• Title/Summary/Keyword: Integrity Protection

Search Result 260, Processing Time 0.027 seconds

Development of B-Value Based GBAS Ground Facility Error Standard Deviation Model and Verification (B-Value를 이용한 GBAS 지상국 오차 표준편차 모델 개발 및 성능 평가)

  • Jun, Hyang-Sig;Ahn, Jong-Sun;Lee, Young-Jae;Choi, Young-Kiu;Sung, Sang-Kyung;Yeom, Chan-Hong
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.37 no.12
    • /
    • pp.1232-1237
    • /
    • 2009
  • The ICAO and FAA are developing and verifying of GBAS for civil aircraft landing and take-off. The guarantee of aircraft integrity issue is the important part of GBAS. To guarantee integrity, the GBAS ground facility broadcasts various informations to aircraft. The informations are related to the estimated accuracy of each pseudorange correction and the estimated error terms, for example B-value and standard deviation of the ground facility error. These parameters are used to calculate position error (estimated value of the user). If estimated position errors don't satisfy requirements, aircraft use alternate navigation means. In this paper, GBAS reference stations's real data, which operated by KARI (Korea Aerospace Research Institute) in Jeju international airport, are used to development of new ground facility error standard deviation model. We verify improvement of GBAS availability, with respected to vertical protection level, using B-value based a new ground facility error standard deviation model and a sigma inflation factor.

System Design for the Safe store and Issue Service Assurance of the E-Document (전자문서의 안전한 보관 및 발급 서비스 확보를 위한 시스템 설계)

  • Sung, Kyung-Sang;Kim, Jung-Jae;Oh, Hae-Seok
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.6
    • /
    • pp.173-180
    • /
    • 2008
  • Certified e-Document Authority keep it with protection legal as a system a guarantee and identifies originality of an e-Record, It presume to be authenticity e-Records and contents of an e-Record prove what was not changed. But, e-Records has high medium degree of dependence and loss danger of information has very high problems. In addition, Because correction(attachment and deletion) and a revision of information are easy, a problem for integrity and the originality of an e-Record is caused. Existing system show the following inefficient. For the originality guarantee, an existing e-Documents encryption method accomplishes a encrypted process of a whole document with a symmetric key, if the information revised midway, the whole documents content must accomplish re-scanning and re-encryption process again. To get over such inefficient, this paper maximize efficiency which occurred at the time of partial information revision request by encryption and managing using the link information based on the linkage characteristics of the each page on the registered requested e-Documents, It was able to increase security configuration by minimizing problems on an information exposure through increasing complicated of the key management.

  • PDF

A Fault Detection and Exclusion Algorithm using Particle Filters for non-Gaussian GNSS Measurement Noise

  • Yun, Young-Sun;Kim, Do-Yoon;Kee, Chang-Don
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • v.2
    • /
    • pp.255-260
    • /
    • 2006
  • Safety-critical navigation systems have to provide 'reliable' position solutions, i.e., they must detect and exclude measurement or system faults and estimate the uncertainty of the solution. To obtain more accurate and reliable navigation systems, various filtering methods have been employed to reduce measurement noise level, or integrate sensors, such as global navigation satellite system/inertial navigation system (GNSS/INS) integration. Recently, particle filters have attracted attention, because they can deal with nonlinear/non-Gaussian systems. In most GNSS applications, the GNSS measurement noise is assumed to follow a Gaussian distribution, but this is not true. Therefore, we have proposed a fault detection and exclusion method using particle filters assuming non-Gaussian measurement noise. The performance of our method was contrasted with that of conventional Kalman filter methods with an assumed Gaussian noise. Since the Kalman filters presume that measurement noise follows a Gaussian distribution, they used an overbounded standard deviation to represent the measurement noise distribution, and since the overbound standard deviations were too conservative compared to the actual distributions, this degraded the integrity-monitoring performance of the filters. A simulation was performed to show the improvement in performance of our proposed particle filter method by not using the sigma overbounding. The results show that our method could detect smaller measurement biases and reduced the protection level by 30% versus the Kalman filter method based on an overbound sigma, which motivates us to use an actual noise model instead of the overbounding or improve the overbounding methods.

  • PDF

An IoT Information Security Model for Securing Bigdata Information for IoT Users (IoT 사용자의 빅데이터 정보를 안전하게 보호하기 위한 IoT 정보 보안 모델)

  • Jeong, Yoon-Su;Yoon, Deok-Byeong;Shin, Seung-Soo
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.11
    • /
    • pp.8-14
    • /
    • 2019
  • Due to the development of computer technology, IoT technology is being used in various fields of industry, economy, medical service and education. However, multimedia information processed through IoT equipment is still one of the major issues in the application sector. In this paper, a big data protection model for users of IoT based IoT is proposed to ensure integrity of users' multimedia information processed through IoT equipment. The proposed model aims to prevent users' illegal exploitation of big data information collected through IoT equipment without users' consent. The proposed model uses signatures and authentication information for IoT users in a hybrid cryptographic method. The proposed model feature ensuring integrity and confidentiality of users' big data collected through IoT equipment. In addition, the user's big data is not abused without the user's consent because the user's signature information is encrypted using a steganography-based cryptography-based encryption technique.

Efficient and Secure User Authentication and SDP Encryption Method in SIP (일회성 암호를 이용한 효율적이고 안전한 SIP 사용자 인증 및 SDP 암호화 기법)

  • Kim, Jung-Je;Chung, Man-Hyun;Cho, Jae-Ik;Shon, Tae-Shik;Moon, Jong-Sub
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.3
    • /
    • pp.463-472
    • /
    • 2012
  • This paper propose a security method that performs mutual authentication between the SIP UA and the server, check for integrity of the signaling channel and protection of SDP information for VoIP using a One-Time Password. To solve the vulnerability of existing HTTP Digest authentication scheme in SIP, Various SIP Authentication schemes have been proposed. But, these schemes can't meet security requirements of SIP or require expensive cryptographic operations. Proposed method uses OTP that only uses hash function and is updated each authentication. So Proposed method do not require expensive cryptographic operations but performs user authentication efficiently and safely than existing methods. In addition, Proposed method verifies the integrity of the SIP messages and performs SDP encryption/decryption through OTP that used for user authentication. So Proposed method can reduce communication overhead when applying S/MIME or TLS.

Securing Sensitive Data in Cloud Storage (클라우드 스토리지에서의 중요데이터 보호)

  • Lee, Shir-Ly;Lee, Hoon-Jae
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2011.04a
    • /
    • pp.871-874
    • /
    • 2011
  • The fast emerging of network technology and the high demand of computing resources have prompted many organizations to outsource their storage and computing needs. Cloud based storage services such as Microsoft's Azure and Amazon's S3 allow customers to store and retrieve any amount of data, at anytime from anywhere via internet. The scalable and dynamic of the cloud storage services help their customer to reduce IT administration and maintenance costs. No doubt, cloud based storage services brought a lot of benefits to its customer by significantly reducing cost through optimization increased operating and economic efficiencies. However without appropriate security and privacy solution in place, it could become major issues to the organization. As data get produced, transferred and stored at off premise and multi tenant cloud based storage, it becomes vulnerable to unauthorized disclosure and unauthorized modification. An attacker able to change or modify data while data inflight or when data is stored on disk, so it is very important to secure data during its entire life-cycle. The traditional cryptography primitives for the purpose of data security protection cannot be directly adopted due to user's lose control of data under off premises cloud server. Secondly cloud based storage is not just a third party data warehouse, the data stored in cloud are frequently update by the users and lastly cloud computing is running in a simultaneous, cooperated and distributed manner. In our proposed mechanism we protect the integrity, authentication and confidentiality of cloud based data with the encrypt- then-upload concept. We modified and applied proxy re-encryption protocol in our proposed scheme. The whole process does not reveal the clear data to any third party including the cloud provider at any stage, this helps to make sure only the authorized user who own corresponding token able to access the data as well as preventing data from being shared without any permission from data owner. Besides, preventing the cloud storage providers from unauthorized access and making illegal authorization to access the data, our scheme also protect the data integrity by using hash function.

Analysis of Sigma Inflation Factor with Respect to Elevation Angle for GBAS Availability Improvement (위성 앙각별 시그마 팽창계수 분석을 통한 GBAS 가용성 향상)

  • Park, Jong-Geun;Ahn, Jongsun;Jun, Hyang-Sig;Yeom, Chan-Hong;Sung, Sangkyung;Lee, Young Jae
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.42 no.5
    • /
    • pp.368-375
    • /
    • 2014
  • The Ground Based Augmentation System (GBAS) is influenced by environmental factors, making analysis in the installation region important. This study has proposed the sigma inflation of the B-value considering the satellite elevation angle and analyzed the Vertical Protection Level (VPL) of the H1 hypothesis. After collecting data that meet the environmental conditions of the installation region, sigma expansion coefficients by the unit of satellite elevation angle ($5^{\circ}$) have been estimated. The obtained results were functionalized through curve-fitting, and sigma inflation customized for the environmental conditions of the test region was proposed. Then, the characteristics were classified and analyzed depending on humidity and solar activities. According to the sigma inflation with respect to elevation angle analysis, changes in the size of sigma inflation factors by the difference of humidity were minor. However, the VPL under the satellite elevation angle-based sigma inflation met integrity. Also, considering the sigma inflation factor with respect to elevation angle, compared to existing methods, high-integrity and improved availability is confirmed by removing unnecessary margins in high elevation angle satellite.

A Study on Legal Regulation of Neural Data and Neuro-rights (뇌신경 데이터의 법적 규율과 뇌신경권에 관한 소고)

  • Yang, Ji Hyun
    • The Korean Society of Law and Medicine
    • /
    • v.21 no.3
    • /
    • pp.145-178
    • /
    • 2020
  • This paper examines discussions surrounding cognitive liberty, neuro-privacy, and mental integrity from the perspective of Neuro-rights. The right to control one's neurological data entails self-determination of collection and usage of one's data, and the right to object to any way such data may be employed to negatively impact oneself. As innovations in neurotechnologies bear benefits and downsides, a novel concept of the neuro-rights has been suggested to protect individual liberty and rights. In Oct. 2020, the Chilean Senate presented the 'Proyecto de ley sobre neuroderechos' to promote the recognition and protection of neuro-rights. This new bill defines all data obtained from the brain as neuronal data and outlaws the commerce of this data. Neurotechnology, especially when paired with big data and artificial intelligence, has the potential to turn one's neurological state into data. The possibility of inferring one's intent, preferences, personality, memory, emotions, and so on, poses harm to individual liberty and rights. However, the collection and use of neural data may outpace legislative innovation in the near future. Legal protection of neural data and the rights of its subject must be established in a comprehensive way, to adapt to the evolving data economy and technical environment.

A Query Result Integrity Assurance Scheme Using an Order-preserving Encryption Scheme in the Database Outsourcing Environment (데이터베이스 아웃소싱 환경에서 순서 보존 암호화 기법을 이용한 질의 결과 무결성 검증 기법)

  • Jang, Miyoung;Chang, Jae Woo
    • Journal of KIISE
    • /
    • v.42 no.1
    • /
    • pp.97-106
    • /
    • 2015
  • Recently, research on database encryption for data protection and query result authentication methods has been performed more actively in the database outsourcing environment. Existing database encryption schemes are vulnerable to order matching and counting attack of intruders who have background knowledge of the original database domain. Existing query result integrity auditing methods suffer from the transmission overhead of verification object. To resolve these problems, we propose a group-order preserving encryption index and a query result authentication method based on the encryption index. Our group-order preserving encryption index groups the original data for data encryption and support query processing without data decryption. We generate group ids by using the Hilbert-curve so that we can protect the group information while processing a query. Finally, our periodic function based data grouping and query result authentication scheme can reduce the data size of the query result verification. Through performance evaluation, we show that our method achieves better performance than an existing bucket-based verification scheme, it is 1.6 times faster in terms of query processing time and produces verification data that is 20 times smaller.

A Study of Authors' Moral Rights Infringements Regarding Cinematographic Works and Other Visual Works (음악·영상저작물의 동일성유지권 침해관련 연구)

  • Kang, Sang-Gu
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.6
    • /
    • pp.228-236
    • /
    • 2021
  • This research investigates the causes of infringements related to authors' moral rights which has most conflict among moral rights of authorship, through analysis of judicial precedents and compare whether there subsists any differences in viewpoints between judicial precedent trend and those on behind the scene of broadcast production. Copyright is divided into intellectual property and moral rights of authorship. Right to the integrity of the work is part of moral rights of authorship and produce one content and used in various media. When the edit is needed to fit the organization and advertisement time, advanced consultation from the rightful owner or written consent is needed. However, under the time pressure or ignorance of copyright, the arbitrary edits are made and content is used. This infringes the right of the integrity of the work. When we produce and use cinematographic works and other audiovisual works, there are considerable variablilies stemming from authorship, production cost and program staff. Therefore, prior conscent is needed to acquire and use the copyright in a proper manner. However, due to production-oriented environment and low understanding of the copyright protection, we usually depend on the users' work practices rhather than insufficiency of copyright laws in dealing with the infringement of right to the industry. In conclusion, we need to provide meticulous work manual and to focus on systematic eduction of professional copyright manpower.