• Title/Summary/Keyword: Key-Recovery

Search Result 442, Processing Time 0.027 seconds

CTaG: An Innovative Approach for Optimizing Recovery Time in Cloud Environment

  • Hung, Pham Phuoc;Aazam, Mohammad;Huh, Eui-Nam
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.4
    • /
    • pp.1282-1301
    • /
    • 2015
  • Traditional infrastructure has been superseded by cloud computing, due to its cost-effective and ubiquitous computing model. Cloud computing not only brings multitude of opportunities, but it also bears some challenges. One of the key challenges it faces is recovery of computing nodes, when an Information Technology (IT) failure occurs. Since cloud computing mainly depends upon its nodes, physical servers, that makes it very crucial to recover a failed node in time and seamlessly, so that the customer gets an expected level of service. Work has already been done in this regard, but it has still proved to be trivial. In this study, we present a Cost-Time aware Genetic scheduling algorithm, referred to as CTaG, not only to globally optimize the performance of the cloud system, but also perform recovery of failed nodes efficiently. While modeling our work, we have particularly taken into account the factors of network bandwidth and customer's monetary cost. We have implemented our algorithm and justify it through extensive simulations and comparison with similar existing studies. The results show performance gain of our work over the others, in some particular scenarios.

Numerical Analysis on Energy Reduction of an Exhaust-Air-Heat-Recovery Type Air Washer System for Semiconductor Manufacturing Clean Rooms (반도체 클린룸용 배기 열회수식 에어와셔 시스템의 에너지절감에 관한 수치해석)

  • Song, Gen-Soo;Kim, Hyung-Tae;Yoo, Kyung-Hoon;Son, Seung-Woo;Shin, Dae-Kun;Kim, Young-Il
    • Korean Journal of Air-Conditioning and Refrigeration Engineering
    • /
    • v.22 no.10
    • /
    • pp.697-703
    • /
    • 2010
  • In recent semiconductor manufacturing clean rooms, air washers are used to remove airborne gaseous contaminants from the outdoor air introduced into a clean room. Meanwhile, there is a large amount of exhaust air from a clean room. From an energy conservation point of view, heat recovery is useful for reducing the outdoor air conditioning load required to maintain a clean room. Therefore it is desirable to recover heat from the exhaust air and use it to cool or heat the outdoor air. In the present study, numerical analysis was conducted to evaluate the recovered heat of an exhaust air heat recovery type air washer system, which is the key part of an energy saving outdoor air conditioning system for semiconductor clean rooms. The present numerical results showed relatively good agreement with the available experimental data.

Recovery of ammonia from wastewater by liquid-liquid membrane contactor: A review

  • Jang, Yoonmi;Lee, Wooram;Park, Jaebeom;Choi, Yongju
    • Membrane and Water Treatment
    • /
    • v.13 no.3
    • /
    • pp.147-166
    • /
    • 2022
  • Liquid-liquid membrane contactor (LLMC), a device that exchanges dissolved gas molecules between the two sides of a hydrophobic membrane through membrane pores, can be employed to extract ammoniacal nitrogen from a feed solution, which is transported across the membrane and accumulated in a stripping solution. This LLMC process offers the promise of improving the sustainability of the global nitrogen cycle by cost-effectively recovering ammonia from wastewater. Despite recent technological advances in LLMC processes, a comprehensive review of their feasibility for ammonia recovery is rarely found in the literature. Our paper aims to close this knowledge gap, and in addition to analyze the challenges and provide potential solutions for improvement. We begin with discussions on the operational principles of the LLMC process for ammonia recovery and membrane types and membrane configurations commonly used in the process. We then assess the performance of the process by reviewing publications that demonstrate its practical application. Challenges involved in the implementation of the LLMC process, such as membrane fouling, membrane wetting, and chemical requirements, are presented, along with discussions on potential strategies to address each. These strategies, including membrane modification, hybrid process design, and process optimization based on cost-benefit analysis, guide the reader to identify key areas of future research and development.

The Recovery of the Deleted Certificate and the Detection of the Private-Key Encryption Password (삭제된 공인인증서의 복구 및 개인키 암호화 패스워드의 검출)

  • Choi, Youn-Sung;Lee, Young-Gyo;Lee, Yun-Ho;Park, Sang-Joon;Yang, Hyung-Kyu;Kim, Seung-Joo;Won, Dong-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.1
    • /
    • pp.41-55
    • /
    • 2007
  • The certificate is used to confirm and prove the user's identity in online finance and stocks business. A user's public key is stored in the certificate(for e.g., SignCert.der) and the private key, corresponding to public key, is stored in the private key file(for e.g., SignPri.key) after encryption using the password that he/she created for security. In this paper, we show that the certificate, deleted by the commercial certificate software, can be recovered without limitation using the commercial forensic tools. In addition, we explain the problem that the private key encryption password can be detected using the SignCert.der and the SignPri.key in off-line and propose the countermeasure about the problem.

An Authentication and Key Management Protocol for Secure Data Exchange in EPON MAC Layer (EPON MAC 계층의 안전한 데이터 전송을 위한 인증 및 키관리 프로토콜)

  • Kang, In-kon;Lee, Do-Hoon;Lee, Bong-Ju;Kim, Young-Chon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.1B
    • /
    • pp.1-10
    • /
    • 2003
  • An EPON which is going on standardization in IEEE 802.3ah, is tree topology consists of a OLT and multiple ONU using passive optical components, so this network is susceptible to variable security threats - eavesdropping, masquerading, denial of service and so on. In this paper, we design a security protocol supporting authentication and confidentiality services in MAC layer in order to prevent these security threats and to guarantee secure data exchange The designed security protocol introduce public-key based authentication and key management protocols for efficient key management, and choose Rijndael algorithm, which is recent standard of AES, to provide the confidentiality of EPON Proposed authentication and key management protocols perform authentication and public-key exchange at a time, and are secure protocols using derived common cipher key by exchanging public random number To implement the designed security protocol, we propose the procedures of authentication and public-key exchange, session key update, key recovery. This proposed protocol is verified using unknown session key, forward secrecy, unknown key-share, key-compromise impersonation.

The Analysis of Cipher Padding Problem for Message Recovery Security Function of Honey Encryption (허니암호의 메시지 복구보안 기능을 위한 암호패딩 문제점 분석)

  • Ji, Changhwan;Yoon, Jiwon
    • Journal of KIISE
    • /
    • v.44 no.6
    • /
    • pp.637-642
    • /
    • 2017
  • Honey Encryption (HE) is a technique to overcome the weakness of a brute-force attack of the existing password-based encryption (PBE). By outputting a plausible plaintext even if the wrong key is entered, it provides message recovery security which an attacker can tolerate even if the attacker tries a brute-force attack against a small entropy secret key. However, application of a cipher that requires encryption padding to the HE present a bigger problem than the conventional PBE method. In this paper, we apply a typical block cipher (AES-128) and a stream cipher (A5 / 1) to verify the problem of padding through the analysis of the sentence frequency and we propose a safe operation method of the HE.

Concentration of 6-Amonopenicillanic Acid from Penicillin Bioconversion Solution and Its Mother Liquor by Nanofiltration Membrane

  • Xuejun Cao;Wu, Xing-Yan;Tong Wu;Keming Jin;Hur, Byung-Ki
    • Biotechnology and Bioprocess Engineering:BBE
    • /
    • v.6 no.3
    • /
    • pp.200-204
    • /
    • 2001
  • In this study, nanofiltration was applied to the concentration of the 6-aminopenicillinic acid (6-APA) from bioconverted penicillin solution and also to its mother liquor. The 6-APA in the solution was concentrated from 0.211 mol/L to 0.746 mol/L by nanofiltration. The final maximum concentration was 3.6 times higher than the initial concentration an the recovery yield was 97% to 99% of the original 6-APA. The concentrated solution was crystallized with the yields of 88.9-90.2% and the purity of the crystallized product was about 98%. The concentration of 6-APA in the mother liquor after crystallization was 0.014 mol/L and thus was concentrated 20-30 fold by nanofiltration and crystallization. The recovery of 6-APA was over 98%. The salts contained in the mother liquor, such as NH$_4$Cl and KCl, could be removed by allowing them to permeate through the membrane.

  • PDF

TT&C security algorithm of satellite based on CBC-MAC (CBC-MAC 기반의 위성 관제 신호 보호 알고리즘)

  • 곽원숙;조정훈;홍진근;박종욱;김성조;윤장홍;이상학;황찬식
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.27 no.6B
    • /
    • pp.616-624
    • /
    • 2002
  • In satellite communication, which use the satellite, the protection of TT&C channel which controls the position, performance, and operation is required. In this thesis, we analyzed the weakness of authentication algorithm which is used for protection of TT&C generation and operation. Also, we proposed the authentication algorithm which complements key recovery attack structurely without increasing additional computational amount and verified its performance. The proposed authentication algorithm can satisfy Rivest's recommendation by increasing the computational complexity from $2^{55}$ operations to $2^{111}$ operations. In addition, it can be applied to the existing satellite system because the length of TT&C data and message authentication codes used for the input of authentication algorithm are unchanged.

Did Fiscal Stimulus Lift Developing Asia Out of the Global Crisis? An Empirical Investigation

  • Hur, Seok-Kyun;Park, Donghyun
    • East Asian Economic Review
    • /
    • v.22 no.1
    • /
    • pp.55-73
    • /
    • 2018
  • The substantial slowdown of economic growth since the global financial crisis of 2008-2009 is rekindling debate on whether developing Asia should use fiscal expansion to boost aggregate demand. A key factor in the debate is the effectiveness of countercyclical fiscal policy in the region. The global crisis, as well as the fiscal stimulus packages implemented by developing Asian countries at that time, give some clues to this important issue. The region weathered the global crisis well and experienced a robust V-shaped recovery. According to conventional wisdom, the fiscal stimulus packages put in place by Asian governments played a key role in the region's recovery. The central objective of this paper is to empirically test this wisdom by using cross-country panel data. Our main finding is that the stimulus has had a limited but positive impact on developing Asia's output during the global crisis. This lends some support to the notion that countercyclical fiscal policy can help the region cope with severe external shocks. The broader, more fundamental implication for regional policymakers is that the region's long-standing commitment to fiscal discipline can yield significant benefits beyond macroeconomic stability. An important consequence of this commitment - relatively healthy fiscal balance sheets - enabled the region's governments to quickly and decisively embark upon fiscal stimulus programs.

A Study on National Control Policy for the Use of Encryption Technologies by an Accused Person (피의자 개인의 암호이용 통제정책에 대한 연구)

  • Baek, Seung-Jo;Lim, Jong-In
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.6
    • /
    • pp.271-288
    • /
    • 2010
  • In this paper, we study the dysfunctions of cryptography as dual-use goods and national domestic encryption control policies like key recovery system and decryption order. And we examine risks of the breach of the peoples' constitutional rights like the right to privacy in these policies and analyze these policies by applying the principle of the ban on the over-restriction. Finally, we propose the direction and requirements of our national domestic encryption control policy that maintains the balance of peoples' constitutional rights and investigatory powers.