• Title/Summary/Keyword: Integrity Protection

Search Result 255, Processing Time 0.025 seconds

SIS Design for Fuel Gas Supply System of Dual Fuel Engine based on Safety Integrity Level(SIL) (이중연료엔진의 연료가스공급시스템에 대한 안전무결도 기반 안전계장시스템 설계)

  • Kang, Nak-Won;Park, Jae-Hong;Choung, Choung-Ho;Na, Seong
    • Journal of the Society of Naval Architects of Korea
    • /
    • v.49 no.6
    • /
    • pp.447-460
    • /
    • 2012
  • In this study, the shutdown system of the fuel gas supply system is designed based on the Safety Integrity Level of IEC 61508 and IEC 61511. First of all, the individual risk($10^{-4}$/year) and the risk matrix which are the risk acceptance criteria are set up for the qualitative risk assessment such as the HAZOP study. The natural gas leakage at the gas supply pipe is identified as the highest risk among the hazards identified through the HAZOP study and as a safety instrumented function the shutdown function for leakage was defined. SIL 2 and PFD($2.5{\cdot}10^{-3}$) for the shutdown function are determined by the layer of protection analysis(LOPA). The shutdown system(SIS) carrying out the shutdown function(SIF) is verified and designed according to qualitative and quantitative requirements of IEC 61508 and IEC 61511. As a result of SIL verification and SIS conceptual design, the shutdown system is composed of two gas detectors voted 1oo2, one programmable logic solver, and two shutdown valve voted 1oo2.

Using Staganography method for Protection of Caption Information in the Motion Picture (스테가노그래피 기법을 이용한 동영상 자막정보의 저작권 보호)

  • Ham, Jun-Sick;Ryou, Hwang-Bin;Hong, Seong-Sik
    • The KIPS Transactions:PartC
    • /
    • v.10C no.7
    • /
    • pp.835-842
    • /
    • 2003
  • The technical advancement in and the widespread expansion of use of the internet has recently led to an increase in high bandwidth multimedia data usage. This is largely due to an unfettered access to the internet. The intrinsic merit of the internet, however, brings about a side effect:multimedia date can easily be duplicated recklessly. This invokes the problem of intellectual property right violation. Focusing on this matter, multi-faceted studies are being conducted now. This paper aims to provide, by applying steganography and encryption methods into the SMIL files which supply subtitle data, the intellectual property protection of both motion picture and its subtitle data, as well as the integrity of the contents in question. In order to achieve the above goal, the authors show a particular method how to safely embed subtitle data into the given frames, after they separate subtitle data to encrypt them. By doing this, the authors suggests, the intellectual property right to the subtitle data as well as their integrity can be protected and achieved respectively. Besides, an integrity service for motion picture can be made.

The Personal Data Protection Mechanism in the European Union

  • Syroid, Tetiana L.;Kaganovska, Tetiana Y.;Shamraieva, Valentyna M.;Perederiі, Оlexander S.;Titov, Ievgen B.;Varunts, Larysa D.
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.5
    • /
    • pp.113-120
    • /
    • 2021
  • The adoption of the General Data Protection Regulation (EU) 2016/679 transformed approaches and concepts to the implementation of the personal data protection mechanism in the European Union. Within the EU, almost all countries have adapted a new protection mechanism, which requires a study of the specifics of its use. The article intends to assess the legal provisions of the current mechanism of personal data protection in the EU. The author studied the mechanism of personal data protection under the General Data Protection Regulation (EU) 2016/679 (GDPR) based on the concept of contextual integrity and analysis of EU legislation on personal data protection. The scientific publications for 2016-2020 were reviewed for the formation of ideas of a new personal data protection mechanism in the EU, informative and transparent analysis of legal provisions. The article notes that the personal data privacy and protection is increasing, there is an ongoing unification of the legal status of personal data protection and the formation of a digital market for dissemination, exchange, control, and supervision of data. Cross-border cooperation is part of the personal data protection mechanism. The author proved that the GDPR has changed approach to personal data protection: the emphasis is now shifting to the formation of a digital market, where the EU's role in ensuring regulation is crucial. The article identifies the emergence of a new protectionist legal system and strengthening of legal provisions regarding privacy. This legal system needs unification and harmonization in accordance with national legislation, is territorially fragmented and differentiated within the EU.

A Scalable Data Integrity Mechanism Based on Provable Data Possession and JARs

  • Zafar, Faheem;Khan, Abid;Ahmed, Mansoor;Khan, Majid Iqbal;Jabeen, Farhana;Hamid, Zara;Ahmed, Naveed;Bashir, Faisal
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.6
    • /
    • pp.2851-2873
    • /
    • 2016
  • Cloud storage as a service provides high scalability and availability as per need of user, without large investment on infrastructure. However, data security risks, such as confidentiality, privacy, and integrity of the outsourced data are associated with the cloud-computing model. Over the year's techniques such as, remote data checking (RDC), data integrity protection (DIP), provable data possession (PDP), proof of storage (POS), and proof of retrievability (POR) have been devised to frequently and securely check the integrity of outsourced data. In this paper, we improve the efficiency of PDP scheme, in terms of computation, storage, and communication cost for large data archives. By utilizing the capabilities of JAR and ZIP technology, the cost of searching the metadata in proof generation process is reduced from O(n) to O(1). Moreover, due to direct access to metadata, disk I/O cost is reduced and resulting in 50 to 60 time faster proof generation for large datasets. Furthermore, our proposed scheme achieved 50% reduction in storage size of data and respective metadata that result in providing storage and communication efficiency.

Secure Boot + Measured Boot: Guaranteeing the Integrity of the Linux Booting Process (보안부팅+측정부팅: 리눅스 부팅 과정의 무결성 보장)

  • Lee, Yunjae;Yoo, Seehwan
    • KIISE Transactions on Computing Practices
    • /
    • v.23 no.8
    • /
    • pp.504-509
    • /
    • 2017
  • Preserving the integrity of the booting process is important. Recent rootkit attacks and subverting OS attacks prove that any post-OS security mechanism can be easily circumvented if the booting process is not properly controlled. Using an actual case as an example, the hacker of the Se-jong government office simply bypassed the user's password authentication by compromising the normal booting process. This paper analyzes existing pre-OS protection using secure boot and measured boot, and proposes another bootloader that overcomes the limitations. The proposed bootloader not only guarantees the integrity of all the pre-OS binaries, bootloaders, and kernel, it also makes explicit records of integrity in the booting process to the external TPM device, so that we can track modifications of BIOS configurations or unintended booting process modifications.

A Spatial Transformation Scheme Supporting Data Privacy and Query Integrity for Outsourced Databases (아웃소싱 데이터베이스에서 데이터 프라이버시 및 질의 무결성을 지원하는 공간 변환 기법)

  • Kim, Hyeong-Il;Song, Young-Ho;Chang, Jaewoo
    • Journal of KIISE
    • /
    • v.42 no.5
    • /
    • pp.652-663
    • /
    • 2015
  • Due to the popularity of location-based services, the amount of generated spatial data in daily life has been dramatically increasing. Therefore, spatial database outsourcing has become popular for data owners to reduce the spatial database management cost. The most important consideration in database outsourcing is meeting the privacy requirements and guarantying the integrity of the query result. However, most of existing database transformation techniques do not support both of the data privacy and integrity of the query result. To solve this problem, we propose a spatial data transformation scheme that utilizes the shearing transformation with rotation shifting. In addition, we described the attack models to measure the data privacy of database transformation schemes. Finally, we demonstrated through the experimental evaluations that our scheme provides high level of data protection against different kinds of attack models, compared to the existing schemes, while guaranteeing the integrity of the query result sets.

Parametric Study of Offshore Pipeline Wall Thickness by DNV-OS-F101, 2010

  • Choi, Han-Suk;Yu, Su-Young;Kang, Dae-Hoon;Kang, Hyo-Dong
    • Journal of Ocean Engineering and Technology
    • /
    • v.26 no.2
    • /
    • pp.1-7
    • /
    • 2012
  • DNV-OS-F101 includes the concept development, design, construction, operation,and abandonment of offshore pipeline systems. The main objective of this offshore standard (OS) is to ensure that pipeline systems are safe during the installation and operational period. The pipeline design philosophy also includes public safety and environmental protection. The mechanical wall thickness design of a pipeline shall follow the design objectives and safety philosophy. This new design code includes a very sophisticated design procedure to ensure a safe pipeline, public safety, and environmental protection. This paper presents the results of a parametric study for the wall thickness design of offshore pipelines. A design matrix was developed to cover the many design factors of pipeline integrity, public safety, and environmental protection. Sensitivity analyses of the various parameters were carried out to identify the impacts on offshore pipeline design.

An Efficient Selective Encryption of Fingerprint Images for Embedded Processors

  • Moon, Dae-Sung;Chung, Yong-Wha;Pan, Sung-Bum;Moon, Ki-Young;Chung, Kyo-Il
    • ETRI Journal
    • /
    • v.28 no.4
    • /
    • pp.444-452
    • /
    • 2006
  • Biometric-based authentication can provide a strong security guarantee of the identity of users. However, the security of biometric data is particularly important as any compromise of the biometric data will be permanent. In this paper, we propose a secure and efficient protocol to transmit fingerprint images from a fingerprint sensor to a client by exploiting the characteristics of the fingerprint images. Because the fingerprint sensor is computationally limited, a standard encryption algorithm may not be applied to the full fingerprint images in real-time to guarantee the integrity and confidentiality of the fingerprint images transmitted. To reduce the computational workload on the resource-constrained sensor, we apply the encryption algorithm to a nonce for integrity and to a specific bitplane of each pixel of the fingerprint image for confidentiality. Experimental results show that the integrity and confidentiality of the fingerprint images can be guaranteed without any leakage of the fingerprint ridge information and can be completed in real-time on embedded processors.

  • PDF

A Study on the Achievement of Required Safety Integrity Level to Reduce Risk for SMR On-Site Hydrogen Refueling Stations (개질형 On-Site 수소충전소의 리스크 감소를 위해 요구되는 SIL 등급 달성 방안에 관한 연구)

  • Lee, Jin Ho;Lim, Jae-Yong
    • Journal of the Korean Society of Safety
    • /
    • v.35 no.6
    • /
    • pp.1-8
    • /
    • 2020
  • In recent years, hydrogen has received much attention as an alternative energy source to fossil fuels. In order to ensure safety from the increasing number of hydrogen refueling stations, prevention methods have been required. In this regard, this study suggested an approach to reduce the risk of hydrogen refueling station by increasing Safety Integrity Level (SIL) for a Steam Methane Reformer (SMR) in On-Site Hydrogen Refueling Station. The worst scenario in the SMR was selected by HAZOP and the required SIL for the worst scenario was identified by LOPA. To verify the required SIL, the PFDavg.(1/RRF) of Safety Instrumented System (SIS) in SMR was calculated by using realistic failure rate data of SIS. Next, several conditions were tested by varying the sensor redundancy and proof test interval reduction and their effects on risk reduction factor were investigated. Consequently, an improved condition, which were the redundancy of two-out-of-three and the proof test interval of twelve months, achieved the tolerable risk resulting in the magnitude of risk reduction factor ten times greater than that of the baseline condition.

Electrical fire simulation in control room of an AGN reactor

  • Jyung, Jae-Min;Chang, Yoon-Suk
    • Nuclear Engineering and Technology
    • /
    • v.53 no.2
    • /
    • pp.466-473
    • /
    • 2021
  • Fire protection is one of important issues to ensure safety and reduce risks of nuclear power plants (NPPs). While robust programs to shut down commercial reactors in any fires have been successfully maintained, the concept and associated regulatory requirements are constantly changing or strengthening by lessons learned from operating experiences and information all over the world. As part of this context, it is necessary not only to establish specific fire hazard assessment methods reflecting the characteristics of research reactors and educational reactors but also to make decisions based on advancement encompassing numerical analyses and experiments. The objectives of this study are to address fire simulation in the control room of an educational reactor and to discuss integrity of digital console in charge of main operation as well as analysis results through comparison. Three electrical fire scenarios were postulated and twenty-four thermal analyses were carried out taking into account two turbulence models, two cable materials and two ventilation conditions. Twelve supplementary thermal analyses and six subsequent structural analyses were also conducted for further examination on the temperature and heat flux of cable and von Mises stress of digital console, respectively. As consequences, effects of each parameter were quantified in detail and future applicability was briefly discussed. On the whole, higher profiles were obtained when Deardorff turbulence model was employed or polyvinyl chloride material and larger ventilation condition were considered. All the maximum values considered in this study met the allowable criteria so that safety action seems available by sustained integrity of the cable linked to digital console within operators' reaction time of 300 s.