• Title/Summary/Keyword: Security design

Search Result 3,411, Processing Time 0.029 seconds

RI-RSA system design to increase security between nodes in RFID/USN environments (RFID/USN 환경에서 노드들간의 보안성 증대를 위한 RI-RSA 시스템 설계)

  • Lee, Seon-Keun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.11
    • /
    • pp.157-162
    • /
    • 2010
  • Due to the IT development, RFID/USN became very familiar means of communication. However, because of increased number, security, and size constraints of nodes, it is insufficient to implement a variety of services. To solve these problems, this paper suggests RI-RSA, which is an appropriate asymmetric cryptographic system for RFID/USN environment. The proposed RI-RSA cryptographic system is easy to implement. To increase the processing speed, RI-RSA was suggested by subdividing the multiplication section into two-dimensional, where bottleneck phenomena occurs, and it was implemented in the hardware chip level. The simulation result verified that it caused 6% of circuit reduction, and for the processing speed, RI-RSA was 30% faster compare to the existing RSA.

Design of License Management Model for super-distribution between DRM Consumers (DRM 사용자간 재배포를 위한 라이센스관리 모델 설계)

  • Lee, Byung-Wook;Liu, Zong-Hua
    • Journal of Internet Computing and Services
    • /
    • v.8 no.3
    • /
    • pp.9-17
    • /
    • 2007
  • Super-distribution is essential for revitalization of digital contents industry in DRM system. Since existing DRM systems emphasize on security for intellectual property rights, it became restrictions to content distribution and the consumer rights. This paper suggests license management mechanism which strengthen super-distribution between consumers. It is to manage distribution history for each content by inserting consumer's identification information in content head. Client can verify security by comparing header and license after issuing license. It classifies the type of distribution and license, and then applies adaptive distribution methods. It can revitalize contents distribution by releasing proper license for super-distribution.

  • PDF

Design and Implementation of a Proxy-based Mobile Grid Services Framework (프록시 기반의 모바일 그리드 서비스 프레임워크 설계 및 구현)

  • Kim, Min-Gyu;Park, Si-Yong;Lee, Bong-Hwan
    • Journal of Internet Computing and Services
    • /
    • v.8 no.3
    • /
    • pp.85-98
    • /
    • 2007
  • In distributed computing paradigm, mobile surrogate systems have not gained wide acceptance because of security concerns that have not been suitably addressed yet. Currently even the widely used Grid middleware, Globus, does not have a host authentication mechanism, which makes it hard to provide high performance Grid computing capabilities to mobile clients. In this paper, a mobile Grid service framework is designed and implemented in order to provide Grid services to mobile host such as PDA. The surrogate host-based system allows mobile hosts to be provided with Grid services while moving. The implemented mobile Grid services system has been applied to mobile healthcare system which utilizes Grid computing for ECG signal processing. The presented system framework can be used as a secure enterprise mobile healthcare system for hospital physicians.

  • PDF

SVC: Secure VANET-Assisted Remote Healthcare Monitoring System in Disaster Area

  • Liu, Xuefeng;Quan, Hanyu;Zhang, Yuqing;Zhao, Qianqian;Liu, Ling
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.3
    • /
    • pp.1229-1248
    • /
    • 2016
  • With the feature of convenience and low cost, remote healthcare monitoring (RHM) has been extensively used in modern disease management to improve the quality of life. Due to the privacy of health data, it is of great importance to implement RHM based on a secure and dependable network. However, the network connectivity of existing RHM systems is unreliable in disaster area because of the unforeseeable damage to the communication infrastructure. To design a secure RHM system in disaster area, this paper presents a Secure VANET-Assisted Remote Healthcare Monitoring System (SVC) by utilizing the unique "store-carry-forward" transmission mode of vehicular ad hoc network (VANET). To improve the network performance, the VANET in SVC is designed to be a two-level network consisting of two kinds of vehicles. Specially, an innovative two-level key management model by mixing certificate-based cryptography and ID-based cryptography is customized to manage the trust of vehicles. In addition, the strong privacy of the health information including context privacy is taken into account in our scheme by combining searchable public-key encryption and broadcast techniques. Finally, comprehensive security and performance analysis demonstrate the scheme is secure and efficient.

The Effect on Information Communication Ethics of Experience Type Smart Learning Contents Application for High School Information Security Education (고등학교 정보보안단원의 체험형 스마트교육 콘텐츠 적용 수업이 정보통신윤리의식에 미치는 영향)

  • Seo, Hyun-Jeong;Kim, Seong-Sik
    • The Journal of Korean Association of Computer Education
    • /
    • v.19 no.6
    • /
    • pp.81-89
    • /
    • 2016
  • As the social and technical circumstance changes rapidly, passive learners who were knowledge-finders not only remember and regenerate about the given information but also critically grasp the phenomena of real life, and then also it became necessary for us to help cultivate the ability to solve the problem creatively in the new form of educational goal, educational content, educational methods and evaluation, educational environment. As a result, this study analyzes the smart learning education, fit the model of smart learning education training in high school information ethics parts, design the lesson that is proposal class of 'Information protection and Security' section, and develop the teaching and experience educational contents, furthermore, It is to investigate the impact on the ethics consciousness about information communications.

Designing and Realization of the System for the Improvement of Processing Capability of Intrusion Detection by Using O/S Information (O/S 정보를 이용한 침입탐지 처리성능 향상에 관한 시스템 설계 및 구현)

  • Son, Man-Kyung;Lee, Dong-Hwi;J Kim, Kui-Nam
    • Convergence Security Journal
    • /
    • v.6 no.2
    • /
    • pp.91-99
    • /
    • 2006
  • As the speed of network has fastened and the Internet has became common, an ill-intentioned aggression, such as worm and E-mail virus rapidly increased. So that there too many defenses created the recent Intrusion detection system as well as the Intrusion Prevention Systems to defense the malicious aggression to the network. Also as the form of malicious aggression has changed, at the same time the method of defense has changed. There is "snort" the most representive method of defense and its Rules file increases due to the change of aggression form. This causes decline of capability for detection. This paper suggest, design, and realize the structure for the improvement of processing capability by separating the files of Snort Rule according to o/s. This system show more improvement of the processing capability than the existing composion.

  • PDF

Design and Implementation of CCTV Remote Real-time Monitoring and Context Reporting System using Xcode (Xcode를 이용한 CCTV 원격 실시간 모니터링 및 상황 알림보고 시스템의 설계 및 구현)

  • Yang, Soo-Mi;Kim, Yu-Rim
    • Convergence Security Journal
    • /
    • v.15 no.1
    • /
    • pp.83-89
    • /
    • 2015
  • In the wide area surveillance system including many CCTVs, application for remote realtime monitoring is designed and implemented. The applications using Xcode provide secure administrator interface from headquarters. Through the efficient and intuitive interface, it delivers real-time context reports and inference results. For the user convenience, it includes push alarm of events, SNS, Media streaming service for real-time monitoring uses Wirecast and Wowza media server. Wowza stream engine provides URL accommodating development specification. Mobile devices can receive real-time stream data. Performance evaluation in the processing is provided.

Examining Customers' Continuance Intentions towards E-wallet Usage: The Emergence of Mobile Payment Acceptance in Vietnam

  • PHUONG, Nguyen Ngoc Duy;LUAN, Ly Thien;DONG, Vu Van;KHANH, Nguyen Le Nhat
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.7 no.9
    • /
    • pp.505-516
    • /
    • 2020
  • The purpose of the research is to identify antecedents of mobile wallet continuance intention in Vietnam. A self-administered questionnaire was distributed to collect data from a total of 276 respondents. Partial least squares structural equation modeling was employed for analyzing the data. Five mobile wallet features - mobile application quality, mobile wallet familiarity, situational normality, payment security, and feedback mechanism - are introduced as fundamental elements, which influence customer' continuance intention to use mobile wallet in Vietnam. The results indicate that mobile quality application and familiarity can significantly influence perceived ease-of-use (PEOU) and perceived usefulness (PU), but situational normality has an impact only on PEOU. PEOU and PU are positively related to satisfaction. On the other hand, payment security and feedback mechanism affect positively customer' trust. As a result, the positive effects that satisfaction and trust have on electronic wallet continuance intention are confirmed. The findings can be used to advise mobile wallet providers to improve their platform design and services to retain users. As a theoretical contribution, this study combines the Technology Acceptance Model, Unified Theory of Acceptance and Use of Technology to investigate the key determinants on continuance intention in the context of electronic wallet in Vietnam.

Factors Affecting Continuous Usage Intention of Mobile Closed Social Network Services: In-depth Interviews and An Empirical Investigation (모바일 폐쇄형 SNS의 지속적 이용의도에 영향을 미치는 요인: 심층인터뷰와 실증분석)

  • Shao, Zehua;Koh, Joon
    • The Journal of Information Systems
    • /
    • v.24 no.3
    • /
    • pp.21-46
    • /
    • 2015
  • Purpose Social Network Service (SNS) users feel fatigue in process of using open type of SNS like Facebook and Twitter. Compared to the open SNS, the closed SNS takes an closed form to prevent privacy exposure, and they are more practical and advantageous to form deeper social relationships. This study attempt to examine the effects of the mobile closed SNS characteristics (such as usefulness, playfulness, perceived security, psychological privacy, social influence, and belonging) on the users' continuous SNS usage intention. Design/methodology/approach This study used a mixed methodology combining in-depth interviews and empirical validation to investigate the effects of the mobile closed SNS characteristics on the continuous SNS usage intention of users. Findings Analytical results from a survey of 210 mobile closed SNS users showed that except perceived security, the effects of the five SNS characteristics on continuous SNS usage intention were significant. These findings contribute to improving the quality of mobile closed SNS services and suggesting SNS related marketing strategies.

A Decentralized Copyright Management Model using Mydata Concept (마이데이터 개념을 활용한 탈중앙화 저작권 관리 모델)

  • Kim, Hyebin;Shin, Weon;Shin, Sang Uk
    • Journal of Korea Multimedia Society
    • /
    • v.23 no.2
    • /
    • pp.262-273
    • /
    • 2020
  • This paper analyzes the existing copyright management and copyright sharing model and discusses the limitations. It then proposes a consortium Blockchain-based copyright management model in which the service platform participates as a node, and discusses how to combine the My Data concept with Blockchain and smart contracts. Also, Blockchain-based CP-ABE is introduced and applied to the proposed model as a way for users to define access policies and store copyright data in encrypted form on the storage of the online service providers (OSP). Compared with the existing copyright management model, the proposed model allows the copyright holder to focus on copyright registration, license content design, and sharing, as the data subject. And it is expected to be able to transparently manage the usage records and the basis for the settlement of the copyrighted data that are shared and used on each platform.