• 제목/요약/키워드: Secure Databases

검색결과 48건 처리시간 0.45초

A Study on the Secure Database Controlled Under Cloud Environment (클라우드 환경하에서의 안전한 데이터베이스 구축에 관한 연구)

  • Kim, SungYong;Kim, Ji-Hong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • 제23권6호
    • /
    • pp.1259-1266
    • /
    • 2013
  • Nowadays, the databases are getting larger and larger. As the company has difficulty in managing the database, they want to outsource the database to the cloud system. In this case the database security is more important because their database is managed by the cloud service provider. Among database security techniques, the encryption method is a well-certified and established technology for protecting sensitive data. However, once encrypted, the data can no longer be easily queried. The performance of the database depends on how to encrypt the sensitive data, and on the approach for searching, and the retrieval efficiency that is implemented. In this paper we propose the new suitable mechanism to encrypt the database and lookup process on the encrypted database under control of the cloud service provider. This database encryption algorithm uses the bloom filter with the variable keyword based index. Finally, we demonstrate that the proposed algorithm should be useful for database encryption related research and application activities.

Design and Implementation of on XML Data Encryption System considering Validation (유효성을 고려한 XML 데이타 암호화 시스템의 설계 및 구현)

  • 남궁영환;박대하;허승호;백두권
    • Journal of KIISE:Databases
    • /
    • 제29권6호
    • /
    • pp.417-428
    • /
    • 2002
  • XML(extensible Markup Language) is effective to information retrieval and sharing but has defects related to the data security. And, as a solution of this problem, the current XML security researches such as XML digital signature, XML data encryption, and XML access control exclude the validation property of XML document. The validation of XML should be considered for the secure information sharing in the XML-based environment. In this paper, we design and implement the system to support both security and validation to XML document. Our system performs data encryption and maintenance of valid status of XML document by referencing new XML schema namespace. In addition, it also provides the XML schema security function through the XML schema digital signature. During generating XML schema digital signature, DOMHash method which has the advantage of the faster speed than canonical XML method is applied to XML schema. In conclusion, our system shows the improved functions in flexibility, scalability, and reliability compared with the existing XML security researches.

Current status on expression profiling using rice microarray (벼 microarray를 이용한 유전자발현 profiling 연구동향)

  • Yoon, Ung-Han;Kim, Yeon-Ki;Kim, Chang-Kug;Hahn, Jang-Ho;Kim, Dong-Hern;Lee, Tae-Ho;Lee, Gang-Seob;Park, Soo-Chul;Nahm, Baek-Hie
    • Journal of Plant Biotechnology
    • /
    • 제37권2호
    • /
    • pp.144-152
    • /
    • 2010
  • As the International Rice Genome Sequencing Project (IRGSP) was completed in 2005 and opened to the public, many countries are making a lot of investments in researches on the utilization of sequence information along with system development. Also, the necessity of the functional genomics researches using microarray is increased currently to secure unique genes related with major agricultural traits and analyze metabolic pathways. Microrarray enables efficient analysis of large scale gene expression and related transcription regulation. This review aims to introduce available microarrays made based on rice genome information and current status of gene expression analysis using these microarrays integrated with the databases available to the public. Also, we introduce the researches on the large scale functional analysis of genes related with useful traits and genetic networks. Understanding of the mechanism related with mutual interaction between proteins with co-expression among rice genes can be utilized in the researches for improving major agricultural traits. The direct and indirect interactions of various genes would provide new functionality of rice. The recent results of the various expression profiling analysis in rice will promote functional genomic researches in plants including rice and provide the scientists involved in applications researches with wide variety of expression informations.

The Dispute on the Modernization of Korean Medicine after the Restoration of Independence -Based on the 1950s and from the 1990s to the Present- (해방 이후 한의학의 현대화 논쟁 - 1950년대와 1990년대 이후의 논의를 바탕으로 -)

  • Lee, Tae-Hyung;Jung, Yoo-Ong;Lee, Duk-Ho;Kim, Nam-Il
    • Journal of Society of Preventive Korean Medicine
    • /
    • 제16권3호
    • /
    • pp.53-73
    • /
    • 2012
  • Objectives : The inclusion of Korean Medicine in the national health care system led to the need of a serious discussion on its modernization. This paper looked at how these discussions were progressed. Especially, a difference in the meaning of 'science' in the 1950s and the 1990s was observed. Methods : Articles related to the medical dispute between Korean and Western Medicine in "EE LIM", especially the ones from the 1950s, were selected, classified and analyzed. Research papers on Evidence-Based Medicine were also analyzed. Evidence-Based Medicine was a new medical research methodology in the 1990s. Articles on Evidence-Based Medicine were searched and selected from journal databases: DBpia, KISS, RISS, and OASIS. Results : The problem of establishment of modernity of Korean Medicine in the recent times was addressed in the context of scientification and systematization. Accordingly, the academic societies of Korean Medicine aimed for scientification. But efforts to secure the identity of Korean Medicine opposed to western science were also made. Meanwhile, Evidence-Based Medicine established in 1992 presented a different concept of science. This led to a new means of acknowledgement of Korean Medicine in the modern society. Conclusions : The modernization process of Korean Medicine up to now was a course of scientification. But as this process did not fully reflect its characteristics, the modernization of Korean Medicine still remains a pending question. A modern study methodology that fully reflects the identity of Korean Medicine needs to be established.

An Efficient RDF Query Validation for Access Authorization in Subsumption Inference (포함관계 추론에서 접근 권한에 대한 효율적 RDF 질의 유효성 검증)

  • Kim, Jae-Hoon;Park, Seog
    • Journal of KIISE:Databases
    • /
    • 제36권6호
    • /
    • pp.422-433
    • /
    • 2009
  • As an effort to secure Semantic Web, in this paper, we introduce an RDF access authorization model based on an ontology hierarchy and an RDF triple pattern. In addition, we apply the authorization model to RDF query validation for approved access authorizations. A subscribed SPARQL or RQL query, which has RDF triple patterns, can be denied or granted according to the corresponding access authorizations which have an RDF triple pattern. In order to efficiently perform the query validation process, we first analyze some primary authorization conflict conditions under RDF subsumption inference, and then we introduce an efficient query validation algorithm using the conflict conditions and Dewey graph labeling technique. Through experiments, we also show that the proposed validation algorithm provides a reasonable validation time and when data and authorizations increase it has scalability.

Research on Countermeasure of SQL Injection Attack (SQL Injection 공격을 효율적으로 방어하는 대응책 연구)

  • Hong, Sunghyuck
    • Journal of the Korea Convergence Society
    • /
    • 제10권10호
    • /
    • pp.21-26
    • /
    • 2019
  • At present, it is indispensable to utilize data as an information society. Therefore, the database is used to manage large amounts of data. In real life, most of the data in a database is the personal information of a group of members. Because personal information is sensitive data, the role of the database administrator who manages personal information is important. However, there is a growing number of attacks on databases to use this personal information in a malicious way. SQL Injection is one of the most known and old hacking techniques. SQL Injection attacks are known as an easy technique, but countermeasures are easy, but a lot of efforts are made to avoid SQL attacks on web pages that require a lot of logins, but some sites are still vulnerable to SQL attacks. Therefore, this study suggests effective defense measures through analysis of SQL hacking technology cases and contributes to preventing web hacking and providing a secure information communication environment.

Effects of Complementary and Alternative Therapies Applied as Nursing Interventions in Patients with Osteoarthritis: A Systematic Review (골관절염 대상자에게 간호중재로 적용한 보완대체요법의 효과: 체계적 문헌고찰)

  • Kim, Hyo Won;Noh, Gyeong Min;Park, Mi Hyeon;Lee, Hyun Sook;Jin, Su Hee;Hwang, Ji Suk;Son, Jung Tae
    • Journal of muscle and joint health
    • /
    • 제28권2호
    • /
    • pp.79-90
    • /
    • 2021
  • Purpose: The purpose of this review was to analyze the effectiveness of complementary and alternative therapies (CAT) as nursing interventions for patients with osteoarthritis (OA). Methods: A systematic literature review was conducted using the PRISMA statement guidelines. To search for studies related to the effects of CAT applied as nursing care in OA patients, a combination of the keywords 'osteoarthritis,' 'complementary and alternative therapy,' and 'nursing care' were used. Finally, 12 articles retrieved from five electronic databases were included for the analysis. Results: Twelve studies were classified into seven interventions: Tai chi exercise, yoga, qigong, massage. flax seed compress, music, and meditation relaxation, administered by a nurse, and were RCTs. Outcome variables used for pain evaluation were WOMAC and VAS. The duration of interventions varied from 2 to 12 weeks. All twelve interventions had a positive effect on the outcome variables. Conclusion: CAT applied in nursing care for patients with OA significantly reduced pain and improved mobility. When planning a nursing intervention program, it is recommended to combine multiple therapies, considering the duration of effects. In addition, it is recommended to design the study as an RCT to secure the evidence for practical application.

Acupotomy for Carpal Tunnel Syndrome: A Systematic Review and Meta-Analysis (수근관증후군에 대한 도침치료의 효과: 체계적 문헌 고찰과 메타분석)

  • Jeong, Jae-Min;Sul, Jae-Uk;Kim, Seon-Jong;Seon, Yun-Gwon;Choi, Ji-Min;Noh, Hui-Jeong;Choi, Jin-Bong
    • Journal of Korean Medicine Rehabilitation
    • /
    • 제32권3호
    • /
    • pp.55-64
    • /
    • 2022
  • Objectives The objective of this study was to assess the effectiveness of acupotomy for carpal tunnel syndrome. Methods Based on seven domestic and foreign databases. We analyzed the randomized controlled trials using acupotomy for carpal tunnel syndrome. The treatment group was treated with acupotomy and the control group was no restrictions on treatment methods. Results In this study, the effect of acupuncture treatment for carpal tunnel syndrome was investigated. Each study reported that acupotomy could be an effective treatment for carpal tunnel syndrome. However, as a result of meta-analysis of Levine carpal tunnel syndrome questionnaire scores, visual analog scale, and sensory nerve conduction velocity, the results were more clinically significant than those of the control group. Due to the small number of randomized controlled trial studies and the nature of acupotomy treatment, blinding of interventions was impossible, resulting in a high risk of bias. Conclusions In this regard, it is thought that well-planned randomized controlled studies on patients with carpal tunnel syndrome are needed in the future to secure the clinical evidence for acupotomy treatment.

Data-driven prediction of compressive strength of FRP-confined concrete members: An application of machine learning models

  • Berradia, Mohammed;Azab, Marc;Ahmad, Zeeshan;Accouche, Oussama;Raza, Ali;Alashker, Yasser
    • Structural Engineering and Mechanics
    • /
    • 제83권4호
    • /
    • pp.515-535
    • /
    • 2022
  • The strength models for fiber-reinforced polymer (FRP)-confined normal strength concrete (NC) cylinders available in the literature have been suggested based on small databases using limited variables of such structural members portraying less accuracy. The artificial neural network (ANN) is an advanced technique for precisely predicting the response of composite structures by considering a large number of parameters. The main objective of the present investigation is to develop an ANN model for the axial strength of FRP-confined NC cylinders using various parameters to give the highest accuracy of the predictions. To secure this aim, a large experimental database of 313 FRP-confined NC cylinders has been constructed from previous research investigations. An evaluation of 33 different empirical strength models has been performed using various statistical parameters (root mean squared error RMSE, mean absolute error MAE, and coefficient of determination R2) over the developed database. Then, a new ANN model using the Group Method of Data Handling (GMDH) has been proposed based on the experimental database that portrayed the highest performance as compared with the previous models with R2=0.92, RMSE=0.27, and MAE=0.33. Therefore, the suggested ANN model can accurately capture the axial strength of FRP-confined NC cylinders that can be used for the further analysis and design of such members in the construction industry.

Delegated Provision of Personal Information and Storage of Provided Information on a Blockchain Ensuring Data Confidentiality (개인정보의 위임 제공 및 데이터 기밀성을 보장하는 블록체인에 제공 정보의 저장)

  • Jun-Cheol, Park
    • Smart Media Journal
    • /
    • 제11권10호
    • /
    • pp.76-88
    • /
    • 2022
  • Personal information leakage is very harmful as it can lead to additional attacks using leaked information as well as privacy invasion, and it is primarily caused by hacking server databases of institutions that collect and store personal information. We propose a scheme that allows a service-requesting user to authorize a secure delegated transfer of his personal information to the service provider via a reliable authority and enables only the two parties of the service to retrieve the provided information stored on a blockchain ensuring data confidentiality. It thus eliminates the necessity of storing customer information in the service provider's own database. As a result, the service provider can serve customers without requiring membership registration or storing personal information in the database, so that information leakage through the server database can be completely blocked. In addition, the scheme is free from the risk of information leakage and subsequent attacks through smartphones because it does not require a user's smartphone to store any authentication credential or personal information of its owner.