• Title/Summary/Keyword: sessionStorage

Search Result 33, Processing Time 0.026 seconds

ECU Data Integrity Verification System Using Blockchain (블록체인을 활용한 ECU 데이터 무결성 검증 시스템)

  • Sang-Pil, Byeon;Ho-Yoon, Kim;Seung-Soo, Shin
    • Journal of Industrial Convergence
    • /
    • v.20 no.11
    • /
    • pp.57-63
    • /
    • 2022
  • If ECU data, which is responsible for collecting and processing data such as sensors and signals of automobiles, is manipulated by an attack, it can cause damage to the driver. In this paper, we propose a system that verifies the integrity of automotive ECU data using blockchain. Since the car and the server encrypt data using the session key to transmit and receive data, reliability is ensured in the communication process. The server verifies the integrity of the transmitted data using a hash function, and if there is no problem in the data, it is stored in the blockchain and off-chain distributed storage. The ECU data hash value is stored in the blockchain and cannot be tampered with, and the original ECU data is stored in a distributed storage. Using the verification system, users can verify attacks and tampering with ECU data, and malicious users can access ECU data and perform integrity verification when data is tampered with. It can be used according to the user's needs in situations such as insurance, car repair, trading and sales. For future research, it is necessary to establish an efficient system for real-time data integrity verification.

A Design of Authority Management Protocol for Secure Storage Access Control in Cloud Environment (클라우드 환경에서 안전한 스토리지 접근 제어를 위한 권한 관리 프로토콜 설계)

  • Min, So-Yeon;Lee, Kwang-Hyong;Jin, Byung-Wook
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.9
    • /
    • pp.12-20
    • /
    • 2016
  • With the enhancements in existing major industries, cloud computing-based converging services have been created, as well as value-added industries. A variety of converging services are now provided, from personalized services up to industrial services. In Korea, they have become the driving force behind existing industries throughout the whole economy, but mainly in finance, mobile systems, social computing, and home services, based on cloud services. However, not only denial of service (DOS) and distributed DOS (DDOS) attacks have occurred, but also attack techniques targeting core data in storage servers. Even security threats that are hardly detected, such as multiple attacks on a certain target, APT, and backdoor penetration have also occurred. To supplement defenses against these, in this article, a protocol for authority management is designed to provide users with safe storage services. This protocol was studied in cases of integration between a cloud environment and big data-based technology, security threats, and their requirements. Also studied were amalgamation examples and their requirements in technology-based cloud environments and big data. With the protocol suggested, based on this, security was analyzed for attack techniques that occur in the existing cloud environment, as well as big data-based techniques, in order to find improvements in session key development of approximately 55%.

Study on Methods for Determining Half-Life of Domestic Wooden Panel among Harvested Wood Products (국산 목질판상재의 반감기 결정방법에 관한 연구)

  • Chang, Yoon-Seong;Han, Yeonjung;Park, Jun-Ho;Son, Whi-Lim;Park, Joo-Saeng;Park, Moon-Jae;Yeo, Hwanmyeong
    • Journal of the Korean Wood Science and Technology
    • /
    • v.42 no.3
    • /
    • pp.309-317
    • /
    • 2014
  • Harvested wood products (HWP) are known as products from the tree such as sawn wood, plywood, particle board, structural lumber, wooden interior material, wooden furniture, and paper products. Because carbon is locked up in the HWP until eventual end-use of HWP, HWP played a role as the carbon storage which has the effect of stabilizing the concentration of carbon dioxide in the atmosphere. For these reasons, the suggestion that it must admit the carbon storage effect of HWP has been constantly raised. In 2011, the 17th session of the Conference of the Parties (COP) to the United Nations Framework Convention on Climate Change (UNFCCC) which was held in Durban, South Africa, assigned "Production Approach" which targets only the HWP producted by using round wood of domestic forestry as a official method for carbon accounting. Therefore, it is necessary that each country has to determine the half-life of wood in order to correspond to the discussions and negotiations between countries in the future and to develop an inventory of product-specific domestic wood. In this study, some countries' examples of the methods and conditions for determining half-life of HWP were investigated, and it was tried to derive the factor and methodology to determine half-life span of domestic HWP appropriately.

Ubiquitous Workspace Synchronization in a Cloud-based Framework (클라우드 기반 프레임워크에서 유비쿼터스 워크스페이스 동기화)

  • Elijorde, Frank I.;Yang, Hyunho;Lee, Jaewan
    • Journal of Internet Computing and Services
    • /
    • v.14 no.1
    • /
    • pp.53-62
    • /
    • 2013
  • It is common among users to have multiple computing devices as well as to access their files or do work at different locations. To achieve file consistency as well as mobility in this scenario, an efficient approach for workspace synchronization should be used. However, file synchronization alone cannot guarantee the mobility of work environment which allows activities to be resumed at any place and time. This paper proposes a ubiquitous synchronization approach which provides cloud-based access to a user's workspace. Efficient synchronization is achieved by combining session monitoring with file system management. Experimental results show that the proposed mechanism outperforms Cloud Master-replica Synchronization in terms of number of I/O operations, CPU utilization, as well as the average and maximum latencies in responding to client requests.

Development of I-HTTP for supporting Interactive Learning Object (상호작용적 학습 객체 지원을 위한 I-HTTP 개발)

  • 정영식
    • Journal of the Korea Computer Industry Society
    • /
    • v.4 no.10
    • /
    • pp.713-722
    • /
    • 2003
  • The purpose of this study was to define an interactive learning object of ILO through implementation of learning object content standardization technology for the reuse of interactive tools between learners, and to develop I(Interactive)-HTTP for the ILO to properly communicate with LMS. 1-HTTP developed here was enabled to keep connection status during the entire session by improving the existing HTTP with its stateless connection property. This ceaseless connection made it possible to provide users with the real-time interactivity between learners that happened frequently in the ILO. Also, because the I-HTTP was an expanded version of HTTP, it was possible to conduct general HTML documentation as well as ILO. In particular, the standardized launch process between LMS and ILO was embodied in adding the INIT, GETVAL, SETVAL, COMMBT, FINISH methods in the protocol, and the results from the interactivity between ILO learners were channeled to the database storage to save them through separately defined data models.

  • PDF

An Efficient Variant of Self-Healing Group Key Distribution Scheme with Revocation Capability (자가 치료 기능과 취소 능력을 가진 효율적인 그룹키 분배 기법)

  • Kang Ju-Sung;Hong Dowon
    • The KIPS Transactions:PartC
    • /
    • v.12C no.7 s.103
    • /
    • pp.941-948
    • /
    • 2005
  • In the self-healing group key distribution scheme, users are capable of recovering lost group keys on their own without requesting additional transmission from the group manager, where there is no reliable network infrastructure. In this paper, we propose a new self-healing group key distribution scheme with revocation capability, which is optimal in terms of user memory storage and more efficient in terms of communication complexity than the previous results. We obtain a slightly improved result from (13) and (14) by using the new broadcasting method. In addition, we prove that our scheme has the properties of t-wise forward secrecy and t-wise backward secrecy, and extend this self-healing approach to the session key recovery scheme from a single broadcast message.

An X-masking Scheme for Logic Built-In Self-Test Using a Phase-Shifting Network (위상천이 네트워크를 사용한 X-마스크 기법)

  • Song, Dong-Sup;Kang, Sung-Ho
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.44 no.2
    • /
    • pp.127-138
    • /
    • 2007
  • In this paper, we propose a new X-masking scheme for utilizing logic built-in self-test The new scheme exploits the phase-shifting network which is based on the shift-and-add property of maximum length pseudorandom binary sequences(m-sequences). The phase-shifting network generates mask-patterns to multiple scan chains by appropriately shifting the m-sequence of an LFSR. The number of shifts required to generate each scan chain mask pattern can be dynamically reconfigured during a test session. An iterative simulation procedure to synthesize the phase-shifting network is proposed. Because the number of candidates for phase-shifting that can generate a scan chain mask pattern are very large, the proposed X-masking scheme reduce the hardware overhead efficiently. Experimental results demonstrate that the proposed X-masking technique requires less storage and hardware overhead with the conventional methods.

Mitigating the Side-effect of Starting New Session in Multimedia Streaming using Multi-zoned Disk (구역분할 디스크를 사용하는 멀티미디어 서버에서 새로운 세션 시작에 따른 스케줄링 지연 현상의 최소화)

  • Cho, Kyeong-Sun;Won, You-Jip;Shin, Il-Hoon;Koh, Kern
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.31 no.8
    • /
    • pp.445-452
    • /
    • 2004
  • Zoning technology of disk improved the performance of disk subsystem with increase of storage capacity and average transfer bandwidth. SCAN disk scheduling with double buffering is used to utilize the performance of zoned disk in multimedia system. However, this method has a problem that generates jitter when the number of steams increases. In this article, we propose the novel approach, pre-buffering policy, to overcome this problem. Pre-buffering avoids jitter by buffering the lack of data before starting service, which is estimated from the current cycle length and the maximum cycle length. We can calculate cycle length, data sire needed in each cycle and the possible lack of data caused by the increase of the number of streams using the numerical model of disk subsystem. Pre-buffering can be applied for multimedia systems and contribute to provide clients with high quality service without jitter.

The Compatibility Analysis on the Track Record Operation Center for the Regional Industry Upbringing (지역산업 육성을 위한 분산형 전원 트렉 레코드 실증 운영 센터 적합성 분석)

  • Kim, IL-Song
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.9 no.4
    • /
    • pp.269-277
    • /
    • 2019
  • In this paper, the compatibility analysis on the track record operation center for the regional industry upbringing is presented. The renewable energy sources such as solar, wind and battery energy storage system have been widely spread in these days. Also the requirements on the efficiency, reliability and power demands of these distributed systems are increasing and they can be demands on the construction of the data track record center for renewable energy industries in order to promote the local industries. The analysis on the size of the de-centralized power system are performed based on the technical issues. The necessities, requirements and center goals to meet these missions are presented in the following session. The proposal of the 1 MW operation center construction and operations are presented in the result of the compatibility analysis. And the lists of the required equipments in the operation facilities are suggested to have proper operational capabilities. The results of this research can be applied in the fundamental data to promote the regional renewable industries.

Development of SAML Software for JAVA Web Applications in Korea (국내 자바 웹 응용을 위한 SAML 소프트웨어의 개발)

  • Jo, Jinyong;Chae, Yeonghun;Kong, JongUk
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.9
    • /
    • pp.1160-1172
    • /
    • 2019
  • Federated authentication is a user authentication and authorization infrastructure that spans multiple security domains. Many overseas Web applications have been adopting SAML-based federated authentication. However, in Korea, it is difficult to apply the authentication because of the high market share of a specific Web (application) server, which is hard to use open-source SAML software and the high adoption of Java-based standard framework which is not easy to integrate with SAML library. This paper proposes the SAML4J, which is developed in order to have Web applications easily and safely integrated with the Java-based framework. SAML4J has a developer-friendly advantage of using a session storage independent of the framework and processing Web SSO flows through simple API. We evaluate the functionality, performance, and security of the SAML4J to demonstrate the high feasibility of it.