• Title/Summary/Keyword: Department of Security Service

Search Result 676, Processing Time 0.027 seconds

An Overview of Data Security Algorithms in Cloud Computing

  • D. I. George Amalarethinam;S. Edel Josephine Rajakumari
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.5
    • /
    • pp.65-72
    • /
    • 2023
  • Cloud Computing is one of the current research areas in computer science. Recently, Cloud is the buzz word used everywhere in IT industries; It introduced the notion of 'pay as you use' and revolutionized developments in IT. The rapid growth of modernized cloud computing leads to 24×7 accessing of e-resources from anywhere at any time. It offers storage as a service where users' data can be stored on a cloud which is managed by a third party who is called Cloud Service Provider (CSP). Since users' data are managed by a third party, it must be encrypted ensuring confidentiality and privacy of the data. There are different types of cryptographic algorithms used for cloud security; in this article, the algorithms and their security measures are discussed.

Novel VNFI Security Management Function Block For Improved Security Framework For SDN/NFV Networks

  • Alruwaili, Rahaf Hamoud;Alanazi, Haifa Khaled;Hendaoui, Saloua
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.10
    • /
    • pp.303-309
    • /
    • 2022
  • Software Defined Networking (SDN) is a novel approach that have accelerated the development of numerous technologies such as policy-based access control, network virtualization, and others. It allows to boost network architectural flexibility and expedite the return on investment. However, this increases the system's complexity, necessitating the expenditure of dollars to assure the system's security. Network Function Virtualization (NFV) opens up new possibilities for network engineers, but it also raises security concerns. A number of Internet service providers and network equipment manufacturers are grappling with the difficulty of developing and characterizing NFVs and related technologies. Through Moodle's efforts to maintain security, this paper presents a detailed review of security-related challenges in software-defined networks and network virtualization services.

Configuration Method of AWS Security Architecture for Cloud Service (클라우드 서비스 보안을 위한 AWS 보안 아키텍처 구성방안)

  • Park, Se-Joon;Lee, Yong-Joon;Park, Yeon-Chool
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.7
    • /
    • pp.7-13
    • /
    • 2021
  • Recently, due to the many features and advantages of cloud computing, cloud service is being introduced to countless industries around the world at an unbelievably rapid pace. With the rapid increase in the introduction of multi-cloud based services, security vulnerabilities are increasing, and the risk of data leakage from cloud computing services are also expected to increase. Therefore, this study will propose an AWS Well-Architected based security architecture configuration method such as AWS standard security architecture, AWS shared security architecture model that can be applied for personal information security including cost effective of cloud services for better security in AWS cloud service. The AWS security architecture proposed in this study are expected to help many businesses and institutions that are hoping to establish a safe and reliable AWS cloud system.

Cognitive Radio Anti-Jamming Scheme for Security Provisioning IoT Communications

  • Kim, Sungwook
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.10
    • /
    • pp.4177-4190
    • /
    • 2015
  • Current research on Internet of Things (IoT) has primarily addressed the means to enhancing smart resource allocation, automatic network operation, and secure service provisioning. In particular, providing satisfactory security service in IoT systems is indispensable to its mission critical applications. However, limited resources prevent full security coverage at all times. Therefore, these limited resources must be deployed intelligently by considering differences in priorities of targets that require security coverage. In this study, we have developed a new application of Cognitive Radio (CR) technology for IoT systems and provide an appropriate security solution that will enable IoT to be more affordable and applicable than it is currently. To resolve the security-related resource allocation problem, game theory is a suitable and effective tool. Based on the Blotto game model, we propose a new strategic power allocation scheme to ensure secure CR communications. A simulation shows that our proposed scheme can effectively respond to current system conditions and perform more effectively than other existing schemes in dynamically changeable IoT environments.

Dynamic Service Chaining Method Considering Performance of Middlebox Over SDN (소프트웨어 정의 네트워크상의 미들박스 성능을 고려한 동적 서비스 체이닝 방안)

  • Oh, Hyeongseok;Kim, Namgi;Choi, Yoon-Ho
    • Journal of Internet Computing and Services
    • /
    • v.16 no.6
    • /
    • pp.47-55
    • /
    • 2015
  • The conventional dynamic routing methods in Software Defined Networks (SDN) set the optimal routing path based on the minimum link cost, and thereby transmits the incoming or outgoing flows to the terminal. However, in this case, flows can bypass the middlebox that is responsible for security service and thus, thus the network can face a threat. That is, while determining the best route for each flow, it is necessary to consider a dynamic service chaining, which routes a flow via a security middlebox. Therefore, int this paper, we propose a new dynamic routing method that considers the dynamic flow routing method combined with the security service functions over the SDN.

Factors Affecting Enterprise's Satisfaction toward Social Security's Online Public Service: The Case of Thanh Hoa Province, Vietnam

  • NGO, Chi Thanh;NGUYEN, Thi Ngoc Mai;NGUYEN, Duy Dat;LE, Hoang Ba Huyen;LE, Van Cuong;LE, Thi Binh
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.7 no.9
    • /
    • pp.467-475
    • /
    • 2020
  • The study aims to investigate factors affecting enterprise's satisfaction and loyalty toward the Social Security's online public services, looking at the case of Thanh Hoa province, Vietnam. This study employs samples with 216 enterprises that use online public system of Thanh Hoa province's Social Security. The research model is closely linked to the SERVQUAL model developed by Parasuraman, Zeithaml and Berry (1988). We propose 23 scales that constitute the quality of service, three scales that constitute Customer Satisfaction and three components that constitute Customer Loyalty. This study use the tool of Exploratory Factor Analysis (EFA), Cronbach's Alpha test, Confirm Factor Analysis (CFA) and Structural Equation Modeling (SEM) in order to address the question of satisfaction and loyalty. The result shows that the factor with the most impact is Reliability, next is Capacity of staffs, Tangibles, Attitude of staffs, and the least impacting factor is Empathy; moreover, the results also show that Satisfaction has a strong impact on Customer Loyalty. The findings of this study suggest that Thanh Hoa province's Social Security should: (i) strengthen the reliability of online service system; (ii) build capacity for staffs; (iii) develop the responsiveness of electronic transactions systems; and (iv) improve the empathy of staffs.

Why Do You Use A Podcast Service? : A UTAUT Model (당신은 왜 팟캐스트 서비스를 사용하는가? : UTAUT 모형)

  • Kim, Hyeong-Yeol;Kim, Tae-Sung
    • Journal of Information Technology Applications and Management
    • /
    • v.23 no.2
    • /
    • pp.153-176
    • /
    • 2016
  • This study investigated factors affecting the use intention of podcast service users based on the unified theory of acceptance and use of technology (UTAUT). Performance expectancy, effort expectancy, social influence, facilitating condition, hedonic motivation, innovativeness, and media credibility were used as independent variables in the model. The survey data from the users of the podcast portal 'podbbang' were analyzed with Smart PLS 2.0 to test the structural equation model. The results revealed that the podcast service user's effort expectancy, facilitating condition, hedonic motivation, and media credibility have a significant influence on use intention. However, the relationship between the podcast service user's performance expectancy, social influence, innovativeness, and use intention were not identified as significant.

Pre-service Special Education Teachers' Knowledge and Perceptions of Using Computer Technology in Teaching from PST Perspectives

  • Alhwaiti, Mohammed M.
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.4
    • /
    • pp.169-174
    • /
    • 2022
  • The study aims to discover the scope of pre-service special education teachers' knowledge and perceptions of using computer technology in teaching students with disabilities from a pre-service teacher (PST) perspective in light of the gender and sub-major variables. The sample consisted of 84 MEd students/pre-service teachers at the Department of Special Education, Faculty of Education, Umm Al-Qura University. The descriptive analytical approach is used due to its relevance to the study. A survey consisting of the participant's basic information section and 12 statements was sent to a set of pre-service teachers. Findings showed that pre-service special education teachers had an overall high knowledge of using computer technology (M=3.93). Findings also indicated that there were no gender- or major-related statistically significant differences (α = 0.05), in pre-service special education students' knowledge and perceptions of using computer technology.

Cloud computing Issues and Security measure (클라우드 컴퓨팅 보안 대책 연구)

  • Lee, Sang Ho
    • Journal of Convergence Society for SMB
    • /
    • v.5 no.1
    • /
    • pp.31-35
    • /
    • 2015
  • Cloud computing is internet-based computing technology. This is a form for exchanging service focused on the Internet. Because Cost is saved and use is easy there's a tendency that many companies are using. Cloud is in the form of a public cloud and private cloud and hybrid cloud. The service model is SaaS, PaaS, IaaS. Cloud computing use is simple but it has a security vulnerability. In particular, there is a vulnerability in virtualization and centralized information. In order to overcome this new security technology is to be developed. In particular, network security technology and authentication technology should be developed. Another way to overcome security responsibilities must be clearly and policies should be unified.

  • PDF

A Study on Web Service Framework Security based on SAML (SAML기반의 웹서비스 프레임워크 보안에 관한 연구)

  • Kim, Hyun-Hee;Cha, Suk-Il;Song, Jun-Hong;Sung, Baek-Ho;Shin, Dong-Il;Shin, Dong-Kyoo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2002.04b
    • /
    • pp.931-934
    • /
    • 2002
  • 현재의 e-비즈니스 환경은 단순히 웹사이트를 구축 및 운용하는 차원을 넘어, 시간이 지남에 따라 급격한 진화 과정을 거치고 있다. 진화의 초점으로 떠오르고 있는 웹서비스 중 SAML(Security Assertions Markup Language)은 사용자 인증 정보 교환에 관한 프레임워크로 OASIS XML 보안 서비스 기술 위원회(OASIS XML-Security Service Technical Committee)에서 표준화 작업을 진행하고 있다. SAML은 S2ML(Security Services Markup Language)의 원리와 구조를 재사용해서 S2ML의 이점을 공유 하고 Single Sign-On, 인증 서비스, B2B Transaction, Sessioning같은 기능을 가진다. 그로 인해 다양한 정책기반의 산업에서 보안 시스템, 자바 어플리케이션 서버, XML 메시징 프레임워크와 오퍼레이팅 플랫폼사이에 인증, 승인과 함께 프로필 정보를 교환하기 위해 사용된다. 본 논문에서는 SAML의 범위와 목적 그리고 유즈케이스 모델과 시나리오를 통해 기본 구조와 쓰임새에 대해서 알아본다.

  • PDF