• Title/Summary/Keyword: Remote Server Management

Search Result 186, Processing Time 0.024 seconds

Forward Anonymity-Preserving Secure Remote Authentication Scheme

  • Lee, Hanwook;Nam, Junghyun;Kim, Moonseong;Won, Dongho
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.3
    • /
    • pp.1289-1310
    • /
    • 2016
  • Dynamic ID-based authentication solves the ID-theft problem by changing the ID in each session instead of using a fixed ID while performing authenticated key exchanges between communicating parties. User anonymity is expected to be maintained and the exchanged key kept secret even if one of the long-term keys is compromised in the future. However, in the conventional dynamic ID-based authentication scheme, if the server's long-term key is compromised, user anonymity can be broken or the identities of the users can be traced. In addition, these schemes are vulnerable to replay attacks, in which any adversary who captures the authentication message can retransmit it, and eventually cause the legitimate user to be denied service. This paper proposes a novel dynamic ID-based authentication scheme that preserves forward anonymity as well as forward secrecy and obviates replay attacks.

A Design and Implementation about CORBA-based Remote Server Management System (CORBA 기반 원격 서버 관리 시스템의 설계 및 구현)

  • Park, Nam-Sup;Kim, Tai-Yun
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2002.04b
    • /
    • pp.1423-1426
    • /
    • 2002
  • 기존의 원격 서버 관리 시스템은 웹 기반의 클라이언트가 하나의 서버에 접속하는 소켓(socket) 프로그래밍 형태로 개발되었다. 즉, 시스템 관리자는 웹 환경의 클라이언트에서 하나의 서버 시스템에 접속하여 서버를 관리해야만 했다. 본 논문에서는 다수의 같은 형태의 서버들 혹은 UNIX와 NT 서버와 같은 운영체제가 다른 서버들을 하나의 웹 클라이언트에서 동시에 관리할 수 있는 모델을 제시하고자 한다. 제안하는 시스템에서는 두 서버의 시스템 호출을 중간에서 변환하는 CORBA 기반의 미들웨어를 설계 및 구현하였다. CORBA 기반의 미들웨어 명세(specification)를 결정한 후 그에 따른 서버 측의 서비스들을 정리하여 서버 측에서 개발하였고, 클라이언트 측에서는 서버 측의 서비스들을 호출할 수 있도록 자바 Swing을 이용하여 애플릿 형태로 구현하였다. 그리고, CORBA의 특징을 살려 다수의 서버들을 동적으로 등록시킬 수 있는 기법을 설계하고 구현하였다.

  • PDF

A Study on an AOI Management in Virtual Environments Based on the Priority (대규모 가상공간에서 우선순위에 기반한 AOI 관리모델에 관한 연구)

  • Yu Seok-Jong
    • Journal of Korea Multimedia Society
    • /
    • v.9 no.2
    • /
    • pp.189-196
    • /
    • 2006
  • This paper proposes a priority based AOI management model as a method to effectively process message traffic for collaboration in virtual environments. Where message traffic reaches the maximum capacity of the message replay server in DVE, some of the events might be delayed to be updated at the remote clients. Because existing AOI models depend only on the occurrence time of events, they have a problem that more important events in the context might be processed later than less serious ones. Close Interactions with other participants are relatively more important than simple events which happen at a distance from the participant. This study classifies the priorities of events according to the degree of interest, and proposes a method to reduce processing delay time of events highly interested by a user. The proposed model offers a way to effectively utilize limited capacity of a server using a priority queue mechanism, which is able to handle different kinds of events. To prevent from starvation of simple events and to give fairness to the proposed algorithm, event occurrence time is also considered as well as degree of interest when processing events.

  • PDF

Development and Test of Line-Telemetry DPS for KSLV-I Upper Stage (나로호 상단부 Line-Telemetry 데이터처리시스템 개발 및 시험)

  • Kim, Kwang-Soo;Lee, Soo-Jin;Chung, Eui-Seung
    • Aerospace Engineering and Technology
    • /
    • v.10 no.1
    • /
    • pp.107-115
    • /
    • 2011
  • The line-telemetry data processing system is necessary for monitoring the status of each onboard systems of KSLV-I upper stage during the ground tests and launch preparation. The mission of line-telemetry system is to provide reference telemetry data and to monitor the status of upper stage. The line-telemetry data processing system consists of a PCM acquisition/processing server, a system management server, and 9 monitoring consoles. In this paper, we will describe the overview of onboard remote measurement system, the design of the line-telemetry data processing system, anomaly setup information for indicating alarm signal in case of abnormal occurrence, and the result of the ground test and flight test.

Enhancement of a Secure Remote Working Environment using CloudHSM and edge-DRM Proxy (Cloud HSM와 edge-DRM Proxy를 활용한 안전한 원격근무 환경 강화 연구)

  • Kim, Hyunwoo;Lee, Junhyeok;Park, Wonhyung
    • Convergence Security Journal
    • /
    • v.21 no.3
    • /
    • pp.25-30
    • /
    • 2021
  • Due to the current COVID-19 pandemic, companies and institutions are introducing virtual desktop technology, one of the logical network separation technologies, to establish a safe working environment in a situation where remote work is provided. With the introduction of virtual desktop technology, companies and institutions can operate the network separation environment more safely and effectively, and can access the business network quickly and safely to increase work efficiency and productivity. However, when introducing virtual desktop technology, there is a cost problem of high-spec server, storage, and license, and it is necessary to supplement in terms of operation and management. As a countermeasure to this, companies and institutions are shifting to cloud computing-based technology, virtual desktop service (DaaS, Desktop as a Service). However, in the virtual desktop service, which is a cloud computing-based technology, the shared responsibility model is responsible for user access control and data security. In this paper, based on the shared responsibility model in the virtual desktop service environment, we propose a cloud-based hardware security module (Cloud HSM) and edge-DRM proxy as an improvement method for user access control and data security.

Smart Elderly-care System using Smart-phone (스마트폰을 이용한 고령자용 스마트 간병 시스템)

  • Cho, Myeon-gyun
    • Journal of Convergence for Information Technology
    • /
    • v.7 no.5
    • /
    • pp.129-135
    • /
    • 2017
  • In this paper, we propose a system to monitor the condition of elderly people who are uncomfortable by using smart-phone and biometric sensor at any time and for care-givers to provide with the best medical service anytime and anywhere. The proposed system monitors the status of the elderly through various bionic sensors installed in the hospital ward based on the Arduino system and not only provides the physiological and medical services required by the elderly, but also informs the guardian so that he can cope with the emergency. In conclusion, this paper suggests that a reading light used by elderly people can operate as a home server with a biosensor using Arduino and Android applications (Apps.), and the smart-phone of care-givers is configured as a remote management and a emergency call system. Therefore, this study suggests important ways to improve the satisfaction of medical service for the both elderly people and care-givers of chronic diseases in the future.

An Efficient and Secure Authentication Scheme Preserving User Anonymity

  • Kim, Mi Jin;Lee, Kwang Woo;Kim, Seung Joo;Won, Dong Ho
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.6 no.3
    • /
    • pp.69-77
    • /
    • 2010
  • Authentication and key establishment are fundamental procedures to establish secure communications over public insecure network. A password-based scheme is common method to provide authentication. In 2008, Khan proposed an efficient password-based authentication scheme using smart cards to solve the problems inherent in Wu-Chieu's authentication scheme. As for security, Khan claimed that his scheme is secure and provides mutual authentication between legal users and a remote server. In this paper, we demonstrate Khan's scheme to be vulnerable to various attacks, i. e., password guessing attack, insider attack, reflection attack and forgery attack. Our study shows that Khan's scheme does not provide mutual authentication and is insecure for practical applications. This paper proposes an improved scheme to overcome these problems and to preserve user anonymity that is an issue in e-commerce applications.

DESIGN AND IMPLEMENTATION OF MOVING OBJECTS MANAGEMENT SYSTEM APPLYING OPEN GOESPATIAL DATA ENCODING

  • Lee, Hye-Jin;Lee, Hyun-Ah;Park, Jong-Heung
    • Proceedings of the KSRS Conference
    • /
    • 2005.10a
    • /
    • pp.663-666
    • /
    • 2005
  • The Geography Markup Language (GML) is an XML encoding for the transport and storage of geographic information, including both the geometry and properties of geographic features. This paper uses the GML to provide extendibility and interoperability of spatial data in moving objects management system. Since the purpose of the system is to provide locations of the moving objects in the web and mobile environments, we used the GML both for presenting map data and trajectories of the moving objects. The proposed system is composed of Location Data Interface, Moving Objects Engine, and Web/Mobile Presentation Interface. We utilized the concept of Web Map Server, that is web mapping technology of OGC (Open Geospatial Consortium), to integrate map data and the location information of the moving objects. In the process of the integration, we used the standard data model and interfaces while defining new application schema. Since our suggested system uses open spatial data encoding and interfaces, both extendibility and interoperability are guaranteed.

  • PDF

A Study on Locker Management System (사물함 개폐 관리 시스템 연구)

  • Kim, Jin;Lee, Jae-Hak;Chi, Sang-Lim;Choi, Tae-Hwan;Lee, Hyun
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2017.11a
    • /
    • pp.1173-1175
    • /
    • 2017
  • This paper proposes a system for convenient remote control and management of the lockers with a smart phone. The key features of the proposed system are as follows. First, we connect the lockers to the server and then use the authentication procedure to open and close their lockers. Second, we create instant lockers to increase convenience for users who need to use casual necessities. Unlike traditional analog methods, we finally develop certification procedures. Particularly, log data are better secured than traditional ones. The performance assessment of the proposed system is simulated by producing a dummy model. We will show that the proposed system could effectively support opening and closing the lockers using smart phones.

Distributed Multi-Sensor based Laboratory Safety Management System (분산 다중 센서 기반 실험실 안전 관리 시스템)

  • Hwang, Doyeun;Kim, Hwangryong;Kim, Eunseong;Jung, Daejin;Jung, Hoekyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2019.05a
    • /
    • pp.585-586
    • /
    • 2019
  • Recently, the systems for managing the labs provide services that can be managed in real time by using various sensors based on IoT. The system collects sensor data and transmits it to the server, identifies the dangerous situation, and sends operation commands to the devices. These systems have a centralized structure that slows data processing when managing multiple laboratories. To solve this problem, this paper proposes a system that manages laboratories in distributed processing environment to identify and manage risk situations. The sensor module is used to control the laboratory and to automatically identify and respond to the dangerous situation.

  • PDF