• Title/Summary/Keyword: Security Verification

Search Result 715, Processing Time 0.022 seconds

A Fast and Exact Verification of Inter-Domain Data Transfer based on PKI

  • Jung, Im-Y.;Eom, Hyeon-Sang;Yeom, Heon-Y.
    • Journal of Information Technology Applications and Management
    • /
    • v.18 no.3
    • /
    • pp.61-72
    • /
    • 2011
  • Trust for the data created, processed and transferred on e-Science environments can be estimated with provenance. The information to form provenance, which says how the data was created and reached its current state, increases as data evolves. It is a heavy burden to trace and verify the massive provenance in order to trust data. On the other hand, it is another issue how to trust the verification of data with provenance. This paper proposes a fast and exact verification of inter-domain data transfer and data origin for e-Science environment based on PKI. The verification, which is called two-way verification, cuts down the tracking overhead of the data along the causality presented on Open Provenance Model with the domain specialty of e-Science environment supported by Grid Security Infrastructure (GSI). The proposed scheme is easy-applicable without an extra infrastructure, scalable irrespective of the number of provenance records, transparent and secure with cryptography as well as low-overhead.

An Automatic Signature Verification Algorithm for Smart Devices

  • Kim, Seong-Hoon;Fan, Yunhe;Heo, Gyeongyong
    • Journal of the Korea Society of Computer and Information
    • /
    • v.20 no.10
    • /
    • pp.15-21
    • /
    • 2015
  • In this paper, we propose a stable automatic signature verification algorithm applicable to various smart devices. The proposed algorithm uses real and forgery data all together, which can improve the verification rate dramatically. As a tool for signature acquisition in a smart device, two applications, one using touch with a finger and the other using a pressure-sensing-stylus pen, are developed. The verification core is based on SVM and some modifications are made to include the characteristics of signatures. As shown in experimental results, the minimum error rate was 1.84% in the SVM based method, which can easily defeat 4.38% error rate with the previous parametric approach. Even more, 2.43% error rate was achieved with the features excluding pressure-related features, better than the previous approach including pressure-related features and only about 0.6% more error than the best result, which means that the proposed algorithm can be applied to a smart device with or without pressure-sensing-stylus pens and used for security purposes.

Study on the Effective Management Plans of Mobilization Security Business which Utilizes NFC (NFC를 활용한 출동경비업무의 효율적 관리방안에 관한 연구)

  • Kim, Min Su;Lee, Dong Hwi;Kim, Kui Nam J.
    • Convergence Security Journal
    • /
    • v.13 no.2
    • /
    • pp.95-100
    • /
    • 2013
  • As the near field communication technology's application scope tends to expand gradually in the various fields, application of mobile-based NFC(Near Field Communication) is increasing in the various types of technologies. The method which reads the URL address and supports access to the web site of the address if you touch the NFC device in the tag(RFID) that the URL address is stored was applied to the unmanned security system. It proposed the effective plan to manage mobilization security business in the aspects of Integrity, Damage, Real-Time, and Speed through comparison and verification of the method with the existing unmanned security system.

Be study technical information protection in ubiqutious home networks (유비쿼터스 홈 네트워크에서의 정보보호 기술 연구)

  • Cheon, Jae-Hong;Park, Dea-Woo
    • KSCI Review
    • /
    • v.15 no.1
    • /
    • pp.65-75
    • /
    • 2007
  • Analyzed about a matter and requirements to intimidate security of ubiquitous and home network threatening various security for personal information protection in ubiquitous home networks at these papers, and studied. Got authentication procedures and verification procedures acid user approach to be reasonable through designs to the home security gateway which strengthened a security function in the outsides, and strengthened protection of a home network. Also, execute a DoS, DDoS, IP Spoofing attack protective at home network security gateways proved, and security regarding an external denial of service attack was performed, and confirmed. Strengthen appliances and security regarding a user, and confirm a defense regarding an external attack like DoS, DDoS, IP Spoofing, and present a home network security model of this paper to the plans that can strengthen personal information protection in ubiquitous home networks in ubiquitous home networks through experiment.

  • PDF

Function-Level Verification of Security Vulnerabilities in Windows Network Services (Windows 네트워크 서비스 함수 수준의 취약점 검증)

  • Park, Jung-Min;Song, Yong-Ho;Choi, Young-Han;Kim, Hyoung-Chun;Hong, Soon-Jwa
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2005.11a
    • /
    • pp.73-75
    • /
    • 2005
  • 최근 Windows 관련 취약점으로 인한 피해는 매우 커지고 있다. 그러나 그에 대한 조치는 사후처리식의 수동적 형태였다. 따라서 본 논문에서는 Windows 관련 취약점에 능동적으로 대처하기 위하여 Windows 관련 취약점 공격 유형을 분석하고, 그 정보를 바탕으로 주요 취약점의 동작 원리를 분석하여 사전에 예상되는 취약점의 취약성유무를 검증하는 기법을 제안한다.

  • PDF

Deep Learning Based Security Model for Cloud based Task Scheduling

  • Devi, Karuppiah;Paulraj, D.;Muthusenthil, Balasubramanian
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.9
    • /
    • pp.3663-3679
    • /
    • 2020
  • Scheduling plays a dynamic role in cloud computing in generating as well as in efficient distribution of the resources of each task. The principle goal of scheduling is to limit resource starvation and to guarantee fairness among the parties using the resources. The demand for resources fluctuates dynamically hence the prearranging of resources is a challenging task. Many task-scheduling approaches have been used in the cloud-computing environment. Security in cloud computing environment is one of the core issue in distributed computing. We have designed a deep learning-based security model for scheduling tasks in cloud computing and it has been implemented using CloudSim 3.0 simulator written in Java and verification of the results from different perspectives, such as response time with and without security factors, makespan, cost, CPU utilization, I/O utilization, Memory utilization, and execution time is compared with Round Robin (RR) and Waited Round Robin (WRR) algorithms.

A Study on Embedded Operating System Security Technology for Ubiquitous Computing (유비쿼터스 컴퓨팅을 위한 임베디드 운영체제 보안 기술 연구)

  • Park, Jong-Hyuk
    • Journal of Korea Multimedia Society
    • /
    • v.13 no.8
    • /
    • pp.1194-1201
    • /
    • 2010
  • Currently embedded system has been widespreadly used in digital Set-top box, mobile phone, USN, etc and the significance of security has been increased due to be necessarily embedded in these all system. In this paper we propose new integrity verification scheme among the main security requirements in target system based on the korea TTA standard, security reference model for embedded operating system, published in december 2006. Moreover the proposed scheme is more effective than the previous scheme, Jung, et al.[2,6].

A Study on the Information System Security Audit Method for Personal Information Protection (개인정보보호를 위한 정보시스템 보안감사 방법에 관한 연구)

  • Lee, Dong-Nyuk;Park, Jeong-Sun
    • Journal of the Korea Safety Management & Science
    • /
    • v.12 no.4
    • /
    • pp.107-116
    • /
    • 2010
  • To give a solution to solve personal information problems issued in this study, the domestic and overseas cases about information security management system including an authentication technique are analyzed. To preserve the outflow of personal information, which is such a major issue all over the world, a new security audit check list is also proposed. We hope this study to help information system developers construct and operate confidential information systems through the three steps: Analysis of risk factors that expose personal information, Proposal to solve the problem, Verification of audit checking items.

Formal Verification of LSH Hash Function Using Cryptol (Cryptol을 이용한 LSH 해시함수 정형검증)

  • Ryu, Do-Hyeon;Choi, Yong-Rak;Kim, Tae-Hoon;Shin, Youngjoo
    • Annual Conference of KIPS
    • /
    • 2018.10a
    • /
    • pp.162-165
    • /
    • 2018
  • 암호 알고리즘은 세계적으로 표준화가 진행되고 있으며, 암호 알고리즘의 안전성은 충분히 입증되어 왔다. 하지만, 기존 검증 방법으로 사용되는 테스트벡터 방식으로는 전수조사를 시행할 수 없어 구현상의 취약점을 완벽하게 발견할 수 없기 때문에 심각한 피해를 야기할 수 있다. 그래서 개발한 혹은 현재 존재하고 있는 암호 알고리즘이 표준에 따라 올바르게 구현되었는지에 대한 개선된 검증 방법이 필요하다. 본 논문에서는 KISA에서 개발한 LSH 해시함수 모듈을 미국의 Galois사와 NSA가 함께 공동 개발한 Cryptol을 이용하여 암호 모듈이 올바르게 구현되었는지 검증하였다.

Implementation and Verification of the Image Encryption Scheme for Industrial Digital Image Security (산업용 디지털 이미지 보안을 위한 이미지 암호화 기법 구현 및 검증)

  • Hong, Young-Sik;Chung, Jang-Young
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.6
    • /
    • pp.13-20
    • /
    • 2011
  • Nowadays, digital-images are widely used at Web, industrial and medical applications. There have been many studies on online and Web copyright. But there are a few studies on industrial digital-image. In this paper, we propose the image encryption scheme for digital image in the industrial film. We implement and verify the proposed digital image encryption scheme for prevention of industrial secrets and intellectual property right outflow.