• Title/Summary/Keyword: File Integrity

Search Result 91, Processing Time 0.03 seconds

Configuration Management based Configuration File Version Integrity Auditing Framework (형상관리 기반 설정파일 버전 무결성 감사 프레임워크)

  • Kim, Seonjoo;Lee, Sukhoon;Baik, Doo-Kwon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2012.11a
    • /
    • pp.1511-1514
    • /
    • 2012
  • 최근 기업에서 구축하는 IT 아키텍쳐가 점점 복잡해져 가는 환경변화에 따라 각 시스템 구성요소의 조건이나 특성을 저장하는 설정파일(Configuration file)의 중요성이 강조되고 있지만, 대부분의 형상관리시스템이 응응 소프트웨어를 중심으로 구성되어 설정파일의 특징을 반영한 활동에 한계를 갖고 있다. 또한 품질보증 목적으로 수행하는 형상감사 활동도 응용 소프트웨어를 대상으로 품질중심 감사 활동이 이루어지면서, 등록된 개별 소프트웨어 별로 변경통제와 버전관리가 이루어져 설정 파일이 포함되는 경우 버전 무결성 차원의 문제를 적발하지 못하는 문제가 있다. 이 논문에서는 추가적으로 필요한 감사활동 요구기능을 정의하고, 동일한 원본에서 배포된 설정파일들이 서로 버전이 다르게 관리 될 수 있는 문제를 감사(Audit)를 통해 탐지할 수 있는 버전 무결성 감사 프레임워크를 제시한다. 제안하는 프레임워크는 기존 형상관리 개념과 액티비티, 프로세스를 기반으로 감사기능을 보완한다. 이를 통해 기존 감사활동에 버전 무결성 검증을 수행하는 형상감사 기능이 포함되며, 이는 설정파일의 버전 차이에 의해 사전/사후 발생될 장애, 오동작 등의 문제 해결에 활용된다. 이 논문에서 제안 프레임워크의 검증을 위하여 웹 시스템 기반 자바환경으로 구현하였고, 현장 적용한 부분을 평가 함으로써 검증하였다.

A Techniques to Conceal Information Using Eojeol in Hangul Text Steganography (한글 텍스트 스테가노그래피에서 어절을 이용한 정보은닉 기법)

  • Ji, Seon Su
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.22 no.5
    • /
    • pp.9-15
    • /
    • 2017
  • In the Digital Age, All Data used in the Internet is Digitized and Transmitted and Received Over a Communications Network. Therefore, it is Important to Transmit Data with Confidentiality and Integrity, Since Digital Data may be Tampered with and Tampered by Illegal users. Steganography is an Efficient Method for Ensuring Confidentiality and Integrity Together with Encryption Techniques. I Propose a Hangul Steganography Method that Inserts a Secret Message based on a Changing Insertion Position and a Changing Eojeol Size in a Cover Medium. Considering the Insertion Capacity of 3.35% and the File Size Change of 0.4% in Hangul Text Steganography, Experimental Results Show that the Jaro_score Value needs to be Maintained at 0.946.

Fusion of Blockchain-IoT network to improve supply chain traceability using Ethermint Smart chain: A Review

  • George, Geethu Mary;Jayashree, LS
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.11
    • /
    • pp.3694-3722
    • /
    • 2022
  • In today's globalized world, there is no transparency in exchanging data and information between producers and consumers. However, these tasks experience many challenges, such as administrative barriers, confidential data leakage, and extensive time delays. To overcome these challenges, we propose a decentralized, secured, and verified smart chain framework using Ethereum Smart Contract which employs Inter Planetary File Systems (IPFS) and MongoDB as storage systems to automate the process and exchange information into blocks using the Tendermint algorithm. The proposed work promotes complete traceability of the product, ensures data integrity and transparency in addition to providing security to their personal information using the Lelantos mode of shipping. The Tendermint algorithm helps to speed up the process of validating and authenticating the transaction quickly. More so in this time of pandemic, it is easier to meet the needs of customers through the Ethermint Smart Chain, which increases customer satisfaction, thus boosting their confidence. Moreover, Smart contracts help to exploit more international transaction services and provide an instant block time finality of around 5 sec using Ethermint. The paper concludes with a description of product storage and distribution adopting the Ethermint technique. The proposed system was executed based on the Ethereum-Tendermint Smart chain. Experiments were conducted on variable block sizes and the number of transactions. The experimental results indicate that the proposed system seems to perform better than existing blockchain-based systems. Two configuration files were used, the first one was to describe the storage part, including its topology. The second one was a modified file to include the test rounds that Caliper should execute, including the running time and the workload content. Our findings indicate this is a promising technology for food supply chain storage and distribution.

A Novel Auditing System for Dynamic Data Integrity in Cloud Computing (클라우드 컴퓨팅에서 동적 데이터 무결성을 위한 개선된 감사 시스템)

  • Kim, Tae-yeon;Cho, Gi-hwan
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.8
    • /
    • pp.1818-1824
    • /
    • 2015
  • Cloud computing draws attention as an application to provide dynamically scalable infrastructure for application, data and file storage. An untrusted remote server can cause a variety of problems in the field of data protection. It may process intentionally or involuntarily user's data operations(modify, insert, delete) without user's permission. It may provide false information in order to hide his mistakes in the auditing process. Therefore, it is necessary to audit the integrity of data stored in the cloud server. In this paper, we propose a new data auditing system that can verify whether servers had a malicious behavior or not. Performance and security analysis have proven that our scheme is suitable for cloud computing environments in terms of performance and security aspects.

A Study on Data Recording and Play Method between Tactical Situations to Ensure Data Integrity with Data Link Processor Based on Multiple Data Links (다중데이터링크 기반에서 데이터링크 처리기와의 데이터 무결성 보장을 위한 전술상황전시기 간 데이터 기록 및 재생 방법 연구)

  • Lee, Hyunju;Jung, Eunmi;Lee, Sungwoo;Yeom, Jaegeol;Kim, Sangjun;Park, Jihyeon
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.13 no.2
    • /
    • pp.13-25
    • /
    • 2017
  • Recently, the high performance of tactical situation display console and tactical data links are used to integrate the operational situations in accordance with information age and NCW (Network Centric Warfare). The tendency to maximize the efficiency of task execution has been developed by sharing information and the state of the battle quickly through complex and diverse information exchange. Tactical data link is a communication system that shares the platform with core components of weapons systems and battlefield situation between the command and control systems to perform a Network Centric Warfare and provides a wide range of tactical data required for decision-making and implementation.It provides the tactical information such as tactical information such as operational information, the identification of the peer, and the target location in real time or near real time in the battlefield situation, and it is operated for the exchange of mass tactical information between the intellectuals by providing common situation recognition and cooperation with joint operations. In this study, still image management, audio file management, tactical screen recording and playback using the storage and playback, NITF (National Imagery Transmission Format) message received from the displayer integrates the tactical situation in three dimensions according to multiple data link operation to suggest ways to ensure data integrity between the data link processor during the entire operation time.

Chaincode-based File Integrity Verification Model (체인코드 기반의 파일 무결성 검증 모델)

  • Kim, Hyo-Jong;Han, Kun-Hee;Shin, Seung-Soo
    • Journal of the Korea Convergence Society
    • /
    • v.12 no.4
    • /
    • pp.51-60
    • /
    • 2021
  • Recent advances in network and hardware technologies have led to active research and multiple network technologies that fuse blockchain technologies with security. We propose a system model that analyzes technologies using existing blockchain and verifies the integrity of files using private blockchain in a limited environment. The proposed model can be written as a chain code of Hyperleisure Fabric, a private blockchain platform, and verified for integrity of files through Hyperleisure Explorer, a private blockchain integrated management platform. The system performance of the proposed model was analyzed from a developer perspective and from a user perspective. As a result of the analysis, there are compatibility problems according to the version of various modules to run the blockchain platform, and only limited elements such as chain code status and groups can be checked.

Boosting WiscKey Key-Value Store Using NVDIMM-N (NVDIMM-N을 활용한 WiscKey 키-밸류 스토어 성능 향상)

  • Il Han Song;Bo hyun Lee;Sang Won Lee
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.12 no.3
    • /
    • pp.111-116
    • /
    • 2023
  • The WiscKey database, which optimizes overhead by compaction of the LSM tree-based Key-Value database, stores the value in a separate file, and stores only the key and value addresses in the database. Each time an fsync system call function is used to ensure data integrity in the process of storing values. In previously conducted studies, workload performance was reduced by up to 5.8 times as a result of performing the workload without calling the fsync system call function. However, it is difficult to ensure the data integrity of the database without using the fsync system call function. In this paper, to reduce the overhead of the fsync system call function while performing workloads on the WiscKey database, we use NVDIMM caching techniques to ensure data integrity while improving the performance of the WiscKey database.

Development of Automated Structural Design and Analysis Aided-Program of Aluminum Extrusion Carbody Structures for Railway Vehicle (알루미늄 압출재 철도차량 차체 구조물의 자동화 구조 설계 및 해석 지원 프로그램 개발)

  • Kim, Jun-Hwan;Shin, Kwang-Bok;Kang, Seung-Gu;Lee, Young-Ju
    • Proceedings of the KSR Conference
    • /
    • 2011.10a
    • /
    • pp.2679-2683
    • /
    • 2011
  • The purpose of this study is to develop automated structural design and analysis aided-program of aluminum extrusion carbody structures for railway vehicle. This developed program is possible to perform simultaneously structural design and design verification of aluminum extrusion profiles independent of expertise and experience of design engineers. Design engineers was able to design it using database of existing aluminum extrusion profiles or user-defined function. The design verification was programmed to evaluate its structural integrity according to Korean Railway Safety Law or Urban Transit Safety Law. Also, this program could automatically generate an executable file of various commercial finite element program and CAD files such as stp and iges by GUI environment applications using MFC(Microsoft Foundation Classes). In conclusion, it is expected to contribute to reduce product development time and improve product quality of aluminum extrusion profile and structures in railway industry.

  • PDF

An RP Data Exchange Model Based on STEP (STEP을 이용한 신속조형용 설계정보 변환체계)

  • 이병열;지해성
    • Korean Journal of Computational Design and Engineering
    • /
    • v.6 no.1
    • /
    • pp.48-58
    • /
    • 2001
  • One of the biggest problems of rapid prototyping(RP) technologies lies in their standard file format for CAD data exchange. Current methods using the de facto industry standard 'STL'have at times resulted in problems such as accuracy, redundancy, and integrity. In this paper we propose a STEP based data exchange framework for rapid prototyping systems. In this paradigm of data exchange, STEP models can be imported and converted into faceted B-rep. solid models for visualization and 2-D layer data for RP. Also an STL model, on the other hand, can be converted into a faceted B-rep. STEP model and exported as a new data exchange model with RP information.

  • PDF

The People Navigator : A New Collaboration Chatting Application (The People Navigator: 새로운 협동 Chatting 애플리케이션)

  • 유상진;장영택;윤성로
    • Korean Management Science Review
    • /
    • v.18 no.1
    • /
    • pp.79-88
    • /
    • 2001
  • We often feel the necessity to communicate with members involved in a project to remote discuss business activities, needs for the fast file transfer, and check the existence of members to talk with. There are some commercial applications in these problems. However, in addition to those existing functions, this study focuses especially on adding couple of functions such as automatic responding function, in which a sender of a message automatically knows if a receiver checks the message. Its application is that a project leader sends an important message and later on can check at his desk the fact that who have checked their messages. The prototype application, build in this study, will check the correctness of every sub-function, and then the interface of inter-sub-functions, finally the integrity of the entire system, so that important information will not be lost among members of a project in the real world situation.

  • PDF