• Title/Summary/Keyword: Leakage management

Search Result 662, Processing Time 0.025 seconds

ID-based group key exchange mechanism for virtual group with microservice

  • Kim, Hyun-Jin;Park, Pyung-Koo;Ryou, Jae-Cheol
    • ETRI Journal
    • /
    • v.43 no.5
    • /
    • pp.932-940
    • /
    • 2021
  • Currently, research on network functions virtualization focuses on using microservices in cloud environments. Previous studies primarily focused on communication between nodes in physical infrastructure. Until now, there is no sufficient research on group key management in virtual environments. The service is composed of microservices that change dynamically according to the virtual service. There are dependencies for microservices on changing the group membership of the service. There is also a high possibility that various security threats, such as data leakage, communication surveillance, and privacy exposure, may occur in interactive communication with microservices. In this study, we propose an ID-based group key exchange (idGKE) mechanism between microservices as one group. idGKE defines the microservices' schemes: group key gen, join group, leave group, and multiple group join. We experiment in a real environment to evaluate the performance of the proposed mechanism. The proposed mechanism ensures an essential requirement for group key management such as secrecy, sustainability, and performance, improving virtual environment security.

Blockchain-based DID Problem Analysis Research (블록체인 기반의 DID 문제점 분석 연구)

  • Lee, Kwangkyu
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.18 no.3
    • /
    • pp.25-32
    • /
    • 2022
  • DID(Decentralized Identity Identification) is a system in which users voluntarily manage their identity, etc., and control the scope and subject of submission of identity information based on a block chain. In the era of the 4th industrial revolution, where the importance of protecting personal information is increasing day by day, DID will surely be positioned as the industrial center of the Internet and e-business. However, when managing personal information, DID is highly likely to cause a large amount of personal information leakage due to electronic infringement, such as hacking and invasion of privacy caused by the concentration of user's identity information on global service users. Therefore, there are a number of challenges to be solved before DID settles into a stable standardization. Therefore, in this paper, we try to examine what problems exist in order to positively apply the development of DID technology, and analyze the improvement plan to become a stable service in the future.

Decomposition of Thickener in Grease by Water Contamination (수분오염에 따른 그리스 내 증주제 분해 연구)

  • Lim, Young-Kwan;Ham, Song-Yee;Lee, Joung-Min;Jeong, Choong-Sub
    • Tribology and Lubricants
    • /
    • v.28 no.1
    • /
    • pp.33-37
    • /
    • 2012
  • Automotive wheel bearing grease helps to reduce stresses and prevent wear of wheel bearings. But it is easily contaminated by water and other contaminants. Previously, our research group reported the change of grease physical properties such as dropping point, work penetration and oxidation work stability, water washout characteristics, leakage tendency, oil separation, evaporation loss and rust protection by water contamination. In this paper, we analyzed the physical characteristics of grease such as lubricity, viscosity and total acid number to investigate the mechanism of thickener decomposition. In water contaminated grease, the total acid number and wear scar were increased, the viscosity was decreased due to the decomposition of lithium complex thickener.

A Study on Decision Making Process of System Access Management (시스템 접근관리에 대한 의사결정 프로세스 연구)

  • Cho, Young-Seok;Im, Jong-In;Lee, Kyung-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.1
    • /
    • pp.225-235
    • /
    • 2015
  • Recently, the administration and supervision of Information Security Certification and Security Inspection has been enforced but information leakage and security accidents by insiders are increasing consistently. The security accidents by insiders ran to 21% in 2010, by the 2011 Cyber Security Watch Survey. The problem is that immediate recognition is difficult and stopgap measure is mostly adopted without company's external notice apprehensive for cost increase or credit drop in case of internal security accidents. In the paper, we conducted the regression study on security access management then proposed the standard process available for other systems and businesses sites. It can be very useful for many companies to investigate, analyze and improve the problem of security management conveniently.

Empirical Validation of Personal Information Violation Risks with Use Intention : Focusing on Domestic Smart Banking Services (개인정보 침해위험이 이용의도에 미치는 영향에 대한 연구 - 국내은행의 스마트뱅킹 서비스 중심으로)

  • Kim, Jeongwook;Jeon, Youngchan
    • Journal of Korean Society for Quality Management
    • /
    • v.45 no.3
    • /
    • pp.583-594
    • /
    • 2017
  • Purpose: The purpose of this study is how personal information protection risks affect the intention to use domestic smart banking services. VAM(Value based Adoption Model) model is validated as a theoretical background, selecting ease of use, usefulness and perceived security as a benefit factor, and considers perceived cost, technical complexity, and risk of personal information leakage as a sacrifice factor. Methods: The method of this study used questionnaire survey to collect 365 data on suer's perception on smart banking services, and also performed a structural equation modeling method using by AMOS 23. Results: The result of this paper shows that all hypothesis are accepted statistically significant except 1 hypothesis. Conclusion: This research is concluded that perceived value is affected on statistically positive impact on ease of use, usefulness and perceived security, and negative impact on perceived cost and risk of personal information violation, not statistically technical complexity.

Proposed measure for Smart Grid's Personal Information Security Issue (스마트 그리드 개인정보 보안이슈 방안 제시)

  • Choi, Heesik;Cho, Yanghyun
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.12 no.4
    • /
    • pp.41-49
    • /
    • 2016
  • Smart Grid is a next generation of new power growth electrical grid which provide high quality of electrical service by using Information Technologies to increase intelligence and performance. By using Smart Grid system, it can support energy management such as increase quality of electrical power, decrease energy and decrease emissions. However, Smart Grid uses information of energy consumption and when Smart Grid collects information, it will create private information. In this thesis, it will address issues of security private information which caused by Smart Grid for administrative measure and efficiency of Smart Grid in domestic. Also, cryptographic module algorithm, latest security solutions and strong wireless security policy for network environment such as wireless communication Iinternet are require for Smart Grid perform successfully and protect national power network equipment from cyber-attack and can stop leakage of user's personal information. Finally, it is urgent to prepare protection measures of National industrial facilities and power grid which can prepare for a cyber terrorism and penetration attacks and build emergency countermeasure management team for Smart Grid are require for safe Smart Grid environment.

Improvements of Information Security Level in Electronic Financial Infrastructure(By Analyzing Information Security Management Level) (전자금융기반시설 정보보호 수준강화 방안 (정보보호 관리수준 분석을 통한))

  • Park, Keun-dug;Youm, Heung-youl
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.6
    • /
    • pp.1605-1618
    • /
    • 2016
  • In recent years, security incidents - such as personal information leakage, homepage hacking, DDoS and etc. - targeting finance companies(banks, securities companies, credit card companies, insurance companies and etc.) have increased steadily. In this paper, we analyze problems of information security management level in the existing electronic financial infrastructure from perspective of compliance and information security certification system and propose improvements to enable sustainable high level of information security activities under a comprehensive management system for the financial sector characteristics using ISMS, SECU-STAR and CNIVAM system.

Current status of Jeju special self-governing province's water infrastructure and direction for improvement (제주특별자치도 물인프라 현황 및 개선방향)

  • Kim, Jinkeun
    • Journal of Korean Society of Water and Wastewater
    • /
    • v.35 no.6
    • /
    • pp.497-505
    • /
    • 2021
  • This paper investigates the current status of Jeju special self-governing province (JSSGP)'s water infrastructure and recommends directions for improvement. JSSGP relies on groundwater for most of its water resources. Recently, water usage has been steadily increasing due to the increase of residents and tourists while the quality of groundwater has been steadily worsening. Deterioration in water quality of groundwater can be seen through the increase in concentration of nitrate nitrogen and microorganisms. To overcome such problems, water consumption must be reduced by water demand management in all fields including residential and agricultural water use. The quality of water resources should be preserved through the management of pollutants. For efficient management of water resources, great efforts should be made to reduce the leakage rates in household and agricultural water, which is currently at the highest level in the country. Furthermore, diversification of water intake sources other than groundwater is needed, especially for agricultural water supply. For water and sewerage facilities, compliance with drinking water quality standards and discharge water quality standards must be achieved through the optimization of operation management. This process requires recruiting professionals, improving existing workers' expertise, and improving facilities.

Risk Assessment of Semiconductor PR Process based on Frequency Analysis of Flammable Material Leakage (반도체 PR 공정의 인화성 물질 누출 빈도분석을 통한 위험성 평가)

  • Park, Myeongnam;Chun, Kwang-Su;Yi, Jinseok;Shin, Dongil
    • Journal of the Korean Institute of Gas
    • /
    • v.25 no.5
    • /
    • pp.1-10
    • /
    • 2021
  • Semiconductor Photo Resist (PR) automation equipment uses a mixture of several flammable substances, and when it leaks during the process, it can lead to various accidents, therefore, risk assessment is necessary. This study analyzed the frequency of leakage of Acetone and PGMEA used in PR automation equipment and the frequency at which such leakage could lead to a fire accident through the frequency analysis method, and evaluated the need for additional risk reduction measures in the current facility. Based on the process leak data and ignition probability data of IOGP, leak frequency analysis and ignition probability were derived, and the frequency of actual fire accidents was analyzed by combining them. The frequency of material leakage in semiconductor PR process is 7.30E-03/year, and fire accidents can occur by acetone that exists above the flash point when the material is leaked, the frequency was calculated at the level of 1.24E-05/year. According to the UK HSE, for a major accident occurring with a frequency of 1.24E-05/year, it is defined as "Broadly Acceptable", a level that does not require additional measures for risk reduction when it causes 7 or less deaths, and due to the process operated by two people, no additional risk reduction are required.

Comparison of key management systems across different industries (다양한 산업에서의 키 관리 시스템 비교 분석)

  • Woojoo Kwon;Hangbae Chang
    • Journal of Platform Technology
    • /
    • v.12 no.3
    • /
    • pp.55-61
    • /
    • 2024
  • As the digital environment becomes more complex and cyber attacks become more sophisticated, the importance of data protection is emerging. As various security threats such as data leakage, system intrusion, and authentication bypass increase, secure key management is emerging. Key Management System (KMS) manages the entire encryption key life cycle procedure and is used in various industries. There is a need for a key management system that considers requirements suitable for the environment of various industries including public and finance. The purpose of this paper is to derive the characteristics of the key management system for each industry by comparing and analyzing key management systems used in representative industries. As for the research method, information was collected through literature and technical document analysis and case analysis, and comparative analysis was conducted by industry sector. The results of this paper will be able to provide a practical guide when introducing or developing a key management system suitable for the industrial environment. The limitations are that the analyzed industrial field was insufficient and experimental verification was insufficient. Therefore, in future studies, we intend to conduct specific performance tests through experiments, including key management systems in various fields.

  • PDF