• Title/Summary/Keyword: identity based

Search Result 2,344, Processing Time 0.047 seconds

Fine-Grained and Traceable Key Delegation for Ciphertext-Policy Attribute-Based Encryption

  • Du, Jiajie;HelIl, Nurmamat
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.9
    • /
    • pp.3274-3297
    • /
    • 2021
  • Permission delegation is an important research issue in access control. It allows a user to delegate some of his permissions to others to reduce his workload, or enables others to complete some tasks on his behalf when he is unavailable to do so. As an ideal solution for controlling read access on outsourced data objects on the cloud, Ciphertext-Policy Attribute-Based Encryption (CP-ABE) has attracted much attention. Some existing CP-ABE schemes handle the read permission delegation through the delegation of the user's private key to others. Still, these schemes lack the further consideration of granularity and traceability of the permission delegation. To this end, this article proposes a flexible and fine-grained CP-ABE key delegation approach that supports white-box traceability. In this approach, the key delegator first examines the relations between the data objects, read permission thereof that he intends to delegate, and the attributes associated with the access policies of these data objects. Then he chooses a minimal attribute set from his attributes according to the principle of least privilege. He constructs the delegation key with the minimal attribute set. Thus, we can achieve the shortest delegation key and minimize the time of key delegation under the premise of guaranteeing the delegator's access control requirement. The Key Generation Center (KGC) then embeds the delegatee's identity into the key to trace the route of the delegation key. Our approach prevents the delegatee from combining his existing key with the new delegation key to access unauthorized data objects. Theoretical analysis and test results show that our approach helps the KGC transfer some of its burdensome key generation tasks to regular users (delegators) to accommodate more users.

Modern reinterpretation and succession of Balenciaga design by Demna Gvasalia (뎀나 바잘리아에 의한 발렌시아가 디자인의 현대적 계승과 재해석)

  • Kim, Jiyoung;An, Hyosun
    • The Research Journal of the Costume Culture
    • /
    • v.29 no.2
    • /
    • pp.185-203
    • /
    • 2021
  • The aim of this study was to reveal the modern succession and reinterpretation of brand identity through the case of Balenciaga design presented by Demna Gvasalia through a review of the literature, design collection, and design review analysis. The design collection analysis was conducted from 2016 F/W to 2020 F/W, when Demna Gvasalia commenced responsibility for the Balenciaga collection. A total of 12 articles from overseas fashion magazines and newspapers were analyzed. A modern reinterpretation of Demna Gvasalia's Balenciaga design is as follows. First, he introduced luxury mode to reflect a sense of the times and introduced luxury street looks based on street and sports sensibilities, showing various styles without specific concepts. Second, by sharing universal sensibilities based on pragmatism, he proposed an easy-to-wear outfit for daily life to demonstrate the everydayness of fashion. Third, as a new exploration of traditional structural beauty, the design of Cristobal Balenciaga was reinterpreted through the conversion of items, overlapping outfits, and the introduction of high-tech technologies. Fourth, by taking a conceptual approach to fashion, he has renewed the spirit of experimentation and modernity shown by Cristobal Balenciaga. Fifth, with the presentation of a new icon, new styles of sneakers such as Triple S and Speed Runner are presented as new icons. He inherited the original mindset and creative approach of the house's founder, Cristobal Balenciaga, and reinterpreted it from a contemporary street sensibility and pragmatic perspective.

A Study on The Classification of Target-objects with The Deep-learning Model in The Vision-images (딥러닝 모델을 이용한 비전이미지 내의 대상체 분류에 관한 연구)

  • Cho, Youngjoon;Kim, Jongwon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.2
    • /
    • pp.20-25
    • /
    • 2021
  • The target-object classification method was implemented using a deep-learning-based detection model in real-time images. The object detection model was a deep-learning-based detection model that allowed extensive data collection and machine learning processes to classify similar target-objects. The recognition model was implemented by changing the processing structure of the detection model and combining developed the vision-processing module. To classify the target-objects, the identity and similarity were defined and applied to the detection model. The use of the recognition model in industry was also considered by verifying the effectiveness of the recognition model using the real-time images of an actual soccer game. The detection model and the newly constructed recognition model were compared and verified using real-time images. Furthermore, research was conducted to optimize the recognition model in a real-time environment.

Robust Fuzzy Fingerprint Vault System against Correlation Attack (상관관계 공격에 강인한 지문퍼지볼트 시스템)

  • Moon, Dae-Sung;Chae, Seung-Hoon;Chung, Yong-Wha;Kim, Sung-Young;Kim, Jeong-Nyeo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.2
    • /
    • pp.13-25
    • /
    • 2011
  • Biometric-based authentication can provide strong security guarantee about the identity of users. However, security of biometric data is particularly important as the compromise of the data will be permanent. The fuzzy fingerprint vault system is one of the most popular solutions for protecting the fingerprint template stored in the database. Recently, however, this system is very susceptible to a correlation attack that finds the real minutiae using multiple fingerprint vaults enrolled for different applications. To solve this problem, we propose a robust fuzzy fingerprint vault system against the correlation attack. In this paper, we add chaff minutiae based on the relative information of minutiae such as direction, coordinate instead of adding randomly. Also, our proposed approach allow to add multiple chaff minutiae within tolerance box for enhanced security level. Experimental results show that the proposed approach can protect the correlation attack and achieve enhanced verification accuracy.

The Characteristics of Fashion Flex on Social Media (소셜 미디어 속 패션 플렉스(Flex) 현상의 특성)

  • Park, Juha;Chun, Jaehoon
    • Fashion & Textile Research Journal
    • /
    • v.23 no.1
    • /
    • pp.31-43
    • /
    • 2021
  • This study analyzes the characteristics of fashion flex, which have recently spread on social media. The study was conducted with big data analysis that derived flex keywords from news articles and social media as well as case studies that collected 136 posted images on Instagram to analyze the content. The meaning of flex was positively accepted based on big data results. Flex was also a buzzword frequently used on social media as well as a symbolic meaning when discussing luxury goods or fashion brand experiences. The characteristics of fashion flex in social media were largely divided into three categories. First, conspicuous consumption is considered an active expression of individual fashion tastes or self-oriented consumption and emphasizes individuality through consumption. The second characteristic is that the public actively participates in events or fashion flex challenges. People use similar fashion styles or products to participate in playful social interactions with others using various Instagram functions. Finally, acts of pursuing psychological well-being in social media were used as the term flex in a broad sense and were shown to actively explore fashion-related materials and experiences for individual happiness. This study found that the meaning of existing conspicuous consumption is transforming into positive consumption, such as the expression of taste-based identity or the seeking of fun and psychological well-being. It is also meaningful that fashion has become an effective means to express individuality and taste in expressing flex.

Development of Semi-Supervised Deep Domain Adaptation Based Face Recognition Using Only a Single Training Sample (단일 훈련 샘플만을 활용하는 준-지도학습 심층 도메인 적응 기반 얼굴인식 기술 개발)

  • Kim, Kyeong Tae;Choi, Jae Young
    • Journal of Korea Multimedia Society
    • /
    • v.25 no.10
    • /
    • pp.1375-1385
    • /
    • 2022
  • In this paper, we propose a semi-supervised domain adaptation solution to deal with practical face recognition (FR) scenarios where a single face image for each target identity (to be recognized) is only available in the training phase. Main goal of the proposed method is to reduce the discrepancy between the target and the source domain face images, which ultimately improves FR performances. The proposed method is based on the Domain Adatation network (DAN) using an MMD loss function to reduce the discrepancy between domains. In order to train more effectively, we develop a novel loss function learning strategy in which MMD loss and cross-entropy loss functions are adopted by using different weights according to the progress of each epoch during the learning. The proposed weight adoptation focuses on the training of the source domain in the initial learning phase to learn facial feature information such as eyes, nose, and mouth. After the initial learning is completed, the resulting feature information is used to training a deep network using the target domain images. To evaluate the effectiveness of the proposed method, FR performances were evaluated with pretrained model trained only with CASIA-webface (source images) and fine-tuned model trained only with FERET's gallery (target images) under the same FR scenarios. The experimental results showed that the proposed semi-supervised domain adaptation can be improved by 24.78% compared to the pre-trained model and 28.42% compared to the fine-tuned model. In addition, the proposed method outperformed other state-of-the-arts domain adaptation approaches by 9.41%.

A Study on the Implementation of a Web-browser-based Global e-Navigation Service Discovery System for Decentralized Maritime Service Registries (탈중앙화 MSR 환경에서의 웹 브라우저 기반 글로벌 이내비게이션 서비스 검색 시스템 구현에 대한 연구)

  • Jinki, Jung;Young-Joong, Ahn
    • Journal of Navigation and Port Research
    • /
    • v.46 no.6
    • /
    • pp.501-508
    • /
    • 2022
  • The flow of global digitalization is leading to the emergence of a decentralized system environment based on blockchain or distributed ledger technology in the fields of economy, identity authentication, and logistics. Accordingly, a requirement that public services be searchable from several decentralized maritime service registries (MSRs) has been derived in terms of the discoverability of e-navigation services. This study describes a decentralized MSR environment composed of the MSR ledger and multiple local MSRs, and it has implemented a service search system that can search global e-navigation services in the environment through a web browser. This system is a decentralized application that dynamically generates service attributes, geometry information, and free text queries, and that provides users with relevant MSR and service access information from search results that are registered in the MSR ledger. In this study, we tested the established decentralized MSR environment and the system that performs service search within that environment, and we discussed its advantages and limitations.

An Enhancement of The Enterprise Security for Access Control based on Zero Trust (제로 트러스트 기반 접근제어를 위한 기업 보안 강화 연구)

  • Lee, Seon-A;Kim, Beomseok;Lee, Hyein;Park, Wonhyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.2
    • /
    • pp.265-270
    • /
    • 2022
  • With the advent of the Fourth Industrial Revolution, the paradigm of finance is also changing. As remote work becomes more active due to cloud computing and coronavirus, the work environment changes and attack techniques are becoming intelligent and advanced, companies should accept new security models to further strengthen their current security systems. Zero trust security increases security by monitoring all networks and allowing strict authentication and minimal access rights for access requesters with the core concept of doubting and not trusting everything. In addition, the use of NAC and EDR for identification subjects and data to strengthen access control of the zero trust-based security system, and strict identity authentication through MFA will be explained. Therefore, this paper introduces a zero-trust security solution that strengthens existing security systems and presents the direction and validity to be introduced in the financial sector.

A Study on the Value of Kanga as an Ethos of the Swahili Culture (스와힐리 문화의 기풍으로써 캉가의 가치)

  • Lee, Hyojin
    • Fashion & Textile Research Journal
    • /
    • v.24 no.1
    • /
    • pp.42-52
    • /
    • 2022
  • The goal of this study is to analyze the value of Kanga as an ethos of the Swahili culture. The theoretical background of the research method was the analysis of the domestic and foreign literature, journals, and research data from various internet sites related to the subject, and the conclusion was drawn based on these studies. With the spread Pan-Africanism, the interest in African ethos has become a source of inspiration for contemporary fashion. Moreover, as a symbol of Swahili culture in East Africa, Kanga has been developed by embracing its own diverse cultures, The unique feature of Kanga is that it can easily be transformed created ceaselessly and creatively. Consequently, the following results were obtained based on the theoretical content. Firstly, as a representative of Women's Voice, Kanga serves as an outlet for the voices of women coming from a poor social status under the political background in East Africa. Secondly, as a Reliable Advocate, Kanga performs the positive functions as a medium of communication through its traditional usage and distinctive arrangement of clothes. Thirdly, as a Versatile Messenger, the uniqueness of Kanga with the external elements in most interestingly and active mannerly, and it has become the value of communication channel which clearly inspired the fashion designers. I believe that it will be interesting and meaningful to study the strategies on the social role of Kanga in the future which has started receiving more attention in the 21st century. And it can be said that Kanga's unique identity lies in the attraction and value which influences contemporary fashion.

Design of DID-based Verification Protocol for Strengthening Copyright Holders' Sovereignty (저작권자의 주권 강화를 위한 DID 기반 검증 프로토콜 설계)

  • Kim, Ho-Yoon;Shin, Seung-Soo
    • Journal of Industrial Convergence
    • /
    • v.20 no.9
    • /
    • pp.47-58
    • /
    • 2022
  • Digital content is difficult to distinguish between the original and the replica due to its nature. For this reason, NFT technology using blockchain technology is attracting attention because it can guarantee the proof and scarcity of the original digital content. However, the NFT buyer does not own the copyright to the digital content, but the ownership. In particular, since the minting process of issuing NFTs is possible for anyone, there is a copyright threat to the copyright holder. In this study, we propose a verification protocol based on DID for the process of issuing and transacting NFTs for copyright protection of copyright holders' digital contents. As a research method, the problems of research cases related to digital contents were analyzed and the safety was comparatively analyzed. NFT issuance can only be issued by copyright holders whose identity has been verified through DID, and only users who have completed authentication can participate in the transaction to prevent indiscriminate theft and use of digital content and form a safe and transparent transaction market.