• Title/Summary/Keyword: information security system

Search Result 6,599, Processing Time 0.029 seconds

The Distributed Encryption Processing System for Large Capacity Personal Information based on MapReduce (맵리듀스 기반 대용량 개인정보 분산 암호화 처리 시스템)

  • Kim, Hyun-Wook;Park, Sung-Eun;Euh, Seong-Yul
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.3
    • /
    • pp.576-585
    • /
    • 2014
  • Collecting and utilizing have a huge amount of personal data have caused severe security issues such as leakage of personal information. Several encryption algorithms for collected personal information have been widely adopted to prevent such problems. In this paper, a novel algorithm based on MapReduce is proposed for encrypting such private information. Furthermore, test environment has been built for the performance verification of the distributed encryption processing method. As the result of the test, average time efficiency has improved to 15.3% compare to encryption processing of token server and 3.13% compare to parallel processing.

Evolution Of Educational Activity: Digitalization Of Information Space Of Distance Education

  • Postova, Svitlana;Karpliuk, Svitlana;Vdovina, Olena;Nakonechna, Oksana;Khoroshev, Oleksandr;Chernova, Iryna
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.9
    • /
    • pp.163-168
    • /
    • 2021
  • The article discusses the use of the concept of digitalization in the science of education. The influence of information technologies on the ability to self-study is analyzed. Various technologies that are used in science and education are shown. The issues of the advantages of using IT as a tool for creating conditions for the implementation of the problem-activity approach and the organization of project activities are considered. The possibilities are shown, which gives the opportunities that the use of ICT of distance educational resources in the educational process gives. Shown is their auxiliary form of transmission, information retrieval; working out skills and consolidating what has been learned. Based on the analysis of the presented material of the article, you can see what problems can be solved using IT and remote resources.

A Proposed Model for Supply Chain using Blockchain Framework

  • Zenab AlSadeq;Haya Alubaidan;Alanoud Aldweesh;Atta-ur-Rahman ;Tahir Iqbal
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.6
    • /
    • pp.91-98
    • /
    • 2023
  • The rapid increase in the use of new technology known as 'blockchain technologies' has addressed many challenges in different areas and provided benefits to users, in this paper we discuss the field of supply chains, improve confidence and transparency between participants and stakeholders significantly also in this paper we Compare between different blockchain frameworks focusing on most popular frameworks. Moreover, we proposed a model in the supply chain using a blockchain framework, the proposed supply chain model included many different resources that help to exchange information over the network. The proposed model also includes smart contracts that maintain all rules for transactions. using blockchain technology information such as transaction details, time and money are recorded and stored within the system from the beginning of the transaction entry.

Future Cyber Information Warfare (사이버 정보전 준비 해야)

  • 오제상
    • Convergence Security Journal
    • /
    • v.1 no.1
    • /
    • pp.31-35
    • /
    • 2001
  • Currently if we are to make a thought to depend on our fast developing information technology, a future war is necessarily to be made a situation of a cyber information warfare. A attacker in the cyber information warfare is able to make attack a military or a civil information and communication system, especially if a attack of a hacker, a virus or a electromagnetic pulse bomb at a military C4ISR system is able to make a confusion or a interruption in military operations, they are available to attack as a real time with non restrictions of physical distance, time, weather and space. While a expenditure of carrying out the cyber information warfares is the lowest expenditure, a effect of carrying out the cyber information warfares is the greatest effect in side of a interruption of information, a confusion, a terror, a pillage and crime of the people. This paper is to introduce "weapons of cyber information warfares", "offence capability of cyber information warfares about several nations" and to propose "a cyber information warfare organization" or the future knowledge warfare. the future knowledge warfare.

  • PDF

Privacy Leakage Monitoring System Design for Privacy Protection (개인정보보호를 위한 개인정보 유출 모니터링 시스템의 설계)

  • Cho, Sung-Kyu;Jun, Moon-Seog
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.1
    • /
    • pp.99-106
    • /
    • 2012
  • Numerous private corporations and public institutions are collecting personal information through the diverse methods for the purpose of sales, promotion and civil services, and using personal information for the profits of the organizations and services. However, due to immaturity of the technical, managerial measures and internal control for the collected personal information, the misuse, abuse and the leaks of personal information are emerged as major social issues, and the government also is promoting implementation of the act on the privacy protection by recognizing the importance of the personal information protection. This research describes on the measures to detect the anomaly by analyzing personal information treatment patterns managed by the organizations, and on the measures to coup with the leaks, misuse, and abuse of personal information. Particularly, this research is intended to suggest privacy leakage monitoring system design, which can be managed by making the elements related to personal information leaks to numeric core risk indexes to be measured objectively.

Reliability Improvement of the Electronic Security Fence Using Friction Electricity Sensor by Analyzing Frequency Characteristic of Environmental Noise Signal (환경잡음신호의 주파수특성 분석에 의한 전자보안펜스의 신뢰성 향상)

  • Yun, Seok Jin;Won, Seo Yeon;Kim, Hie Sik;Lee, Young Chul;Jang, Woo Young
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.52 no.3
    • /
    • pp.173-180
    • /
    • 2015
  • A passive type of fence security system was developed, which was based on electric charge detection technique. The implemented fence security system was installed at outskirts of greenhouse laboratory in the University of Seoul. The purpose of this research is to minimize false alarms by analyzing environmental noise. The existing system determines the intrusion alarm by analyzing the power of amplified signal, but the alarm was seriously affected by natural strong wind and heavy rainfall. The SAU(Signal Analysis Unit) sends input signals to remote server which displays intrusion alarm and stores all the information in database. The environmental noise such as temperature, humidity and wind speed was separately gathered to analyze a correlation with input signal. The input signal was analyzed for frequency characteristic using FFT(Fast Fourier Transform) and the algorithm that differentiate between intrusion alarm and environmental noise signal is improved. The proposed algorithm is applied for the site for one month as the same as the existing algorithm and the false alarm data was gathered and analyzed. The false alarm number was decreased by 98% after new algorithm was applied to the fence. The proposed algorithm improved the reliability at the field regarding environmental noise signal.

Dynamic Virtual Organization Management System for Grid Based Information Retrieval Service (그리드 기반 정보검색 서비스를 위한 동적 가상 조직 관리 시스템)

  • Kim, Yang-Woo;Lee, Seung-Ha;Kim, Hyuk-Ho
    • The KIPS Transactions:PartD
    • /
    • v.13D no.7 s.110
    • /
    • pp.1009-1016
    • /
    • 2006
  • Under foundational precepts of Grid computing, two important requirements that all Grid application systems should satisfy are to accommodate the dynamic nature of Virtual Organizations (VOs), and to enforce different levels of security among different VOs. For the research described in this paper, we developed two different use-case scenarios addressing the two requirements, and then showed how the requirements can be met by implementing a Grid information retrieval (GIR) system prototype. The dynamic nature of VO applies not only to increasing and decreasing number of users, but also to the dynamically changing requirement of computing power among the different subcomponents that consist in overall system configuration. This implies that a request to increase computing power by a certain subcomponent can be satisfied by other idling subcomponents taking advantage of overall system flexibility. This paper describes how we implemented a Grid IR system using VO and security mechanisms provided by Globus toolkit 3.0, and shows how GIR system scalability and security can be improved for dynamic VOs. In order to manage different VOs, we implemented VO management service (VOMS), and registered it to Globus as an additional service.

A Novel Transmitter and Receiver Design of CDSK-Based Chaos Communication System (CDSK 방식의 카오스 통신 시스템의 새로운 송·수신기 설계)

  • Lee, Jun-Hyun;Ryu, Heung-Gyoon
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.24 no.10
    • /
    • pp.987-993
    • /
    • 2013
  • Chaos communication system has characteristics of non-periodic, non-predictability, broadband signal and easy implementation. Also, chaos communication system is sensitive to the initial value, because completely another signal is generated when initial value of chaos equation is changed subtly. By these characteristics, security of chaos communication system is generally evaluated better than other digital communication systems. However, BER(Bit Error Rate) performance is worse than other digital communication systems, because transmitter and receiver of existing chaos communication system are strongly influenced by reference signal and noise. So, studies in order to improve the BER performance of chaos communication system is continuously performed. In this paper, We will propose a new CDSK (Correlation Delay Shift Keying) receiver in order to improve the BER performance. After we compare to the performance of existing receiver and proposed receiver, BER performance of proposed receiver evaluate. A novel receiver has characteristic that BER performance is better than existing receiver. However, if existing transmitter is used, existing receiver is possible to recover information bits even though BER performance is bad. Therefore, we propose a novel CDSK transmitter in order to improve the security of proposed receiver. When information bits are transmitted by using proposed transmitter, existing receiver is impossible to recover information bits, and proposed receiver is possible to recover information bits.

A Study of Web Application Attack Detection extended ESM Agent (통합보안관리 에이전트를 확장한 웹 어플리케이션 공격 탐지 연구)

  • Kim, Sung-Rak
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.1 s.45
    • /
    • pp.161-168
    • /
    • 2007
  • Web attack uses structural, logical and coding error or web application rather than vulnerability to Web server itself. According to the Open Web Application Security Project (OWASP) published about ten types of the web application vulnerability to show the causes of hacking, the risk of hacking and the severity of damage are well known. The detection ability and response is important to deal with web hacking. Filtering methods like pattern matching and code modification are used for defense but these methods can not detect new types of attacks. Also though the security unit product like IDS or web application firewall can be used, these require a lot of money and efforts to operate and maintain, and security unit product is likely to generate false positive detection. In this research profiling method that attracts the structure of web application and the attributes of input parameters such as types and length is used, and by installing structural database of web application in advance it is possible that the lack of the validation of user input value check and the verification and attack detection is solved through using profiling identifier of database against illegal request. Integral security management system has been used in most institutes. Therefore even if additional unit security product is not applied, attacks against the web application will be able to be detected by showing the model, which the security monitoring log gathering agent of the integral security management system and the function of the detection of web application attack are combined.

  • PDF

Hash-based Authentication Protocol for RFID Applicable to Desynchronization between the Server and Tag with efficient searching method (서버와 태그 비동기시에도 효율적으로 검색이 가능한 해시기반 RFID 인증 프로토콜)

  • Kwon, Hye-Jin;Kim, Hae-Mun;Jeong, Seon-Yeong;Kim, Soon-Ja
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.5
    • /
    • pp.71-82
    • /
    • 2011
  • The RFID system provides undeniable advantages so that it is used for various application. However recent RFID system is vulnerable to some attacks as eavesdropping, replay attack, message hijacking, and tag tampering, because the messages are transmitted through the wireless channel and the tags are cheap. Above attacks cause the tag and reader impersonation, denial of service by invalidating tag, and the location tracking concerning bearer of tags, A lot of RFID authentication protocol bas been proposed to solve the vulnerability. Since Weis, Sanna, Rivest, and Engel, proposed the bash-based RFID authentication protocol, many researchers have improved hash-based authentication protocol and recent bash-based authentication protocols provide security and desirable privacy. However, it remains open problem to reduce the tag identification time as long as privacy and security are still guaranteed. Here we propose a new protocol in which the tags generate the message depending on the state of previous communitions between tag and reader. In consequence, our protocol allows a server to identify a tag in a reasonable amount of time while ensuring security and privacy, To be specific, we reduced the time for the server to identify a tag when the last session finished abnormally by at least 50% compared with other bash-based schemes that ensure levels of security and privacy similar to ours.