• Title/Summary/Keyword: information security system

Search Result 6,599, Processing Time 0.034 seconds

A Study on the Operation Components for Elliptic Curve Cryptosystem based on a Real Number Field (실수체 기반 타원곡선 암호시스템의 연산항 연구)

  • Woo, Chan-Il;Goo, Eun-Hee
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.13 no.2
    • /
    • pp.795-800
    • /
    • 2012
  • Recently, as communication is evolved by leaps and bounds through wired/wireless networks, variety of services are routinely made through communication networks. Accordingly, technology that is for protecting data and personal information is required essentially, and study of security technology is actively being make progress to solve these information protection problems. In this paper, to expand selection scope of the key of elliptic curve cryptography, arithmetic items of real number based elliptic curve algorithm among various cryptographic algorithms was studied. The result of an experiment, we could know that elliptic curve cryptography using the real number can choose more various keys than existing elliptic curve cryptography using integer and implement securer cryptographic system.

An Attack Model Based on Software Cruise for Information Warfare (정보전을 위한 소프트웨어 순항 기반 공격 모델)

  • Ryu Ho-Yeon;Nam Young-Ho
    • Journal of Internet Computing and Services
    • /
    • v.5 no.5
    • /
    • pp.49-60
    • /
    • 2004
  • Information Warfare(IW), a new aspect of war, is the field centralized the concern and research in the information security and national security, Both the defense and the offensive are important in the next generation IW, and so we need to do the various research to secure the network and system for gaining the superiority of IW. This paper proposes a model for IW based on software cruise to prepare the IW that is changing the offensive aspect. Software cruise is defined as a behavior of computer programs that travel toward specific destination from a source through the network. The proposed model have the cruise property and uses the cybermap to cruise toward the destination chosen in advance. Also, while self-movement, the model can function the predefined task.

  • PDF

The Security Plan of Matching Accuracy between Digital Map and Cadastral Map (수치지도와 지적도간의 정합정축도 확보방안)

  • 강준묵;윤희천;엄대용;강영미
    • Spatial Information Research
    • /
    • v.11 no.4
    • /
    • pp.391-407
    • /
    • 2003
  • Recently, a lot of interests are commanding in link practical use of country information and cadastral information for management of efficient country resource and administration of land. As map information, a lot of interests are commanding in construction of synthetic informations system including digital map and cadastral map. In this study, achieves analysis about non-coincidence causes of digital map and cadastral map, and achieve investigation about representative algorithm that is used in conversion of map for correct overlay between two map and opes overlay plan. Also, presented plan that can ready fetters for integration database construction of digital map and cadastral map by achieving study about matching security plan between map and plan elevation of the quality.

  • PDF

A Study on UCC and Information Security for Personal Image Contents Based on CCTV-UCC Interconnected with Smart-phone and Mobile Web

  • Cho, Seongsoo;Lee, Soowook
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.7 no.2
    • /
    • pp.56-64
    • /
    • 2015
  • The personal image information compiled through closed-circuit television (CCTV) will be open to the internet with the technology such as Long-Tail, Mash-Up, Collective Intelligence, Tagging, Open Application Programming Interface (Open-API), Syndication, Podcasting and Asynchronous JavaScript and XML (AJAX). The movie User Created Contents (UCC) connected to the internet with the skill of web 2.0 has the effects of abuse and threat without precedent. The purpose of this research is to develop the institutional and technological method to reduce these effects. As a result of this research, in terms of technology this paper suggests Privacy Zone Masking, IP Filtering, Intrusion-detection System (IDS), Secure Sockets Layer (SSL), public key infrastructure (PKI), Hash and PDF Socket. While in terms of management this paper suggests Privacy Commons and Privacy Zone. Based on CCTV-UCC linked to the above network, the research regarding personal image information security is expected to aid in realizing insight and practical personal image information as a specific device in the following research.

SPaRe: Efficient SQLite Recovery Using Database Schema Patterns

  • Lee, Suchul;Lee, Sungil;Lee, Jun-Rak
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.3
    • /
    • pp.1557-1569
    • /
    • 2017
  • In recent times, the Internet of Things (IoT) has rapidly emerged as one of the most influential information and communication technologies (ICT). The various constituents of the IoT together offer novel technological opportunities by facilitating the so-called "hyper-connected world." The fundamental tasks that need to be performed to provide such a function involve the transceiving, storing, and analyzing of digital data. However, it is challenging to handle voluminous data with IoT devices because such devices generally lack sufficient computational capability. In this study, we examine the IoT from the perspective of security and digital forensics. SQLite is a light-weight database management system (DBMS) used in many IoT applications that stores private information. This information can be used in digital forensics as evidence. However, it is difficult to obtain critical evidence from IoT devices because the digital data stored in these devices is frequently deleted or updated. To address this issue, we propose Schema Pattern-based Recovery (SPaRe), an SQLite recovery scheme that leverages the pattern of a database schema. In particular, SPaRe exhaustively explores an SQLite database file and identifies all schematic patterns of a database record. We implemented SPaRe on an iPhone 6 running iOS 7 in order to test its performance. The results confirmed that SPaRe recovers an SQLite record at a high recovery rate.

Efficient Rekey Interval for Minimum Cost on Secure Multicast System using Group Key (그룹키를 이용한 보안 멀티캐스트 시스템에서 최소 비용을 위한 Rekey Interval 할당에 관한 연구)

  • Lee, Goo-Yeon;Lee, Yong
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.40 no.1
    • /
    • pp.8-14
    • /
    • 2003
  • In this paper, we investigate a rekey mechanism for a secure multicast group communications and relate the mechanism to the loss of information from group key exposal. We also combine cost for the information loss and cost for group key updates and analyze the optimum rekey interval. Using the results of the analysis in this paper, we can manage a secure multicast group efficiently with the minimal cost on the bases of number of group members, each member's security level and withdrawal rates.

Automatic Generation of Network Topology for Large Scale Internet Simulation (대규모 인터넷 시뮬레이션을 위한 네트워크 토폴로지 자동 생성 기법)

  • Ryu, Key-Won;Choi, Kyung-Hee;Park, Seung-Kyu;Jung, Gi-Hyun;Lee, Sang-Hun;Park, Eung-Ki
    • Annual Conference of KIPS
    • /
    • 2005.11a
    • /
    • pp.1187-1190
    • /
    • 2005
  • 인터넷 토폴로지 생성 기법에 대하여 많은 연구가 진행되고 있다. 이는 인터넷 토폴로지가 라우팅, 멀티캐스트, 프로토콜 등의 성능과 사이버 테러 공격에 대한 분석 및 방어체계와 밀접한 관계가 있기 때문이다. 토폴로지를 생성하는 GT-ITM[5], INET-3.0[6] 등은 Autonomous System (AS) 노드들로 이루어진 네트워크 토폴로지를 생성한다. 즉, 이들 도구들은 AS 가 노드인 토폴로지를 생성하며, AS 내의 네트워크에 대해서는 표현하지 않는다. 이에, 본 논문에서는 대규모 네트워크의 시뮬레이션을 위한 토폴로지를 구성하는 데 필요한 PoP (Presence of Point), ISP(Internet Service Provider) 등 하위 레벨의 토폴로지를 자동 생성함으로써 네트워크 토폴로지를 표현하는 방법을 제안한다. 본 연구에서 제안하는 방법은 서로 다른 특성을 가진 하부 서브넷을 가지고 있으며 hierarchy 를 반영한 토폴로지를 생성할 수 있다는 장점을 가지고 있다.

  • PDF

Design and Estimation of a Session Key based Access Control Scheme for Secure Communications in IoT Environments (IoT 환경에서 안전한 통신을 위한 세션 키 기반 접근 제어 기법의 설계 및 평가)

  • Jin, Byungwook;Jung, Dongwoog;Cha, Siho;Jun, Moonseog
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.12 no.1
    • /
    • pp.35-41
    • /
    • 2016
  • Internet of Things (IoT) services are widely used in appliances of daily life and industries. IoT services also provide various conveniences to users and are expected to affect value added of all industries and national competitiveness. However, a variety of security threats are increased in IoT environments and lowers reliability of IoT devices and services that make some obstacles for commercialization. The attacks arising in IoT environments are making industrial and normal life accidents unlike existing information leak and monetary damages, and can expand damage scale of leakage of personal information and privacy more than existing them. To solve these problems, we design a session key based access control scheme for secure communications in IoT environments. The proposed scheme reinforces message security by generating session key between device and access control network system. We analyzed the stability of the proposed access scheme in terms of data forgery and corruption, unauthorized access, information disclosure, privacy violations, and denial of service attacks. And we also evaluated the proposed scheme in terms of permission settings, privacy indemnity, data confidentiality and integrity, authentication, and access control.

A Practical Implementation of Fuzzy Fingerprint Vault

  • Lee, Sun-Gju;Chung, Yong-Wha;Moon, Dae-Sung;Pan, Sung-Bum;Seo, Chang-Ho
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.5 no.10
    • /
    • pp.1783-1798
    • /
    • 2011
  • Recently, a cryptographic construct, called fuzzy vault, has been proposed for crypto-biometric systems, and some implementations for fingerprint have been reported to protect the stored fingerprint template by hiding the fingerprint features. In this paper, we implement the fuzzy fingerprint vault, combining fingerprint verification and fuzzy vault scheme to protect fingerprint templates. To implement the fuzzy fingerprint vault as a complete system, we have to consider several practical issues such as automatic fingerprint alignment, verification accuracy, execution time, error correcting code, etc. In addition, to protect the fuzzy fingerprint vault from the correlation attack, we propose an approach to insert chaffs in a structured way such that distinguishing the fingerprint minutiae and the chaff points obtained from two applications is computationally hard. Based on the experimental results, we confirm that the proposed approach provides higher security than inserting chaffs randomly without a significant degradation of the verification accuracy, and our implementation can be used for real applications.

A Study on Intelligent Jobs Information Recommendation Algorithm for a Mobile Environment (모바일 환경을 위한 지능형 일자리 정보 추천 알고리즘에 관한 연구)

  • Jeon, Dong-Pyo;Jeon, Do-Hong
    • Convergence Security Journal
    • /
    • v.8 no.4
    • /
    • pp.167-179
    • /
    • 2008
  • As ubiquitous technology develops, there are many studies to provide various contents proper to users through a mobile device. However, there is a limit of information provision due to a small user interface of a mobile device. This study proposes a system that can solve a problem and provide an intelligent agent model appropriate to a mobile environment and job information positively that an individual user is interested. It is composed of a personalization engine to monitor users' behavior patterns and a learning algorithm to provide information to a mobile device. Analysis shows that preferred job items are different by sex, age and education, while a region affects job searching significantly.

  • PDF