• Title/Summary/Keyword: Security Server

Search Result 1,250, Processing Time 0.026 seconds

Link-E-Param : A URL Parameter Encryption Technique for Improving Web Application Security (Link-E-Param : 웹 애플리케이션 보안 강화를 위한 URL 파라미터 암호화 기법)

  • Lim, Deok-Byung;Park, Jun-Cheol
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.9B
    • /
    • pp.1073-1081
    • /
    • 2011
  • An URL parameter can hold some information that is confidential or vulnerable to illegitimate tampering. We propose Link-E-Param(Link with Encrypted Parameters) to protect the whole URL parameter names as well as their values. Unlike other techniques concealing only some of the URL parameters, it will successfully discourage attacks based on URL analysis to steal secret information on the Web sites. We implement Link-E-Param in the form of a servlet filter to be deployed on any Java Web server by simply copying a jar file and setting a few configuration values. Thus it can be used for any existing Web application without modifying the application. It also supports numerous encryption algorithms to choose from. Experiments show that our implementation induces only 2~3% increase in user response time due to encryption and decryption, which is deemed acceptable.

The research regarding an information system risk management process characteristics (정보시스템 위험관리 프로세스 특성에 관한 연구)

  • Kim, Tai-Dal;Lee, Hyung-Won
    • The KIPS Transactions:PartD
    • /
    • v.14D no.3 s.113
    • /
    • pp.303-310
    • /
    • 2007
  • Information system failure is various such as program test unpreparedness, physical facilities for damage prevention unpreparedness from simple software error. Although cross is trifling the result causes vast damage. Recently, became difficult by simple outside security system to solve this problem. Now, synthetic countermove establishment and suitable confrontation connected with danger came in necessary visual point about general Information Technology of enterprise. In connection with, in this paper, various informations and system and control about data that can happen information inside and outside considering integrity for IT resource, solubility, confidentiality within organization studied about special quality to model synthetic Risk Management System that can of course and cope in danger.

Big Data Processing Scheme of Distribution Environment (분산환경에서 빅 데이터 처리 기법)

  • Jeong, Yoon-Su;Han, Kun-Hee
    • Journal of Digital Convergence
    • /
    • v.12 no.6
    • /
    • pp.311-316
    • /
    • 2014
  • Social network server due to the popularity of smart phones, and data stored in a big usable access data services are increasing. Big Data Big Data processing technology is one of the most important technologies in the service, but a solution to this minor security state. In this paper, the data services provided by the big -sized data is distributed using a double hash user to easily access to data of multiple distributed hash chain based data processing technique is proposed. The proposed method is a kind of big data data, a function, characteristics of the hash chain tied to a high-throughput data are supported. Further, the token and the data node to an eavesdropper that occurs when the security vulnerability to the data attribute information to the connection information by utilizing hash chain of big data access control in a distributed processing.

A Data Sharing Algorithm of Micro Data Center in Distributed Cloud Networks (분산클라우드 환경에서 마이크로 데이터센터간 자료공유 알고리즘)

  • Kim, Hyuncheol
    • Convergence Security Journal
    • /
    • v.15 no.2
    • /
    • pp.63-68
    • /
    • 2015
  • Current ICT(Information & Communication Technology) infrastructures (Internet and server/client communication) are struggling for a wide variety of devices, services, and business and technology evolution. Cloud computing originated simply to request and execute the desired operation from the network of clouds. It means that an IT resource that provides a service using the Internet technology. It is getting the most attention in today's IT trends. In the distributed cloud environments, management costs for the network and computing resources are solved fundamentally through the integrated management system. It can increase the cost savings to solve the traffic explosion problem of core network via a distributed Micro DC. However, traditional flooding methods may cause a lot of traffic due to transfer to all the neighbor DCs. Restricted Path Flooding algorithms have been proposed for this purpose. In large networks, there is still the disadvantage that may occur traffic. In this paper, we developed Lightweight Path Flooding algorithm to improve existing flooding algorithm using hop count restriction.

System Design and Implementation for New Move Picture Solution EZ-MOV Using FLV (FLV를 이용한 새로운 동명상 솔루션 EZ-MOV 대한 시스템 설계 및 구현)

  • Kwon, O-Byoung;Shin, Hyun-Cheul
    • Convergence Security Journal
    • /
    • v.9 no.2
    • /
    • pp.79-84
    • /
    • 2009
  • Recently, Move Picture Files have the same file format and a compression technique as Window Media Video form. but Moving Pictures using file format and a compression technique have question about Motion blur and compressibility. In this paper, we design and Implement for new Move Picture Solution EZ-MOV using FLV different from developed FLV(Flash Video) in the Macromedia company. EZ-MOV have advantages as follow. first, FLV player is able to compact disk access time and DRM (Digital Rights Management) with a built-in self and unable to an illegal video recording, second, whenever WMV formal file encoded FLV are able to lossless compression to fifty percent, third, FLV is able to Moving Picture streaming no buffering. fourth, FLV file is able streaming service no streaming server. fifth, FLV file is able to streaming service keep pace with download and streaming. sixth, FLV file is able to full duplex service.

  • PDF

Study on Agent based Internetworking Platform (에이전트 기반 인터네트워킹 플랫폼 연구)

  • 전준현
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.3B
    • /
    • pp.314-324
    • /
    • 2004
  • Recently, high-speed internet subscribers have grown continuously, and reached up to 10 millions. But existing network management that is responsible only for user access is confronted with many difficulties, since user access network(xDSL, Cable, B-WILL, and so on) has diversified and value added wired/wireless contents service has developed. In this paper propose the Agent based Inter Networking platform as object-oriented hierarchical system that can provide various service such as access QoS(Quality of Service), customized application service and security service according to user on demand. This system has divided into two parts(user agent and agent management system & local and central management systems). Management system periodically receive status information such as bandwidth, download speed, delay, current service, and so on, and process them, then build a policy based on processed information. According to personal user profile that is generated by this policy, the customized service can be provided for users. And This system adopt the object-oriented modeling in case that system migration and integration, and implement a system that is robust and stable for security through hierarchical server system.

Voice and Video Call Continuity for Enterprise Users (기업형 사용자들을 위한 음성/영상 서비스 이동성 제공 방안)

  • Jung, Chang-Yong;Kim, Hyeon-Soo;Moon, Jeong-Hyeon;Kim, Hee-Dong
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2009.08a
    • /
    • pp.99-103
    • /
    • 2009
  • Recently, as wired and wireless communication services have rapidly developed and multimodal mobile devices which have various characteristics have widely spread, the need for new convergence services increases. The growing population of VoIP technologies and the high communication expense yield that the market of IP based telephony such as WiFi phone and IP phone is substituted for one of the conventional PSTN telephony. With the help of this trend, the wireline network operators desire to find a market in mobile networks. Therefore, they focus on Fixed Mobile Convergence (FMC) service as one of the key factors to accomplish this goal. FMC services are able to provide the mobility of voice services between circuit switched and packet switched networks. IP Multimedia Subsystem (IMS) based Voice Call Continuity (VCC) is one of the schemes to embody FMC services. As Application Server (AS) which has this VCC function provides seamless handover of services between heterogeneous networks, FMC subscribers can communicate seamlessly with others m WiFi domain and COMA domain using WiFi-COMA dual phone. Most of enterprises have already introduced IP network infrastructure and IP-PBX (Private Branch eXchange) for telephony. However, the problems of high communication cost and work inefficiency due to frequent outside jobs or business trips have remained. In order to solve these problems, demands for enterprise FMC services increase. In this paper, we introduce a new IP-PBX based VCC model that can provide seamless handover of voice services between WiFi and COMA networks for enterprise users and we investigate some interworking and security issues between Soft Switch (SSW) and IMS, or between IMSs. In addition, we introduce a new service that can provide the continuity of voice sessions as well as video sessions using Multimedia Session Continuity (MMSC) technology which has evolved from VCC. This service is expected to be one of the next-generation personalized services based on user's context.

  • PDF

An Authentication Scheme for Providing to User Service Transparency in Multicloud Environment (멀티클라우드 환경에서 사용자에게 서비스의 투명성을 제공하는 인증 기법)

  • Lee, Jaekyung;Son, Junggab;Kim, Hunmin;Oh, Heekuck
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.6
    • /
    • pp.1131-1141
    • /
    • 2013
  • Most of the single server model of cloud computing services have problems that are hard to solve, such as a service availability, insider attack, and vendor lock-in, etc. To solve these problems, the research about multicloud has emerged. Multicloud model can supplement previous cloud model's weakness and provides new services to user. In this paper, we focus on a user authentication problem in multicloud model and propose a scheme to resolve it. We define a cloud broker-based multicloud model. And we propose an authentication protocol that is applicable at presented model. The proposed scheme can provide service transparency to user and prevent an impersonation attack by service provider.

A Design of DA_UDC(Double Authentication User.Device.Cross) Module using OTA(One Time Authentication) Key in Home Network Environment (홈 네트워크 환경에서 OTA(One Time Authentication)키를 이용한 DA_UDC(Double Authentication User.Device.Cross) 모듈 설계)

  • Jeong, Eun-Hee;Lee, Byung-Kwan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.4B
    • /
    • pp.419-427
    • /
    • 2009
  • This paper propose DA-UDC(Double Authentication User, Device, Cross) Module which solves the cost problem and the appropriation of Certificate using User Authentication, Device Authentication and Cross Authentication with OTA(One Time Authentication) Key, and which is designed not to subscribe to the service of Home network business. Home Server transmits its public key which is needed to create OTA to the user which passed the first step of authentication which verifies User ID, Device ID and Session Key. And it performs the second step of authentication process which verifies the OTA key created by a user. Whenever the OTA key of DA-UDC module is generated, the key is designed to be changed. Therefore, DA-UDC Module prevents the exposure of User and Device ID by performing the two steps of authentication and enhances the authentication security of Home Network from malicious user with OTA key. Also, DA-UDC Module is faster than the existing authentication system in processing speed because it performs authentication calculation only once. Though DA-UDC Module increases data traffic slightly because of the extra authentication key, it enhances the security more than the existing technique.

A Study on Measurement Parameters of Virtualized Resources on Cloud Computing Networks (클라우드 컴퓨팅 네트워크에서 가상화 장비 평가 항목 연구)

  • Lee, Wonhyuk;Park, Byungyeon;Kim, Seunghae;Kim, TaeYeon;Kim, Hyuncheol
    • Convergence Security Journal
    • /
    • v.14 no.7
    • /
    • pp.85-90
    • /
    • 2014
  • Cloud computing originated simply to request and execute the desired operation from the network of clouds. It means that an IT resource that provides a service using the Internet technology. It is getting the most attention in today's IT trends. In cloud computing networks, devices and data centers which are composed of the server, storage and application are connected over network. That is, data of computers in different physical locations are integrated using the virtualization technology to provide a service. Therefore cloud computing system is a key information resource, standardized methods and assessment system are required. In this paper, we aims to derive the parameters and information for research of technical standards stability evaluation method associated with various cloud computing equipment.