• Title/Summary/Keyword: 정보보안 3요소

Search Result 220, Processing Time 0.029 seconds

Development of Personal Information Protection Framework to be Followed by IoT Service Providers (IoT서비스제공자가 준수해야 할 개인정보보호 프레임워크의 개발 방안)

  • Shin, Young-Jin
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.7
    • /
    • pp.20-32
    • /
    • 2020
  • This study is to develop and provide a personal information protection framework that enables IoT service providers to safely and systematically operate personal information of IoT service subjects in the overall process of providing IoT devices and services. To this end, a framework for personal information framework was derived through literature survey, and FGI with experts, it was divided into three stages, each of three stages: IoT service provision process and IoT personal information processing process. The study conducted an e-mail survey of related experts using AHP techniques to determine the importance of the components of the selected personal information protection framework. As a result, in the IoT service provision process, the IoT product and service design and development stage (0.5413) is the most important, and in the IoT personal information processing process, personal information protection in the collection and retention of personal information (0.5098) is the most important. Therefore, based on this research, as the IoT service is spreading, it is expected that a safe personal information protection framework will be realized by preventing security threats and personal information infringement accidents.

A Design of Hybrid Implementation Server System for Network Game (네트워크 게임을 위한 하이브리드 분산 서버 시스템 설계에 관한 연구)

  • 배재환
    • Proceedings of the Korea Multimedia Society Conference
    • /
    • 2003.05b
    • /
    • pp.455-459
    • /
    • 2003
  • In the great motive power which promotes the Game of future to develop. three main factors focus on 3D Graphics, Network and Virtual Reality. the Network technique as necessary elemental technique in Next-generation on-line game is being researched largely. However, from viewing the features of on-line game, if many users meet in same server, it not only causes heavy load to the server and brings inconvenience to the users, but also increases expense to the service provider and creates a problem which is to put up server or not. A proposal is going to do hybrid distributed system a client hardly depends on server for this paper, and to be able to enjoy a network game through information alternating current between clients. depended on the existing server, and the most message processing did a design in order to achieve between clients. A design way to propose is as follows. Primarily it was done in order proposed a message grade anger process way, and to be able to manage server or a client according to importance of message, and, with the second, did a Client-Server method and a Pear-to-Pear method at the same time, and a chase did efficiency. Third is going to propose other problem solving way by message grade anger in multi-anger and a security section of a message cue.

  • PDF

uPC player : An OS Virtualization-based Technique to Support Stateless Computing Execution Environment on Windows (uPC player : 윈도우 운영체제에서의 OS가상화 기반 무상태 컴퓨팅 실행환경 지원 기술)

  • Sung, Baek-Jae;Park, Chan-Ik
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.16 no.1
    • /
    • pp.125-129
    • /
    • 2010
  • Stateless computing supports a mobility of computing environment easily. It is becoming a major technology for securing personal user's information on shared computing environment. With the advance of virtualization technology and cloud computing, stateless computing is an essential part of personal computing environment connectivity (user's setting and data is stored in remote server or some storage, and it can be restored at any computing environment) In this paper, we propose uPC player that supports stateless computing execution environment on Windows. uPC player provides Windows operating system to user by using an uPC OS virtualization module. In this paper, we leverage how uPC player is designed and implemented for supporting a stateless computing execution environment. uPC player provides a desktop switch between host-system execution environment and uPC virtual execution environment. And it needs just one second for loading uPC virtual execution environment by using OS virtualization-based technique.

Gabor Wavelet Analysis for Face Recognition in Medical Asset Protection (의료자산보호에서 얼굴인식을 위한 가보 웨이블릿 분석)

  • Jun, In-Ja;Chung, Kyung-Yong;Lee, Young-Ho
    • The Journal of the Korea Contents Association
    • /
    • v.11 no.11
    • /
    • pp.10-18
    • /
    • 2011
  • Medical asset protection is important in each medical institution especially because of the law on private medical record protection and face recognition for this protection is one of the most interesting and challenging problems. In recognizing human faces, the distortion of face images can be caused by the change of pose, illumination, expressions and scale. It is difficult to recognize faces due to the locations of lights and the directions of lights. In order to overcome those problems, this paper presents an analysis of coefficients of Gabor wavelets, kernel decision, feature point, size of kernel, for face recognition in CCTV surveillance. The proposed method consists of analyses. The first analysis is to select of the kernel from images, the second is an coefficient analysis for kernel sizes and the last is the measure of changes in garbo kernel sizes according to the change of image sizes. Face recognitions are processed using the coefficients of experiment results and success rate is 97.3%. Ultimately, this paper suggests empirical application to verify the adequacy and the validity with the proposed method. Accordingly, the satisfaction and the quality of services will be improved in the face recognition area.

Quantitative Methodology to Assess Cyber Security Risks of SCADA system in Electric Power Industry (전력 SCADA 시스템의 사이버 보안 위험 평가를 위한 정량적 방법론에 관한 연구)

  • Kang, Dong-Joo;Lee, Jong-Joo;Lee, Young;Lee, Im-Sop;Kim, Huy-Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.3
    • /
    • pp.445-457
    • /
    • 2013
  • This paper is about the study to build a quantitative methodology to assess cyber threats and vulnerabilities on control systems. The SCADA system in power industry is one of the most representative and biggest control systems. The SCADA system was originally a local system but it has been extended to wide area as both ICT and power system technologies evolve. Smart Grid is a concept to integrate energy and IT systems, and therefore the existing cyber threats might be infectious to the power system in the integration process. Power system is operated on a real time basis and this could make the power system more vulnerable to the cyber threats. It is a unique characteristic of power systems different from ICT systems. For example, availability is the most critical factor while confidentiality is the one from the CIA triad of IT security. In this context, it is needed to reflect the different characteristics to assess cyber security risks in power systems. Generally, the risk(R) is defined as the multiplication of threat(T), vulnerability(V), and asset(A). This formula is also used for the quantification of the risk, and a conceptual methodology is proposed for the objective in this study.

Analysis of Determinants of the Introduction of Maritime Autonomous Surface Ships (자율운항선박 도입의 결정요인 분석)

  • Jung, Su-Jin;Yun, Hee-Sung;Kim, Sun-Tae;Seor, Jin-Ki
    • Journal of Korea Port Economic Association
    • /
    • v.40 no.3
    • /
    • pp.97-114
    • /
    • 2024
  • With the advancement of Fourth Industrial Revolution technologies, the maritime sector is actively developing technologies and policies related to autonomous ships. This study aims to identify and prioritize various factors influencing the adoption of Maritime Autonomous Surface Ships (MASS) by conducting surveys among experts and professionals in the maritime industry. To achieve this, relevant factors related to the adoption of autonomous ships were examined through a review of previous research, and survey questions for pairwise comparison using the Analytic Hierarchy Process (AHP) were developed based on the insights of industry experts. The pairwise comparison items were categorized into four main factors at the highest level, with each factor further subdivided into sub-factors to establish their priorities. The survey results, which distinguish between shipowner and non-shipowner groups, reveal that, among the main factors-economic, legal and policy, safety and security, and technical-the shipowner group prioritized economic factors, though the difference from safety and security factors was relatively minor. In contrast, the non-shipowner group rated safety and security factors as the highest priority, with economic factors ranked lowest. Further analysis of the sub-factors across both groups indicated that, for economic factors, the increase in operational profit was most critical; for legal and policy factors, regulations related to structural equipment were paramount; for safety and security factors, the risk of equipment and machinery failure was key; and for technical factors, accident response technology was most significant. This study provides strategic insights for stakeholders by systematically analyzing decision factors for adopting MASS through AHP analysis. The findings enable companies to establish efficient resource allocation and investment strategies, while policymakers can utilize the results to guide policy and regulatory directions. Moreover, the study contributes to the existing body of knowledge by solidifying the framework of determinants for MASS adoption, incorporating commercial considerations alongside technical and legal factors. The results not only offer fundamental information for future research but also provide a rationale for informed decision-making in the shipbuilding and maritime industries regarding MASS adoption and operation.

A Study on Smart Job Matching Platform for Personal Assistant of the Disabled (장애인 활동보조인의 구인·구직을 위한 비대면 플랫폼에 관한 연구)

  • Kang, Seungae
    • Convergence Security Journal
    • /
    • v.21 no.3
    • /
    • pp.75-80
    • /
    • 2021
  • This study provided personnel and recruitment information related to job offer and job hunting, and proposed a non-face-to-face platform that can facilitate matching of one-time services as well as periodic services. The existing recruitment and job search method for personal assistant of the disabled is a one-way matching method in which a person in charge of the service providing centers assigns an activity assistant belonging to the institution when a consumer requests an personal assistant service, so the choice of job seekers is very weak. The job matching platform of the activity assistant for the disabled can be logged in separately by dividing users and separating them into the interface of the disabled or the disabled family members (job seekers) and activity assistants for the disabled (job seekers). Search for job offer and job seekers that meet their respective conditions, and real-time bidirectional decision-making through the chat function, and when the activity assistance service is completed, recruiters and job seekers can write service reviews and evaluations from their own point of view. The real-time interactive decision-making matching platform will also help minimize blind spots where it is difficult to provide services when short-term or one-time assistance is needed.

(Design of Group Key Management Protocol for Information Security in Multicast) (멀티캐스트 정보 보호를 위한 그룰 키 관리 프로토콜의 설계)

  • 홍종준
    • Journal of the Korea Computer Industry Society
    • /
    • v.3 no.9
    • /
    • pp.1235-1244
    • /
    • 2002
  • This paper proposes a group key management protocol for a secure of all the multicast user in PIM-SM multicast group communication. With prosed architect, subgroups for multicast secure group management will be divided by RP (Rendezvous-Point) unit and each RP has a subgroup manager. Each subgroup manager gives a secure key to it's own transmitter md the transmitter compress the data with it's own secure key from the subgroup manager. Before the transmitter send the data to receiver, the transmitter prepare to encrypt a user's service by sending a encryption key to the receiver though the secure channel, after choking the user's validity through the secure channel. As the transmitter sending a data after then, the architecture is designed that the receiver will decode the received data with the transmitter's group key. As a result, the transmitting time is shortened because there is no need to data translation by group key on data sending and the data transmition is possible without new key distribution at path change to SPT (Shortest Path Tree) of the router characteristic. Additionally, the whole architecture size is samller than the other multicast secure architecture by using the conventional PIM-SIM routing structure without any additional equipment.

  • PDF

How to Generate Lightweight S-Boxes by Using AND Gate Accumulation (AND 연산자 축적을 통한 경량 S-boxes 생성방법)

  • Jeon, Yongjin;Kim, Jongsung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.3
    • /
    • pp.465-475
    • /
    • 2022
  • Due to the impact of COVID-19, people are paying attention to convenience and health, and the use of IoT devices to help them is increasing. In order to embed a lightweight security element in IoT devices that need to handle sensitive information even with limited resources, the development of a lightweight S-box is essential. Until 2021, it was common to develop a lightweight 4-bit S-box by a heuristic method, and to develop an extended structure or repeat the same operation for a larger size lightweight S-box. However, in January 2022, a paper that proposed a heuristic algorithm to find an 8-bit S-box with better differential uniformity and linearity than the S-box generated with an MISTY extended structure, although non-bijective, was published [1]. The heuristic algorithm proposed in this paper generates an S-box by adding AND operations one by one. Whenever an AND operation is added, they use a method that pre-removes the S-box for which the calculated differential uniformity does not reach the desired criterion. In this paper, we improve the performance of this heuristic algorithm. By increasing the amount of pre-removal using not only differential uniformity but also other differential property, and adding a process of calculating linearity for pre-removing, it is possible to satisfy not only differential security but also linear security.

Wavelet Transform-based Face Detection for Real-time Applications (실시간 응용을 위한 웨이블릿 변환 기반의 얼굴 검출)

  • 송해진;고병철;변혜란
    • Journal of KIISE:Software and Applications
    • /
    • v.30 no.9
    • /
    • pp.829-842
    • /
    • 2003
  • In this Paper, we propose the new face detection and tracking method based on template matching for real-time applications such as, teleconference, telecommunication, front stage of surveillance system using face recognition, and video-phone applications. Since the main purpose of paper is to track a face regardless of various environments, we use template-based face tracking method. To generate robust face templates, we apply wavelet transform to the average face image and extract three types of wavelet template from transformed low-resolution average face. However template matching is generally sensitive to the change of illumination conditions, we apply Min-max normalization with histogram equalization according to the variation of intensity. Tracking method is also applied to reduce the computation time and predict precise face candidate region. Finally, facial components are also detected and from the relative distance of two eyes, we estimate the size of facial ellipse.