DOI QR코드

DOI QR Code

A Study Medium-based safe File Management Security System on the cloud Environment

클라우드 환경에서 매체기반의 안전한 파일관리 보안 시스템에 대한 연구

  • Kim, Hee-Chul (Division of Computer Engineering, Gwangju University)
  • 김희철 (광주대학교 컴퓨터공학과)
  • Received : 2018.11.19
  • Accepted : 2019.01.20
  • Published : 2019.01.28

Abstract

This study is a file management security system that encrypts and decrypts computer and cloud data by using Bluetooth based cryptographic module. It is a necessary solution in terms of abuse of personal information and protection of social and national information. We developed H/W and S/W for SFMS(: Safe File Management Security) related Bluetooth module in cloud environment and implemented firmware development, encryption key generation and issuance, client program for system mobile and key management system. In the terminal internal encryption and decryption, SFMS was developed to ensure high security that the hacking itself is not possible because key values exist separately for each file.

본 연구는 블루투스 기반의 암호모듈을 활용하여 전산기 및 클라우드 데이터를 암 복호화하는 파일관리 보안시스템으로 개인정보의 오남용과 사회적, 국가적 정보보호 측면에서 반드시 필요한 솔루션이다. 클라우드 환경에서 SFMS(; Safe File Management Security) 관련 블루투스 암호모듈에 대한 H/W와 S/W를 개발하여 펌웨어 개발과 암호키 생성 및 발급, 시스템 모바일용 Client 프로그램, 키 관리 시스템 등을 적용하였다. 단말 내부 암 복호화는 파일별로 키값이 별도로 존재함으로 해킹 자체가 원천적으로 불가능 한 높은 안전성을 확보할 수 있는 SFMS 개발하였다.

Keywords

JKOHBZ_2019_v9n1_142_f0001.png 이미지

Fig. 1. USB2642 Block Diagram

JKOHBZ_2019_v9n1_142_f0002.png 이미지

Fig. 2. Whole block diagram

JKOHBZ_2019_v9n1_142_f0003.png 이미지

Fig. 3. SPI Block

JKOHBZ_2019_v9n1_142_f0004.png 이미지

Fig. 4. Advertising course

JKOHBZ_2019_v9n1_142_f0005.png 이미지

Fig. 5. BLE operation structure diagram

JKOHBZ_2019_v9n1_142_f0006.png 이미지

Fig. 6. SFMS module operation flowchart

JKOHBZ_2019_v9n1_142_f0007.png 이미지

Fig. 7. SFMS OS Operation Flowchart

Table. 1 Personal Information Infringement Report by Year

JKOHBZ_2019_v9n1_142_t0001.png 이미지

Table 2. SFMS Test result

JKOHBZ_2019_v9n1_142_t0002.png 이미지

References

  1. G. Heiser, K. Elphinstone, I. Kuz, G. Klein & S. M. Petters. (2007). Towards Trustworthy Computing Systems: Taking Microkernels to the Next Level. Operating Systems Review, 41(3), 3-11.
  2. H. Huh & J. Lee. (2009). A Study on Development of H8 MCU IDB(Integrated development board) for Embedded Education. J . of the Korea Institute of Electronic Communication Sciences, 4(1), 51-57.
  3. H. Lee & J. Oh. (2017). Design and Implementation of a Small Server Room Environment Monitoring System by Using the Arduino. J . of the Korea Institute of Electronic Communication Sciences, 12(2), 386-387.
  4. K. Kim, C. By on, C. Lim & S. Han. (2008). Design of Electrostatic Monitoring System. The J . of the korea Institute of Maritime Information & Communication Sciences, 12(11), 2069-2076.
  5. K. Kim, D. Wang & S. Han. (2017). Home Security System Based on IoT. J . of the Korea Institute of Electronic Communication Sciences, 12(1), 147-154 https://doi.org/10.13067/JKIECS.2017.12.1.147
  6. D. Ryu & T. Choi. (2016). Development of Open IoT platform based on Open Source Hardware & Cloud Service. J . of the Korea Institute of Electronic Communication Sciences, 11(5), 485-490. https://doi.org/10.13067/JKIECS.2016.11.5.485
  7. H. Xu & C. Kim. (2017). Design and Implementation of a Smart Home Cloud Control System Using Bridge based on IoT. J . of the Korea Institute of Electronic Communication Sciences, 12(5) 866-869
  8. K Yoo & D. Ko. (2012). Study on the Performance Test Technique of Open SW-based Cloud computing. J . Korean Institute of Information Technology, 10(7), 185-19
  9. Y. Oh & S. Lee. (2014). IoT and the open source development platform. J . of the Korean Institute of Information Scientists and Engineers, 32(6), 25-30.
  10. C. Ryu. (2014). Context Inference and Sensor Data Classification of Big Data Stream Environment. J . of The Korea Institute of Electronic Communication Sciences, 9(10), 1079-1085. https://doi.org/10.13067/JKIECS.2014.9.10.1079
  11. K. Nam. (2014). A Study on the Office Management Service Platform based on M2M/IoT. J . of the Korea Institute of Electronic Communication Sciences, 9(12), 1405-1413. https://doi.org/10.13067/JKIECS.2014.9.12.1405
  12. D. Lee, D. Bae, S. You, J. Chae, Y. Lee & H. Yang. (2011). An Analysis on the Security of Secure Keypads for Smartphone. Review of Korea Institute of Information Security and Cryptograph (KIISC), 21(7), 30-37.
  13. J. Saidov, B. Kim, J. Lee & G. Lee. (2017). Hardware Interlocking Security System with Secure Key Update Mechanisms In IoT Environments. J . of the Korea Institute of Electronic Communication Sciences, 12(4), 671-678. https://doi.org/10.13067/JKIECS.2017.12.4.671