• 제목/요약/키워드: Secure Sharing

검색결과 277건 처리시간 0.026초

A Secure Medical Information Management System for Wireless Body Area Networks

  • Liu, Xiyao;Zhu, Yuesheng;Ge, Yu;Wu, Dajun;Zou, Beiji
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제10권1호
    • /
    • pp.221-237
    • /
    • 2016
  • The wireless body area networks (WBANs) consist of wearable computing devices and can support various healthcare-related applications. There exist two crucial issues when WBANs are utilized for healthcare applications. One is the protection of the sensitive biometric data transmitted over the insecure wireless channels. The other is the design of effective medical management mechanisms. In this paper, a secure medical information management system is proposed and implemented on a TinyOS-based WBAN test bed to simultaneously address these two issues. In this system, the electronic medical record (EMR) is bound to the biometric data with a novel fragile zero-watermarking scheme based on the modified visual secret sharing (MVSS). In this manner, the EMR can be utilized not only for medical management but also for data integrity checking. Additionally, both the biometric data and the EMR are encrypted, and the EMR is further protected by the MVSS. Our analysis and experimental results demonstrate that the proposed system not only protects the confidentialities of both the biometric data and the EMR but also offers reliable patient information authentication, explicit healthcare operation verification and undeniable doctor liability identification for WBANs.

군 전술 통신에서의 주파수 공동사용 기반 인지엔진 플랫폼 연구 (Study on Cognitive Engine Platform Based on the Spectrum Sharing for the Military Tactical Communications)

  • 최주평;이원철
    • 한국전자파학회논문지
    • /
    • 제27권7호
    • /
    • pp.599-611
    • /
    • 2016
  • 본 논문은 주파수 공동사용 체계를 기반으로 군 전술 통신망 환경에서 동적 스펙트럼 접속 실현이 가능한 인지엔진 플랫폼을 제안하였다. 현재의 군 전술 무선통신 체계는 동종 및 이종의 군 전술 무선통신의 효과적 운용을 위한 추가 주파수 확보 및 무기체계 무선망 간의 상호공존 방안에 대한 필요성이 빠르게 증가하고 있는 실정이다. 본 논문은 추가 주파수 확보 방안으로 미국 및 유럽을 중심으로 활발한 연구개발이 진행되고 있는 주파수 공동사용에 대한 정책 및 연구개발 추진현황에 대해 살펴보았다. 또한, 동적 스펙트럼 접속(DSA: Dynamic Spectrum Access)을 위한 군 전술 무선통신분야의 핵심 기술인 인지엔진 기술개발 현황에 대해서도 소개하였다. 이를 통하여 본 논문은 최신 트랜드 흐름을 고려하여 향후 군 전술 무선통신에서 추가 주파수 확보 및 동적 스펙트럼 접속의 실현, 무기체계 무선망 간 상호공존이 가능한 주파수 공동사용 기반의 인지엔진 플랫폼 구조에 대해 제안하였다.

A Comparative Analysis of Accommodation Sharing Legislation of Platform Businesses in South Korea and OECD Countries

  • LEE, Eun Joo;CHO, Yooncheong
    • 산경연구논집
    • /
    • 제13권5호
    • /
    • pp.1-14
    • /
    • 2022
  • Purpose: This study investigated the legal issues and policies on accommodation sharing based on qualitative research and examined how OECD societies establish laws and regulations to legalize accommodation sharing and prevent adverse effects. The purpose of this study is to contribute to the understanding of the different laws and regulations at both the country and city levels and to help better manage accommodation sharing in our society. The ultimate goal of this study is to enhance citizen understanding of platform businesses to minimize unnecessary conflicts. Research design, data and methodology: This study conducted a qualitative research by exploring laws and regulations in OECD countries. This study performed comparative analysis of accommodation sharing business' legislation, legal definitions, and operational policies that citizens should necessarily understand for better usage. Results: Local ordinances and regulations developed differently based on the situations of local markets and communities, so they are established and improved at the city or country level. Conclusions: Each government should consider preparing better policy on accommodation sharing by considering how to secure the housing market for residents with better establishment of new platform businesses and relationships with citizens. This study suggests policy reactions to government as policymakers, guests, hosts, platforms, and communities.

하둡 분산파일시스템에서 안전한 쓰기, 읽기 모델과 평가 (A Secure Model for Reading and Writing in Hadoop Distributed File System and its Evaluation)

  • 방세중;나일균;김양우
    • 인터넷정보학회논문지
    • /
    • 제13권5호
    • /
    • pp.55-64
    • /
    • 2012
  • 요즘 클라우드 컴퓨팅이 활성화됨에 따라 분산파일시스템의 요구가 증대되고 있지만 클라우드 컴퓨팅 환경에서 민감한 개인정보의 악용을 방지하는 분산파일시스템의 프레임은 아직 없다. 그래서 이 논문에서는 비밀분산 방법을 이용하여 분산파일시스템을 위한 안전한 쓰기/읽기 모델을 제시하였다. 이 모델은 비밀분산 방법을 사용하여 분산파일시스템의 기밀성뿐만 아니라 가용성도 보장한다. 또 제안한 방법으로 비밀 분산, 복구를 실행하였고 이를 대표적 암호화 알고리즘인 SEED 알고리즘에 의한 것과 비교를 함으로써 제시한 방법의 우수성을 보였다. 이와 더불어 이 방법이 하둡 분산파일시스템에 쉽게 이식될 수 있도록 하둡 분산파일시스템의 구조에 의존적이지 않은 쓰기/읽기 모델을 제안하였으며, 비밀분산모델의 성능측정방법으로 제안모델에 대한 이론적 평가를 실시하였다.

가중치 테이블 기반 안전한 e-비즈니스 데이터 분할 복원 방식 (Secure Sharing and Recovering Scheme of e-Business Data Based on Weight Table)

  • 송유진;김진석
    • 정보처리학회논문지C
    • /
    • 제16C권1호
    • /
    • pp.27-36
    • /
    • 2009
  • 최근의 개인정보 노출의 가장 큰 원인은 정당한 개인정보 관리자 즉, 내부자에 의한 부정 이용이다. 관리자는 사용자의 기밀문서를 몰래 복사하거나 고쳐 쓰는 것도 가능하다. 이러한 민감한 개인 및 기업 데이터의 안전한 관리 대책으로서 기밀정보의 안전한 분산 저장관리 기능이 요구되고 있다. 한편, 개인정보를 제공하는 경우, 정보 소유자가 프라이버시 데이터를 누구에게 얼마만큼 가중치(weight)을 두고 공개할지를 정해야 한다. 따라서 참여자의 중요도에 따라 개인정보 열람에 대한 권한의 가중치를 다르게 지정할 수 있는 구조가 요구된다. 본 논문에서는 개인정보를 권한의 가중치에 따라 안전하게 관리할 수 있는 새로운 데이터 관리 기법을 위한 Digit-independent 알고리즘을 새롭게 제안한다. 제안된 알고리즘을 근거로 데이터의 수집과 단순한 연산만으로 고속 연산처리가 가능하여 대량의 프라이버시 데이터에 적용할 수 있는 데이터 관리기법으로서 가중치 테이블 기반의 Digit-independent 알고리즘을 이용한 데이터 분할 복원 방식을 제안한다. 제안 방식은 유비쿼터스 환경에서 e-비즈니스 데이터의 안전한 관리 및 저장에 활용될 수 있을 것이다.

New Secret Sharing Scheme for Privacy Data Management

  • 송유진;이동혁
    • 한국정보보호학회:학술대회논문집
    • /
    • 한국정보보호학회 2006년도 하계학술대회
    • /
    • pp.765-773
    • /
    • 2006
  • In ubiquitous environment, private enterprise or public institution's privacy data are sometimes exposed to hackers because of the lack of the sense of information security. We apply secret sharing scheme to solve the privacy problems. But, the existing secret sharing scheme are not suitable for the management of large a quantity of data because that required operation of large capacity. In this paper, We propose new secret sharing scheme for privacy data management. Our scheme makes high-speed operation possible, and it also allows for set weight for each secret pieces depending on weight of participants. The scheme proposed in this paper makes it efficient to collect and manage secure privacy data in ubiquitous environment.

  • PDF

Intragroup Resource Sharing of Business group in Korea: The Effects on the Internationalization of Group-affiliated companies

  • 김기현;이영우
    • 지식경영연구
    • /
    • 제19권3호
    • /
    • pp.113-134
    • /
    • 2018
  • This study examines the roles of intangible and tangible resources of Korean business groups on internationalization by their member firms. Specifically, we argue that not all affiliates receive same benefit from group-level resource sharing. Instead, the effect of group-level knowledge sharing on affiliates' internationalization depends on individual affiliates' relative financial positions within a business group. Using samples of business groups in Korea, chaebols, hereafter chaebols, we find that foreign market knowledge at the group level has a positive impact on the internationalization of affiliated firms while the product knowledge has no impact. Furthermore, we also find evidences that an affiliate with high level of financial capacity receives internal pressures to stay in domestic market to secure internal capital market and support other sister affiliates' international activities.

Topology-Hiding Broadcast Based on NTRUEncrypt

  • Mi, Bo;Liu, Dongyan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제10권1호
    • /
    • pp.431-443
    • /
    • 2016
  • Secure multi-party computation (MPC) has been a research focus of cryptography in resent studies. However, hiding the topology of the network in secure computation is a rather novel goal. Inspired by a seminal paper [1], we proposed a topology-hiding broadcast protocol based on NTRUEncrypt and secret sharing. The topology is concealed as long as any part of the network is corrupted. And we also illustrated the merits of our protocol by performance and security analysis.

Efficient Key Management Protocol for Secure RTMP Video Streaming toward Trusted Quantum Network

  • Pattaranantakul, Montida;Sanguannam, Kittichai;Sangwongngam, Paramin;Vorakulpipat, Chalee
    • ETRI Journal
    • /
    • 제37권4호
    • /
    • pp.696-706
    • /
    • 2015
  • This paper presents an achievable secure videoconferencing system based on quantum key encryption in which key management can be directly applied and embedded in a server/client videoconferencing model using, for example, OpenMeeting. A secure key management methodology is proposed to ensure both a trusted quantum network and a secure videoconferencing system. The proposed methodology presents architecture on how to share secret keys between key management servers and distant parties in a secure domain without transmitting any secrets over insecure channels. The advantages of the proposed secure key management methodology overcome the limitations of quantum point-to-point key sharing by simultaneously distributing keys to multiple users; thus, it makes quantum cryptography a more practical and secure solution. The time required for the encryption and decryption may cause a few seconds delay in video transmission, but this proposed method protects against adversary attacks.

A Network Transport System Using Next Generation CCN Technology

  • Lee, Hyung-Su;Park, Jae-Pyo;Park, Jae-Kyung
    • 한국컴퓨터정보학회논문지
    • /
    • 제22권10호
    • /
    • pp.93-100
    • /
    • 2017
  • Current internet has evolved from the sharing and efficiency aspects of information, it is still vulnerable to the fact that the Internet is not secure in terms of security and is not safe to secure of security mechanism. Repeating patches on continuous hacking are continuously demanding additional resources for network or system equipment, and consequently the costs continue to increase. Businesses and individuals alike are speeding up the damage caused by crime like of ransomware, not jusy simple attacks, and businesses and individuals need to respond to cyber security. In addition, the ongoing introduce of security device, and separate of networks for secure transmission of contents in the existing TCP/IP system, but it is still lacking in security. To complement the security implications of this existing TCP/IP Internet Protocol, we intend to propose a Secure Contents Transport System (SCTS) on the network using the CCN concept.