• 제목/요약/키워드: Data integrity

검색결과 1,367건 처리시간 0.027초

Provably-Secure Public Auditing with Deduplication

  • Kim, Dongmin;Jeong, Ik Rae
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제11권4호
    • /
    • pp.2219-2236
    • /
    • 2017
  • With cloud storage services, users can handle an enormous amount of data in an efficient manner. However, due to the widespread popularization of cloud storage, users have raised concerns about the integrity of outsourced data, since they no longer possess the data locally. To address these concerns, many auditing schemes have been proposed that allow users to check the integrity of their outsourced data without retrieving it in full. Yuan and Yu proposed a public auditing scheme with a deduplication property where the cloud server does not store the duplicated data between users. In this paper, we analyze the weakness of the Yuan and Yu's scheme as well as present modifications which could improve the security of the scheme. We also define two types of adversaries and prove that our proposed scheme is secure against these adversaries under formal security models.

Verification Algorithm for the Duplicate Verification Data with Multiple Verifiers and Multiple Verification Challenges

  • Xu, Guangwei;Lai, Miaolin;Feng, Xiangyang;Huang, Qiubo;Luo, Xin;Li, Li;Li, Shan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제15권2호
    • /
    • pp.558-579
    • /
    • 2021
  • The cloud storage provides flexible data storage services for data owners to remotely outsource their data, and reduces data storage operations and management costs for data owners. These outsourced data bring data security concerns to the data owner due to malicious deletion or corruption by the cloud service provider. Data integrity verification is an important way to check outsourced data integrity. However, the existing data verification schemes only consider the case that a verifier launches multiple data verification challenges, and neglect the verification overhead of multiple data verification challenges launched by multiple verifiers at a similar time. In this case, the duplicate data in multiple challenges are verified repeatedly so that verification resources are consumed in vain. We propose a duplicate data verification algorithm based on multiple verifiers and multiple challenges to reduce the verification overhead. The algorithm dynamically schedules the multiple verifiers' challenges based on verification time and the frequent itemsets of duplicate verification data in challenge sets by applying FP-Growth algorithm, and computes the batch proofs of frequent itemsets. Then the challenges are split into two parts, i.e., duplicate data and unique data according to the results of data extraction. Finally, the proofs of duplicate data and unique data are computed and combined to generate a complete proof of every original challenge. Theoretical analysis and experiment evaluation show that the algorithm reduces the verification cost and ensures the correctness of the data integrity verification by flexible batch data verification.

An Improved Privacy Preserving Construction for Data Integrity Verification in Cloud Storage

  • Xia, Yingjie;Xia, Fubiao;Liu, Xuejiao;Sun, Xin;Liu, Yuncai;Ge, Yi
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제8권10호
    • /
    • pp.3607-3623
    • /
    • 2014
  • The increasing demand in promoting cloud computing in either business or other areas requires more security of a cloud storage system. Traditional cloud storage systems fail to protect data integrity information (DII), when the interactive messages between the client and the data storage server are sniffed. To protect DII and support public verifiability, we propose a data integrity verification scheme by deploying a designated confirmer signature DCS as a building block. The DCS scheme strikes the balance between public verifiable signatures and zero-knowledge proofs which can address disputes between the cloud storage server and any user, whoever acting as a malicious player during the two-round verification. In addition, our verification scheme remains blockless and stateless, which is important in conducting a secure and efficient cryptosystem. We perform security analysis and performance evaluation on our scheme, and compared with the existing schemes, the results show that our scheme is more secure and efficient.

How Social Intelligence, Integrity, and Self-efficacy Affect Job Satisfaction: Empirical Evidence from Indonesia

  • ALIFUDDIN, Moh.;WIDODO, Widodo
    • The Journal of Asian Finance, Economics and Business
    • /
    • 제8권7호
    • /
    • pp.625-633
    • /
    • 2021
  • The study aims to explore the empirical effect of social intelligence, integrity, self-efficacy, and affective commitment on job satisfaction, and also to prove the theoretical model regarding affective commitment as a mediator between social intelligence, integrity, self-efficacy, and job satisfaction. This research uses a quantitative approach to the survey method through a Likert scale model questionnaire. The questionnaire for all research variables is reliable with an alpha coefficient > 0.7. The research participants are comprised of 386 teachers in Indonesia selected by accidental sampling. Data analysis uses path analysis supported by descriptive statistics and correlational matrices. The research results indicate that social intelligence, integrity, self-efficacy, and affective commitment have a significant effect on job satisfaction. Besides, affective commitment also indirectly mediates the effect of social intelligence, integrity, and self-efficacy on job satisfaction. Thus, a new model regarding the effect of social intelligence, integrity, and self-efficacy on job satisfaction mediating by affective commitment was confirmed. The research suggested that the teachers' job satisfaction can improve through social intelligence, integrity, self-efficacy, and affective commitment. Therefore, researchers and practitioners can adopt a new empirical model to enhance job satisfaction through social intelligence, integrity, self-efficacy, and affective commitment in the future.

차량용 온칩 버스의 데이터 무결성을 위한 종단간 에러 정정 코드(e2eECC)의 설계 및 구현 (Design and Implementation of e2eECC for Automotive On-Chip Bus Data Integrity)

  • 길은배;박찬;김주호;정준호;이주석;이성수
    • 전기전자학회논문지
    • /
    • 제28권1호
    • /
    • pp.116-122
    • /
    • 2024
  • AMBA AHB-Lite 버스는 저전력 및 경제성 측면에서 SoC에 널리 사용되는 온칩 버스 프로토콜이다. 하지만 이 프로토콜은 종단간 데이터 무결성을 위한 에러 검출 및 정정이 불가능하다. 이로 인해 자동차와 같이 열악한 환경에서 동작하는 경우에 데이터 변질과 시스템 불안정을 일으킬 수 있다. 이러한 문제를 해결하기 위해 본 논문에서는 AMBA AHB-Lite 버스에 SEC-DED(Single Error Correction-Double Error Detection)를 적용하는 방법을 제안한다. 이는 전송 중 발생하는 데이터 에러를 실시간으로 감지하고 정정하여 종단간 데이터 무결성을 강화한다. 시뮬레이션 결과, 에러가 일어나도 실시간으로 이를 감지하고 정정하여 차량용 온칩 버스에서 종단간 데이터 무결성을 강화하는 것을 확인하였다.

공간 객체 무결성 검증을 위한 규칙 관리 시스템의 구현 (Implementation of Rule Management System for Validating Spatial Object Integrity)

  • 고굉욱;유상봉;김기창;차상균
    • 한국정보과학회논문지:소프트웨어및응용
    • /
    • 제26권12호
    • /
    • pp.1393-1403
    • /
    • 1999
  • 공간 데이타베이스 시스템을 통하여 공유되는 공간 데이타는 무결성이 적절하게 유지되지 않는 한 전체 응용 시스템의 행위를 예측할 수 없게 되므로 데이타의 무결성 확인 및 유지는 필수적이다. 특히 공공 GIS에 저장된 공간 데이타는 토지 이용도 평가, 도시 계획, 자원 관리, 시설물 관리, 안전 관리, 국방 등 국가 전체 및 지역의 중요한 정책 결정을 위한 다양한 응용 시스템들에 의해 이용되므로 적절한 공간 객체의 무결성 확인이 더욱 더 필요하다. 본 논문에서는 능동(active) DBMS의 능동 규칙(active rule) 기법을 이용하여 공간 객체의 무결성 확인을 지원하기 위한 규칙 관리 시스템을 제시한다. 능동 규칙을 이용한 공간 객체의 무결성 확인은 응용 프로그래머를 무결성 확인에 대한 부담으로부터 자유롭게 할 수 있다. 본 시스템은 특정 DBMS에 종속되지 않는 독립적인 외부 시스템으로 존재하며, 능동 규칙 관리기, 규칙 베이스, 그리고 활성규칙 생성기의 3 부분으로 구성된다. 사용자가 공간 데이타베이스 응용 프로그램을 통해 공간 객체를 조작하고자 할 때, 본 시스템은 데이타베이스 트랜잭션을 단위로 조작되는 모든 공간 객체의 무결성 확인을 위해 응용 프로그램에 삽입될 무결성 제약조건 규칙들을 효율적으로 관리하는 역할을 한다.Abstract It is necessary that the integrity of spatial data shared through the spatial database system is validated and appropriately maintained, otherwise the activity of whole application system is unpredictable. Specially, the integrity of spatial data stored in public GIS has to be validated, because those data are used by various applications which make a decision on an important policy of the region and/or whole nation such as evaluation of land use, city planning, resource management, facility management, risk management/safety supervision, national defense. In this paper, we propose rule management system to support validating the integrity of spatial object, using the technique of active rule technique from active DBMS. Validating data integrity using active rules allows database application programmer to be free from a burden on validation of the data integrity. This system is an independent, external system that is not subject to specific DBMS and consists of three parts, which are the active rule manager, the rule base, and the triggered rule generator. When an user tries to manipulate spatial objects through a spatial database application program, this system serves to efficiently manage integrity rules to be inserted into the application program to validate the integrity constraints of all the spatial objects manipulated by database transactions.

무결성 제약에 기초한 규칙 기반 데이타베이스 검증 시스템 (A Rule-Based Database Verification System Based on the Integrity Constranints)

  • 류명춘;박창현
    • 한국정보처리학회논문지
    • /
    • 제3권1호
    • /
    • pp.77-86
    • /
    • 1996
  • 데이타베이스 관리 측면에서 데이타의 무결성은 매우 중요한 의미를 가진다. 따라 서 특정의 데이타베이스 구축시 무결성 규정들을 반드시 고려하여야 하며, 데이타베이 스의 무결성 유지를 위해 데이타베이스 관리자는 지속적으로 데이타베이스의 내용을 감시하면서 데이타의 무결성을 저해하는 요소가 발생될경우 이를 제거해 주어야만 한 다.그러나 이러한 무결성 유지 작업은 응용 영역 데이타의 양이 증가 할수록 더욱 복잡해지며 또한 많은 시간을 필요로 하게 된다. 본 논문에서는 이러한 문제점을 개선하기 위한 규칙 기반 데이타베이스 검증 시스템을 제시한다. 제시 하는 규칙 기반 데이타베이스 검증 시스템은 문제 영역 모델로부터 필요한 데이타 베이스와 무결성 유지를 위한 규 칙들을 생성하고, 추론 시스템과 데이타베이스의 결합을 통해 데이타베이스의 무결성 검증 작업을 수행한다.

  • PDF

노인의 죽음불안에 영향을 미치는 요인 (Factors Influencing Death Anxiety in the Aged)

  • 이정인;김순이
    • 한국보건간호학회지
    • /
    • 제25권1호
    • /
    • pp.28-37
    • /
    • 2011
  • Purpose: The study examined influencing factors on death anxiety in the aged. Method: This was a descriptive survey study. Data were collected from March to June, 2010, from357 older home-dwelling adults. The questionnaires solicited information on death anxiety, family function, morale, health behavior and ego-integrity. Data was analyzed using descriptive statistics, Pearson's correlation, and stepwise multiple regression. Results: Average scores were 2.50 for death anxiety, 3.80 for family function, 9.0 for morale, 3.12 for health behavior and 2.84 for ego-integrity. There were statistically significant negative correlations between family function and death anxiety, morale and death anxiety, health behavior and death anxiety, and ego-integrity and death anxiety Morale, ego-integrity, and economic status were a significant predictor of death anxiety. Conclusion: Multilateral efforts are needed to assist the aged in successful aging through continuous body activities and active participation in society.

3-L Model: A Model for Checking the Integrity Constraints of Mobile Databases

  • Ibrahim, Hamidah;Dzolkhifli, Zarina;Affendey, Lilly Suriani;Madiraju, Praveen
    • Journal of Computing Science and Engineering
    • /
    • 제3권4호
    • /
    • pp.260-277
    • /
    • 2009
  • In this paper we propose a model for checking integrity constraints of mobile databases called Three-Level (3-L) model, wherein the process of constraint checking to maintain the consistent state of mobile databases is realized at three different levels. Sufficient and complete tests proposed in the previous works together with the idea of caching relevant data items for checking the integrity constraints are adopted. This has improved the checking mechanism by preventing delays during the process of checking constraints and performing the update. Also, the 3-L model reduces the amount of data accessed given that much of the tasks are performed at the mobile host, and hence speeds up the checking process.

An Enhanced Remote Data Checking Scheme for Dynamic Updates

  • Dong, Lin;Park, Jinwoo;Hur, Junbeom;Park, Ho-Hyun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제8권5호
    • /
    • pp.1744-1765
    • /
    • 2014
  • A client stores data in the cloud and uses remote data checking (RDC) schemes to check the integrity of the data. The client can detect the corruption of the data using RDC schemes. Recently, robust RDC schemes have integrated forward error-correcting codes (FECs) to ensure the integrity of data while enabling dynamic update operations. Thus, minor data corruption can be recovered by FECs, whereas major data corruption can be detected by spot-checking techniques. However, this requires high communication overhead for dynamic update, because a small update may require the client to download an entire file. The Variable Length Constraint Group (VLCG) scheme overcomes this disadvantage by downloading the RS-encoded parity data for update instead of the entire file. Despite this, it needs to download all the parity data for any minor update. In this paper, we propose an improved RDC scheme in which the communication overhead can be reduced by downloading only a part of the parity data for update while simultaneously ensuring the integrity of the data. Efficiency and security analysis show that the proposed scheme enhances efficiency without any security degradation.