• 제목/요약/키워드: Data Security Technology

검색결과 2,248건 처리시간 0.024초

Blockchain-based Data Storage Security Architecture for e-Health Care Systems: A Case of Government of Tanzania Hospital Management Information System

  • Mnyawi, Richard;Kombe, Cleverence;Sam, Anael;Nyambo, Devotha
    • International Journal of Computer Science & Network Security
    • /
    • 제22권3호
    • /
    • pp.364-374
    • /
    • 2022
  • Health information systems (HIS) are facing security challenges on data privacy and confidentiality. These challenges are based on centralized system architecture creating a target for malicious attacks. Blockchain technology has emerged as a trending technology with the potential to improve data security. Despite the effectiveness of this technology, still HIS are suffering from a lack of data privacy and confidentiality. This paper presents a blockchain-based data storage security architecture integrated with an e-Health care system to improve its security. The study employed a qualitative research method where data were collected using interviews and document analysis. Execute-order-validate Fabric's storage security architecture was implemented through private data collection, which is the combination of the actual private data stored in a private state, and a hash of that private data to guarantee data privacy. The key findings of this research show that data privacy and confidentiality are attained through a private data policy. Network peers are decentralized with blockchain only for hash storage to avoid storage challenges. Cost-effectiveness is achieved through data storage within a database of a Hyperledger Fabric. The overall performance of Fabric is higher than Ethereum. Ethereum's low performance is due to its execute-validate architecture which has high computation power with transaction inconsistencies. E-Health care system administrators should be trained and engaged with blockchain architectural designs for health data storage security. Health policymakers should be aware of blockchain technology and make use of the findings. The scientific contribution of this study is based on; cost-effectiveness of secured data storage, the use of hashes of network data stored in each node, and low energy consumption of Fabric leading to high performance.

A Study on the Security Technology of Real-time Biometric Data in IoT Environment

  • Shin, Yoon-Hwan
    • 한국컴퓨터정보학회논문지
    • /
    • 제21권1호
    • /
    • pp.85-90
    • /
    • 2016
  • In this paper, the biometric data is transmitted in real time from the IoT environment is runoff, forgery, alteration, prevention of the factors that can be generated from a denial-of-service in advance, and the security strategy for the biometric data to protect the biometric data secure from security threats offer. The convenience of living in our surroundings to life with the development of ubiquitous computing and smart devices are available in real-time. And is also increasing interest in the IOT. IOT environment is giving the convenience of life. However, security threats to privacy also are exposed for 24 hours. This paper examines the security threats to biological data to be transmitted in real time from IOT environment. The technology for such security requirements and security technology according to the analysis of the threat. And with respect to the biometric data transmitted in real time on the IoT environment proposes a security strategy to ensure the stability against security threats and described with respect to its efficiency.

빅데이터 플랫폼을 이용한 보안로그 분석 시스템 구현 모델 연구 (A Study on implementation model for security log analysis system using Big Data platform)

  • 한기형;정형종;이두식;채명희;윤철희;노규성
    • 디지털융복합연구
    • /
    • 제12권8호
    • /
    • pp.351-359
    • /
    • 2014
  • 보안 장비에서 발생하는 로그는 그동안 ESM(Enterprise Security Management) 기반으로 통합적으로 데이터를 분석하였으나 데이터 저장 용량의 한계와 ESM자체의 데이터 처리 성능의 한계로 빅데이터 처리에 부적합하기 때문에 빅데이터 플랫폼을 이용한 보안로그 분석 기술이 필요하다. 빅데이터 플랫폼은 Hadoop Echosystem을 이용하여 대용량의 데이터 수집, 저장, 처리, 검색, 분석, 시각화 기능을 구현할 수 있다. 현재 ESM기술은 SIEM(Security Information & Event Management)방식으로 기술이 발전하고 있으며 SIEM방식의 보안기술을 구현하기 위해서는 현재 보안장비에서 발생하는 방대한 로그 데이터를 처리할 수 있는 빅데이터 플랫폼 기술이 필수적이다. 본 논문은 Hadoop Echosystem 이 가지고 있는 빅데이터 플랫폼 기술을 활용하여 보안로그를 분석하기 위한 시스템을 어떻게 구현할 수 있는지에 대한 모델을 연구하였다.

Private Blockchain-Based Secure Access Control for Smart Home Systems

  • Xue, Jingting;Xu, Chunxiang;Zhang, Yuan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제12권12호
    • /
    • pp.6057-6078
    • /
    • 2018
  • Smart home systems provide a safe, comfortable, and convenient living environment for users, whereby users enjoy featured home services supported by the data collected and generated by smart devices in smart home systems. However, existing smart devices lack sufficient protection in terms of data security and privacy, and challenging security and privacy issues inevitably emerge when using these data. This article aims to address these challenging issues by proposing a private blockchain-based access control (PBAC) scheme. PBAC involves employing a private blockchain to provide an unforgeable and auditable foundation for smart home systems, that can thwart illegal data access, and ensure the accuracy, integrity, and timeliness of access records. A detailed security analysis shows that PBAC could preserve data security against various attacks. In addition, we conduct a comprehensive performance evaluation to demonstrate that PBAC is feasible and efficient.

SECURITY THREATS AND ATTACKS IN CLOUD

  • Mohammed, Asma;Al khathami, Jamilah;Alhakami, Wajdi
    • International Journal of Computer Science & Network Security
    • /
    • 제21권1호
    • /
    • pp.184-191
    • /
    • 2021
  • The amount of information and data in the digital era is increasing tremendously. Continuous online connectivity is generating a massive amount of data that needs to store in computers and be made available as and when required. Cloud computing technology plays a pivotal role in this league. Cloud computing is a term that refers to computer systems, resources and online services that aim to protect and manage data in an effective, more efficient and easy way. Cloud computing is an important standard for maintaining the integrity and security of sensitive data and information for organizations and individuals. Cloud security is one of the most important challenges that the security of the entire cloud system depends on. Thus, the present study reviews the security challenges that exist in cloud computing, including attacks that negatively affect cloud resources. The study also addresses the most serious threats that affect cloud security. We also reviewed several studies, specifically those from 2017-20, that cited effective mechanisms to protect authentication, availability and connection security in the cloud. The present analysis aims to provide solutions to the problems and causes of cloud computing security system violations, which can be used now and developed in the future.

방산기술보호를 위한 방산기술 마스터 데이터 관리 체계 구현 방안 (A Study on the Implementation of Defense Technology Master Data Management System for Defense Technology Security)

  • 박흥순;김세용;권혁진
    • 정보보호학회논문지
    • /
    • 제31권1호
    • /
    • pp.111-122
    • /
    • 2021
  • 4차 산업혁명 기술의 확산으로 국내 방위산업은 첨단 기술이 집약된 산업 구조로 발전하고 있다. 방산기술의 중요성이 점차 증대됨에 따라 정부는 방산기술보호법을 제정하여 방산기술을 보유하거나 관리하는 기관을 대상으로 방산기술보호체계를 구축하도록 하고 있다. 대상기관이 기술보호체계를 도입하기 위해서는 보호대상이 되는 방산기술을 식별하고 체계적인 데이터 관리를 선행하여야 한다. 이를 위해 본 논문에서는 방산기술 데이터 관리를 위한 마스터 데이터 항목을 도출하고, 방위산업 환경에 적합한 방산기술 마스터 데이터 관리 시스템 구현 방안을 분석하였다. 도출된 방안으로 1차, 2차 마스터 데이터 등 방산기술 마스터 데이터를 식별하였고, AHP분석을 통해 마스터 데이터 관리시스템 목표 모델로 Co-existence 유형이 적합한 것으로 분석되었다. 방산기술 마스터 데이터 관리 시스템 도입을 통해 한층 강화된 방산기술보호 정책이 추진될 것으로 기대한다.

과학기술 중심 국방혁신을 위한 데이터 가치 기반 보안정책 발전 방향 (Improving the Security Policy Based on Data Value for Defense Innovation with Science and Technology)

  • 박흥순
    • 융합보안논문지
    • /
    • 제23권1호
    • /
    • pp.109-115
    • /
    • 2023
  • 미래 국방은 세계 안보정세의 불확실성 가속화, 국내 사회·경제적 여건 제한 등 다양하고 도전적인 환경에 직면하고 있다. 이에 우리 국방부는 인공지능, 드론, 로봇 등 과학기술 기반의 국방혁신으로 당면한 문제점과 위협요인에 대응하려 하고 있다. 인공지능 기반의 첨단과학기술 도입을 위해서는 클라우드, 5G와 같은 IT기반 환경 위에 데이터를 융합하고 활용하는 것이 필수적이다. 하지만 기존의 전통적인 보안 정책은 주로 시스템 중심의 보안으로 일률적인 보안 통제수단을 적용하는 등 데이터공유 및 활용에 어려움이 있다. 본 연구는 데이터 가치 평가 및 데이터 수명주기 관리에 대한 이론적 배경을 바탕으로 데이터가치 기반의 국방 보안정책으로 패러다임 전환을 제안한다. 이를 통해 데이터 기반의 업무 활성화 및 AI기반 과학기술중심의 국방혁신 구현에 도움이 될 것으로 기대한다.

ICT 융합서비스 제공을 위한 정보보호 기술개발 현황분석 (Analysis of Information Security Technology Development for ICT Convergence Services)

  • 김동철
    • 융합보안논문지
    • /
    • 제15권4호
    • /
    • pp.27-33
    • /
    • 2015
  • 본 논문에서는 최근 국내외적으로 많은 이슈가 되고 있는 사물인터넷, 빅데이터, 클라우드 융합 서비스들에 대한 정보보호 기술 개발 현황을 분석하고 특허 및 표준화 분야에서 우리나라가 선도적인 위치를 차지하기 위한 세부 전략을 제시한다. 이를 위하여, ICT 융합의 개념을 살펴보고 주요 융합 기술이 제공하는 서비스와 시장 현황을 진단하며, 기술별로 주요 기능과 보안대상을 제시한다. 그리고 국외대비 국내 기술 및 표준화 수준을 진단하기 위한 평가기준을 설정하고 이에 대한 평가 결과와 지적재산권의 보유 현황을 분석한다. 모든 분야에서 아직은 국외 선진국의 수준에 크게 미치지 못하나 빅데이터 및 클라우드 분야에서의 국내 역량을 활용한 선도 전략의 마련과 시장기술적 파급효과가 높은 사물인터넷과 클라우드 서비스에 대한 우선적인 기술 개발이 요구된다. 그리고 사물인터넷 분야에서의 M2M 보안 프레임워크, 빅데이터에서의 데이터 보안 기술 및 클라우드에서의 보안관리 및 신뢰 클라우드 연동 보안 기술 개발 및 표준화 추진이 우선적으로 요구된다.

Secure and Efficient Privacy-Preserving Identity-Based Batch Public Auditing with Proxy Processing

  • Zhao, Jining;Xu, Chunxiang;Chen, Kefei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제13권2호
    • /
    • pp.1043-1063
    • /
    • 2019
  • With delegating proxy to process data before outsourcing, data owners in restricted access could enjoy flexible and powerful cloud storage service for productivity, but still confront with data integrity breach. Identity-based data auditing as a critical technology, could address this security concern efficiently and eliminate complicated owners' public key certificates management issue. Recently, Yu et al. proposed an Identity-Based Public Auditing for Dynamic Outsourced Data with Proxy Processing (https://doi.org/10.3837/tiis.2017.10.019). It aims to offer identity-based, privacy-preserving and batch auditing for multiple owners' data on different clouds, while allowing proxy processing. In this article, we first demonstrate this scheme is insecure in the sense that malicious cloud could pass integrity auditing without original data. Additionally, clouds and owners are able to recover proxy's private key and thus impersonate it to forge tags for any data. Secondly, we propose an improved scheme with provable security in the random oracle model, to achieve desirable secure identity based privacy-preserving batch public auditing with proxy processing. Thirdly, based on theoretical analysis and performance simulation, our scheme shows better efficiency over existing identity-based auditing scheme with proxy processing on single owner and single cloud effort, which will benefit secure big data storage if extrapolating in real application.

Ruzicka Indexed Regressive Homomorphic Ephemeral Key Benaloh Cryptography for Secure Data Aggregation in WSN

  • Saravanakumar Pichumani;T. V. P. Sundararajan;Rajesh Kumar Dhanaraj;Yunyoung Nam;Seifedine Kadry
    • Journal of Internet Technology
    • /
    • 제22권6호
    • /
    • pp.1287-1297
    • /
    • 2021
  • Data aggregation is the significant process in which the information is gathered and combines data to decrease the amount of data transmission in the WSN. The sensor devices are susceptible to node attacks and security issues such as data confidentiality and data privacy are extremely important. A novel technique called Ruzicka Index Regressive Homomorphic Ephemeral Key Benaloh Cryptography (RIRHEKBC) technique is introduced for enhancing the security of data aggregation and data privacy in WSN. By applying the Ruzicka Index Regressive Homomorphic Ephemeral Key Benaloh Cryptography, Ephemeral private and public keys are generated for each sensor node in the network. After the key generation, the sender node performs the encryption using the receiver public key and sends it to the data aggregator. After receiving the encrypted data, the receiver node uses the private key for decrypting the ciphertext. The key matching is performed during the data decryption using Ruzicka Indexive regression function. Once the key is matched, then the receiver collects the original data with higher security. The simulation result proves that the proposed RIRHEKBC technique increases the security of data aggregation and minimizes the packet drop, and delay than the state-of-the- art methods.