• 제목/요약/키워드: secure auction

검색결과 17건 처리시간 0.028초

독일 5G주파수 최근(2019) 경매사례 분석 (Latest 5G Spectrum Auction in Germany)

  • 김헌진;이성준
    • 전자통신동향분석
    • /
    • 제34권6호
    • /
    • pp.17-27
    • /
    • 2019
  • This paper introduces the 5G spectrum auction in Germany that occurred last summer and ended overheatedly after an extraordinarily long period. We describe the context of the latest German spectrum auction and trace the participants' bidding behavior. This case details the trend of the 5G spectrum auction and the factors that affect the spectrum auction as follows: First, it is determined that investment obligations that force network installations can be a financial burden to mobile network operators (MNOs) and require a careful approach. Second, excess demands can cause auction overheating and the spectrum supply volume needs to be determined by a proper demand forecast and investment incentive. Third, 'Set-Aside' for local usage aids in developing the vertical industry; however it limits the spectrum supply for mobiles and leads to higher bidding prices. Fourth, a modified adoption of a typical spectrum auction can alleviate MNO's financial burdens to secure the broadband spectrum. Finally, competition to secure the necessary bandwidth in the situation of limited spectrum supply may delay the process of the spectrum auction, causing it overheated.

안전한 인터넷 경매시스템 설계 (Design of an Secure Internet Auction System)

  • 박진호;안성진
    • 융합보안논문지
    • /
    • 제2권1호
    • /
    • pp.69-76
    • /
    • 2002
  • 인터넷이 보다 대중화되면서 웹을 통한 다양한 서비스가 창출되고 있다. 경매분야도 예외는 아니어서 현재 국내외의 여러 사이트에서 인터넷 경매가 활발하게 진행중이다. 그러나, 대부분의 인터넷 경매시스템은 보안기능이 취약해서 사용자에게 큰 피해를 초래할 수 있다. 본 논문에서는 사용자에게 보다 안전하면서 편리한 인터넷 경매 환경을 제공하기 위한 안전한 인터넷 경매시스템을 설계하였다.

  • PDF

단일 서버 기반의 안전한 봉인경매 기법 (A Single Server-based Secure Electronic Sealed-Bid Auction Method)

  • 이건명;김동호
    • 한국지능시스템학회논문지
    • /
    • 제14권6호
    • /
    • pp.678-686
    • /
    • 2004
  • This paper presents a new method to securely conduct online sealed-bid auctions with a single auctioneer server The sealed-bid auctions have several vulnerable security problems when they are performed on the Internet. One of such problems is the trust establishment between an auctioneer and bidders who participate in an auction. Several online sealed-bid auction methods have been developed to address this trust problem. The proposed method solves the security problems that would happen in the sealed-bid auction using a blind signature scheme and a contract signature protocol. It prevents the auctioneer from illegally manipulating the bidders' bidding information, repudiating the reception of some bid, manipulating the auction period, and illegally adding or deleting bids. In addition, it keeps the bidders from modifying the bidding information after issuing their bid and doing intentional mistake to invalidate their own bid. The method can be easily implemented using the multiagent architecture.

신뢰 기반 경매 시스템에서의 퍼지를 이용한 신뢰도 측정과 신뢰도에 따른 거래 방식 추천 (Trust Measurement Using Fuzzy Theory and Trade Protocol Recommendation Based on Trust Level in Trusted Auction System)

  • 양근우;허순영
    • 한국경영과학회지
    • /
    • 제28권2호
    • /
    • pp.17-33
    • /
    • 2003
  • The explosive growth of the internet-based transactions requires not only a secure payment system but also an appropriate trust measuring methodology and secure transaction protocols to guarantee the minimal risk for the transacting entities involved in specific transactions. Especially, in internet auction systems where either buyers or sellers or both can be more than one in one transaction, providing those systems that make sure no one transacting entity takes a major risk becomes critical. In this paper, an improved trust measuring method using a relationship-based internet community for an auction system is proposed. The proposed system incorporates fuzzy set and calculation concepts to help build trust matrices and models, which is used to measure the level of risk involved in a specific auction trade concerned. Also, to optimize the auction trade process in terms of cost and time, the proposed system recommends a differentiated trade protocol according to the risk level involved in each auction trade. To test the appropriateness of the proposed trusted auction system, a prototype system has been developed under a Windows-NT environment.

효율적인 sealed-bid 경매 프로토콜 (An efficient sealed-bid auction protocol)

  • 신상욱;류희수
    • 정보보호학회논문지
    • /
    • 제12권6호
    • /
    • pp.3-15
    • /
    • 2002
  • 본 논문에서는 두 서버 S와 A를 가진 효율적이고 안전한 sealed-bid 경매 프로토콜을 제안한다. 제안된 기법은 Crescenzo-Ostrovskey-Rajagopalan의 Conditional Oblivious Transfer프로토콜에서 사용된 기술을 이용하며, 서버 A는 신뢰되는 제3자(third. party)가 아니고 서버 S와 공모하지 않는다고 가정된다. 이러한 가정하에서 제안된 경매 프로토콜은 어느 개체도 경매에 관한 어떠한 정보도 얻지 못하고 경매의 결과는 정확하다는 것을 보장한다. 또한 제안된 기법은 기제안된 Naor-Pinkas-Sumner의 기법보다 훨씬 적은 계산량을 요구하며 비슷한 통신 오버헤드를 가진다.

Two-Stage Model for Security Network-Constrained Market Auction in Pool-Based Electricity Market

  • Kim, Mun-Kyeom
    • Journal of Electrical Engineering and Technology
    • /
    • 제12권6호
    • /
    • pp.2196-2207
    • /
    • 2017
  • This paper presents a two-stage market auction model in a pool-based electricity market, which explicitly takes into account the system network security. The security network-constrained market auction model considers the use of corrective control to yield economically efficient actions in the post-contingency state, while ensuring a certain security level. Under this framework, the proposed model shows not only for quantifying the correlation between secure system operation and efficient market operation, but also for providing transparent information on the pricing system security for market participants. The two-stage market auction procedure is formulated using Benders decomposition (BD). In the first stage, the market participants bid in the market for maximizing their profit, and the independent system operator (ISO) clears the market based on social welfare maximization. System network constraints incorporating post-contingency control actions are described in the second stage of the market auction procedure. The market solutions, along with the BD, yield nodal spot prices (NSPs) and nodal congestion prices (NCPs) as byproducts of the proposed two-stage market auction model. Two benchmark systems are used to test and demonstrate the effectiveness of the proposed model.

Provable Secure Brand-new Multi-auction Mechanism with Dynamic Identity

  • Lee, Jung-San;Wei, Kuo-Jui;Chen, Ying-Chin;Sun, Yun-Hsiang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제10권12호
    • /
    • pp.5616-5642
    • /
    • 2016
  • Different from traditional auctions, electronic auctions provide a platform to allow bidders and auctioneers merchandise to each other over network anytime and anywhere. Auctioneers can publish information of goods, and bidders can choose the interested targets through this bidding platform. To ensure the fairness and security of electronic auctions, Li et al. have proposed a practical electronic auction scheme which can confirm the requirement of strong anonymity, bidding privacy, and secret bidding price. However, we have found out that Li et al.'s scheme may lurk the risk of the denial-of-service attack during the bidding phase in a sealed-bid auction. Thus, we propose a brand-new sealed-bid auction mechanism, in which the essentials of e-auction can be firmly preserved. In particular, each bidder only needs to register at the center once and then can join to multiple plays launched by different auctioneers. Moreover, the correctness of mutual authentication is confirmed according to the BAN logic model.

A Secure Auction Protocol without Any Dispute

  • Ha, Jung-Hoon;Kwak, Dong-Jin;Moon, Sang-Jae
    • 한국정보보호학회:학술대회논문집
    • /
    • 한국정보보호학회 2003년도 동계학술대회
    • /
    • pp.518-522
    • /
    • 2003
  • We propose a new auction protocol scheme that uses the publicly verifiable secret sharing (PVSS) scheme. Unlike the existing scheme where a verifiable encryption scheme is employed when there is a dispute between a bidder and the auctioneer, the proposed scheme essentially removes the potential of a dispute. In addition, it has a robust registration phase and any entities participating in or observing the auction can verify the correctness of the auction process. The manager does not directly chooses the private key for the bidders, but only verifies the correctness between the private key and the public key, thereby improving the security, such as a bid submission of a malicious manager using the private key of a bidder.

  • PDF

A Secure and Efficient Cloud Resource Allocation Scheme with Trust Evaluation Mechanism Based on Combinatorial Double Auction

  • Xia, Yunhao;Hong, Hanshu;Lin, Guofeng;Sun, Zhixin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제11권9호
    • /
    • pp.4197-4219
    • /
    • 2017
  • Cloud computing is a new service to provide dynamic, scalable virtual resource services via the Internet. Cloud market is available to multiple cloud computing resource providers and users communicate with each other and participate in market transactions. However, since cloud computing is facing with more and more security issues, how to complete the allocation process effectively and securely become a problem urgently to be solved. In this paper, we firstly analyze the cloud resource allocation problem and propose a mathematic model based on combinatorial double auction. Secondly, we introduce a trust evaluation mechanism into our model and combine genetic algorithm with simulated annealing algorithm to increase the efficiency and security of cloud service. Finally, by doing the overall simulation, we prove that our model is highly effective in the allocation of cloud resources.

A Secure Network for Mobile Wireless Service

  • Peng, Kun
    • Journal of Information Processing Systems
    • /
    • 제9권2호
    • /
    • pp.247-258
    • /
    • 2013
  • A new secure network communication technique that has been designed for mobile wireless services, is presented in this paper. Its network services are mobile, distributed, seamless, and secure. We focus on the security of the scheme and achieve anonymity and reliability by using cryptographic techniques like blind signature and the electronic coin. The question we address in this paper is, "What is the best way to protect the privacy and anonymity of users of mobile wireless networks, especially in practical applications like e-commerce?" The new scheme is a flexible solution that answers this question. It efficiently protects user's privacy and anonymity in mobile wireless networks and supports various applications. It is employed to implement a secure e-auction as an example, in order to show its advantages in practical network applications.