detection using VDTN Protocol and TD3 Algorithm

  • Vamshi Krishna. K;Ganesh Reddy K
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.18 no.1
    • /
    • pp.233-262
    • /
    • 2024
  • Due to the rapid evolution of vehicular ad hoc networks (VANETs), effective communication and security are now essential components in providing secure and reliable vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communication. However, due to their dynamic nature and potential threats, VANETs need to have strong security mechanisms. This paper presents a novel approach to improve VANET security by combining the Vehicular Delay-Tolerant Network (VDTN) protocol with the Deep Reinforcement Learning (DRL) technique known as the Twin Delayed Deep Deterministic Policy Gradient (TD3) algorithm. A store-carry-forward method is used by the VDTN protocol to resolve the problems caused by inconsistent connectivity and disturbances in VANETs. The TD3 algorithm is employed for capturing and detecting Worm Hole Attack (WHA) behaviors in VANETs, thereby enhancing security measures. By combining these components, it is possible to create trustworthy and effective communication channels as well as successfully detect and stop rushing attacks inside the VANET. Extensive evaluations and simulations demonstrate the effectiveness of the proposed approach, enhancing both security and communication efficiency.

2-Layered Group Key Management Structure and Protocols using Multi-Core Based Tree (다중 코어 기반 트리를 이용한 2계층 그룹키 관리 구조 및 프로토콜)

  • Cho, Tac-Nam;Kim, Sang-Hee;Eun, Sang-A;Lee, Sang-Ho;Chae, Ki-Joon;Park, Won-Joo;Nah, Jae-Hoon
    • Journal of KIISE:Information Networking
    • /
    • v.29 no.5
    • /
    • pp.583-594
    • /
    • 2002
  • Assuring the security of group communications such as tole-conference and software distribution requires a common group key be shared among the legal members in a secure manner. Especially for large groups with frequent membership change, efficient rekey mechanism is essential for scalability. One of the most popular ways to provide sealable rekey is to partition the group into several subgroups. In this paper, we propose a two-layered key management scheme which combines DEP and CBT, a protocol in which subgroup manager cannot access the multicast data and another that has a multi-core, respectively. We also select sub-group key management protocols suitable for our structure and design new rekey protocols to exclude the subgroup managers from the multicast data. Compared to previous protocols based on CBT, our scheme provides forward secrecy, backward secrecy and scalability. This would reduce the number of encryption and decryption for a rekey message and would improve the efficiency number of rekey messages and the amount of information related to group members that group managers must maintain compared to DEP.

A Study on Design and Implementation of Driver's Blind Spot Assist System Using CNN Technique (CNN 기법을 활용한 운전자 시선 사각지대 보조 시스템 설계 및 구현 연구)

  • Lim, Seung-Cheol;Go, Jae-Seung
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.20 no.2
    • /
    • pp.149-155
    • /
    • 2020
  • The Korea Highway Traffic Authority provides statistics that analyze the causes of traffic accidents that occurred since 2015 using the Traffic Accident Analysis System (TAAS). it was reported Through TAAS that the driver's forward carelessness was the main cause of traffic accidents in 2018. As statistics on the cause of traffic accidents, 51.2 percent used mobile phones and watched DMB while driving, 14 percent did not secure safe distance, and 3.6 percent violated their duty to protect pedestrians, representing a total of 68.8 percent. In this paper, we propose a system that has improved the advanced driver assistance system ADAS (Advanced Driver Assistance Systems) by utilizing CNN (Convolutional Neural Network) among the algorithms of Deep Learning. The proposed system learns a model that classifies the movement of the driver's face and eyes using Conv2D techniques which are mainly used for Image processing, while recognizing and detecting objects around the vehicle with cameras attached to the front of the vehicle to recognize the driving environment. Then, using the learned visual steering model and driving environment data, the hazard is classified and detected in three stages, depending on the driver's view and driving environment to assist the driver with the forward and blind spots.

Strategic and Tactical Use of Naval Ship for Maritime Defense during the reign of King Sejong (조선 세종시대 병선(兵船)의 해방(海防)전략·전술)

  • Min, Jang-won
    • Strategy21
    • /
    • s.44
    • /
    • pp.177-212
    • /
    • 2018
  • The purpose of this article is to examine the 'Discussion of maritime defense' which began to be discussed from the late Goryeo dynasty to the early Joseon dynasty and the process of establishing a maritime defense system. Also it can identify changes in the aspects of the naval ship operation and their strategic tactics during the reign of King Sejong. Japanese raiders began a full-scale invasion from 1350 at the late Goryeo Dynasty, So the government realized the need to raise the 'Sea power' and to organize the maritime defense system for defending enemy invasion. for example, the reinforcement of naval forces, construction of warships, develoment of weapon systems and so on. which have achieved remarkable growth while continuing, have also been used to carry out a three-time 'Conquest of Daemado' in 1389, 1396, 1419. Until then, however, it is difficult to interpret that the naval forces had a systematic and organizational combat operation system. According to fighting patterns on combat reports before the early days of King Sejong's reign, Our naval forces had no advantage over the Japanese raiders in terms of their capabilities and tactics. Then, the period of King Sejong marked a watershed in maritime defense history. Based on accumulated experience of naval battles and force Projections, The paradigm shift of the naval strategic tactics for maritime defense has occurred. First, the capability of the naval vessels has improved. for example, ship speed, durability, and weather resistance. Through these efforts, navy forces were able to pursue and attack, destroy enemy's ships by taking advantage of the 'Ship speed superiority'. This has led to tactical shifts from defensive to offensive. Second, purpose to support offensive tactics, the government put a strategic plan into practice that is the forward depolyment of naval bases from the inland to the coast, considering the 'sea environment' and 'threat'. By doing so, Joseon dynasty was able to secure 'the command of the sea'. This may be a little different from the perception of the so-called 'peace period' that King Sejong's era. We need to remember that Joseon dynasty was working hard for its defense. When studying history of maritime defense, these strategic and tactical elements must be fully considered. Only then we can have a coherent understanding of the many naval battles in the past, including the Imjin War(1592-1598).

Basic study of new concept environment-friendly pile foundations with earthquake resistant foundation and lateral reinforcement on rapid-transit railway bridge (고속철도교 기초 내진 및 수평저항성능 보강형 신개념 친환경말뚝 신공법의 실용화 기초연구)

  • SaGong, Myung;Paik, Kyu-Ho;Lim, Hae-Sik;Cho, Kook-Hwan;Na, Kyung
    • Proceedings of the KSR Conference
    • /
    • 2010.06a
    • /
    • pp.880-894
    • /
    • 2010
  • The Grout injected precast pile is widely used in rapid-transit railway bridge recently. The existing portland cement of well used filling at injected precast method that with low strength and environmental pollution, unstable in which ground water contamination by cement flow out, ground relaxation by water down, decrease of horizontality resistance and durability and load transfer divide etc. In particular, as in rapid-transit railway bridge need to secure safety from different angle with vibration of high speed train, horizontal force when train stop and earthquake. Works of foundation construction consider to requirements of the times to coal yard green growth. Together, new green foundation method for possible economics and securing of reduce the term of works are material to developments. Therefore, we carried out study that it is using and development new concept environment - friendly filling include durability and earthquake resistance, for secure safety and minimize environment pollution. To achieve this, we carried out difference tests that new green fillings of underwater concrete, high liquidity, high viscosity, early stiffness as compared to existing portland cement fillings. As results, new green filling have outstanding application at precast pile method and micropile construction method with vertical bearing capacity, horizontal bearing capacity and many case. From now on we will be looking forward to development of new environment-friendly foundation method from various further studies.

  • PDF

A Study on the Improvement of Public Cloud Technology and Policy (공공 클라우드 기술과 정책의 개선방안에 대한 연구)

  • Kim, So Hui;Lee, Yu Rim;Lee, Il-Gu
    • Journal of Digital Convergence
    • /
    • v.19 no.8
    • /
    • pp.11-20
    • /
    • 2021
  • Due to the Covid-19 Pandemic, the world is facing the most serious crisis since the Great Depression, and is facing a new paradigm of the Untact era. Korea has also announced various policies and legal systems, including the 'Korean version of the New Deal', but it is conflicting between the use of information and the protection of information. In this paper, we derive thresholds by analyzing policies, statutes and technologies in the public cloud. Based on this, we propose to introduce the "Building a Nationwide Public Virtual Machine" as a key task to secure the next-generation national growth engine so that all citizens can use digital services in a secure and reliable environment with equal access to information. Through this, all citizens can use various digital new technology services only with low-priced and low-specification terminals, and by establishing a dedicated center for information protection, we want to respond to rapidly increasing security threats. It also points out that the domestic cloud-related legal system only emphasizes the use of information while overlooking the importance of security, and suggests the right direction for the legal system to move forward.

Weaknesses and Improvement of User Authentication Scheme against Smart-Card Loss Attack (스마트 카드 분실 공격에 안전한 사용자 인증 스킴의 취약점 및 개선방안)

  • Choi, Younsung
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.6
    • /
    • pp.95-101
    • /
    • 2016
  • With the rapid development of Internet and communication network technology, various studies had proceeded to develop the technology of wireless sensor networks. Authentication schemes for user and sensor are critical and important security issue to use wireless sensors legally. First, Das introduce a user authentication scheme using smart card and password for wireless sensor networks, various studies had proceeded. Chem et al. suggested a secure user authentication scheme against smart card loss attack but Chen et al. scheme does not still resolve some security vulnerability such as perfect forward secrecy, session key exposure by gateway node, anonymity, and the password check. To resolve the problems, this paper proposes a security enhanced user authentication using the fuzzy extraction, elliptic curves cryptography and dynamic ID and analyzes the security.