• Title/Summary/Keyword: Security Verification

Search Result 688, Processing Time 0.024 seconds

A Study on Building System of e-Discovery about Logistics Information of Safty Agricultural-livestock Products (안심 농축수산물 물류정보에 관한 e-Discovery시스템 구축 연구)

  • Jung, Kyung-yong;Park, Dae-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.05a
    • /
    • pp.287-290
    • /
    • 2014
  • The Large-scale Agricultural & Livestock Products consists largely of distribution at The nation's of school and military foods. but false information on the Agricultural & Livestock Products in a safe food supply has become a social issue. The food suppliers deliver food resource in a school-large food establishments such as Change to domestic high-quality Livestock products from low-quality foreign Livestock products, Change to eco-friendly agricultural produce from normal agricultural produce, Change to fresh vegetables from contaminated vegetables. In this paper, e-Discovery system applies to the methods and security of incorrect logistics information and evidential data about illegal products of agriculture & livestock, it is necessary as studies about compensation and liability.

  • PDF

A Review on Info-Convergence Nanohybrid System (정보 융합 나노하이브리드 시스템의 이해)

  • Jin, Wenji;Park, Dae-Hwan
    • Korean Chemical Engineering Research
    • /
    • v.57 no.3
    • /
    • pp.321-330
    • /
    • 2019
  • With the rapid development trend in multidisciplinary science and convergence technology, digital data storages have been necessary in order to accumulate a huge amount of information with high security. The possibility that biological DNA code system can offer encoding and decoding information has been illustrated by many researchers. In this review, we summarized current issue of info-convergence nanohybrid system, so-called infohybrid. DNA-inorganic nanohybrid materials and devices to achieve DNA-based molecular information system are presented. The possible applications focusing on tracking-and-traceability management, authenticity verification, and nano-forensics are also reviewed with four steps of encoding, encrypting, decrypting and decoding. We also highlighted the potential of smart code system with Nano-Bio-Info-Cogno (NBIC) convergence technology through the recently published case study of Avatar DNA nanohybrid system with smart phone.

Blockchain-based new identification system (블록체인 기반 새로운 신원확인 체계)

  • Jung, Yong-Hoon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.2
    • /
    • pp.452-458
    • /
    • 2021
  • The value and importance of personal information are increasing due to the increasing number of fields where the Internet environment and computing environment are used, and user authentication technology is also changing. Until now, accredited certificates, which are mainly used in the financial sector, are being replaced with biometric authentication technology due to the problem of revocation. However, another problem is that biometric information cannot be modified once it is leaked. Recently, with the advent of blockchain technology, research on user authentication methods has actively progressed. In this paper, both public certificate and blockchain-based user authentication can be used without system change, and a new DID issuance and reissuance method that can replace the resident registration number is presented. The proposed system can be used without restrictions in a blockchain. However, the currently used DID requires installation of an application at the Interworking Support Center for verification. Since a DID can be authenticated without registering as a member, indiscriminate information collection can be prevented. Security, convenience, and determinism are compared with the existing system, and excellence is proven based on various attack methods, its portability, and proxy use.

A Message Communication for Secure Data Communication in Smart Home Environment Based Cloud Service (클라우드 서비스 기반 스마트 홈 환경에서 안전한 데이터 통신을 위한 메시지 통신 프로토콜 설계)

  • Park, Jung-Oh
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.7
    • /
    • pp.21-30
    • /
    • 2021
  • With the development of IoT technology, various cloud computing-based services such as smart cars, smart healthcare, smart homes, and smart farms are expanding. With the advent of a new environment, various problems continue to occur, such as the possibility of exposure of important information such as personal information or company secrets, financial damage cases due to hacking, and human casualties due to malicious attack techniques. In this paper, we propose a message communication protocol for smart home-based secure communication and user data protection. As a detailed process, secure device registration, message authentication protocol, and renewal protocol were newly designed in the smart home environment. By referring to the security requirements related to the smart home service, the stability of the representative attack technique was verified, and as a result of performing a comparative analysis of the performance, the efficiency of about 50% in the communication aspect and 25% in the signature verification aspect was confirmed.

A Study on the Blockchain-Based Bill of Lading System to Improve Usability (사용성 개선을 위한 블록체인 기반 선하증권 거래 시스템 연구)

  • Lee, Ju-young;Kim, Hyun-a;Sung, Chae-min;Kim, Joung-min;Kim, Sungwook
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.11 no.7
    • /
    • pp.283-290
    • /
    • 2022
  • Blockchain is a technology that secures integrity and transparency by distributing and storing transaction details within multiple node networks. Recently, research is being conducted to secure integrity by applying blockchain to Bill of Lading (B/L documents) of monetary value. In this paper, we study a blockchain-based bill of lading system to improve usability. The shippers register the issued bill of lading on the blockchain, and banks in each country read it to conduct L/C transactions. The consignees receive the goods after completing certification with a quick response code (QR) containing the bill of lading information. Through this, shippers enjoy merits in that they can shorten the time and cost of sending shipping documents by mail and prove the integrity of the documents. The consignees have the advantage of being able to check the documents at the same time as they are registered and trust the transaction. Finally, on the bank side, the security of shipping documents is ensured and verification can be done quickly.

A Study on Improving Plan of the Evaluating System for Efficient Defense M&S Accreditation Work (효율적인 국방M&S 인정업무 수행을 위한 평가시스템 발전방안 연구)

  • Han, Seung-Ho
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.4
    • /
    • pp.42-48
    • /
    • 2021
  • Recently, the defense industry has been improving high technology by developing convergence technology through the 4th industrial revolution. On the other hand, it is very difficult to guarantee the performance of high-tech weapon systems because the test for weapon systems has many risks and cannot perform in an actual operating environment. Therefore, M&S resources are needed to make sound weapon systems, but many people demand reliable M&S resources. Owing to the continuous demand and execution of the VV&A work, related rules have developed significantly, but tools and techniques for performing the work have not been developed. Hence, there are inefficient parts in the performance of work due to the absence of a systematic system. Accordingly, many risks may cause various safety accidents, such as security. This paper suggests a direction for the development of VV&A work procedures by improving efficiency and reducing risk.

Blockchain (A-PBFT) Based Authentication Method for Secure Lora Network (안전한 Lora 네트워크를 위한 블록체인(A-PBFT) 기반 인증 기법)

  • Kim, Sang-Geun
    • Journal of Industrial Convergence
    • /
    • v.20 no.10
    • /
    • pp.17-24
    • /
    • 2022
  • Lora, a non-band network technology of the long-distance wireless standard LPWAN standard, uses ABP and OTTA methods and AES-128-based encryption algorithm (shared key) for internal terminal authentication and integrity verification. Lora's recent firmware tampering vulnerability and shared-key encryption algorithm structure make it difficult to defend against MITM attacks. In this study, the consensus algorithm(PBFT) is applied to the Lora network to enhance safety. It performs authentication and PBFT block chain creation by searching for node groups using the GPS module. As a result of the performance analysis, we established a new Lora trust network and proved that the latency of the consensus algorithm was improved. This study is a 4th industry convergence study and is intended to help improve the security technology of Lora devices in the future.

Evaluation of SPACE Code Prediction Capability for CEDM Nozzle Break Experiment with Safety Injection Failure (안전주입 실패를 동반한 제어봉구동장치 관통부 파단 사고 실험 기반 국내 안전해석코드 SPACE 예측 능력 평가)

  • Nam, Kyung Ho
    • Journal of the Korean Society of Safety
    • /
    • v.37 no.5
    • /
    • pp.80-88
    • /
    • 2022
  • The Korean nuclear industry had developed the SPACE (Safety and Performance Analysis Code for nuclear power plants) code, which adopts a two-fluid, three-field model that is comprised of gas, continuous liquid and droplet fields and has the capability to simulate three-dimensional models. According to the revised law by the Nuclear Safety and Security Commission (NSSC) in Korea, the multiple failure accidents that must be considered for the accident management plan of a nuclear power plant was determined based on the lessons learned from the Fukushima accident. Generally, to improve the reliability of the calculation results of a safety analysis code, verification is required for the separate and integral effect experiments. Therefore, the goal of this work is to verify the calculation capability of the SPACE code for multiple failure accidents. For this purpose, an experiment was conducted to simulate a Control Element Drive Mechanism (CEDM) break with a safety injection failure using the ATLAS test facility, which is operated by Korea Atomic Energy Research Institute (KAERI). This experiment focused on the comparison between the experiment results and code calculation results to verify the performance of the SPACE code. The results of the overall system transient response using the SPACE code showed similar trends with the experimental results for parameters such as the system pressure, mass flow rate, and collapsed water level in component. In conclusion, it can be concluded that the SPACE code has sufficient capability to simulate a CEDM break with a safety injection failure accident.

A study on Data Context-Based Risk Measurement Method for Pseudonymized Information Processing

  • Kim, Dong-Hyun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.6
    • /
    • pp.53-63
    • /
    • 2022
  • Recently, as digital transformation due to the COVID-19 pandemic accelerates, data to improve individual quality of life is being used in large quantities, and more reinforced non-identification processing procedures are required to utilize the most valuable personal information among data. In Korea, procedures for de-identification measures are presented through amendments to laws and guidelines, but there is no methodology to measure the level of de-identification in the field due to ambiguous processing standards and subjective risk measurement methods. This paper compares and analyzes the current status of policy and guidelines related to de-identification measures proposed at home and abroad to derive complementary points, suggests a data context-based risk measurement method centered on pseudonymized information processing, and verifies its validity. As a result of verification through Delphi survey and focus group interview (FGI), it was confirmed that the need for the proposed methodology and the validity of the indicators were high.

Collaborative Modeling of Medical Image Segmentation Based on Blockchain Network

  • Yang Luo;Jing Peng;Hong Su;Tao Wu;Xi Wu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.3
    • /
    • pp.958-979
    • /
    • 2023
  • Due to laws, regulations, privacy, etc., between 70-90 percent of providers do not share medical data, forming a "data island". It is essential to collaborate across multiple institutions without sharing patient data. Most existing methods adopt distributed learning and centralized federal architecture to solve this problem, but there are problems of resource heterogeneity and data heterogeneity in the practical application process. This paper proposes a collaborative deep learning modelling method based on the blockchain network. The training process uses encryption parameters to replace the original remote source data transmission to protect privacy. Hyperledger Fabric blockchain is adopted to realize that the parties are not restricted by the third-party authoritative verification end. To a certain extent, the distrust and single point of failure caused by the centralized system are avoided. The aggregation algorithm uses the FedProx algorithm to solve the problem of device heterogeneity and data heterogeneity. The experiments show that the maximum improvement of segmentation accuracy in the collaborative training mode proposed in this paper is 11.179% compared to local training. In the sequential training mode, the average accuracy improvement is greater than 7%. In the parallel training mode, the average accuracy improvement is greater than 8%. The experimental results show that the model proposed in this paper can solve the current problem of centralized modelling of multicenter data. In particular, it provides ideas to solve privacy protection and break "data silos", and protects all data.