• Title/Summary/Keyword: information security system

Search Result 6,599, Processing Time 0.029 seconds

Efficient File System Level Encryption Mechanism Using HSM (HSM을 이용한 효율적인 파일시스템 암호화 메커니즘)

  • Kang, Cheol-Oh;Won, Jong-Jin;Park, Sung-Jin;Ryou, Jea-Cheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.5
    • /
    • pp.849-858
    • /
    • 2013
  • In today's mobile computing environment, there are many threats, such as device loss or theft, malware, to the sensitive information stored on end user device. To prevent disclosure of information, encryption and authentication method are properly adjusted to the device. In cryptographic file systems, CBC mode of operation has been commonly used. It requires an IV need not be secret, but must be unpredictable and protect integrity of the IV. In this paper, we propose file system-level encryption mechanism with HSM that satisfy the requirement of the IV and improve the performance. Moreover, Design and experimental results prove the efficiency of our proposed method.

Collaborative Consumption Motivation Factor Model under the Sharing Economy (공유경제 모형에서의 협력적 소비 영향요인)

  • Roh, Tae-Hyup;Choi, Hwa-Yeol
    • The Journal of Information Systems
    • /
    • v.27 no.2
    • /
    • pp.197-219
    • /
    • 2018
  • Purpose The purpose of this study is to examine what motivates users to adopt one of the emerging applications for collaborative consumption of sharing economy. Using the self-determination theory, motivation theory and TAM(Technology Acceptance Model) as the theoretical framework, this study illustrates important factors that influence adoption of collaborative consumption service. We develops the ICTs(Information and Communications Technologies) initiatives and motivation model to collaborative consumption. Design/methodology/approach This paper makes use of a quantitative methodology using survey questionnaire that allows for the measurement of the eight constructs(System Availability, Contents Quality, Design & Personalization, Security & Privacy, Emotional & Social Value, Economic Value, Attitude, Adoption & Consumption) contained in the hypothesized theoretical model on the basis of the prior literatures. Data collected from a sample of 227 respondents who have used the collaborative consumption services and provided the foundation for the examination of the proposed relationships in the model. Findings This study has the following implications for the users and providers of CC platforms and services. The ICTs initiatives (System Availability, Contents Quality, Design & Personalization, Security & Privacy) are the influential factors that motivate the emotional and social value to CC. On the other hand, The ICTs initiatives (System Availability, Contents Quality) are not very significant factors of economic value to CC. The empirical analysis result indicate that there are significant causal effect among emotional & social value, economic value, and adoption to CC. This study provides important theoretical implications for innovation adoption research through an empirical examination of the relationship between ICTs initiatives, motivation factors to collaborative consumption in the sharing economy.

The suggestion of new big data platform for the strengthening of privacy and enabled of big data (개인정보 보안강화 및 빅데이터 활성화를 위한 새로운 빅데이터 플랫폼 제시)

  • Song, Min-Gu
    • Journal of Digital Convergence
    • /
    • v.14 no.12
    • /
    • pp.155-164
    • /
    • 2016
  • In this paper, we investigate and analyze big data platform published at home and abroad. The results had a problem with personal information security on each platform. In particular, there was a vulnerability in the encryption of personal information stored in big data representative of HBase NoSQL DB that is commonly used for big data platform. However, data encryption and decryption cause the system load. In this paper, we propose a method of encryption with HBase, encryption and decryption systems, and methods for applying the personal information management system (PMIS) for each step of the way and big data platform to reduce the load on the network to communicate. And we propose a new big data platform that reflects this. Therefore, the proposed Big Data platform will greatly contribute to the activation of Big Data used to obtain personal information security and system performance efficiency.

A Study of Logical Network Monitoring System Architecture for Research Group (응용연구 그룹별 논리 네트워크 모니터링 시스템 구조 연구)

  • Kang, Hyun-Joong;Kim, Hyun-Cheol
    • Convergence Security Journal
    • /
    • v.12 no.3
    • /
    • pp.75-83
    • /
    • 2012
  • Recent science technology research network moves to establish logical private network among specific research groups such as high energy physics and climate, requiring to implement private network by group for each purpose. Up to now, national research networks such as KREONET service high capacity logical private networks. Therefore standardized configuration and management scheme is essential for the deployment of logical private network. In this study, we propose the core service element and protocols for the logical networks over Layer 2 networks. We also propose system architecture that make monitoring and management easier. After that we design and implement monitoring map for logical network based on scheme. For this purpose, we also propose the description system for logical research network to provide data such as operation information, formation information, performance information and failure information of network infrastructure resource.

A model for preventing the spread of infectious diseases using beacons (비콘을 활용한 감염병 확산 방지 시스템에 관한 모델)

  • Kim, Ho-Yoon;Kim, Hyo-Jong;Shin, Seung-Soo
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.8
    • /
    • pp.14-22
    • /
    • 2021
  • As the Covid-19 outbreak spreads and prolongs around the world, visitor lists are prepared in various ways when entering the facility to prevent infection and identify confirmed people. In this study, we propose an access management system using beacons to solve the problems with the preparation and management of existing visitor lists. The research method searches the laws related to the collection of personal information and compares the current status of personal information collection and trends in the beacons. The proposed system compares and analyzes existing methods and security and efficiency, which confirm accurate and rapid access registration. By using Beacon access management system, it is effective in preventing and responding to the spread of new infectious diseases in the future.

The Analyzing the Consumer Information Leak Case of Korean Card Companies with Business Ethics CLD: Studying on Cause and Solution with System Dynamics (윤리경영 인과지도를 바탕으로 분석한 한국의 카드사 고객정보 유출 사건: 시스템다이내믹스를 활용한 원인 탐구와 해결책 모색)

  • Kim, SeungBum;Shin, Ho-Sang
    • Korean System Dynamics Review
    • /
    • v.17 no.1
    • /
    • pp.77-105
    • /
    • 2016
  • Whenever Information leak case had been happened, even though IT Infra systems were reinforced, those cases of kind were not decreased. It meant that the causes are not only the fault of IT, but also other things. So that the information leak cases should have been studied by the interdisciplinary way. There was a point of view for the Business Ethics which needed to be studied in the interdisciplinary way. Financial Information Leak Case of three representative Card Companies in Korea which is happened in 2014 was a case which was composed by many problems. These were bad circumstances, half-educated, lower salary, and the most of all, the C-Levels' ignorance of the law. By studying the CLD: Causal Loop Diagram of Business Ethics and those mentioned factors, few meanings were discovered. Firstly, this case was not a accident, but a predeterminate issue at all, because of the structural unethical corruption. Secondly, main reason of this case was not only criminals who leaked information, but also managers, especially CEO who didn't obey the law, forced that to employees. Thirdly, although those companies had moral guide and did CSR activities, it was not help to protect this information leak case. This study shows that the important thing was not the action for showing, but effective action to management for sustainability.

Design and Implementation of the Payment System using One-time Credit Information (일회용 신용정보를 이용한 전자지불 시스템의 설계 및 구현)

  • Sin, Jong-Cheol;Park, Jong-Yeol;Lee, Hyeong-Hyo;Lee, Dong-Ik;Yun, Seok-Hwan
    • The KIPS Transactions:PartC
    • /
    • v.9C no.3
    • /
    • pp.351-358
    • /
    • 2002
  • Recently, personal business styles have been rapidly changed into e-business due to the rapid progress and deployment of Internet. As a result of the change, new and safe ways of payment such as electronic wallet, electronic money and electronic check have been developed and introduced. In this paper a secure and user-friendly payment method is addressed. One of most important reasons why newly developed safe payment methods are not widely used in e-business is lack of convenience for the users. On the other hand credit card based payment, which is traditional one, is the most prevailing due to the user-friendliness. However this payment also has some problem in sense of security. In this paper, we design and implement a secure credit card-based payment system using one-time credit information. The main features are "payment information must be new", "can use the old credit system", and "do not require client software".

Practical Conjunctive Searchable Encryption Using Prime Table (소수테이블을 이용한 실용적인 다중 키워드 검색가능 암호시스템)

  • Yang, Yu-Jin;Kim, Sangjin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.1
    • /
    • pp.5-14
    • /
    • 2014
  • Searchable encryption systems provide search on encrypted data while preserving the privacy of the data and the search keywords used in queries. Recently, interest on data outsourcing has increased due to proliferation of cloud computing services. Many researches are on going to minimize the trust put on external servers and searchable encryption is one of them. However, most of previous searchable encryption schemes provide only a single keyword boolean search. Although, there have been proposals to provide conjunctive keyword search, most of these works use a fixed field which limit their application. In this paper, we propose a field-free conjunctive keyword searchable encryption that also provides rank information of search results. Our system uses prime tables and greatest common divisor operation, making our system very efficient. Moreover, our system is practical and can be implemented very easily since it does not require sophisticated cryptographic module.

A study on BLE-based ZEP System Attack Techniques and Countermeasures Utilizing the Convergence of Big data Platform and Monitoring System (빅데이터 플랫폼과 모니터링 시스템의 융합을 이용한 BLE기반의 ZEP시스템 공격 기법에 대한 대응방안 연구)

  • Ahn, Ye-Chan;Shin, Young-Hyun;Lee, Keun-Ho
    • Journal of Digital Convergence
    • /
    • v.13 no.8
    • /
    • pp.331-336
    • /
    • 2015
  • Lately, the development and utilization of technology of the Internet of Things(IoT), and Fintech have been on the rise and amid the emerging convergence of system and service, mobile payment system and location based service technology have received much attention. Considering the fact that smartphone users are currently utilizing mobile payment frequently, many corporations are introducing various methods to the market for easy payment process of consumers by grafting various technologies, and by utilizing the technology based on BLE technology and location based technology, it is emerging as new method applied to payment service such as ZEP, for easy payment process. And by checking the existence of security threats and studying the attack techniques in these payment services, we strive to suggest a method of response based on big data platform.

Building of Remote Control Attack System for 2.4 GHz Wireless Keyboard Using an Android Smart Phone (안드로이드 스마트폰을 이용한 2.4 GHz 무선 키보드 원격제어 공격 시스템 구축)

  • Lee, Su-Jin;Park, Aesun;Sim, Bo-Yeon;Kim, Sang-su;Oh, Seung-Sup;Han, Dong-Guk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.4
    • /
    • pp.871-883
    • /
    • 2016
  • It has been steadily increasing to use a wireless keyboard via Radio Frequency which is the input device. Especially, wireless keyboards that use 2.4 GHz frequency band are the most common items and their vulnerabilities have been reported since 2010. In this paper, we propose a 2.4 GHz wireless keyboard keystroke analysis and injection system based on the existing vulnerability researches of the Microsoft 2.4 GHz wireless keyboards. This system is possible to control on the remote. We also show that, via experiments using our proposed system, sensitive information of user can be revealed in the real world when using a 2.4 GHz wireless keyboard.