• Title/Summary/Keyword: 다중 인증

Search Result 301, Processing Time 0.025 seconds

Broker-based Authentication Scheme in a Multi-Cloud Environment (멀티 클라우드 환경에서 브로커 기반 인증 기법)

  • Kim, Hyungjoo;Lee, Jaeseung;Kang, Jungho
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2016.04a
    • /
    • pp.151-152
    • /
    • 2016
  • 최근 컴퓨터 자원을 효율적으로 사용 가능한 클라우드 컴퓨팅 기술의 활용이 증가하고 있다. 특히, 클라우드 컴퓨팅 환경에서 단순 하나의 클라우드 컴퓨팅 서비스의 제약을 넘어 2개 이상의 클라우드 서비스를 활용할 수 있는 멀티 클라우드에 대한 연구가 활발히 진행되고 있다. 멀티 클라우드란 2개 이상의 클라우드 서비스가 상호 협약을 통해 사용자에게 컴퓨팅 자원을 추가적으로 지원해주는 기술로, 기존 환경에서는 각각의 클라우드 서비스에 인증을 해야 하는 다중 인증 기술이 활용 되었다. 본 논문에서는 기존의 멀티 인증 과정을 단순히 하기 위해, 사용자가 특정 클라우드 서비스에 가입 후, 다른 클라우드 서비스 이용 시 브로커를 활용하여 유저가 추가적인 인증 과정 없이 2개 이상의 클라우드 서비스 이용이 가능한 인증 기법을 제안하였다.

Multi-Server Authenticated Key Exchange Protocol (다중서버를 이용한 인증된 키교환 프로토콜)

  • 이정현;김현정;이동훈
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.1
    • /
    • pp.87-97
    • /
    • 2003
  • In this paper, we define two security concepts, “non-computable security” and “distribution security”, about authentication information committed to a authentication server without any trustee, and propose an authenticatied key exchange protocol based on password, satisfying “distribution security”. We call it MAP(Muti-Server Authentication Protocol based on Password) and show that SSSO(Secure Single Sign On) using MAP solves a problem of SSO(Single Sign On) using authentication protocol based on password with a trustee.

Mutual Authentication Scheme between Multiple Instances for Secure Data Share of Virtualized Environment (가상화 환경의 안전한 데이터 공유를 위한 다중 인스턴스간 상호인증 기법)

  • Choi, Dohyeon;Kim, Sangkun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.6
    • /
    • pp.83-94
    • /
    • 2016
  • Recent cloud, big data, there is a problem for the architectural security vulnerability to the server platforms of various fields such as artificial intelligence occurs consistently, but using the virtualization technology. In addition, most secure virtualization technology is known to be dependent on the type is limited and the platform provider. This paper presents a method for mutual authentication for secure data between multiple instances of a shared virtualized environment. The proposed method was designing a security architecture in consideration of the mutual authentication between multiple independent instances, and enhance the safety of a security protocol for sharing data by applying a key chain techniques. Performance analysis results and the existing security architecture demonstrated that protect each virtualized instances of the session and the other way, a compliance effectiveness for each instance of the mutual authentication process.

Untraceable Authenticated Key Agreement Scheme for Multi-server Environment (다중서버를 위한 비-추적성을 제공하는 인증된 키 동의 기법)

  • Choi, Hae-Won;Kim, Sangjin;Ryoo, Myungchun
    • Journal of Digital Convergence
    • /
    • v.15 no.10
    • /
    • pp.253-260
    • /
    • 2017
  • Authenticated key agreement in multi-server environments is one of very important security issues because only authorized user needs to access their data and services. To support this issue, numerous schemes have been proposed over recent years. Recently, Shin showed the security weaknesses in the previous scheme and proposed an improved scheme called SIAKAS to solve them. Unfortunately, this paper shows that SIAKAS is still weak against application server impersonation attack and could be traceable to attackers. To solve the problems in SIAKAS, we propose an untraceable authenticated key agreement scheme, denoted by UAKAS. UAKAS efficiently solves security and privacy issues in SIAKAS and the related schemes and could reduce the operation overhead at least 12% compared to them.

Mutual Authentication Protocol for Safe Data Transmission of Multi-distributed Web Cluster Model (다중 분산 웹 클러스터모델의 안전한 데이터 전송을 위한 상호 인증 프로토콜)

  • Lee, Kee-Jun;Kim, Chang-Won;Jeong, Chae-Yeong
    • The KIPS Transactions:PartC
    • /
    • v.8C no.6
    • /
    • pp.731-740
    • /
    • 2001
  • Multi-distributed web cluster model expanding conventional cluster system is the cluster system which processes large-scaled work demanded from users with parallel computing method by building a number of system nodes on open network into a single imaginary network. Multi-distributed web cluster model on the structured characteristics exposes internal system nodes by an illegal third party and has a potential that normal job performance is impossible by the intentional prevention and attack in cooperative work among system nodes. This paper presents the mutual authentication protocol of system nodes through key division method for the authentication of system nodes concerned in the registration, requirement and cooperation of service code block of system nodes and collecting the results and then designs SNKDC which controls and divides symmetrical keys of the whole system nodes safely and effectively. SNKDC divides symmetrical keys required for performing the work of system nodes and the system nodes transmit encoded packet based on the key provided. Encryption packet given and taken between system nodes is decoded by a third party or can prevent the outflow of information through false message.

  • PDF

Implementation of Hybrid Smartcard Using Multi Encryption Method (다중 암호화 기법을 활용한 하이브리드 스마트카드 구현)

  • 이성은;장홍종;박인재;한선영
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.2
    • /
    • pp.81-89
    • /
    • 2003
  • With the rapid development of information and communication technology, online dissemination increases rapidly. So, It becomes more important to protect information. Recently the authentication system using public key infrastructure (PKI) is being utilized as an information protection infrastructure for electronic business transactions. And the smartcard system makes the most use of such an infrastructure. But because the certification based on the current PKI provides oかy basic user certification information, the use has to be limited in various application services that need the identification and authorization information as well as face-to-face information of the user. In order to protect a system from various kinds backings and related treats, we have proposed angular and private key multiplexing for prevention of smartcard forgery and alteration based on a photopolymer cryptosystem. When smartcard becomes prone to forgery and alteration, we should be able to verify it. Also, our parer proposes a new authentication system using multi authentication based on PKI. The smartcard has an excellent advantage in security and moving.

항공기 낙뢰 간접영향 인증시험 동향

  • Han, Sang-Ho;Seo, Jang-Won
    • Current Industrial and Technological Trends in Aerospace
    • /
    • v.5 no.2
    • /
    • pp.87-97
    • /
    • 2007
  • 오늘날 항공기 설계와 제작은 다국적인 산업의 형태로 이루어지고 있다. 즉 항공기 서브시스템은 세계 각국에서 독립적으로 설계, 제작 및 시험한 후 한 곳으로 납품되어 조립 제작되는 데 이 때 중요한 것이 표준화이다. 항공전자장비의 낙뢰 간접영향에 대한 인증의 경우 RTCA DO-160E, Section 22 Lightning Induced Transient Susceptibility(낙뢰 유도 과도현상 적응성)로 표준화 되어 있다. 이 Section 22는 낙뢰 간접영향에 대한 항공전자장비 단위 즉, LRU (Line Replaceable Units)와 같은 부품단위의 시험 요건을 규정하고 있으며 이 규격은 현재 전 세계적으로 통용이 되고 있다. 1980년대 초 상용 수송기에 디지털 "Fly by Wire" 비행 시스템과 엔진제어시스템(EEC, Electronic Engine Control)의 도입 이후, 항공기 시스템이 낙뢰 환경에서 운용시 신뢰성을 보증할 필요성이 대두되었다. 데이터 처리를 통하여 제어되는 각종 항공전자장비에는 다중타격(MS)과 다중파열(MB) 기법에 의한 시험 사항이 최근 추가 되었다. 실제 낙뢰 환경과 유사한 시험실 모사를 위해 계속적인 연구가 진행 중이며 신규 시험 규격서가 새로이 출간되고 있다.

  • PDF

A Code Authentication System of Counterfeit Printed Image Using Multiple Comparison Measures (다중 비교척도에 의한 영상 인쇄물 위조 감식 시스템)

  • Choi, Do-young;Kim, Jin-soo
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.23 no.4
    • /
    • pp.1-12
    • /
    • 2018
  • Currently, a large amount of printed matter associated with code authentication method are diffused widely, however, they have been reproduced with great precision and distributed successively in illegal ways. In this paper, we propose an efficient code authentication method which classifies authentic or counterfeit with smart-phone, effectively. The proposed method stores original image code in the server side and then extracts multiple comparison measures describing the original image. Based on these multiple measures, a code authentication algorithm is designed in such a way that counterfeit printed images may be effectively classified and then the recognition rate may be highly improved. Through real experiments, it is shown that the proposed method can improve the recognition rate greatly and lower the mis-recognition rate, compared with single measure method.