• Title/Summary/Keyword: Integrity Check

Search Result 154, Processing Time 0.043 seconds

A Scalable Data Integrity Mechanism Based on Provable Data Possession and JARs

  • Zafar, Faheem;Khan, Abid;Ahmed, Mansoor;Khan, Majid Iqbal;Jabeen, Farhana;Hamid, Zara;Ahmed, Naveed;Bashir, Faisal
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.6
    • /
    • pp.2851-2873
    • /
    • 2016
  • Cloud storage as a service provides high scalability and availability as per need of user, without large investment on infrastructure. However, data security risks, such as confidentiality, privacy, and integrity of the outsourced data are associated with the cloud-computing model. Over the year's techniques such as, remote data checking (RDC), data integrity protection (DIP), provable data possession (PDP), proof of storage (POS), and proof of retrievability (POR) have been devised to frequently and securely check the integrity of outsourced data. In this paper, we improve the efficiency of PDP scheme, in terms of computation, storage, and communication cost for large data archives. By utilizing the capabilities of JAR and ZIP technology, the cost of searching the metadata in proof generation process is reduced from O(n) to O(1). Moreover, due to direct access to metadata, disk I/O cost is reduced and resulting in 50 to 60 time faster proof generation for large datasets. Furthermore, our proposed scheme achieved 50% reduction in storage size of data and respective metadata that result in providing storage and communication efficiency.

Design and Implementation of VIES for Integrity Evaluation in VPN (VPN의 데이터 무결성 평가를 위한 VIES 설계 및 구현)

  • Lee, Dong-Chun;Kim, Jeom-Gu;Jo, Seok-Pal
    • The KIPS Transactions:PartC
    • /
    • v.9C no.4
    • /
    • pp.481-488
    • /
    • 2002
  • Guarantee of the data integrity is important to the Virtual Private Network (VPN) which can be improved cost decreasing and effective work by applying on Internet as the private network. Thus, the integrity function in the VPN must be maintained and the security manager must be check it occasionally. In this paper we propose the VPN Integrity Evaluation System (VIES) which is collecting, and evaluating automatically the vulnerable data of VPN against current hacking mechanisms in information security system. And this VIES obtain to the results which have objectivity and fairness of evaluation by driving off the evaluation scenario based on Common Criteria (CC), and general users or non-specialist can utilize easy the security evaluation of organization.

Suggestions for Solving Errors and Integrity Guarantees in the Process of Transferring Standard Electronic Documents (표준 전자문서 이관 시 발생하는 무결성 보장 및 오류 해결에 대한 제언)

  • Yu, Young-Moon
    • Journal of Korean Society of Archives and Records Management
    • /
    • v.20 no.3
    • /
    • pp.1-21
    • /
    • 2020
  • Although the National Archives of Korea has been receiving transfer of standard electronic documents with a retention period of more than 30 years from the central administration since 2015, errors and inefficiencies persist. Despite this, however, there remain no studies that analyze or address these issues. This study aims to bridge this gap and found that most errors in the transfer process occur at the production stage. To address such, this study proposes a four-step solution. First, before electronic document approval, the text and attached files are checked for defects to prevent errors. Second, as soon as the signature is made, digital signatures are applied on a file-by-file basis to ensure integrity. Third, integrity verification and transfer inspection are automatically performed through digital signature investigation and defect check procedure during transfer and preservation. Fourth and last, the criteria of acquiring records and integrity guarantee technologies are properly applied in production stage with proper management and supervision.

An Enhanced Remote Data Checking Scheme for Dynamic Updates

  • Dong, Lin;Park, Jinwoo;Hur, Junbeom;Park, Ho-Hyun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.5
    • /
    • pp.1744-1765
    • /
    • 2014
  • A client stores data in the cloud and uses remote data checking (RDC) schemes to check the integrity of the data. The client can detect the corruption of the data using RDC schemes. Recently, robust RDC schemes have integrated forward error-correcting codes (FECs) to ensure the integrity of data while enabling dynamic update operations. Thus, minor data corruption can be recovered by FECs, whereas major data corruption can be detected by spot-checking techniques. However, this requires high communication overhead for dynamic update, because a small update may require the client to download an entire file. The Variable Length Constraint Group (VLCG) scheme overcomes this disadvantage by downloading the RS-encoded parity data for update instead of the entire file. Despite this, it needs to download all the parity data for any minor update. In this paper, we propose an improved RDC scheme in which the communication overhead can be reduced by downloading only a part of the parity data for update while simultaneously ensuring the integrity of the data. Efficiency and security analysis show that the proposed scheme enhances efficiency without any security degradation.

Using Deep Learning for automated classification of wall subtypes for semantic integrity checking of Building Information Models (딥러닝 기반 BIM(Building Information Modeling) 벽체 하위 유형 자동 분류 통한 정합성 검증에 관한 연구)

  • Jung, Rae-Kyu;Koo, Bon-Sang;Yu, Young-Su
    • Journal of KIBIM
    • /
    • v.9 no.4
    • /
    • pp.31-40
    • /
    • 2019
  • With Building Information Modeling(BIM) becoming the de facto standard for data sharing in the AEC industry, additional needs have increased to ensure the data integrity of BIM models themselves. Although the Industry Foundation Classes provide an open and neutral data format, its generalized schema leaves it open to data loss and misclassifications This research applied deep learning to automatically classify BIM elements and thus check the integrity of BIM-to-IFC mappings. Multi-view CNN(MVCC) and PointNet, which are two deep learning models customized to learn and classify in 3 dimensional non-euclidean spaces, were used. The analysis was restricted to classifying subtypes of architectural walls. MVCNN resulted in the highest performance, with ACC and F1 score of 0.95 and 0.94. MVCNN unitizes images from multiple perspectives of an element, and was thus able to learn the nuanced differences of wall subtypes. PointNet, on the other hand, lost many of the detailed features as it uses a sample of the point clouds and perceived only the 'skeleton' of the given walls.

Study on the Impact-proof Internal Structure Design of a Spent Nuclear Fuel Transport Cask (내충격성을 고려한 사용후연료 수송용기 내부구조물의 설계 연구)

  • Shin, Tae-Myung;Kim, Kap-Sun
    • Transactions of the Korean Society for Noise and Vibration Engineering
    • /
    • v.19 no.4
    • /
    • pp.370-377
    • /
    • 2009
  • A simple preliminary analysis is often useful to check a validity of design alternatives before the detailed analysis phase in the viewpoint of efficiency. This paper describes a preliminary analysis procedure for the selection among basket design candidates for the spent fuel shipping cask of Korean standard nuclear power plant. As the cask should maintain the structural integrity in hypothetical accident condition, the case of 9 m drop is significantly considered as the worst scenario among the accident conditions in structural design viewpoint in this paper. As basket design options, totally four different types are considered and analyzed in the point of structural integrity at drop impact and weldability for fabrication. As a result, an insertion round plate type with densely spaced supports turns out to be the best in both of the viewpoints, though the weld plate type shows a bit more design margin.

A study of a equipment, generation and managing train track data for train control system (열차제어시스템의 선로정보 생성관리장치 연구)

  • Yoon, Yongl-Ki;Kim, Yong-Kyu
    • Proceedings of the KIEE Conference
    • /
    • 2008.07a
    • /
    • pp.1018-1020
    • /
    • 2008
  • Since radio communications based train control system requires considerable amount of information than track circuits based signalling system and these information have significant effects on train control system safety, it is essential to ensure information integrity. In addition, when track information has to be added or changed due to track installation, track maintenance (both corrective and preventive), any information changes must be reported to train control system as soon as possible. In this paper, we provide explanation on the equipment and its data structure. Also, we represent the results of a simulator application to check the information integrity generated by the equipment.

  • PDF

Verification of Rule Bases Using Petri-net (페트리네드를 이용한 규칙베이스의 검증)

  • Jo, Sang-Yeop
    • The Transactions of the Korea Information Processing Society
    • /
    • v.4 no.2
    • /
    • pp.430-440
    • /
    • 1997
  • The knowledge repressenatation technique by production rule has been popular method to represent to represent the experts'dxpertise in expert systems.In this paper,we propose a method to verify the integrity of rule base.Proposcd method models rule base as a Petri net and utilizes the systematic strucutural properties of the petri net for berifi-cation.We describe the pricesure to check rule base at both local and global level intermal verification.

  • PDF

Monitoring and Analysis of Galileo Services Performance using GalTeC

  • Su, H.;Ehret, W.;Blomenhofer, H.;Blomenhofer, E.
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • v.1
    • /
    • pp.235-240
    • /
    • 2006
  • The paper will give an overview of the mission of GalTeC and then concentrate on two main aspects. The first more detailed aspect, is the analysis of the key performance parameters for the Galileo system services and presenting a technical overview of methods and algorithms used. The second more detailed aspect, is the service volume prediction including service dimensioning using the Prediction tool. In order to monitor and validate the Galileo SIS performance for Open Service (OS) and Safety Of Life services (SOL) regarding the key performance parameters, different analyses in the SIS domain and User domain are considered. In the SIS domain, the validation of Signal-in-Space Accuracy SISA and Signal-in-Space Monitoring Accuracy SISMA is performed. For this purpose first of all an independent OD&TS and Integrity determination and processing software is developed to generate the key reference performance parameters named as SISRE (Signal In Space Reference Errors) and related over-bounding statistical information SISRA (Signal In Space Reference Accuracy) based on raw measurements from independent sites (e.g. IGS), Galileo Ground Sensor Stations (GSS) or an own regional monitoring network. Secondly, the differences of orbits and satellite clock corrections between Galileo broadcast ephemeris and the precise reference ephemeris generated by GalTeC will also be compared to check the SIS accuracy. Thirdly, in the user domain, SIS based navigation solution PVT on reference sites using Galileo broadcast ephemeris and the precise ephemeris generated by GalTeC are also used to check key performance parameters. In order to demonstrate the GalTeC performance and the methods mentioned above, the paper presents an initial test result using GPS raw data and GPS broadcast ephemeris. In the tests, some Galileo typical performance parameters are used for GPS system. For example, the maximum URA for one day for one GPS satellite from GPS broadcast ephemeris is used as substitution of SISA to check GPS ephemeris accuracy. Using GalTeC OD&TS and GPS raw data from IGS reference sites, a 10 cm-level of precise orbit determination can be reached. Based on these precise GPS orbits from GalTeC, monitoring and validation of GPS performance can be achieved with a high confidence level. It can be concluded that one of the GalTeC missions is to provide the capability to assess Galileo and general GNSS performance and prediction methods based on a regional and global monitoring networks. Some capability, of which first results are shown in the paper, will be demonstrated further during the planned Galileo IOV phase, the Full Galileo constellation phase and for the different services particularly the Open Services and the Safety Of Life services based on the Galileo Integrity concept.

  • PDF

A study on the advanced RFID system using the parallel cyclic redundancy check (병렬 순환 잉여 검사를 이용한 발전된 무선인식 시스템에 관한 연구)

  • Kang Tai-Kyu;Yoon Sang-Mun;Shin Seok-kyun;Kang Min-Soo;Lee Key-Sea
    • Proceedings of the KSR Conference
    • /
    • 2004.10a
    • /
    • pp.1235-1240
    • /
    • 2004
  • This paper has presented the parallel cyclic redundancy check (CRC) technique that performs CRC computation in parallel superior to the conventional CRC technique that processes data bits serially. Also, it has showed that the implemented parallel CRC circuit had been successfully applied to the inductively coupled passive RFID system working at a frequency of 13.56MHz in order to process the detection of logical faults more fast and the system had been verified experimentally. In comparison with previous works, the proposed RFID system using the parallel CRC technique has been shown to reduce the latency and increase the data processing rates in the results. Therefore, it seems reasonable to conclude that the parallel CRC realization in the RFID system offers a means of maintaining the integrity of data in the high speed RFID system.

  • PDF