• Title/Summary/Keyword: 서버 복제

Search Result 113, Processing Time 0.029 seconds

Study of DRM Application for the Portable Digital Audio Device (휴대용 디지털 오디오 기기에서의 DRM 적용에 관한 연구)

  • Cho, Nam-Kyu;Lee, Dong-Hwi;Lee, Dong-Chun;J. Kim, Kui-Nam;Park, Sang-Min
    • Convergence Security Journal
    • /
    • v.6 no.4
    • /
    • pp.21-27
    • /
    • 2006
  • With the introduction of sound source sharing over the high speed internet and portable digital audio, the digitalization of sound source has been rapidly expanded and the sales and distribution of sound sources of the former offline markets are stagnant. Also, the problem of infringement of copyright is being issued seriously through illegal reproduction and distribution of digitalized sound sources. To solve these problems, the DRM technology for protecting contents and copyrights in portable digital audio device began to be introduced. However, since the existing DRM was designed based on the fast processing CPU and network environment, there were many problems in directly applying to the devices with small screen resolution, low processing speed and network function such as digital portable audio devices which the contents are downloadable through the PC. In this study, the DRM structural model which maintains similar security level as PC environment in the limited hardware conditions such as portable digital audio devices is proposed and analyzed. The proposed model chose portable digital audio exclusive device as a target platform which showed much better result in the aspect of security and usability compared to the DRM structure of exiting portable digital audio device.

  • PDF

Object Replication and Consistency Control Techniques of P2P Structures for Multiplayer Online Games (멀티플레이어 온라인 게임을 위한 P2P 구조의 객체 복제와 일관성 제어 기법)

  • Kim, Jinhwan
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.14 no.4
    • /
    • pp.91-99
    • /
    • 2014
  • The main game architectures for multiplayer online games are the traditional client-server architectures, multi-server architectures and P2P(peer-to-peer) architectures. P2P architectures, due to their distributed and collaborative nature, have low infrastructure costs and can achieve high scalability as well as fast response time by creating direct connections between players. However, P2P architectures face many challenges. Distributing a game among peers makes maintaining control over the game more complex. These architectures also tend to be vulnerable to churn and cheating. Providing consistency control in P2P systems is also more difficult since conflicting updates might be executed at different sites resulting in inconsistency. In order to avoid or correct inconsistencies, most multiplayer games use a primary-copy replication approach where any update to the object has to be first performed on the primary copy. This paper presents the primary-copy model with the update dissemination mechanism that provides consistency control over an object in P2P architectures for multiplayer online games. The performance for this model is evaluated through simulation experiments and analysis.

A Scheme of Resource Reallocation and Server Replication against DoS Attacks (서비스 거부 공격에 대비한 자원 재할당 및 서버 중복 방안)

  • Min, Byoung-Joon;Kim, Sung-Ki;Na, Yong-Hi;Lee, Ho-Jae;Choi, Joong-Sup;Kim, Hong-Geun
    • The KIPS Transactions:PartA
    • /
    • v.10A no.1
    • /
    • pp.7-14
    • /
    • 2003
  • In order to cope with DoS (Denial of Service) attacks disturbing delivery of intended services by exhausting resources of computing nodes, we need a solution to recognize important resources for the essential services which have to be maintained under any circumstances and to adapt the system to the urgent situation and reconfigure itself properly. In this paper, we present a two-phase scheme to handle the problem. In the first phase, by means of dynamic resource reallocation within a computing node, we try to make the selected essential services survive even after the occurrence of an attack. For the second phase when it becomes impossible to continue the service in spite of the actions taken in the first phase, we apply server replication in order to continue the transparent provision of the essential services with the end users by utilizing redundant computing nodes previously arranged. Experimental result obtained on a testbed reveals the validity of the proposed scheme. A comparison with other proposed schemes has been conducted by analyzing the performance and the cost.

Distributed Security for Web Application Contents Protection (웹 어플리케이션 콘텐츠 보호를 위한 분산 보안)

  • Heo, Jin-Kyoung
    • Journal of Digital Contents Society
    • /
    • v.9 no.1
    • /
    • pp.125-130
    • /
    • 2008
  • User web service is increasing by development of internet technology. Quantity of encrypted data that transmitted through the network are increasing by development of encipherment technology. We have many problems; it is caused by technical development and service increase of user requests. It is like that, we have reliability of contents and illegality copy problem of internet contents in web application system. It is contents protection skills in web that encipherment technology, authentication and digital signature. We need message encoding and secret key for solve vulnerability of encipherment in web application system. In this paper, we propose a distributed secure system that can data confidentiality and user authentication. It prevent performance degradation from bottle neck in encipherment server, and improve service quality.

  • PDF

Secure Group Communication Scheme for e-Commerce Based on Mobile Agents (이동에이전트 기반의 전자상거래를 위한 안전한 그룹통신 기법)

  • Cho, Hyun-Jin;Kim, Gu -Su;Eom, Young-Ik
    • Annual Conference of KIPS
    • /
    • 2005.05a
    • /
    • pp.487-490
    • /
    • 2005
  • 이동 에이전트란 어떠한 동작을 수행하는 명령과 자신의 상태 정보를 포함하는 자율적인 소프트웨어 객체이다. 이동 에이전트는 자율적으로 이동할 수 있으며 복제와 증식이 가능하고 사용자의 업무를 대신해서 수행할 수 있다는 장점으로 인해 전자상거래에서 사용자를 대신하여 상품 검색 및 구매에 사용될 수 있다. 이 때 다수의 이동 에이전트가 하나의 그룹이 되어 서로 메시지를 주고받으며 사용자의 요구사항을 수행한다. 이동 에이전트간 전달되는 메시지는 상품의 정보뿐 아니라 사용자 또는 에이전트의 비밀정보가 될 수 있다. 악의를 가진 외부 개체로부터 그룹 멤버쉽이나 메시지가 변경된다면 이동 에이전트 그룹은 사용자가 의도하지 않는 동작을 수행할 수 있다. 본 논문에서는 이러한 공격을 방어하기 위해 그룹 멤버간 암호화 통신을 할 수 있는 그룹 세션키 생성 기법을 제안한다. 기존 기법과는 달리 본 논문에서는 중앙 키 분배 서버 없이 그룹에 참가하는 이동 에이전트 각자 그룹 세션키를 생성한다. 또한 키 갱신을 주기적으로 수행함으로써 외부 개체로부터 그룹 세션키의 습득을 어렵게 한다.

  • PDF

A Design of File System that Supports a Global View in Grids (그리드에서 단일 뷰를 제공하는 파일 시스템의 설계)

  • Lee JongHyuk;Chin SungHo;Lee HwaMin;Lee DaeWon;Lee PillWoo;Yu HeonChang
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2005.07b
    • /
    • pp.19-21
    • /
    • 2005
  • 현재 그리드 컴퓨팅에 관한 연구는 그리드 컴퓨팅 인프라의 성공적인 구축과 함께 그리드 컴퓨팅의 응용분야가 확대됨으로써 그리드 컴퓨팅이 제공하는 고성능 연산 자원뿐만 아니라 대용량의 저장장치와 데이터베이스를 이용하기 위한 데이터 그리드에 관한 연구도 활발히 이루어지고 있다. 하지만 데이터 그리드를 이용하는 응용에서 파일을 이용할 기회가 더욱 많음에도 불구하고 데이터베이스에 관한 연구에 비해 파일 데이터에 관한 연구가 미비한 실정이다. 따라서 본 논문에서는 그리드 컴퓨팅 미들웨어의 표준으로 자리 잡고 있는 OGSA물 기반으로 한 그리드 파일 시스템을 설계한다. OGSA 기반 그리드 파일 시스템은 크게 전통적인 파일 시스템과 같은 단일 뷰를 가능케 하는 명명 공간 서비스, 여러 개의 같은 파일을 단일 파일로 보이게 하는 복제 파일 관리 서비스, 파일의 메타 데이터 정보를 관리하는 파일시스템 정보 서비스, 마지막으로 사용자들과 개발자들이 동일한 접근 방식을 이용하도록 하는 서버${\cdot}$클라이언트${\cdot}$파일 제공자 인터페이스로 구성된다.

  • PDF

PKI/PMI based Access Control System on IPTV (IPTV에서 PKI/PMI기반의 권한 제어시스템)

  • Shuai, Wang;Jo, In-June
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.05a
    • /
    • pp.781-784
    • /
    • 2009
  • IPTV, which is convergence of Communication and Broadcasting, has improved quickly recently. This service can provide high quality and various services to their customers, such as choosing channels freely, VOD and many kinds of Interactive service. As the technology of IPTV rapid development, more and more people worry about its disadvantages during the spread and apply, for instance, the illegal application, illegal copy, access authority abuse and the danger of the IPTV contents. This paper will provide the solution to solve these problems, through the Public Key Certificate of PKI(Public Key Infrastructure) and the Attribute Certificate of PMI(Privilege Management Infrastructure).

  • PDF

An eBook Service System based on VOD Broadcasting Contents of Smart TV (스마트 TV의 VOD 방송 콘텐츠 기반 전자책 서비스 시스템 개발)

  • Jun, Eung Sup;Chang, Yong Sik
    • Journal of the Korea Society of Computer and Information
    • /
    • v.19 no.12
    • /
    • pp.257-266
    • /
    • 2014
  • In this paper, we propose the development of an eBook Service System based on VOD Broadcasting Contents(eBSS-VOD) which protects the illegal copy through the effective DRM strategy. Here, eBSS-VOD is composed of three sub-systems - eBook server management system, ePub Builder, and eBook App - according to the functional points of view. The eBook server management system operates to manage the eBooks, the encription keys, the VOD contents, the membership and the history of users' viewing log. The ePub Builder assists to produce eBooks by DRM strategy. The eBook App provides users with the utility services of VOD viewing and eBook purchase processing. The proposed eBSS-VOD, differently from the current eBook systems, helps to increase the users' interests in reading books and to motivate the users' purchasing needs and it also makes new distribution channel for eBooks based on VOD broadcasting contents through smart applications. We provides the differentiated eBook builder which are based on ePub3.0 and DRM strategy. Through empirical survey results on users' interests and purchase intention for eBooks, we show that the proposed eBSS-VOD has the comparative effects compared to the current systems.

The Authentication and Key Management Method based on PUF for Secure USB (PUF 기반의 보안 USB 인증 및 키 관리 기법)

  • Lee, Jonghoon;Park, Jungsoo;Jung, Seung Wook;Jung, Souhwan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38B no.12
    • /
    • pp.944-953
    • /
    • 2013
  • Recently, a storage media is becoming smaller and storage capacity is also becoming larger than before. However, important data was leaked through a small storage media. To solve these serious problem, many security companies manufacture secure USBs with secure function, such as data encryption, user authentication, not copying data, and management system for secure USB, etc. But various attacks, such as extracting flash memory from USBs, password hacking or memory dump, and bypassing fingerprint authentication, have appeared. Therefore, security techniques related to secure USBs have to concern many threats for them. The basic components for a secure USB are secure authentication and data encryption techniques. Though existing secure USBs applied password based user authentication, it is necessary to develop more secure authentication because many threats have appeared. And encryption chipsets are used for data encryption however we also concern key managements. Therefore, this paper suggests mutual device authentication based on PUF (Physical Unclonable Function) between USBs and the authentication server and key management without storing the secret key. Moreover, secure USB is systematically managed with metadata and authentication information stored in authentication server.

NextAuction: A DID-based Robust Auction Service for Digital Contents

  • Lee, Young-Eun;Kim, Hye-Won;Lee, Myung-Joon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.2
    • /
    • pp.115-124
    • /
    • 2022
  • In this paper, we present an NFT auction service for the next generation, named NextAuction, which can reliably trade ownership of individual content using DID technology. Recently, as the types and sizes of tradable digital assets have expanded, the number of NFT transactions has also increased, and a significant number of marketplaces are being operated. But, the current user authentication methods of NFT marketplaces are done only through the associated blockchain wallets. It is desirable that ownership transfer through NFT transactions be transparently managed based on a more reliable identity authentication service. NextAuction increases the reliability of auction service participants by transparently and consistently providing identity authentication for users of auction services based on the DID technique using the Klaytn blockchain. In addition, in preparation for server failure that may occur during the auction of individual content, it provides users with a robust auction service using the BR2K technique that continuously provides consistent service through the replication of a target service. The NextAuction service is developed by extending BCON, a blockchain-based content management service.