• Title/Summary/Keyword: proof of ownership

Search Result 15, Processing Time 0.02 seconds

A Secure and Practical Encrypted Data De-duplication with Proof of Ownership in Cloud Storage (클라우드 스토리지 상에서 안전하고 실용적인 암호데이터 중복제거와 소유권 증명 기술)

  • Park, Cheolhee;Hong, Dowon;Seo, Changho
    • Journal of KIISE
    • /
    • v.43 no.10
    • /
    • pp.1165-1172
    • /
    • 2016
  • In cloud storage environment, deduplication enables efficient use of the storage. Also, in order to save network bandwidth, cloud storage service provider has introduced client-side deduplication. Cloud storage service users want to upload encrypted data to ensure confidentiality. However, common encryption method cannot be combined with deduplication, because each user uses a different private key. Also, client-side deduplication can be vulnerable to security threats because file tag replaces the entire file. Recently, proof of ownership schemes have suggested to remedy the vulnerabilities of client-side deduplication. Nevertheless, client-side deduplication over encrypted data still causes problems in efficiency and security. In this paper, we propose a secure and practical client-side encrypted data deduplication scheme that has resilience to brute force attack and performs proof of ownership over encrypted data.

Information Dispersal Algorithm and Proof of Ownership for Data Deduplication in Dispersed Storage Systems (분산 스토리지 시스템에서 데이터 중복제거를 위한 정보분산 알고리즘 및 소유권 증명 기법)

  • Shin, Youngjoo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.1
    • /
    • pp.155-164
    • /
    • 2015
  • Information dispersal algorithm guarantees high availability and confidentiality for data and is one of the useful solutions for faulty and untrusted dispersed storage systems such as cloud storages. As the amount of data stored in storage systems increases, data deduplication which allows to save IT resources is now being considered as the most promising technology. Hence, it is necessary to study on an information dispersal algorithm that supports data deduplication. In this paper, we propose an information dispersal algorithm and proof of ownership for client-side data deduplication in the dispersed storage systems. The proposed solutions allow to save the network bandwidth as well as the storage space while giving robust security guarantee against untrusted storage servers and malicious clients.

Copyright Protection Protocol providing Privacy (프라이버시를 제공하는 저작권 보호 프로토콜)

  • Yoo, Hye-Joung
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.4 no.2
    • /
    • pp.57-66
    • /
    • 2008
  • There have been proposed various copyright protection protocols in network-based digital multimedia distribution framework. However, most of conventional copyright protection protocols are focused on the stability of copyright information embedding/extracting and the access control to data suitable for user's authority but overlooked the privacy of copyright owner and user in authentication process of copyright and access information. In this paper, we propose a solution that builds a privacy-preserving proof of copyright ownership of digital contents in conjunction with keyword search scheme. The appeal of our proposal is three-fold: (1) content providers maintain stable copyright ownership in the distribution of digital contents; (2) the proof process of digital contents ownership is very secure in the view of preserving privacy; (3) the proposed protocol is the copyright protection protocol added by indexing process but is balanced privacy and efficiency concerns for its practical use.

A Study on Digital Image Watermarking for Embedding Audio Logo (음성로고 삽입을 위한 디지털 영상 워터마킹에 관한 연구)

  • Cho, Gang-Seok;Koh, Sung-Shik
    • Journal of the Institute of Electronics Engineers of Korea TE
    • /
    • v.39 no.3
    • /
    • pp.21-27
    • /
    • 2002
  • The digital watermarking methods have been proposed as a solution for solving the illegal copying and proof of ownership problems in the context of multimedia data. But it is still difficult to have been overcame the problem of the protection of property to multimedia data, such as digital images, digital video, and digital audio. This paper describes a watermarking algorithm that embeds non-linearly audio logo watermark data which is converted from audio signal of the ownership in the components of pixel intensities in an original image and that insists of ownership by hearing the audio signal transformed from the extracted audio logo through the speaker. Experimental results show that our algorithm using audio logo proposed in this paper is robust against attacks such as particularly lossy JPEG image compression. 

Cloud Storage Security Deduplication Scheme Based on Dynamic Bloom Filter

  • Yan, Xi-ai;Shi, Wei-qi;Tian, Hua
    • Journal of Information Processing Systems
    • /
    • v.15 no.6
    • /
    • pp.1265-1276
    • /
    • 2019
  • Data deduplication is a common method to improve cloud storage efficiency and save network communication bandwidth, but it also brings a series of problems such as privacy disclosure and dictionary attacks. This paper proposes a secure deduplication scheme for cloud storage based on Bloom filter, and dynamically extends the standard Bloom filter. A public dynamic Bloom filter array (PDBFA) is constructed, which improves the efficiency of ownership proof, realizes the fast detection of duplicate data blocks and reduces the false positive rate of the system. In addition, in the process of file encryption and upload, the convergent key is encrypted twice, which can effectively prevent violent dictionary attacks. The experimental results show that the PDBFA scheme has the characteristics of low computational overhead and low false positive rate.

Deduplication Technologies over Encrypted Data (암호데이터 중복처리 기술)

  • Kim, Keonwoo;Chang, Ku-Young;Kim, Ik-Kyun
    • Electronics and Telecommunications Trends
    • /
    • v.33 no.1
    • /
    • pp.68-77
    • /
    • 2018
  • Data deduplication is a common used technology in backup systems and cloud storage to reduce storage costs and network traffic. To preserve data privacy from servers or malicious attackers, there has been a growing demand in recent years for individuals and companies to encrypt data and store encrypted data on a server. In this study, we introduce two cryptographic primitives, Convergent Encryption and Message-Locked Encryption, which enable deduplication of encrypted data between clients and a storage server. We analyze the security of these schemes in terms of dictionary and poison attacks. In addition, we introduce deduplication systems that can be implemented in real cloud storage, which is a practical application environment, and describes the proof of ownership on client-side deduplication.

A Study on the Development of a Blockchain-Based Platform for ESG Disclosure (블록체인 기반 ESG 정보공시 플랫폼 구축 방안 연구)

  • Choi, Ha Nool
    • The Journal of Information Systems
    • /
    • v.33 no.2
    • /
    • pp.105-124
    • /
    • 2024
  • Purpose This study aims to propose a blockchain-based platform that can guarantee enhanced trustworthiness in corporate ESG efforts, demanded by global ESG initiatives such as GRI and TCFD. Blockchain technology, recognized for its transparency and data immutability, can contribute to building trust in ESG disclosures, meeting the data transparency verification needs required by these initiatives. This research also explores the use of NFTs representing unique ESG efforts by companies, helping them in organizing and sharing ESG information with investors and consumers. Design/methodology/approach This study utilizes Hyperledger Fabric, a permissioned blockchain known for its enhanced transparency, scalability, and suitability for business transactions, to develop a blockchain platform for managing and disclosing ESG information assets in a trustworthy manner. Furthermore, it introduces the concept of ESG NFTs as a more reliable method for conveying ESG information to stakeholders, where ESG NFTs undergo verification process by third-party authenticators and evaluation by independent evaluators for credibility of ESG disclosure. Findings The use of NFTs, which has been predominantly intended for market trading in public blockchain, offers a credible means of disseminating corporate ESG status and evaluations in a permissioned blockchain, better fit for business transactions. By representing information assets as NFTs, which are tamper-proof and establish clear ownership, the proposed platform enables effective management of ESG-related information assets.

Implementation of SEND Protocol in IPv6 Networks (IPv6 네트워크에서 SEND 프로토콜의 구현)

  • An, Gae-Il;Nah, Jae-Hoon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.7B
    • /
    • pp.403-410
    • /
    • 2007
  • Neighbor Discovery (ND) protocol was proposed to discover neighboring hosts and routers in IPv6 wire/wireless local networks. ND protocol, however, has a problem that it is vulnerable to network attacks because ND protocol allows malicious users to impersonate other legitimate hosts or routers by forging ND protocol messages. To address the security problem, Secure Neighbor Discovery (SEND) protocol was proposed. SEND protocol provides address ownership proof mechanism, ND protocol message protection mechanism, reply attack prevention mechanism, and router authentication mechanism to protect ND protocol. In this paper, we design and implement SEND protocol in IPv6 local networks. And also, we evaluate and analyze the security vulnerability and performance of SEND protocol by experimenting the implemented SEND protocol on IPv6 networks.

A Study on the Characteristics of Non-Fungible Token(NFT) and Application Plans from the Digital Records Perspective : Focused on Transferable Records (전자기록 관점에서 본 대체 불가능한 토큰(NFT) 특성 및 활용 방안 이전 및 거래 가능한 기록을 중심으로)

  • Won, Joo-hye;So, Hyeon-Gi;Oh, Hyo-Jung
    • The Korean Journal of Archival Studies
    • /
    • no.73
    • /
    • pp.47-79
    • /
    • 2022
  • NFT is literally a 'non-fungible token', a digital file that records specific virtual assets on a blockchain. Events such as ownership of the asset and transaction history are recorded on the blockchain through the token transaction, so counterfeiting and falsification are impossible. Therefore, NFT is used as a tool that can uniquely represent a specific virtual asset. The main purpose of this paper is to examine the characteristics of NFT from a records management point of view and to find ways to use them, and focuses on digital records that have the characteristics of assets as digital works. For this purpose, we first examine the basic concept of NFT and the principle of ownership and proof of value as an asset for digital works. In addition, it was confirmed how the advantages of NFT were applied through NFT use cases in various fields, and in particular, areas related to audio-visual records such as art, music, sports, and fashion were focused on. Furthermore, by comparing the characteristics of digital records with those of NFT, factors applicable to electronic records were identified. Finally, the types of digital records that are expected to be effective in the application of NFT were identified, and the possibility of their use and discussion points for introduction in records management are presented.

A Legal Study on the Standard for Conformity of the Goods in the International Sale of Goods (국제물품매매계약상(國際物品賣買契約上) 물품일치성(物品一致性)의 기준(基準)에 관한 법리적(法理的) 고찰(考察))

  • Song, Myeong-Bok
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.12
    • /
    • pp.133-162
    • /
    • 1999
  • The international sale transaction is in essence a sale of goods and presents all those commercial and legal problems in any sale of goods. As a result, A International sales contract imposes several duties on the parties : the seller must deliver the goods and transfer ownership in them, while the buyer must pay the price and take delivery of the goods. However, there are several problems which impede a active transaction between seller and buyer who have their places of business in other countries each other. Therefore, It is necessary to provide the concept on the conformity of goods in the Int'l Sale of Goods. Especially, In our consideration for the point of time when defects occurs, the existence of non-conformity of goods should be judged on the basis of time of delivery rather than time of contract. Moreover, The burden of proof about nonconformity of goods is another fact which make an international dispute between the contractual parties in an international trade. Thus, The consistency in the interpretation of law must be maintained betweened the warranty and seller's liability. In the Uniform Commercial Code and UN Convention, non-conformity of contract is made of contract liability. And in our civil and commercial law provisions of warranty should be understand as the special ones of the provisions of general non-performance of obligation liability. As a result, More concrete study of them is required because they may have a great influence especially on international trade. As a result, We should be our best in finding a helpful and systematic structure that the dualistic structure of nonperformance of obligation liability and warranty liability must be unified by studying the theories of English and American warranty and our legal system, as well as international practice and usage being used in an international trade.

  • PDF