• Title/Summary/Keyword: private cloud

Search Result 140, Processing Time 0.032 seconds

Security Model Tracing User Activities using Private BlockChain in Cloud Environment (클라우드 환경에서 프라이빗 블록체인을 이용한 이상 행위 추적 보안 모델)

  • Kim, Young Soo;Kim, Young Chan;Lee, Byoung Yup
    • The Journal of the Korea Contents Association
    • /
    • v.18 no.11
    • /
    • pp.475-483
    • /
    • 2018
  • Most of logistics system has difficulties in transportation logistics tracking due to problems in real world such as discordance between logistics information and logistics flow. For the solution to these problems, through case study about corporation, suppliers that transport order items in shopping mall, we retain traceability of order items through accordance between logistics and information flow and derive transportation logistics tracking model. Through literature review, we selected permissioned public block chain model as reference model which is suitable for transportation logistics tracking model. We compared, analyzed and evaluated using centralized model and block chain as application model for transportation logistics tracking model. In this paper we proposed transportation logistics tracking model which integrated with logistics system in real world. It can be utilized for tracking and detection model and also as a tool for marketing.

Records and Information Management Issues and Trends Traced from ARMA's 'Information Management' ('Information Management'지에 나타난 기록정보관리 분야의 이슈와 동향)

  • Yoon, Yeo Hyun;Lee, Bo Ram;Choi, Dong Woon;Choi, Yun Jin;Yim, Jin Hee
    • Journal of the Korean Society for information Management
    • /
    • v.33 no.4
    • /
    • pp.245-267
    • /
    • 2016
  • ARMA International has been leading education and publication in records and information management industry worldwide. This study aimed to trace issues and trends in international records and information management field through analysing the articles brought up in Information Management, which is ARMA International's official magazine. Further analysis was also conducted on noticeable subjects from the magazine in order to realize where we currently are. Scanning the contents of Information Management would definitely provide with implications and suggestions to Korean private companies as well as records management communities.

Evaluation of Distributed Intrusion Detection System Based on MongoDB (MongoDB 기반의 분산 침입탐지시스템 성능 평가)

  • Han, HyoJoon;Kim, HyukHo;Kim, Yangwoo
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.8 no.12
    • /
    • pp.287-296
    • /
    • 2019
  • Due to the development and increased usage of Internet services such as IoT and cloud computing, a large number of packets are being generated on the Internet. In order to create a safe Internet environment, malicious data that may exist among these packets must be processed and detected quickly. In this paper, we apply MongoDB, which is specialized for unstructured data analysis and big data processing, to intrusion detection system for rapid processing of big data security events. In addition, building the intrusion detection system(IDS) using some of the private cloud resources which is the target of protection, elastic and dynamic reconfiguration of the IDS is made possible as the number of security events increase or decrease. In order to evaluate the performance of MongoDB - based IDS proposed in this paper, we constructed prototype systems of IDS based on MongoDB as well as existing relational database, and compared their performance. Moreover, the number of virtual machine has been increased to find out the performance change as the IDS is distributed. As a result, it is shown that the performance is improved as the number of virtual machine is increased to make IDS distributed in MongoDB environment but keeping the overall system performance unchanged. The security event input rate based on distributed MongoDB was faster as much as 60%, and distributed MongoDB-based intrusion detection rate was faster up to 100% comparing to the IDS based on relational database.

Study on Location Decisions for Cloud Transportation System Rental Station (이동수요 대응형 클라우드 교통시스템 공유차량 대여소 입지선정)

  • Shin, Min-Seong;Bae, Sang-Hoon
    • Journal of Korean Society of Transportation
    • /
    • v.30 no.2
    • /
    • pp.29-42
    • /
    • 2012
  • Recently, traffic congestion has become serious due to increase of private car usages. Carsharing or other innovative public transportation systems were developed to alleviate traffic congestion and carbon emissions. These measures can make the traffic environment more comfortable, and efficient. Cloud Transportation System (CTS) is a recent carsharing model. User can rent an electronic vehicles with various traffic information through the CTS. In this study, a concept, vision and scenarios of CTS are introduced. And, authors analyzed the location of CTS rental stations and estimated CTS demands. Firstly, we analyze the number of the population, employees, students and traffic volume in study areas. Secondly, the frequency and utilization time are examined. Demand for CTS in each traffic zone was estimated. Lastly, the CTS rental station location is determined based on the analyzed data of the study areas. Evaluation standard of the determined location includes accessibility and density of population. And, the number of vehicles and that of parking zone at the rental station are estimated. The result suggests that Haewoondae Square parking lot would be assigned 11 vehicles and 14.23 parking spaces and that Dongbac parking lot be assigned 7.9 vehicles and 10.29 parking spaces. Further study requires additional real-time data for CTS to increase accuracy of the demand estimation. And network design would be developed for redistribution of vehicles.

A Study on the Improvement of Collection, Management and Sharing of Maritime Traffic Information (해상교통정보의 수집, 관리 및 공유 개선방안에 관한 연구)

  • Shin, Gil-Ho;Song, Chae-Uk
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.28 no.4
    • /
    • pp.515-524
    • /
    • 2022
  • To effectively collect, manage, and share the maritime traffic information, it is necessary to identify the technology trends concerning this particular information and analyze its current status and problems. Therefore, this study observes the domestic and foreign technology trends involving maritime traffic information while analyzing and summarizing the current status and problems in collecting, managing, and sharing it. According to the data analysis, the problems in the collecting stage are difficulties in collecting visual information from long-distance radars, CCTVs, and cameras in areas outside the LTE network coverage. Notably, this explains the challenges in detecting smuggling ships entering the territorial waters through the exclusive economic zone (EEZ) in the early stage. The problems in the management stage include difficult reductions and expansions of maritime traffic information caused by the lack of flexibility in storage spaces mostly constructed by the maritime transportation system. Additionally, it is challenging to deal with system failure with system redundancy and backup as a countermeasure. Furthermore, the problems in the sharing stage show that it is difficult to share information with external operating organizations since the internal network is mainly used to share maritime transportation information. If at all through the government cloud via platforms such as LRIT and SASS, it often fails to effectively provide various S/W applications that help use maritime big data. Therefore, it is suggested that collecting equipment such as unmanned aerial vehicles and satellites should be constructed to expand collecting areas in the collecting stage. In the management and sharing stages, the introduction and construction of private clouds are suggested, considering the operational administration and information disclosure of each maritime transportation system. Through these efforts, an enhancement of the expertise and security of clouds is expected.

The Method for Data Acquisition on a Live NAS System (활성 상태의 NAS 시스템 상에서 내부 데이터 수집 기법 연구)

  • Seo, Hyeong-Min;Kim, Dohyun;Lee, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.3
    • /
    • pp.585-594
    • /
    • 2015
  • As the storage market has been expanded due to growing data size, the research on various kinds of storages such as cloud, USB, and external HDD(Hard Disk Drive) has been conducted in digital forensic aspects. NAS(Network-Attached Storage) can store the data over one TB(Tera Byte) and it is well used for private storage as well as for enterprise, but there is almost no research on NAS. This paper selects three NAS products that has the highest market share in domestic and foreign market, and suggests the process and method for data acquisition in live NAS System.

가상ID 기반의 기업망-모바일-클라우드의 스마트한 연결을 제공하는 VPC 네트워킹 기술

  • Jeong, Bu-Geum;An, Byeong-Jun;Park, Hye-Suk;Kim, Gi-Cheol;Lee, Dong-Cheol
    • Information and Communications Magazine
    • /
    • v.32 no.7
    • /
    • pp.63-71
    • /
    • 2015
  • 클라우드 컴퓨팅이란 공유된 IT 자원을 네트워크 상에서 가상화를 통하여 독립적으로 사용할 수 있는 개념으로 저탄소 녹색시대를 위한 에너지 절감 솔루션이다. 특히 비용 절감이 필수적인 기업과 공공기관 등에서 IT 자원의 개별적 소유에 시간과 비용을 투입하지 않고 사용한만큼의 비용을 지불할 수 있다. 이에 정부에서는 2015년 9월부터 시행되는 클라우드법 제정을 통하여 클라우드 컴퓨팅의 활성화를 적극 장려하고 있다. 그러나 신뢰성있는 서비스 제공을 위해서는 보안성, 성능, 안정성 제공을 위한 네트워크 기능의 한계 극복이 필수적이다. 이에 본 논문에서는 언제 어디서나 다양한 기기로 업무를 수행할 수 있는 모바일 스마트워크가 가능하도록 하는 단말과 기업망, 클라우드를 안전하게 연결하는 가상 사설 클라우드(Virtual Private Cloud) 네트워킹 구조를 제안한다. 본 구조에서는 클라우드 내에서 사설 주소의 중복 문제 해결을 위하여 위치 주소와 아이디 분리 프로토콜 기반 위에 기업망 등의 엔터프라이즈 ID 개념을 적용하여 주소 확장성을 제공하였다. 또한 이러한 기술을 적용한 VPC 매니저, 서비스 게이트웨이 및 에이전트로 구성된 VPC 네트워킹 솔루션으로 테스트베드를 구축하고 그 운용 경험을 통해서 실 사업자망에 적용 가능한 비즈니스 모델 도출이 가능할 것으로 기대한다.

A VPC-based SaaS Framework for Secure Collaboration (안전한 협업을 위한 VPC 기반 SaaS 프레임워크)

  • Lee, Jaekyung;Son, Junggab;Eun, Hasoo;Oh, Heekuck
    • Annual Conference of KIPS
    • /
    • 2013.11a
    • /
    • pp.849-852
    • /
    • 2013
  • 클라우드 컴퓨팅은 인터넷 기술을 기반으로 하드웨어, 소프트웨어 등의 가상화된 컴퓨팅 자원을 제공하는 기술로 제공되는 서비스의 수준에 따라 IaaS(Infrastructure as a Service), PaaS(Platform as a Service), SaaS(Software as a Service), 세 가지 유형으로 분류된다. 최근에는 기업이나 조직에서 이들 유형 중 SaaS 도입에 대한 관심이 증가하고 있다. 이는 SaaS를 이용하면 기업이나 조직 간의 협업 시스템을 구축하기가 쉬워 업무 효율을 증진시킬 수 있기 때문이다. 하지만 SaaS는 서비스 제공자가 접근 권한을 가지고 있기 때문에 문서에 포함된 정보가 노출될 가능성이 있다. 이러한 문제를 해결하기 위해 본 논문에서는 VPC(Virtual Private Cloud)를 기반으로 하는 SaaS 프레임워크를 제안한다. 제안하는 프레임워크는 VPC 내부에서 SaaS를 운영하기 때문에 서비스 제공자의 개입을 최소화할 수 있으며, 독자적인 인증 관리 시스템과 모니터링 기능을 두어 SaaS에 대한 모든 접근을 관리할 수 있다.

A Study of Patient's Privacy Protection in U-Healthcare (유헬스케어에서 환자의 프라이버시 보호 방안 연구)

  • Jeong, Yoon-Su;Lee, Sang-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.4
    • /
    • pp.913-921
    • /
    • 2012
  • On the strength of the rapid development and propagation of U-healthcare service, the service technologies are full of important changes. However, U-healthcare service has security problem that patient's biometric information can be easily exposed to the third party without service users' consent. This paper proposes a distributed model according authority and access level of hospital officials in order to safely access patients' private information in u-Healthcare Environment. Proposed model can both limit the access to patients' biometric information and keep safe system from DoS attack using time stamp. Also, it can prevent patients' data spill and privacy intrusion because the main server simultaneously controls hospital officials and the access by the access range of officials from each hospital.

State of the Art of Anti-Screen Capture Protection Techniques

  • Lee, Young;Hahn, SangGeun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.5
    • /
    • pp.1871-1890
    • /
    • 2021
  • The transition toward a contactless society has been rapidly progressing owing to the recent COVID-19 pandemic. As a result, the IT environment of organizations and enterprises is changing rapidly; in particular, data security is expanding to the private sector. To adapt to these changes, organizations and companies have started to securely transfer confidential data to residential PCs and personally owned devices of employees working from home or from other locations. Therefore, organizations and companies are introducing streaming data services, such as the virtual desktop infrastructure (VDI) or cloud services, to securely connect internal and external networks. These methods have the advantage of providing data without the need to download to a third terminal; however, while the data are being streamed, attacks such as screen shooting or capturing are performed. Therefore, there is an increasing interest in prevention techniques against screen capture threats that may occur in a contactless environment. In this study, we analyze possible screen capture methods in a PC and a mobile phone environment and present techniques that can protect the screens against specific attack methods. The detection and defense for screen capture of PC applications on Windows OS and Mac OS could be solved with a single agent using our proposed techniques. Screen capture of mobile devices can be prevented by applying our proposed techniques on Android and iOS.