• 제목/요약/키워드: Platform security

검색결과 821건 처리시간 0.023초

The Smart Platform for Understanding the Extraordinary of the Our'an

  • Almarhabi, Khalid Ali
    • International Journal of Computer Science & Network Security
    • /
    • 제21권12호
    • /
    • pp.29-34
    • /
    • 2021
  • The Qur'an is regarded as the holy book by Islam followers; they assert that God wants humankind to understand its meanings and implement best practices. Numerous individuals have attempted to understand the meaning of its verses and explore its Extraordinary Vocabulary; however, few people successfully studied and researched the different meanings of that holy text. Only a limited segment of the society comprising scholars, students, and intellectuals have grasped the teachings of the Qur'an. A majority of the general population, specifically youngsters, spend ample time using mobile phones. In this context, many innovative educational platforms have recently been launched to attract the general public to learn and use knowledge. Research has provided the positive impact of such smart platforms. This concept is about an innovative smartphone platform to help users understand and reason the Qur'an by helping with the book vocabulary explained by expert scholars. This work proposes creating an engaging digital format using innovative technologies. This idea is inspired by youngsters who demonstrate an immense interest in online learning. Qur'an vocabulary is the prerequisite to building a better understanding that allows users to get precise meaning.

Web-Based Question Bank System using Artificial Intelligence and Natural Language Processing

  • Ahd, Aljarf;Eman Noor, Al-Islam;Kawther, Al-shamrani;Nada, Al-Sufyini;Shatha Tariq, Bugis;Aisha, Sharif
    • International Journal of Computer Science & Network Security
    • /
    • 제22권12호
    • /
    • pp.132-138
    • /
    • 2022
  • Due to the impacts of the current pandemic COVID-19 and the continuation of studying online. There is an urgent need for an effective and efficient education platform to help with the continuity of studying online. Therefore, the question bank system (QB) is introduced. The QB system is designed as a website to create a single platform used by faculty members in universities to generate questions and store them in a bank of questions. In addition to allowing them to add two types of questions, to help the lecturer create exams and present the results of the students to them. For the implementation, two languages were combined which are PHP and Python to generate questions by using Artificial Intelligence (AI). These questions are stored in a single database, and then these questions could be viewed and included in exams smoothly and without complexity. This paper aims to help the faculty members to reduce time and efforts by using the Question Bank System by using AI and Natural Language Processing (NLP) to extract and generate questions from given text. In addition to the tools used to create this function such as NLTK and TextBlob.

Related-key Neural Distinguisher on Block Ciphers SPECK-32/64, HIGHT and GOST

  • Erzhena Tcydenova;Byoungjin Seok;Changhoon Lee
    • Journal of Platform Technology
    • /
    • 제11권1호
    • /
    • pp.72-84
    • /
    • 2023
  • With the rise of the Internet of Things, the security of such lightweight computing environments has become a hot topic. Lightweight block ciphers that can provide efficient performance and security by having a relatively simpler structure and smaller key and block sizes are drawing attention. Due to these characteristics, they can become a target for new attack techniques. One of the new cryptanalytic attacks that have been attracting interest is Neural cryptanalysis, which is a cryptanalytic technique based on neural networks. It showed interesting results with better results than the conventional cryptanalysis method without a great amount of time and cryptographic knowledge. The first work that showed good results was carried out by Aron Gohr in CRYPTO'19, the attack was conducted on the lightweight block cipher SPECK-/32/64 and showed better results than conventional differential cryptanalysis. In this paper, we first apply the Differential Neural Distinguisher proposed by Aron Gohr to the block ciphers HIGHT and GOST to test the applicability of the attack to ciphers with different structures. The performance of the Differential Neural Distinguisher is then analyzed by replacing the neural network attack model with five different models (Multi-Layer Perceptron, AlexNet, ResNext, SE-ResNet, SE-ResNext). We then propose a Related-key Neural Distinguisher and apply it to the SPECK-/32/64, HIGHT, and GOST block ciphers. The proposed Related-key Neural Distinguisher was constructed using the relationship between keys, and this made it possible to distinguish more rounds than the differential distinguisher.

  • PDF

Relevance of E- Learning and Quality Development in Higher Education

  • Arshi Naim;Sahar Mohammed Alshawaf
    • International Journal of Computer Science & Network Security
    • /
    • 제24권1호
    • /
    • pp.187-195
    • /
    • 2024
  • This is an extended paper explaining the role of E-learning and quality development in the current situation. Amid Covid:19, E-Learning has achieved a new miles stone in imparting education and all levels of institutions have transformed their learning platform from face to face to virtual learning. In this scenario E-Learning is facing two major challenges, first to ensure the ability of computer systems or software to exchange and make use of information on virtual platform (interoperability) and secondly, developing quality learning through e-Learning. To impart learning and teaching (L&T) through E-learning, Middle East University (MEU) has adopted Learning Management Services (LMS) through Blackboard. The university has three types of L&T methods; full online, Blended and Supportive. This research studies the concept, scope and dimensions of interoperability (InT) of E-Learning in MEU then the connection and interdependence between with quality development. In this paper we have described the support and the importance of finest standards and specifications for the objectives of InT of E-Learning and quality development in MEU. The research is based principally on secondary data observed from MEU E-Learning deanship. Also sample of 20 E-Learning experts at MEU were given closed ended as well as semi closed questionnaires for evaluating the assurance of InT of E-Learning and quality development. These experts are mainly certified online facilitators and admin staff. Results provide the verification of application and presence of InT of E-Learning and assured the quality development process in MEU.

블록체인 기술을 이용한 스마트시티 데이터 보안 모델 연구 (D.E.Cho : A Study on Smart City Data Security Model Using Blockchain Technology)

  • 조도은
    • Journal of Platform Technology
    • /
    • 제12권2호
    • /
    • pp.45-57
    • /
    • 2024
  • 스마트 시티는 정보통신기술의 혁신과 도시 생활의 질 향상을 추구하는 현대 도시 계획의 산물이다. 스마트 시티의 효율적인 운영을 위해서는 실시간 수집되고 저장 및 처리되는 데이터가 핵심자원이다. 따라서 다양한 분야에서 수집되는 스마트 시티의 데이터는 안전하게 관리되어야 하며, 개인정보보호가 무엇보다 중요하다. 본 연구에서는 스마트 시티의 데이터를 안전하게 관리하기 위하여 블록체인 기술을 이용한 스마트 시티 데이터 보안 모델을 제안하였다. 제안 모델은 블록체인 네트워크에 IPFS를 통합하여 데이터를 분산 저장함으로써 데이터의 기밀성과 무결성을 확보하고, CP-ABE를 이용하여 데이터를 암호화하여 사용자로부터 데이터의 접근제어가 효율적으로 수행되도록 하였다. 또한 데이터 접근 제어 정책과 동형 암호를 사용함으로써 데이터의 활용성을 강화하면서 프라이버시를 보장하도록 하였다.

  • PDF

초경량 환경의 보안 서비스 지원을 위한 보안 API (Security APIs for Security Services in Ultra Light-weight Environment)

  • 김원영;이영석;이재완;서창호
    • 한국정보통신학회논문지
    • /
    • 제12권3호
    • /
    • pp.485-492
    • /
    • 2008
  • 유비쿼터스 환경에서의 컴퓨팅 기기들은 초경량 컴퓨팅 환경으로서 사용자들이 컴퓨터의 존재를 인지할 수 없도록 사용자 신체나 주변 환경에 내장되며, 크기가 작고, 적은 기능을 가진 많은 컴퓨터를 여러 곳에 분포하여 네트워크로 통신한다. 초경량 컴퓨팅 환경에서는 사용자들에게 서비스를 제공하기 위해 사용자의 정보를 교환하는 일이 많으며, 사용자의 정보를 보호하기 위해서는 보안 기술이 반드시 포함되어야 한다. 본 논문에서는 초경량 컴퓨팅 환경에서 표준화 된 보안 서비스를 제공하는 초경량 환경을 위한 보안 서비스 지원을 위한 API를 연구하고 설계한다. 초경량 환경의 보안 서비스 지원을 위한 API는 일반적인 컴퓨팅 환경에서와 같이 데이터 암호화, 데이터 인증, 키 관리 등의 보안 서비스를 제공하며, 초경 량 컴퓨팅 환경에 맞는 RC5와 SHA1 알고리즘 사용, 효율적인 메모리 관리를 위해 각 서비스를 라이브러리화하여 필요시마다 라이브러리를 할당/해제하는 등의 초경량 컴퓨팅 환경의 문제점을 해결할 수 있도록 설계, 구현한다.

사회보장플랫폼과 스마트시티에의 적용가능성에 관한 연구 (A Study on the Applicability of Social Security Platform to Smart City)

  • 장봉석
    • 한국융합학회논문지
    • /
    • 제11권11호
    • /
    • pp.321-335
    • /
    • 2020
  • 본고는 4차 산업의 발전과 함께 빅데이터, 정보통신기술, 사물인터넷, 사물통신, 인공지능 등을 활용하여 도시경쟁력을 강화하기 위한 방안으로 스마트시티에 대한 관심과 욕구가 점점 증대하고 관련기술도 발전하고 있는 상황에서 스마트웰페어시티에 관한 구상을 전제로 어떠한 방법을 통해 이러한 목표를 달성할 것인가, 다시 말해서 최소한 보건·의료·복지 등 돌봄영역에서의 스마트웰페어시티를 구상하고 그것이 실현가능한지에 대해 살펴보는데 그 목적이 있다. 이러한 인식에서 본고에서는 종래부터 논의되어 왔던 스마트시티의 개념과 영역 및 현재까지의 논의와 사회보장·사회복지에의 접목에 관한 문제나 한계 등에 대해 살펴보고, 이를 기초로 스마트웰페어시티의 개념을 도출하고자 하였다. 그리고 그 실현을 위한 방안으로서의 사회보장플랫폼의 요소와 특성을 파악하고 스마트시티 중 특히 돌봄영역을 중심으로 그 적용가능성에 대해 살펴보았다. 나아가 정책적·제도적 개선방안으로서 표준화, 개인정보 및 공공데이터의 활용, 사회보장정보시스템을 중심으로 하는 제도적 개선방안에 대해 논의를 전개하였다. 이러한 논의는 우리 사회가 지향하고자 하는 디지털 기반의 커뮤니티 케어, 나아가 스마트웰페어시티를 구현하는데 나름의 중요한 의미를 부여하는 것이라고 판단된다. 특히 본고의 특성상 행동설계 및 7하 원칙 등을 기반으로 하는 사회보장플랫폼에 대해서는 스마트시티 중 보건·의료·복지분야에 한정하여 다루었다는 점을 감안할 때 이 외의 다른 영역에도 미칠 영향에 대해서는 또 다른 측면에서의 연구가 필요하며, 여기에 다양한 방면에서의 기술 등의 접목과 활용, 그리고 이에 따라 우리 사회에 미칠 영향이나 변화의 정도 등에 대해서도 고려할 필요가 있을 것으로 사료된다. 본고에서 다루고 있는 내용들이 스마트시티 뿐 아니라 사회보장·사회복지체계 등에 관한 방향과 흐름, 미래상을 제시하고, 이를 기반으로 분야별·영역별 보완과 정비를 통해 삶의 질 향상이라는 취지와 목표를 실현하는데 조금이나마 기여할 수 있기를 기대해 본다.

IoT 디바이스를 위한 MTM 기반의 안전한 OTP 생성기 구현 (Implementation of a MTM-based secure OTP Generator for IoT Devices)

  • 김영세;한진희;전용성;김정녀
    • 대한임베디드공학회논문지
    • /
    • 제10권4호
    • /
    • pp.199-206
    • /
    • 2015
  • In this paper, we present the implementation of a secure OTP(One Time Password) generator for IoT(Internet of Things) devices. Basically, MTM(Mobile Trusted Module) is used and expanded considering secure IoT services. We combine the MTM architecture with a new hardware-based OTP generation engine. The new architecture is more secure, offering not only the security of devices but also that of the OTP service. We have implemented and verified the MTM-based OTP generator on a real mobile platform embedded with the MTM chip. The proposed method can be used as a solution for enhancing security of IoT devices and services.

Higher-Order Countermeasures against Side-Channel Cryptanalysis on Rabbit Stream Cipher

  • Marpaung, Jonathan A.P.;Ndibanje, Bruce;Lee, Hoon Jae
    • Journal of information and communication convergence engineering
    • /
    • 제12권4호
    • /
    • pp.237-245
    • /
    • 2014
  • In this study, software-based countermeasures against a side-channel cryptanalysis of the Rabbit stream cipher were developed using Moteiv's Tmote Sky, a popular wireless sensor mote based on the Berkeley TelosB, as the target platform. The countermeasures build upon previous work by improving mask generation, masking and hiding other components of the algorithm, and introducing a key refreshment scheme. Our contribution brings improvements to previous countermeasures making the implementation resistant to higher-order attacks. Four functional metrics, namely resiliency, robustness, resistance, and scalability, were used for the assessment. Finally, performance costs were measured using memory usage and execution time. In this work, it was demonstrated that although attacks can be feasibly carried out on unprotected systems, the proposed countermeasures can also be feasibly developed and deployed on resource-constrained devices, such as wireless sensors.

IoT 환경에서의 보안위협 분석과 모바일 키 복구 (Threats Analysis and Mobile Key Recovery for Internet of Things)

  • 이윤정;박용준;김철수;이봉규
    • 한국멀티미디어학회논문지
    • /
    • 제19권5호
    • /
    • pp.918-923
    • /
    • 2016
  • IoT should be considered security risk environments such as various platforms and services including smart devices that can be mounted on household electric appliances, healthcare, car, and heterogeneous networks that are connected to the Internet, cloud services and mobile Apps.. In this paper, we provide analysis of new security threats, caused by open-platform of IoT and sensors via the Internet. Also, we present the key recovery mechanism that is applied to IoT. It results to have compatibility with given research, reduces network overhead, and performs key recovery without depending on key escrow agencies or authorized party.