• 제목/요약/키워드: secure solution

검색결과 360건 처리시간 0.025초

ROBUST SEMI-INFINITE INTERVAL-VALUED OPTIMIZATION PROBLEM WITH UNCERTAIN INEQUALITY CONSTRAINTS

  • Jaichander, Rekha R.;Ahmad, Izhar;Kummari, Krishna
    • Korean Journal of Mathematics
    • /
    • 제30권3호
    • /
    • pp.475-489
    • /
    • 2022
  • This paper focuses on a robust semi-infinite interval-valued optimization problem with uncertain inequality constraints (RSIIVP). By employing the concept of LU-optimal solution and Extended Mangasarian-Fromovitz Constraint Qualification (EMFCQ), necessary optimality conditions are established for (RSIIVP) and then sufficient optimality conditions for (RSIIVP) are derived, by using the tools of convexity. Moreover, a Wolfe type dual problem for (RSIIVP) is formulated and usual duality results are discussed between the primal (RSIIVP) and its dual (RSIWD) problem. The presented results are demonstrated by non-trivial examples.

저지연 Legacy SCADA 보안 통신장치 개발 (Development of Low Latency Secure Communication Device for Legacy SCADA)

  • 최문석;김충효;임유석;주성호;임용훈;전경석
    • 정보보호학회논문지
    • /
    • 제23권2호
    • /
    • pp.339-346
    • /
    • 2013
  • SCADA시스템에 대한 보안 필요성이 대두됨에 따라 최근 제어 프로토콜 보안기술에 대한 연구가 활발히 진행중이다. 그러나 성능, 가격 및 키 관리 등의 문제로 보안 솔루션이 legacy SCADA 시스템에 적용된 사례는 전무하다. 본 논문에서는 이러한 문제점을 해결하기 위해 low latency, 저가의 DNP 보안 솔루션을 제안한다. 본 논문에서 제안한 보안 솔루션은 데이터링크 계층에서 보안기능을 수행하고 보안을 위해 추가되는 데이터량을 최소화하여 전송시간 증가를 최소화하였을 뿐만 아니라 체계적인 키 구조와 키 분배방식을 제공하여 키 관리의 어려움을 해결하고자 노력하였다.

Towards efficient sharing of encrypted data in cloud-based mobile social network

  • Sun, Xin;Yao, Yiyang;Xia, Yingjie;Liu, Xuejiao;Chen, Jian;Wang, Zhiqiang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제10권4호
    • /
    • pp.1892-1903
    • /
    • 2016
  • Mobile social network is becoming more and more popular with respect to the development and popularity of mobile devices and interpersonal sociality. As the amount of social data increases in a great deal and cloud computing techniques become developed, the architecture of mobile social network is evolved into cloud-based that mobile clients send data to the cloud and make data accessible from clients. The data in the cloud should be stored in a secure fashion to protect user privacy and restrict data sharing defined by users. Ciphertext-policy attribute-based encryption (CP-ABE) is currently considered to be a promising security solution for cloud-based mobile social network to encrypt the sensitive data. However, its ciphertext size and decryption time grow linearly with the attribute numbers in the access structure. In order to reduce the computing overhead held by the mobile devices, in this paper we propose a new Outsourcing decryption and Match-then-decrypt CP-ABE algorithm (OM-CP-ABE) which firstly outsources the computation-intensive bilinear pairing operations to a proxy, and secondly performs the decryption test on the attributes set matching access policy in ciphertexts. The experimental performance assessments show the security strength and efficiency of the proposed solution in terms of computation, communication, and storage. Also, our construction is proven to be replayable choosen-ciphertext attacks (RCCA) secure based on the decisional bilinear Diffie-Hellman (DBDH) assumption in the standard model.

개인용 보안장치를 통한 안전한 분산형 암호 화폐 거래 모델 (Secure Distributed Cryptocurrency Transaction Model Through Personal Cold Wallet)

  • 이창근;김인석
    • 정보보호학회논문지
    • /
    • 제29권1호
    • /
    • pp.187-194
    • /
    • 2019
  • 2014년 3월, 세계 최대의 비트코인 거래소였던 마운트곡스(Mt. Gox)가 해킹 공격으로 폐쇄된 사건 이래로 최근까지 국내 암호 화폐 거래소인 코인레일(Coinrail)이 해킹되는 등 사건이 잇달아 발생하고 있다. 이러한 거래소 해킹 사건은 단순한 시스템 해킹 수준을 넘어 사용자들의 자산이 탈취되는 자산 손실로까지 피해가 확산되고 있어, 암호 화폐 거래소에 대한 보안 이슈가 발생하였다. 위와 같은 문제를 해결하기 위해 탈중앙화 거래소(DEX, Decentralized Exchange)가 활발히 연구되고 있으나 이 또한 문제를 완화시킬 뿐 해결방안으로서는 부족한 실정이다. 따라서 본 논문에서는 기존의 암호 화폐 거래소들에 대한 보안위협을 분석하고 이에 대한 보안 요구사항을 도출한다. 또한 개인용 보안장치를 통한 안전한 분산형 암호 화폐 거래 모델을 제안하여 본 논문에서 제안하는 거래 모델이 앞선 보안위협에 대한 해결책임을 입증한다.

Smart-Coord: Enhancing Healthcare IoT-based Security by Blockchain Coordinate Systems

  • Talal Saad Albalawi
    • International Journal of Computer Science & Network Security
    • /
    • 제24권8호
    • /
    • pp.32-42
    • /
    • 2024
  • The Internet of Things (IoT) is set to transform patient care by enhancing data collection, analysis, and management through medical sensors and wearable devices. However, the convergence of IoT device vulnerabilities and the sensitivity of healthcare data raises significant data integrity and privacy concerns. In response, this research introduces the Smart-Coord system, a practical and affordable solution for securing healthcare IoT. Smart-Coord leverages blockchain technology and coordinate-based access management to fortify healthcare IoT. It employs IPFS for immutable data storage and intelligent Solidity Ethereum contracts for data integrity and confidentiality, creating a hierarchical, AES-CBC-secured data transmission protocol from IoT devices to blockchain repositories. Our technique uses a unique coordinate system to embed confidentiality and integrity regulations into a single access control model, dictating data access and transfer based on subject-object pairings in a coordinate plane. This dual enforcement technique governs and secures the flow of healthcare IoT information. With its implementation on the Matic network, the Smart-Coord system's computational efficiency and cost-effectiveness are unparalleled. Smart-Coord boasts significantly lower transaction costs and data operation processing times than other blockchain networks, making it a practical and affordable solution. Smart-Coord holds the promise of enhancing IoT-based healthcare system security by managing sensitive health data in a scalable, efficient, and secure manner. The Smart-Coord framework heralds a new era in healthcare IoT adoption, expertly managing data integrity, confidentiality, and accessibility to ensure a secure, reliable digital environment for patient data management.

Zynq를 이용한 비전 및 모션 컨트롤러 통합모듈 구현 (Implementation of Integration Module of Vision and Motion Controller using Zynq)

  • 문용선;노상현;이영필
    • 한국전자통신학회논문지
    • /
    • 제8권1호
    • /
    • pp.159-164
    • /
    • 2013
  • 최근 자동화 시스템에 있어 중요한 요소인 비전과 모션 컨트롤러를 통합한 솔루션이 많이 개발되고 있다. 다만 이러한 솔루션은 비전 처리와 모션 컨트롤을 네트워크로 통합하거나 하나의 모듈에 투 칩 솔루션으로 구성된 경우가 많다. 본 연구에서는 최근에 개발된 확장형 프로세싱 플랫폼인 Zynq-7000을 이용한 비전 및 모션 제어기를 통합한 원 칩 솔루션을 구현하였다. 또한 모션 컨트롤은 제어의 실시간이 보장되면서 대량의 데이터를 처리할 수 있는 개방형 표준 이더넷 호환성을 가지고 있는 산업용 이더넷 프로토콜인 EtherCAT을 적용하였다.

원격의료서비스에서 생체정보를 이용한 암호화키 생성방법 연구 (Process of the Encryption key using a Physical Information in the U-Healthcare Service)

  • 송충건;이근호;류갑상
    • 디지털융복합연구
    • /
    • 제12권1호
    • /
    • pp.573-578
    • /
    • 2014
  • 최근 세계가 고령화 사회로 진입함에 따라 U-Healthcare 서비스가 새롭게 각광받고 있다. 이러한 U-Healthcare 서비스가 발전하기 위해서는 U-Healthcare 환경에 최적화된 보안 솔루션이 요구된다. 그러나 U-Healthcare 환경은 기존 보안 솔루션의 적용이 어렵고 표준이 부재한 상황에 있다. 이러한 시점에서 안전한 U-Healthcare 환경을 구축하기 위해 데이터의 기밀성을 보장하는 목적으로 신체정보를 이용한 암호화키 생성방법을 제안하고자 한다.

A Fast and Secure Scheme for Data Outsourcing in the Cloud

  • Liu, Yanjun;Wu, Hsiao-Ling;Chang, Chin-Chen
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제8권8호
    • /
    • pp.2708-2721
    • /
    • 2014
  • Data outsourcing in the cloud (DOC) is a promising solution for data management at the present time, but it could result in the disclosure of outsourced data to unauthorized users. Therefore, protecting the confidentiality of such data has become a very challenging issue. The conventional way to achieve data confidentiality is to encrypt the data via asymmetric or symmetric encryptions before outsourcing. However, this is computationally inefficient because encryption/decryption operations are time-consuming. In recent years, a few DOC schemes based on secret sharing have emerged due to their low computational complexity. However, Dautrich and Ravishankar pointed out that most of them are insecure against certain kinds of collusion attacks. In this paper, we proposed a novel DOC scheme based on Shamir's secret sharing to overcome the security issues of these schemes. Our scheme can allow an authorized data user to recover all data files in a specified subset at once rather than one file at a time as required by other schemes that are based on secret sharing. Our thorough analyses showed that our proposed scheme is secure and that its performance is satisfactory.

Performance Improvement of a Movie Recommendation System based on Personal Propensity and Secure Collaborative Filtering

  • Jeong, Woon-Hae;Kim, Se-Jun;Park, Doo-Soon;Kwak, Jin
    • Journal of Information Processing Systems
    • /
    • 제9권1호
    • /
    • pp.157-172
    • /
    • 2013
  • There are many recommendation systems available to provide users with personalized services. Among them, the most frequently used in electronic commerce is 'collaborative filtering', which is a technique that provides a process of filtering customer information for the preparation of profiles and making recommendations of products that are expected to be preferred by other users, based on such information profiles. Collaborative filtering systems, however, have in their nature both technical issues such as sparsity, scalability, and transparency, as well as security issues in the collection of the information that becomes the basis for preparation of the profiles. In this paper, we suggest a movie recommendation system, based on the selection of optimal personal propensity variables and the utilization of a secure collaborating filtering system, in order to provide a solution to such sparsity and scalability issues. At the same time, we adopt 'push attack' principles to deal with the security vulnerability of collaborative filtering systems. Furthermore, we assess the system's applicability by using the open database MovieLens, and present a personal propensity framework for improvement in the performance of recommender systems. We successfully come up with a movie recommendation system through the selection of optimal personalization factors and the embodiment of a safe collaborative filtering system.

공개키 기반 구조에서 KT Single Sign-On 설계 (Design of KT′s Single Sign-On on Public Key Infrastructure)

  • 연승호;박현규;오희수;김영헌;전병민
    • 한국정보과학회논문지:컴퓨팅의 실제 및 레터
    • /
    • 제8권2호
    • /
    • pp.231-239
    • /
    • 2002
  • 본 논문은 인증서를 기반으로 한 SSO(Single Sign-On)를 구현함에 있어 LDAP(Lightweight Directory Access Protocol)의 DN(Distinguished Name)과 속성(Attribute)을 지정함에 따라 다양한 응용서비스들을 수용할 수 있는 데이타 구조를 설계하였다. 조직의 인사데이타를 바탕으로 LDAP 데이터를 구축하고, 수시 변경되는 자료에 대하여는 연동에 의한 지속적인 자동수정 기능을 적용하였다. 또한 인증서 발급을 위해서 PKI(Public Key Infrastructure) 기반의 CA(Certificate Authority) 서버를 적용하였으며, 인증통신을 위한 데이타 암호화는 SSL(Secure Socket Layer) 기반의 SHTTP(Secure Hyper Text Transfer Protocol)을 적용하였다.