• Title/Summary/Keyword: private security

Search Result 1,407, Processing Time 0.027 seconds

Performance Evaluation of RSIP Gateway in Intranet Environment (인트라넷 환경에서 RSIP 게이트웨이의 성능분석)

  • Kim, Won;Lee, Young-Taek;Jun, Moon-Seog
    • The KIPS Transactions:PartC
    • /
    • v.11C no.5
    • /
    • pp.683-688
    • /
    • 2004
  • NAT is a very useful IP address translation technique that allows two connected networks using different and incompatible IP address schemes. But it is impractical to use NAT for an application which uses the encrypted IP packet, embedding IP addresses inside of data payloads, to guarantee End-to-End Security such as IPSec. In addition to rewriting the source/destination IP addresses in the packet, NAT must modify IP checksum every time, which could lead to considerable performance decrease of the overall system in the process of the address translation. RSIP is an alternative to solve these disadvantages of NAT and the address shortage problems. Both NAT and RSIP divide networks into inside and outside addressing realms. NAT translates addresses between internal network and external network, but RSIP uses a borrowed external address for outside communications. RSIP server assigns a routable public address to a RSIP client temporarily to communicate with public net-work outside of the private network. In this paper, RSIP gateway for intranet environment is designed and its performance is evaluated. From the results of performance evaluation, we knew that RSIP is operated less sensitive to the data traffic. Also, the experiment shows that RSIP performs better than NAT when the transmission data grows larger.

Study on a Secure Authentication and Authorization Protocol based on Kerberos (커버로스 기반의 안전한 인증 및 허가 프로토콜 에 관한 연구)

  • 김은환;김명희;전문석
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.5C
    • /
    • pp.737-749
    • /
    • 2004
  • Kerberos authenticates clients using symmetric-key cryptography, and supposed to Oust other systems of the realm in distributed network environment. But, authentication and authorization are essential elements for the security. In this paper, we design an efficient and secure authentication/authorization mechanism by introducing the public/private-key and installing the proxy privilege server to Kerberos. In the proposed mechanism, to make a system more secure, the value of the session key is changed everytime using MAC(message authentication code) algorithm with the long-term key for user-authentication and a random number exchanged through the public key. Also, we reduce the number of keys by simplifying authentication steps. Proxy privilege server certifies privilege request of client and issues a privilege attribute certificate. Application server executes privilege request of client which is included a privilege attribute certificate. Also, a privilege attribute certificate is used in delegation. We design an efficient and secure authentication/authorization algorithm with Kerberos.

Routing for Enhancing Source-Location Privacy in Wireless Sensor Networks of Multiple Assets

  • Tscha, Yeong-Hwan
    • Journal of Communications and Networks
    • /
    • v.11 no.6
    • /
    • pp.589-598
    • /
    • 2009
  • In wireless sensor networks, a node that reports information gathered from adjacent assets should relay packets appropriately so that its location context is kept private, and thereby helping ensure the security of the assets that are being monitored. Unfortunately, existing routing methods that counter the local eavesdropping-based tracing deal with a single asset, and most of them suffer from the packet-delivery latency as they prefer to take a separate path of many hops for each packet being sent. In this paper, we propose a routing method, greedy perimeter stateless routing-based source-location privacy with crew size w (GSLP-w), that enhances location privacy of the packet-originating node (i.e., active source) in the presence of multiple assets. GSLP-w is a hybrid method, in which the next-hop node is chosen in one of four modes, namely greedy, random, perimeter, and retreat modes. Random forwarding brings the path diversity, while greedy forwarding refrains from taking an excessively long path and leads to convergence to the destination. Perimeter routing makes detours that avoid the nodes near assets so that they cannot be located by an adversary tracing up the route path. We study the performance of GSLP-w with respect to crew size w (the number of packets being sent per path) and the number of sources. GSLP-w is compared with phantom routing-single path (PR-SP), which is a notable routing method for source-location privacy and our simulation results show that improvements from the point of the ratio of safety period and delivery latency become significant as the number of source nodes increases.

Optimal Clustering of Energy Storage System for Frequency Regulation Service Considering Life Degradation (수명감소를 고려한 주파수 조정용 에너지저장장치의 최적 클러스터링)

  • Kim, Wook-Won;Kim, Jin-O
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.65 no.4
    • /
    • pp.555-560
    • /
    • 2016
  • Recently, many countries have placed great attention on energy security and climate changes. Governments are promoting the construction of renewable energy projects with regulatory support in Korea. Despite an increasing penetration of renewable resources, however, the photovoltaic and wind power are underutilized due to the endemic problems such as difficulties of output control and intermittent output. The Energy Storage System (ESS) is proposed as a good solution for solving the problems and has been studied in both the private business and the government. However, because of inefficient aspects, the research has been carried out for improving high costs and a small capacity. In addition, the ESS is currently installed for using only one purpose which is frequency regulation or transmission congestion relief such that has an economic limitation. Therefore, methods which are becoming economically justifiable to increase the penetration of the ESS is required. Thus, this paper presents in terms of operation efficiency to improve economic feasibility of the ESS currently used. mainly, there are two aspects for the operation efficiency. Firstly, it is intended to improve the utilization rate through a process that can utilize the ESS for various purposes. It is necessary to be able to use for other purposes by classifying and clustering for increasing the efficiency of availability. The clustering method is proposed to conduct the grouping the ESS. Especially, it is proposed to utilize ESS for frequency regulation service which is the one of ancillary services in the power system. Through case studies, it is confirmed to secure the necessary resources by clustering small size ESS.

A Literature Study on Digital Currency and Historical Developments of Money: Dynamic Pattern in Currency, Central Bank Digital Currency and Libra (디지털화폐와 화폐 변천과정에 관한 문헌적 연구: 동적패턴, CBDC, 리브라를 중심으로)

  • Kim, Euiseok
    • The Journal of Society for e-Business Studies
    • /
    • v.25 no.2
    • /
    • pp.109-126
    • /
    • 2020
  • This study attempts to find out the characteristics of digital currency and currency transformation through the analytical descriptions of the literature. In the early days of the emergence of new currency, market-oriented autonomous monetary adjustment was made along with various attempts by the private sector, and then government-centered central currency management and coordination were made for the national monopoly of profits and power. Digital currency can be seen as the emergence of a new form of money that will bring about paradigm changes. CBDC can be divided into direct and indirect types. CBDC is expected to require a strategic approach by the government or firm as it will bring about changes in the ecosystem of related industries. Libra is a stablecoin designed to minimize price fluctuations, and if it succeeds in commercializing it, it is expected to bring about revolutionary changes in the financial industry around the world.

A Secure Personal Health Record System for Handling of Emergency Situations (응급 상황 처리를 위한 안전한 개인건강기록 시스템)

  • Yi, Myung-Kyu;Hwang, Hee-Joung
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.5
    • /
    • pp.117-123
    • /
    • 2016
  • In recent years, Personal Health Record (PHR) has emerged as a patient-centric model of health information exchange. The Personal Health Record (PHR) owners enjoy the full right of accessing their records anywhere and anytime making storage and retrieval more efficient. Due to the sensitivity and confidential nature of the PHR, however, the PHR is maintained in a secure and private environment with the individual determining rights of access. In this paper, we propose a system which enables access to the user's PHR in the event of emergency. In emergency situation where the user is unconscious, the emergency staff can use the PHR information to request a emergency access to the PHR server based on the predefined rights of access for PHR. Under the proposed system, the PHR owner can specify a fine grain access control policy during emergency situations.

The Cognition on Community Childcare Support and Social Support between Working Mothers and Non-working Mothers (취업모와 비취업모의 지역사회 육아 지원과 사회적 지원에 대한 인식)

  • Kim, Hye Gum
    • Korean Journal of Childcare and Education
    • /
    • v.8 no.1
    • /
    • pp.5-24
    • /
    • 2012
  • The purpose of this study was to investigate the cognition on community childcare policy and childcare service needs between working mothers and non-working mothers using the 2008 Child Panel by Korea Childcare Policy Institute. The participants were 654 working mothers and 1,416 non-working mothers. The data were analyzed by $x^2$. The results were as follows; 1) 50% of working mothers and non-working mothers thought that the number of childcare centers was enough. Forty-five percent of working mothers and non-working mothers recognized that the number of kinder gartens and private education institutes was enough. Fifty-two percent of working mothers and 4 5% of non-working mothers thought that use of public leisure facilities were convenient. Twenty-seven percent of working mothers and 20% of non-working mothers thought that use of culture institutes were easily accessible. About 50% of working mothers and non-working mothers felt safe about public security and community safety. 2) Second, working mothers perceived social support higher than non-working mothers in several areas.

A Study on the Improvement of Protection System for Public Interest Reporters

  • Lee, Young-Woo;Jang, Su-Yeon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.11
    • /
    • pp.195-200
    • /
    • 2020
  • Korea enacted the Protection of Public Interest Reporters Act in March 2011 to protect whistleblowers from acts of infringement of public interest in the private sector. Most acts of infringement of the public interest are carried out secretly within the organization, which is known to the outside world by reports from members of the organization who are well aware of the problems within the organization. However, whistleblowers are at a disadvantage due to reporting and are reluctant to report. In addition, measures are needed to strengthen institutional mechanisms such as confidentiality, protection of personal information, responsibility, and prohibition of disadvantageous measures to effectively protect reporters due to lack of practical protective measures. Therefore, practical protection measures for whistleblowers are needed in line with the purpose of protecting whistleblowers, and measures to expand the corresponding compensation system will also be needed. Therefore, in this study, we would like to review the main contents of the current system for protecting whistleblowers in Korea and suggest reasonable improvement measures for protecting whistleblowers.

A Study on Data Research for Fire Regulations and Fire Retardant in Interior Architecture (실내건축관련 소방(消防)규정과 방염(防炎)에 관한 연구)

  • Cho, Sung-O;Kim, Yong-Sung
    • Korean Institute of Interior Design Journal
    • /
    • v.19 no.3
    • /
    • pp.95-102
    • /
    • 2010
  • Recently, a grow in size and features of Interior construction work over the complex and The Fire-related regulations have been strengthened for the prevention of fire damage. This study is purpose to propose interior design, construction and supervision for the efficient and reasonable way throughout the fire-related laws are investigated in interior architecture. First, the interior of the building work will be based on actual use Fire-related Laws and Regulations have be investigated. Second, based on analysis of material and facilities by Application can be used in production by the data were applied to the present. Third, the international Fire and Flame Retardant Standards for investigating and reviewing the relevant laws, differences and characteristics of each country were analyzed. Fourth, the various fire-related issues of regulation and the application of relevant provisions in the field works, the law's standards, and improvements were identified by analysis. Fire-Related Laws and Building codes that Safety Administration of the Fire Services are divided into design, it comes to approval from the municipal authorities with concerns about the fire that will fit on the Fire Department's administrative procedures and operations is necessary to integrate operations. In conclusion, Fire-related business are divided into Minister of Land, Transport and Maritime Affairs and Ministry of Public Administration and Security. So, Both institutions is need to be the cooperative work. It is necessary to the field supervision. Because, Flame-resistant performance standards in the field works applied are too complex. Last, Establishment of fire-related regulations will enact by private organizations and the experts to participate.

A Study on the Threat Review to use Secure Smartphone Applications (안전한 스마트폰 앱 사용을 위한 위협 요소 검토 연구)

  • Choi, Heesik;Cho, Yanghyun
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.16 no.1
    • /
    • pp.41-54
    • /
    • 2020
  • In this paper, it will study various problems such as personal information infringement from when using various useful Apps in the Smartphone environment. It also researched the vulnerabilities Mobile Apps and the risks of personal information leakage when using Smartphone information to decrease threat and find solution. In the second chapter, it will check the existing Mobile App related Apps. In the third chapter, it will check the threats and major factors that caused by the leakage of personal information which related to the app. Then it will suggest solution and end with conclusion. This paper also looked at various problems that caused by illegal adverse effect from illegal personal information collection. Then it researched and made suggestion to make consideration on safety of personal information and privacy infringement that threat to personal information For safety of mobile banking, it proposed a safety method to separate and manage the code which has the core logic which required to run the App. For safety of direction App, when running the direction App, even if the information is collected, location information for unauthorized accessed will encrypt and store in DB, so that access to personal information is difficult. For delivery App environment, by using the national deliver order call center's representative phone to receive a telephone order then, the customer information is delivered to the branch office when it receive order and it will automatically delete information from the server when the delivery is completed by improving DB server of order. For the smart work app environment, the security solution operates automatically by separating and make independent private and work areas. Then it will suggest initialization for company's confidential business information and personal information to safe from danger even if loss.