• Title/Summary/Keyword: Security design

Search Result 3,411, Processing Time 0.036 seconds

A Design of Electronic Health Records Partial Encryption Method for Protecting Patient's Information on the U-Healthcare Environment (U-Healthcare 환경에서 환자정보보호를 위한 전자차트 부분 암호화 기법 설계)

  • Shin, Seon Hee;Kim, Hyun Chul;Park, Chan Kil;Jeon, Moon Seog
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.6 no.3
    • /
    • pp.91-101
    • /
    • 2010
  • By using the U-Healthcare environment, it is possible to receive the health care services anywhere anytime. However, since the user's personal information can be easily exposed in the U-Healthcare environment, it is necessary to strengthen the security system. This thesis proposes the technique which can be used to protect the personal medical records at hospital safely, in order to avoid the exposure of the user's personal information which can occur due to the frequent usage of the electronic chart according to the computerization process of medical records. In the proposed system, the following two strategies are used: i) In order to reduce the amount of the system load, it is necessary to apply the partial encryption process for electronic charts. ii) Regarding the user's authentication process for each patient, the authentication number for each electronic chart, which is in the encrypted form, is transmitted through the patient's mobile device by the National Health Insurance Corporation, when the patient register his or her application at hospital. Regarding the modern health care services, it is important to protect the user's personal information. The proposed technique will be an important method of protecting the user's information.

A Design of Device Identification and Communication Method for Secure Device Monitoring based Smart Phone (스마트폰 기반에서 안전한 디바이스 모니터링을 위한 디바이스 식별 및 통신 기법 설계)

  • Jin, Byungwook;Ahn, Heuihak;Jun, Moonseog
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.13 no.1
    • /
    • pp.69-78
    • /
    • 2017
  • As the smartphone-based devices are diffused and developed rapidly, they provide the convenience to the users. The abovementioned sentence technologies are being used not only in the existing sensor and wireless network technology but also in the application services of the diverse fields application services such as smart appliance, smart car, smart health care, etc. and the new fusion paradigm from the industry is presented by undertaking the researches in diverse area by the enterprises and research institutions. However, the smart environment exposes its weaknesses in the mobile terminal area, existing wireless network and IT security area. In addition, due to new and variant ways of attack, not only the critical information are disclosed However also the financial damages occur. This paper proposed the protocol to perform the smartphone-based safe device monitoring and safe communication. The proposed protocol designed the management procedure of registration, identification, communication protocol and device update management protocol and the safety against the attack techniques such as the an-in-the-middle-attack, impersonation attack, credential threat, information leaks and privacy invasion was analyzed. It was observed that the proposed protocol showed the performance improved by approximately 52% in the communication process than the existing system.

Design of Multicast Group Key Management Protocol for Information Security in PIM_SM (PIM-SM 정보 보안을 위한 멀티캐스트 그룹 키 관리 프로토콜 설계)

  • 홍종준
    • Journal of Internet Computing and Services
    • /
    • v.3 no.5
    • /
    • pp.87-94
    • /
    • 2002
  • This paper proposes a group key management protocol for a secure of all the multcast user in PIM-SM multicast group communication. Each subgroup manager gives a secure key to it's own transmitter and the transmitter compress the data with it's own secure key from the subgroup manager, Before the transmitter send the data to receiver, the transmitter prepares to encrypt a user's service by sending a encryption key to the receiver though the secure channel. after checking the user's validity through the secure channel, As the transmitter sending a data after then, the architecture is designed that the receiver will decode the received data with the transmitter's group key, Therefore, transmission time is shortened because there is no need to data translation by the group key on data sending and the data transmition is possible without new key distribution at path change to shortest path of the router characteristic.

  • PDF

Design and Implementation of a Efficient Storage Virtualization System based on Distributed Hash Tables (분산 해시 테이블 기반의 효율적인 저장 장치 가상화 시스템의 설계 및 구현)

  • Kim, Jong-Hyeon;Lee, Sang-Jun
    • Journal of Internet Computing and Services
    • /
    • v.10 no.3
    • /
    • pp.103-112
    • /
    • 2009
  • This paper proposes an efficient storage virtualization system which allows users to view hard disk resources of numerous nodes as a large logical space using distributed hash tables of P2P techniques. The proposed system is developed at device level of Windows operating system and is suitable for users in Intranet environments. This system is developed to be recognized as one hard disk at the Windows explorer for user conveniences and does not need a supplementary client program at the application layer. In addition, it enhances security via cutting off breaches from external networks.

  • PDF

Multi-Attribute Data Fusion for Energy Equilibrium Routing in Wireless Sensor Networks

  • Lin, Kai;Wang, Lei;Li, Keqiu;Shu, Lei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.4 no.1
    • /
    • pp.5-24
    • /
    • 2010
  • Data fusion is an attractive technology because it allows various trade-offs related to performance metrics, e.g., energy, latency, accuracy, fault-tolerance and security in wireless sensor networks (WSNs). Under a complicated environment, each sensor node must be equipped with more than one type of sensor module to monitor multi-targets, so that the complexity for the fusion process is increased due to the existence of various physical attributes. In this paper, we first investigate the process and performance of multi-attribute fusion in data gathering of WSNs, and then propose a self-adaptive threshold method to balance the different change rates of each attributive data. Furthermore, we present a method to measure the energy-conservation efficiency of multi-attribute fusion. Based on our proposed methods, we design a novel energy equilibrium routing method for WSNs, viz., multi-attribute fusion tree (MAFT). Simulation results demonstrate that MAFT achieves very good performance in terms of the network lifetime.

A Study on Development of Fatigue Life Estimation Method for the Spider of a Drum Washing Machine with CAE (CAE를 활용한 드럼세탁기 Spider의 피로수명 평가기법 개발에 관한 연구)

  • Kim Ji-Seol;Kwak Dong-Hyun;Cho Sang-Bong;Kim Yeong-Su;Jeong Seong-Hae;Gang Dong-U;Jeong Yeon-Su;Jeong Bo-Seon
    • Proceedings of the Korean Society of Precision Engineering Conference
    • /
    • 2005.06a
    • /
    • pp.1311-1314
    • /
    • 2005
  • Recently drum washing machines are required to improve not only functions, but also endurance security. The spider is one of the major parts in a drum washing machine as a power transmission device. It is needed estimating for fatigue life because it rotates at high velocity when the drum washing machine works. In this study, we tried to estimate fatigue life of the Spider with CAE and verified the accuracy by comparing the CAE results with the experimental results. The estimation method of fatigue life for the spider with CAE will be applied to raise the efficiency of time and money in the design process of a new drum washing machine.

  • PDF

A design of the wireless sensor network routing improved security method (무선 센서 네트워크 라우팅 보안 강화 기법의 설계)

  • Kim, Woo-Jin;Khi, Ara
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2010.11a
    • /
    • pp.101-106
    • /
    • 2010
  • As a part of preparing the sniffing attack, this routing method presented in this thesis decreases the risk rates of the leaking of information through separating valid data and transmitting by a multi-path. then data is transmitted from start node to destination node on distributed sensor network. The level of reduction in leaking of information by the sniffing attack is proved by experimental result thich compare the case described above with the case of transmitting whole data with the single path by simulation, and the algorithm for choosing the routing path is showed by proof of the theorem.

  • PDF

A Study on the Block Cryptosystem Design with Variable Byte Operation (바이트 가변 연산기능을 가진 블록 암호시스템 설계에 관한 연구)

  • Lee, Seon-Keun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.12 no.5
    • /
    • pp.2311-2316
    • /
    • 2011
  • With development of information communications and network environments security importance to the informations deepen as time goes. In this viewpoint, cryptosystem is developing but proportionally cracking and hacking technology is developing. Therefore in this paper we proposed and designed block cryptosystem with byte variable operation. Designed cryptosystem based on byte operation is safe than existed cryptosystem because it is not generate the fixed DC and LC characteristics. Additionally, proposed cryptosystem have high processing rate and authenticated operation. Therefore proposed cryptosystem is considered to many aid in the network fields.

Design and Implementation of Office Security and Automation System Using RFID (RFID를 이용한 오피스 보안 및 자동화 시스템의 설계 및 구현)

  • Lee, Seung-Cheol;Ko, Myeong-Cheol;Kim, Jung-Hwan;Han, Deok-Soo;Yang, Kwon-Woo
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2006.10c
    • /
    • pp.560-565
    • /
    • 2006
  • 최근 보안에 대한 사회적인 관심이 높아지면서 RFID는 기존의 스마트카드와 바코드 시스템이 갖는 여러 기능적인 한계점들을 극복함으로써 향 후 이를 대체할 보안 신기술로서 인식되고 있다. 현재 사무실 출입의 보안을 위해 대표적으로 사용되고 있는 출입문 인증시스템은 일단 출입문을 통과한 사용자들에 대해서는 사무실 내부의 모든 요소들이 무방비 상태로 노출되어 보안상의 허점이 발생한다. 또한 사무실 내 개개의 PC에 단말기를 설치하여 사용하는 스마트카드 인증시스템 역시도 빈번한 자리 이동에 따른 카드 인증 절차의 번거로움으로 인해 근거리 이동시 PC를 잠그지 않는 경우가 빈번하게 발생함으로써 사용자 PC에 저장된 보안이 필요한 데이터들에 대한 침해 우려가 발생한다. 본 논문에서는 다중사용자 환경에서 각각의 사용자가 소지한 RFID 태그를 이용하여 기존 카드시스템과 같이 복잡한 인증절차가 필요 없고 빈번한 자리 이동이 발생하더라도 추가적인 인증작업이 없이 매번 자동으로 컴퓨터 시스템을 잠금 및 해제시킴으로써 인증과정에 따른 사용자의 부담을 줄일 수 있는 보안시스템을 제시한다. 또한 사용자가 출근과 동시에 매일 일상적으로 반복되는 사무실에서의 컴퓨터 작업에 대한 효율을 높이기 위한 사무 자동화 시스템을 구현한다.

  • PDF

The Design and Implementation of Messenger Authentication Protocol to Prevent Smartphone Phishing (스마트폰 피싱에 안전한 메신저 인증 프로토콜 설계 및 구현)

  • Yu, Byung-Seok;Yun, Sung-Hyun
    • Journal of the Korea Convergence Society
    • /
    • v.2 no.4
    • /
    • pp.9-14
    • /
    • 2011
  • Phishing is an attack to theft an user's identity by masquerading the user or the device. The number of phishing victims are sharply increased due to wide spread use of smart phones and messenger programs. Smart phones can operate various wi-fi based apps besides typical voice call and SMS functions. Generally, the messenger program such as Kakao Talk or Nate On is consisted of client and server functions. Thus, the authentication between the client and the server is essential to communicate securely. In this paper, we propose the messenger authentication protocol safe against smart phone phishing. To protect communications among clients, the proposed method provides message encryption and authentication functions.