• Title/Summary/Keyword: Secure Sharing

Search Result 278, Processing Time 0.022 seconds

A double-blockchain architecture for secure storage and transaction on the Internet of Things networks

  • Aldriwish, Khalid
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.6
    • /
    • pp.119-126
    • /
    • 2021
  • The Internet of Things (IoT) applications are quickly spread in many fields. Blockchain methods (BC), defined as a distributed sharing mechanism, offer excellent support for IoT evolution. The BC provides a secure way for communication between IoT devices. However, the IoT environments are threatened by hacker attacks and malicious intrusions. The IoT applications security are faced with three challenges: intrusions and attacks detection, secure communication, and compressed storage information. This paper proposed a system based on double-blockchain to improve the communication transactions' safety and enhance the information compression method for the stored data. Information security is enhanced by using an Ellipse Curve Cryptography (ECC) considered in a double-blockchain case. The data compression is ensured by the Compressed Sensing (CS) method. The conducted experimentation reveals that the proposed method is more accurate in security and storage performance than previous related works.

Empowering Blockchain For Secure Data Storing in Industrial IoT

  • Firdaus, Muhammad;Rhee, Kyung-Hyune
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2020.05a
    • /
    • pp.231-234
    • /
    • 2020
  • In the past few years, the industrial internet of things (IIoT) has received great attention in various industrial sectors which have potentially increased a high level of integrity, availability, and scalability. The increasing of IIoT is expected to create new smart industrial enterprises and build the next generation smart system. However existing IIoT systems rely on centralized servers that are vulnerable to a single point of failure and malicious attack, which exposes the data to security risks and storage. To address the above issues, blockchain is widely considered as a promising solution, which can build a secure and efficient environment for data storing, processing and sharing in IIoT. In this paper, we propose a decentralized, peer-to-peer platform for secure data storing in industrial IoT base on the ethereum blockchain. We exploit ethereum to ensure data security and reliability when smart devices store the data.

A Study on Recognition and Demands about Mixed-Generation House-Sharing (세대통합형 하우스셰어링에 대한 청년층과 노년층의 인식 비교)

  • Jeong, Da Woon;Hong, Hyung Ock;Jee, Eun Young
    • Journal of Families and Better Life
    • /
    • v.33 no.6
    • /
    • pp.65-75
    • /
    • 2015
  • This study aimed to analyze the preliminary data to increase the residents' satisfaction of mixed-generation house-sharing. For this purpose, we examined the recognition and demands of different generations and compared the differences. The participants were 50 elderly and 100 young people living in Seoul. The data were analyzed using SPSS statistics. The key findings are outlined below; 1. Most of the young people in our sample got to know about the house-sharing via various routes, but this option was not well known to the elderly. The interest in living in a house-sharing situation was higher among the young people than among the elderly. The reason why people were uninterested in house-sharing was their comfort in living alone. 2. Secure personal-space privacy and the choice of a housemate were regarded as the most important considerations in house-sharing by the young and the elderly, respectively. Young people anticipated a division of housework and the elderly were worried about communication with the younger generation. 3. Expected benefits tended to be higher in economic aspects for the young and in psychological aspects for the elderly. The elderly responded that they would be willing to share the kitchen and living room with the younger generation. Young people demanded necessary living facilities such as a laundry room and a community area with the elderly. The majority of the respondents from both generations said they would be able to solve problems through communication. In conclusion, public relations are needed to increase interest in house-sharing. The elderly and young should understand its purpose and treat each other as family members, not as house owners and tenants. There should be a manager who can coordinate the residents.

Secure Data Management based on Proxy Re-Encryption in Mobile Cloud Environment (모바일 클라우드 환경에서 안전한 프록시 재암호화 기반의 데이터 관리 방식)

  • Song, You-Jin;Do, Jeong-Min
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.4B
    • /
    • pp.288-299
    • /
    • 2012
  • To ensure data confidentiality and fine-grained access control in business environment, system model using KP-ABE(Key Policy-Attribute Based Encryption) and PRE(Proxy Re-Encryption) has been proposed recently. However, in previous study, data confidentiality has been effected by decryption right concentrated on cloud server. Also, Yu's work does not consider a access privilege management, so existing work become dangerous to collusion attack between malicious user and cloud server. To resolve this problem, we propose secure system model against collusion attack through dividing data file into header which is sent to privilege manager group and body which is sent to cloud server and prevent modification attack for proxy re-encryption key using d Secret Sharing, We construct protocol model in medical environment.

Quantum Communication Technology for Future ICT - Review

  • Singh, Sushil Kumar;Azzaoui, Abir El;Salim, Mikail Mohammed;Park, Jong Hyuk
    • Journal of Information Processing Systems
    • /
    • v.16 no.6
    • /
    • pp.1459-1478
    • /
    • 2020
  • In the last few years, quantum communication technology and services have been developing in various advanced applications to secure the sharing of information from one device to another. It is a classical commercial medium, where several Internet of Things (IoT) devices are connected to information communication technology (ICT) and can communicate the information through quantum systems. Digital communications for future networks face various challenges, including data traffic, low latency, deployment of high-broadband, security, and privacy. Quantum communication, quantum sensors, quantum computing are the solutions to address these issues, as mentioned above. The secure transaction of data is the foremost essential needs for smart advanced applications in the future. In this paper, we proposed a quantum communication model system for future ICT and methodological flow. We show how to use blockchain in quantum computing and quantum cryptography to provide security and privacy in recent information sharing. We also discuss the latest global research trends for quantum communication technology in several countries, including the United States, Canada, the United Kingdom, Korea, and others. Finally, we discuss some open research challenges for quantum communication technology in various areas, including quantum internet and quantum computing.

A Survey on Privacy Vulnerabilities through Logit Inversion in Distillation-based Federated Learning (증류 기반 연합 학습에서 로짓 역전을 통한 개인 정보 취약성에 관한 연구)

  • Subin Yun;Yungi Cho;Yunheung Paek
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2024.05a
    • /
    • pp.711-714
    • /
    • 2024
  • In the dynamic landscape of modern machine learning, Federated Learning (FL) has emerged as a compelling paradigm designed to enhance privacy by enabling participants to collaboratively train models without sharing their private data. Specifically, Distillation-based Federated Learning, like Federated Learning with Model Distillation (FedMD), Federated Gradient Encryption and Model Sharing (FedGEMS), and Differentially Secure Federated Learning (DS-FL), has arisen as a novel approach aimed at addressing Non-IID data challenges by leveraging Federated Learning. These methods refine the standard FL framework by distilling insights from public dataset predictions, securing data transmissions through gradient encryption, and applying differential privacy to mask individual contributions. Despite these innovations, our survey identifies persistent vulnerabilities, particularly concerning the susceptibility to logit inversion attacks where malicious actors could reconstruct private data from shared public predictions. This exploration reveals that even advanced Distillation-based Federated Learning systems harbor significant privacy risks, challenging the prevailing assumptions about their security and underscoring the need for continued advancements in secure Federated Learning methodologies.

SecureJS : A Secure JavaSpace based on Jini2.0 (SecureJS : Jini2.0 기반의 안전한 JavaSpace)

  • Yu Yang-Woo;Moon Nam-Doo;Jung Hye-Young;Lee Myung-Joon
    • The KIPS Transactions:PartC
    • /
    • v.11C no.7 s.96
    • /
    • pp.999-1008
    • /
    • 2004
  • The Jini system provides an infrastructure to facilitate a programmer to develop distributed systems. As one of the Jini services, JavaSpare has been used as a repository which is accessible publicly in the Java distributed environment. Although JavaSpace could give a useful method for saving and sharing java object, it would not be applicable to develop a distributed system requiring access securities for the objects because JavaSpare does not support secure access control. In this paper, we present a secure JavaSpare service based on Jini2.0 named SeureJS, which strengthens the security weakness of JavaSpare. The system consists of ObjectStore to store Java objects, AccessManager to control access of ObjectStore and KeyManager to manage public keys.

A Master and Slave Control Strategy for Parallel Operation of Three-Phase UPS Systems with Different Ratings (다른 정격용량을 가진 3상 UPS 시스템의 병렬운전을 위한 주종제어 기법)

  • 이우철;현동석
    • The Transactions of the Korean Institute of Power Electronics
    • /
    • v.9 no.4
    • /
    • pp.341-349
    • /
    • 2004
  • A parallel operation of Uninterruptible Power Supply(UPS) systems is used to increase power capacity of the system or to secure higher reliability at critical loads. In the conventional parallel operation, the load-sharing control to maintain the current balance is the most important, since the load-sharing is very sensitive to discord between components of each module, amplitude/phase difference, line impedance, output LC filter, and so on. To solve these problems various control algorithms are researching. However, these methods cannot apply to the different ratings of UPS. In the case, master and slave control algorithm for parallel operation is adequate. However, if the UPS ratings are different, the value of passive filters L, C is different, and it affects the sharing of current. This paper presents general problems of conventional parallel operation systems, and control strategy for parallel operation with different ratings. The validity of the proposed control strategy is investigated through simulation and experiment in the parallel operation system with two 3-phase UPS systems.

Efficient On-line Secret Sharing scheme based on One-way Hash Function (일반향 해쉬 함수에 기반한 효율적인 온라인 비밀분산 방식)

  • Oh, Soo-Hyun;Kim, Seung-Joo;Won, Dong-Ho
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.10
    • /
    • pp.3128-3137
    • /
    • 2000
  • Secret sharing scheme is a cryptographic protocol in which a dealer distribures shares of a secret among a set of participants such that only authorized set of participants can recover the secret at a later. Secret sharing is an important cryptographic primitive in management of secret information, secure multiparty protocol and group-oriented cryptography, etc. In this paper, we propose an efficient, on-line secret sharing scheme based on one-way hash function. This scheme provides the property to share multiple secrets and allows participants to be added/deleted dynamically, without having to redistributo new shares. Proposed scheme has advantage to detect cheating and identify of all cheater, regardless of then number. Frthermore, it is more eficient than previous schemes.

  • PDF

A Study on the Moderating Effect that Value Congruence Influences Organizational Performance

  • LEE, Joon-Pyo
    • The Journal of Industrial Distribution & Business
    • /
    • v.11 no.3
    • /
    • pp.51-62
    • /
    • 2020
  • Purpose - This study examined the relationship between individual creativity and its related variables to observe how individual creativity contributes to organizational performance. In addition, this study strived to explore how to maximize the utilization of individual creativity and innovate the structure of the organization itself so that teams and organizations can respond more effectively to new rising trends. this study aimed to examine whether the value congruence between individuals and organizations (propensity congruence, goal congruence has a significant impact on knowledge sharing and innovation behavior as dependent variables by exerting individual creativity and synergy as independent variables. Research design, data and methodology - SPSS 24.0 program were used to analyze the data. Descriptive Statistics and correlation analysis were performed, and the reliability factor (Cronbach's α) was calculated. Afterwards, we analyzed the moderating effects of structural equation model analysis and hierarchical regression analysis. The number of samples used in the study were 309 copies. Results - First, Individual creativity had a positive effect on knowledge sharing and innovative behavior. In other words, it was confirmed that decision-making processes fused with individual creativity could create an atmosphere of knowledge sharing and transform the organization. Second, value congruence adjusted the influence of individual creativity on knowledge sharing and innovation behavior. Conclusions - First, it is important for managers to recognize the value and secure the pool of creative talents who will be a potential future basic source of organizational success and competitive advantage. Second, managers should be able to identify those with creative talents and expertise, and use them to increase their knowledge sharing performance, while also developing emotional and motivational creativity. Third, in order improve knowledge sharing performance, managers should pay attention to the emotional aspect of creativity. Fourth, managers should strive to create an environment that is beneficial for the reinforcement of individual self-management capabilities. Fifth, managers should be able to develop decision-making processes to develop potential creativity and encourage creative thinking, opinions, or solutions. Sixth, managers should promote the dissemination and integration of new knowledge based on the creative views and attitudes of team members.