DOI QR코드

DOI QR Code

클라우드 컴퓨팅 환경에 적합한 그룹 키 관리 프로토콜

Group key management protocol adopt to cloud computing environment

  • 김용태 (한남대학교 멀티미디어학부) ;
  • 박길철 (한남대학교 멀티미디어학부)
  • Kim, Yong-Tae (Department of Multimedia Engineering, Hannam University) ;
  • Park, Gil-Cheol (Department of Multimedia Engineering, Hannam University)
  • 투고 : 2014.01.06
  • 심사 : 2014.03.20
  • 발행 : 2014.03.28

초록

IT 서비스 및 컴퓨팅 자원을 기반으로 인터넷 서비스를 제공하는 클라우드 컴퓨팅이 최근 큰 관심을 받고 있다. 그러나 클라우드 컴퓨팅 시스템에 저장되는 데이터는 암호화한 후 저장되어도 기밀 정보가 유출되는 문제점이 있다. 본 논문에서는 사용자가 클라우드 컴퓨팅 시스템에서 제공되는 데이터를 제 3자가 임의로 악용하는 것을 예방하기 위한 그룹 키 관리 프로토콜을 제안한다. 제안된 프로토콜은 임의의 사용자가 원격에서 클라우드 컴퓨팅 서버에 접근할 경우 서버에 존재하는 사용자 인증 데이터베이스내 사용자 정보를 일방향 해쉬 함수와 XOR 연산을 사용하여 사용자 인증을 제공받는다. 도한 사용자의 신분확인 및 권한을 연동하여 클라우드 컴퓨팅 시스템에 불법적으로 접근하는 사용자를 탐색함으로써 클라우드 컴퓨팅의 사용자 보안 문제를 해결하고 있다.

Recently, wind energy is expanding to combination of computing to forecast of wind power generation as well as intelligent of wind powerturbine. Wind power is rise and fall depending on weather conditions and difficult to predict the output for efficient power production. Wind power is need to reliably linked technology in order to efficient power generation. In this paper, distributed power generation forecasts to enhance the predicted and actual power generation in order to minimize the difference between the power of distributed power short-term prediction model is designed. The proposed model for prediction of short-term combining the physical models and statistical models were produced in a physical model of the predicted value predicted by the lattice points within the branch prediction to extract the value of a physical model by applying the estimated value of a statistical model for estimating power generation final gas phase produces a predicted value. Also, the proposed model in real-time National Weather Service forecast for medium-term and real-time observations used as input data to perform the short-term prediction models.

키워드

참고문헌

  1. D. W. Kim, J. W. Han, and K. I. Chung(2009), "Trend of Home Device Authentication/Authorization Technology", Weekly IT BRIEF, No. 1329, pp. 1-11.
  2. S.Y. Lee, K.B. Yim, K.J. Bae, Taeyoung Jeong, and Jong-Wook Han(2009), "Counterplan of Ubiquitous Home Network Privacy based on Device Authentication and Authorization," Korea Institute of Information Security & Cryptology, Review of KIISC, 18(5), pp.125-131.
  3. D. Halperin, T. S. Heydt-Benjamin, B. Ransford et al.(2009), "Pacemakers and implantable cardiac defibrillators: software radio attacks and zero-power defenses", in Proc. of SP'08, pp. 129-142.
  4. W. Jansen, and T. Grance(2011), "Guidelines on Security and Privacy in Public Cloud Computing".
  5. M. Mannan, B. H. Kim, A. Ganjali, and D. Lie(2011), "Unicorn: Two-factor Attestation for data Security", Proc. of the 18th ACM conference on Computer and Communications Security.
  6. F. Zhang, J. Chen, H. Chen, and B. Zang(2011), "CloudVisor: Retrofitting Protection of Virtual Machines in Multitenant Cloud with Nested Virtualization", Proc. of 23rd ACM Symposium on Operating Systems Principles.
  7. L. Eschenauer and V. D. Gligor(2002), "A key-management scheme for distributed sensor networks," in Proceedings of the 9th ACM conference on Computer and communications security, Washington, DC, USA, pp. 41-47.
  8. Gupta G, Younis M(2003), "Performance Evaluation of Load-Balanced Clustering in Wireless Sensor Networks" In the proc. of 10th International Conference on Telecommunications (ICT 2003), Tahiti, French Polynesia.
  9. M. Tatebayashi, N. Matsuzaki, and D. B. Newman(1999), "Key distribution protocol for digital mobile communication systems," Advances in Cryptology-CRYPTO'89, pp. 324-334, INCS Volume 435, Springer-verlag.
  10. C. Park, K. Kurosawa, T. Okamoto, and S. Tsujii(1993), "On key distrubution and authentication in mobile radio networks," Advances in Cryptology - euroCrypt'93, pp. 461-465, INCS Volume 765, Springer-verlag.
  11. S. Basagni, K. Herrin, D. Bruschi, and E. Rosti(2001). "Secure pebblenets," In Proceedings of the 2001 ACM International Symposium on Mobile ad hoc networking & computing, ACM Press, pp. 156-163.
  12. L. Echenauer and V. D. Gligor(2002), "A Key-Management scheme for Distributed sensor networks," In Proceedings of the 9th Computer Communication Security, pp.41-47.
  13. H. Chan, A. Perrig, and D. Song(2003), "Random key predistribution schemes for Sensor networks," In IEEE Symposium on Research in Security and Privacy, pp.197-213
  14. S. Zhu, S. Setia, and S. Jajodia(2002), "A distributed group key managemet protocol for ad hoc networks," Unpublished manuscript, George Mason University.
  15. A. Khalili, et al.(2003), "Toward Secure key Distribution in Truly Ad-Hoc Networks," IEEE SAINT'03, pp. 342-346.

피인용 문헌

  1. An autonomic control system for high-reliable CPS vol.18, pp.2, 2015, https://doi.org/10.1007/s10586-014-0414-8