• Title/Summary/Keyword: 정보복제

Search Result 783, Processing Time 0.03 seconds

A Study of Quantitative Characterization of Physically Uncloanble Functions (물리적 복제 불가능 회로 정량적 특성 평가 방법 연구)

  • Moon-Seok Kim
    • Convergence Security Journal
    • /
    • v.23 no.5
    • /
    • pp.143-150
    • /
    • 2023
  • Applications on physically unclonable circuits (PUFs) for implementing and utilizing security protocols with hardware is on the rise. PUFs have the capability to perform functions such as authentication, prevention of replication, and secure storage of critical information in integrated circuits and security systems. Through the implementation of physically unclonable circuits, a wide range of security features, including confidentiality, integrity, and availability, can be applied. Therefore, PUFs are promising candidate to build secure integrated circuits and hardware systems. However, in order that PUFs possess security features, PUFs should possess characteristics such as unpredictability, uniqueness, and robustness characteristics. This study provides a detailed explanation and introduction of the methods to characterize the PUF properties. By applying the results, it becomes possible to quantitatively evaluate the characteristics of implemented PUFs and assess their availabilities for security system applications.

Performance Evaluation of WAN Storage Migration Scheme for Cloud Computing Environment (클라우드 컴퓨팅 환경을 위한 WAN 스토리지 이주 기법 성능평가)

  • Chang, Jun-Hyub;Lee, Won-Joo;Jeon, Chang-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.5
    • /
    • pp.1-7
    • /
    • 2012
  • In this paper, we design and implement the simulator for WAN storage replication model performance evaluation in cloud computing environment. Each cloud of simulator is composed of virtual machine emulator and storage emulator. The virtual machine emulator is composed of read/write ratio module, the read/write sequence combination module, and the read/write request module. The storage emulator is composed of storage management module, data transfer module, read/write operations module, and overhead processing module. Using the simulator, we evaluate performance of migration scheme, pre-copy and the post-copy, considering about read/write ratio, network delay, and network bandwidth. Through simulation, we have confirmed that the average migration time of pre-copy was decreased proportional to the read operation. However, average migration time of post-copy was on the increase. Also, the average migration time of post-copy was increased proportional to the network delay. However, average migration time of pre-copy was shown uniformly. Therefore, we show that pre-copy model more effective to reduce the average migration time than the post-copy model. The average migration time of pre-copy and post-copy were not affected by the change of network bandwidth. Therefore, these results show that selects the storage replication model to be, the network bandwidth know not being the important element.

A Encryption Scheme for Source Code Protection of Android Applications (안드로이드 애플리케이션 소스코드 보호를 위한 암호화 기법)

  • Moon, Yong-ho
    • Annual Conference of KIPS
    • /
    • 2016.04a
    • /
    • pp.212-214
    • /
    • 2016
  • 안드로이드 마켓이 커지면서 불법복제와 변조를 통한 재배포로 인하여 손해가 증가하고 있다. 앱을 보호하기 위하여 여러 기법이 나왔지만, 역공학으로 우회가 가능하다. 본 논문에서는 사용자의 기기고유정보로 비밀키를 생성하여 소스코드를 암호화하고, 앱이 실행될 때 복호화 및 동적로딩을 수행한다. 본 제안 방식은 소스코드 암호화를 통한 불법복제 및 역공학을 방지할 수 있다.

Design of Anonymity Guaranteed ESD Protocol (익명성을 보장하는 ESD 프로토콜의 설계)

  • 김영준;이병래;김태윤
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2001.04a
    • /
    • pp.838-840
    • /
    • 2001
  • 최근 초고속 통신망을 이용한 인터넷의 대중화와 더불어 인터넷을 기반으로 하는 전자상거래가 활발해지고 있다. 특히 인터넷을 통한 전자 소프트웨어 유통(ESD:Electronic Software Distribution)은 많은 연구의 대상이 되고 있다[1]. 하지만 기존의 모델들은 실질적인 불법복제방지와 저작권보호에 미흡하고 익명성의 보장이 어려운 단점이 있다. 따라서 본 논문에서는 익명서의 보장을 위한 ESD 프로토콜을 제안한다. 제안된 기법은 익명을 원하는 구매자에 대한 정보를 판매자에게 제공하지 않으면서도 불법적인 복제와 유통을 억제한다. 또한 기존의 시리얼넘버(Serial Number)입력방식과 별도의 사용권 설치방식을 지양함으로써 사용자에게 보다 편리한 환경을 제공한다.

  • PDF

A Study on the Revision of Copyright Limitations for Libraries in Copyright Law of Korea (저작권법상 도서관관련 권리제한의 개정안 연구)

  • Yoon, Hee-Yoon
    • Journal of Information Management
    • /
    • v.42 no.2
    • /
    • pp.1-21
    • /
    • 2011
  • The copyright law is the greatest legal tool for promoting access to knowledge and information by striking a balance between owners rights and users rights. For libraries, copyright limitations and exceptions are critical to meeting our missions to support learning and research, promote the flow of information, provide equitable access to information to the public, preserve intellectual and cultural heritage. Based on these reasons, this study analysed the limitation of copyright law of Korea for library, suggested improvement of reproduction for the library preservation and distribution including rental and lending, printout and transmission of internet information resources, copy of library materials which are rarely available through normal trade channel and government publications, reproduction and electronic transmission for persons with disabilities, and proposed fair use model(limitations on exclusive rights) for libraries.

User Perception on Character Clone of Crowds based on Perceptual Organization (군중에서의 캐릭터 복제에 관한 지각체제화 기반 사용자 인지)

  • Byun, Hae-Won;Park, Yoon-Young
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.15 no.11
    • /
    • pp.819-830
    • /
    • 2009
  • When simulating large crowds, it is inevitable that the models and motions of many characters will be cloned. McDonnell et al. analyzed user's perception to find cloned characters. They established that clones of appearance are far easier to detect than motion clones. In this paper, we expand McDonnell's research[1], with the focus on multiple clones and the appearance variety in real-time game environment. Introducing the perceptual organization, we show the appearance variety of crowd clones by using game items and texture modulation. Other factors that influence the ability to detect clones were examined, such as the moving direction and distance between character clones. Our results provide novel insights and useful thresholds that will assist in creating more realistic crowds of game environments.

Game Theoretic Approach to Selfish Replica Allocation over a Mobile Ad Hoc Network (모바일 애드혹 네트워크 환경에서 이기적 복제본 할당 문제에 대한 게임이론적 접근)

  • Yeom, Ji-Yeon;Shim, Kyu-Sun;Choi, Jae-Ho;Lee, SangKeun
    • Annual Conference of KIPS
    • /
    • 2010.11a
    • /
    • pp.16-19
    • /
    • 2010
  • 최근 무선 컴퓨팅 환경과 무선 단말기관련 기술의 발전으로 인해 모바일 애드혹 네트워크관련 연구가 활발하게 이루어지고 있다. 모바일 애드혹 네트워크에서는 노드들이 자유롭게 이동하기 때문에 네트워크가 빈번하게 분리되며, 이로 인해 데이터 접근성 저하문제가 발생한다. 기존 연구에서는 데이터 접근성이 저하되는 문제를 해결하기 위해 다양한 복제본 할당 기법이 연구되었다. 그러나, 지금까지 연구된 복제본 할당기법들은 모바일 애드혹 네트워크 환경의 제한된 자원으로 인한 노드들의 이기적인 행동에 대해 고려하지 않았다. 본 논문은 모바일 애드혹 네트워크 상의 노드들이 자신의 이득을 위해 협력이 아닌 이기적인 행동을 택하게 되는 과정을 게임이론을 통해 설명하고, 수익함수 조절을 통해 노드들의 이기적인 행동을 억제할 수 있는 방안을 제시한다.

Rethinking the Right to Culture in the Digital Age The Issues of Copying Culture and Content Curation (디지털 시대 문화 권리의 제고 복제문화와 콘텐츠 큐레이션의 쟁점)

  • Lee, Kwang-Suk
    • Korean journal of communication and information
    • /
    • v.74
    • /
    • pp.197-224
    • /
    • 2015
  • This paper critically investigates the cultural phenomenon surrounding the news mobile phone app in which 'curation', relying on the news editing and adaption, has become much more significant than making the news directly. This study affirms the fact that a copying culture which is basically a combinative effect of duplication (alias) and imitation(mimesis) enables us enrich the human beings' creative activities. However, we need to warn the regressive aspects of copying culture challenging the journalistic principles. This study exemplifies a case of Pikicast, which has become the most rapid growing news content mobile app in Korea. By doing a case study, this paper suggests that 'social gift' should be given to the online users as a whole. The communal and social gift would be an alternative way to the unpaid crawling of the news resources from the digital commons by the news content curating corporation such as Pikicast.

  • PDF

A Robust Multiple Set-Top Box Authentication Scheme for IPTV Against Smart Card Cloning Attack (IPTV 환경에서 스마트카드 복제에 강건한 다중 셋톱박스 인증기법)

  • Lim, Ji-Hwan;Oh, Hee-Kuck;Kim, Sang-Jin
    • The KIPS Transactions:PartC
    • /
    • v.17C no.1
    • /
    • pp.37-46
    • /
    • 2010
  • In an IPTV system, the rights of the content and service provider can be protected by using Conditional Access System (CAS) and Digital Right Management (DRM). In case of the CAS, only the authorized user who has structured authentication keys can decrypt the encrypted content. However, since the CAS establishes a secure channel only between content provider and Smart Card (SC), it cannot protect the system against McCormac Hack attack which eavesdrops on unsecure channel between SC and Set-Top Box (STB) and SC cloning attack. In this paper, we propose a robust multi-STB assisted SC / STB authentication protocol which can protect the IPTV system against not only McCormac Hack attack, but also SC cloning attack. The previous works which bind a STB and a SC during the SC registration phase against the SC cloning attack does not support multi-STB environments. The proposed system which dynamically updates the STB information in subscriber management system using the bi-directional channel characteristic of IPTV system can support the user's multi-STB device effectively.

Proxy-Quorum Based Replication Control Schemes for Mobile Internet Systems (이동형 인터넷 기기를 위한 위임 정족수 기반의 복제데이터 제어 기법)

  • Byun Si-Woo
    • Journal of Internet Computing and Services
    • /
    • v.5 no.1
    • /
    • pp.51-57
    • /
    • 2004
  • Mobile Internet allows users to request critical information and receive swift responses at any places, but mobile users could suffer from unreliable and ill-timed services due to the characteristics of wireless media, One way that reduces possibility of the unsatisfactory services is data replication. Data Replica1ion, however, inevitably induces the overhead of maintaining replica consistency which requires more expensive synchronization mechanism. We propose a new replicated data management scheme in distributed mobile environment, In order to alleviate negative impact of synchronization message overhead in fault-prone mobile Internet environment, we devise a new replication control scheme called proxy quorum consensus (PQC), PQC minimizes the message overhead by coordinating quorum access activities by means of proxy mediated voting (PMV) which exploits reliable proxy hosts instead of unreliable mobile hosts in voting process, We also propose a simulation model to show the performance of PQC. Based on the results of the performance evaluation, we conclude that PQC scheme outperforms the traditional schemes.

  • PDF