• Title/Summary/Keyword: Security Platform

Search Result 827, Processing Time 0.022 seconds

Design and Implementation of HDFS Data Encryption Scheme Using ARIA Algorithms on Hadoop (하둡 상에서 ARIA 알고리즘을 이용한 HDFS 데이터 암호화 기법의 설계 및 구현)

  • Song, Youngho;Shin, YoungSung;Chang, Jae-Woo
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.5 no.2
    • /
    • pp.33-40
    • /
    • 2016
  • Due to the growth of social network systems (SNS), big data are realized and Hadoop was developed as a distributed platform for analyzing big data. Enterprises analyze data containing users' sensitive information by using Hadoop and utilize them for marketing. Therefore, researches on data encryption have been done to protect the leakage of sensitive data stored in Hadoop. However, the existing researches support only the AES encryption algorithm, the international standard of data encryption. Meanwhile, Korean government choose ARIA algorithm as a standard data encryption one. In this paper, we propose a HDFS data encryption scheme using ARIA algorithms on Hadoop. First, the proposed scheme provide a HDFS block splitting component which performs ARIA encryption and decryption under the distributed computing environment of Hadoop. Second, the proposed scheme also provide a variable-length data processing component which performs encryption and decryption by adding dummy data, in case when the last block of data does not contains 128 bit data. Finally, we show from performance analysis that our proposed scheme can be effectively used for both text string processing applications and science data analysis applications.

Steganography on Android Smart Devices (안드로이드 스마트기기에서의 스테가노그래피 연구)

  • Jung, Ki-Hyun;Lee, Joon-Ho;Yoo, Kee-Young
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.52 no.4
    • /
    • pp.99-105
    • /
    • 2015
  • As increasing the use of smart phones, the interest of iOS and Android operating system is growing up. In this paper, a novel steganographic method based on Android platform is proposed. Firstly, we analyze the skia based image format that is supporting 2D graphic libraries in Android operating system. Then, we propose a new data hiding method based on the Android bitmap image format. The proposed method hides the secret data on the four true color areas which include Alpha, Red, Green, Blue. In especial, we increase the embedding capacity of the secret data on the Alpha area with a less image distortion. The experimental results show that the proposed method has a higher embedding capacity and less distortion by changing the size of the secret bits on the Alpha area.

Privacy-Preserving Aggregation of IoT Data with Distributed Differential Privacy

  • Lim, Jong-Hyun;Kim, Jong-Wook
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.6
    • /
    • pp.65-72
    • /
    • 2020
  • Today, the Internet of Things is used in many places, including homes, industrial sites, and hospitals, to give us convenience. Many services generate new value through real-time data collection, storage and analysis as devices are connected to the network. Many of these fields are creating services and applications that utilize sensors and communication functions within IoT devices. However, since everything can be hacked, it causes a huge privacy threat to users who provide data. For example, a variety of sensitive information, such as personal information, lifestyle patters and the existence of diseases, will be leaked if data generated by smarwatches are abused. Development of IoT must be accompanied by the development of security. Recently, Differential Privacy(DP) was adopted to privacy-preserving data processing. So we propose the method that can aggregate health data safely on smartwatch platform, based on DP.

An Analysis of the Media's Report on the Adoption of the Address of Things using Topic Modeling and Network Analysis (토픽 모델링과 네트워크 분석을 활용한 사물주소 도입에 대한 언론보도 분석)

  • Mo, Sung Hoon;Lim, Cheol Hyeon;Kim, Hyun Jae;Lee, Jung Woo
    • Smart Media Journal
    • /
    • v.10 no.2
    • /
    • pp.38-47
    • /
    • 2021
  • This study analyzed media reports on the Address of Things, which are being introduced through the amendment of related law and pilot projects. The titles and its texts in the media's reports were collected by searching for 'Address of Things' on the Naver News Platform. Then, we analyzed the corpus using by topic modeling and network analysis. As a result, there were four topics: 'Promotion of the address of things system', Proof of assigning Address of Things', 'Improvement of usage of the Roadname Address Systems', and 'Education and public relation for the address activation'. It was confirmed that the topic 'Proof of assigning Address of Things' was the main agenda. We presented some implication by comparing the results with the 「3rd Basic Plan for Address Policy (2018-2022)」 of the Ministry of Public Administration and Security.

On derivation the System Analysis and Evaluation Indicators of Blockchain-based Smart Electronic Transport Waybill Platform for Improvement of Logistics Service Operation Efficiency and Personal Information Security (물류 서비스 운영 효율과 개인정보 보안 향상을 위한 블록체인 기반 스마트 전자 운송장 플랫폼 시스템 분석 및 평가지표 도출에 관한 연구)

  • Park, Jae-Min;Won, JoNg-Woon;Seong, Ki-Deok;Kim, Young-Min
    • Journal of the Korea Safety Management & Science
    • /
    • v.22 no.4
    • /
    • pp.75-86
    • /
    • 2020
  • With the advent of the 4.0 era of logistics due to the Fourth Industrial Revolution, infrastructures have been built to receive the same services online and offline. Logistics services affected by logistics 4.0 and IT technology are rapidly changing. Logistics services are developing using technologies such as big data, artificial intelligence, blockchain, Internet of things, and augmented reality. The convergence of logistics services and various IT new technologies is accelerating, and the development of data management solution technology has led to the emergence of electronic cargo waybill to replace paper cargo waybill. The electronic waybill was developed to supplement paper waybill that lack economical and safety. However, the electronic waybill that appeared to complement the paper waybill are also in need of complementation in terms of efficiency and reliability. New research is needed to ensure that electronic cargo waybill gain the trust of users and are actively utilized. To solve this problem, electronic cargo waybill that combine blockchain technology are being developed. This study aims to improve the reliability, operational efficiency and safety of blockchain electronic cargo waybill. The purpose of this study is to analyze the blockchain-based electronic cargo waybill system and to derive evaluation indicators for system supplementation.

Case Study on the Building Organization of Medibio Research Laboratory Facilities in Research-driven Hospital (연구중심병원 의생명연구원의 실험실 구성 사례 조사)

  • Kim, Young-Aee
    • Journal of the Architectural Institute of Korea Planning & Design
    • /
    • v.34 no.11
    • /
    • pp.95-104
    • /
    • 2018
  • Healthcare technology has been growing and fostering cooperation between industry, university and hospitals as growth engines in korea. So, the medibio research institutes in hospital have been constructed to promote research and industrialization centering on healthcare technology. The purpose of this study is to investigate the cases of research institutes in hospitals, and search the characteristics of building organization of medibio research laboratory facilities. Case study is investigated by floor plan, homepage and site visits about five research institutes selected in research-driven hospitals. The facility title and size of research laboratory is originated from site area and research building location. The building function include not only the research lab and business office reflecting on the development platform, and but assembly and meeting room in the ground level. Laboratory floor plans have three types, rectangular, rectangular+linear and linear type, one is traditional and efficient, the others are people and friendly. And building core types are correlated with lab space unit modules, single and double side core are shown in rectangular type. All the laboratories are open lab, composed with laboratory bench and research note writing desk facing the lab service and enclosed lab-support area. And they have communication space looking as warm and cozy common area for the innovation, convergence and collaboration. As the high risk of contamination and high standard for safety and security, equipment and facilities are well managed with biological environment including BSC, fume hood, PCR classification, eye washing and emergency shower.

Chinese Employees' Collectivism Orientation, Organizational Commitment, and Interpersonal Helping Behavior: A Generational Difference (중국 조직구성원의 집단주의 성향과 조직몰입 및 대인간 도움행위의 관계: 세대간 차이를 중심으로)

  • Fan, Wei;Yang, Xin-Feng;Choi, Byoung-Kwon
    • Asia-Pacific Journal of Business
    • /
    • v.11 no.2
    • /
    • pp.81-98
    • /
    • 2020
  • Purpose - This study aims to examine the relationship between Chinese employees' collectivism orientation and organizational commitment and interpersonal helping behavior and verify the differences of such relationships between new and the previous generation of employees. Design/methodology/approach - The 262 Chinese employees participated in self-reported survey through online platform. The confirmatory factor analysis and the hierarchical regression analysis were performed to test hypotheses. Findings - We found that Chinese employees' collectivism orientation positively influenced their organizational commitment and interpersonal helping behavior. Regarding the moderating role of generation, our result revealed that while the positive relationship between collectivism orientation and organizational commitment was significant for previous generation of employees, such relationship was not valid for new generation employees. However, there was no significant generational difference in the relationship between collectivism orientation and interpersonal helping behavior. Research implications or Originality - Considering that there have been relatively few empirical studies examining the interaction between employees' cultural characteristic and generations, this study contributes to demonstrate that the positive influence of Chinese employees' collectivism orientation on organizational commitment vary depending on Chinese generations. In addition, this study provides implications that organizational leaders in China should understand that the generational difference can influence how employees' collectivism orientation leads to their attitudes towards organizations and need to establish human resource management system by reflecting generational difference.

Cybersecurity of The Defense Information System network connected IoT Sensors (IoT Sensor가 연결된 국방정보통신망의 사이버보안 연구)

  • Han, Hyun-Jin;Park, Dea-Woo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.6
    • /
    • pp.802-808
    • /
    • 2020
  • The IoT(Internet of Things) is based on the development of sensor technology and high-speed communication infrastructure, and the number of IoT connected to the network is increasing more than the number of people, and the increase is also very fast. In the field of defense, IoT is being deployed in various fields such as operations, military, base defense, and informatization, and the need is also increasing. Unlike the existing PC/server information protection system, cyber threats are also increasing as IoT sensors, which are vulnerable to information protection, are increasing in the network, so it is necessary to study the platform to protect the defense information and communication network. we investigated the case of connecting wired and wireless IoT to the defense network, and presented an efficient interlocking design method of the IoT integrated independent network with enhanced security by minimizing the contact point with the defense network.

Mark XIIA(Mode 5) IFF System Integration and Certification Test for Surface to Air Missile System (유도무기체계 모드 5 피아식별 체계통합 및 인증시험)

  • Kim, Woo-Hyun;Jung, Se-Young;Lee, Yun-Soo;Chang, Se-Myong
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.25 no.2
    • /
    • pp.160-168
    • /
    • 2022
  • The new IFF mode, Mode-5 replacing Mode-4, has already been established by the US DoD for its allies and NATO forces. A IFF retrofit program for replacing the Mark XII Mode-4 with Mark XIIA Mode-5 is in progress in order to overcome the security limitations of the former in R.O.K. IFF certification test for the new mode, Mode-5, has been performed on medium range surface to air missile platform of the Korean armed forces for the first time in R.O.K and this is regarded as a monumental event in Korean defense industry. The present paper is a discussion on the procedures applied to the IFF system retrofit and integration, lessons learned from AIMS test with the US AIMS PO as observer. The minimum modification from the existing Mark XII Mode-4 to Mark XIIA Mode-5 and evolutional adaption from previous design including interoperability are required for the system retrofit. Letter of Certification was received from the US AIMS PO after the tests. The authors propose that the lessons learned and know-how acquired during the tests are managed by the R.O.K Government as the standard structure of a database. It is expected that the use of the database will reduce the developmental difficulties and risk, also increase efficiency in future developments and other projects.

Comparison of encryption algorithm performance between low-spec IoT devices (저 사양 IoT 장치간의 암호화 알고리즘 성능 비교)

  • Park, Jung Kyu;Kim, Jaeho
    • Journal of Internet of Things and Convergence
    • /
    • v.8 no.1
    • /
    • pp.79-85
    • /
    • 2022
  • Internet of Things (IoT) connects devices with various platforms, computing power, and functions. Due to the diversity of networks and the ubiquity of IoT devices, demands for security and privacy are increasing. Therefore, cryptographic mechanisms must be strong enough to meet these increased requirements, while at the same time effective enough to be implemented in devices with long-range specifications. In this paper, we present the performance and memory limitations of modern cryptographic primitives and schemes for different types of devices that can be used in IoT. In addition, detailed performance evaluation of the performance of the most commonly used encryption algorithms in low-spec devices frequently used in IoT networks is performed. To provide data protection, the binary ring uses encryption asymmetric fully homomorphic encryption and symmetric encryption AES 128-bit. As a result of the experiment, it can be seen that the IoT device had sufficient performance to implement a symmetric encryption, but the performance deteriorated in the asymmetric encryption implementation.