• 제목/요약/키워드: security requirement

검색결과 396건 처리시간 0.024초

Enabling Efficient Verification of Dynamic Data Possession and Batch Updating in Cloud Storage

  • Qi, Yining;Tang, Xin;Huang, Yongfeng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제12권6호
    • /
    • pp.2429-2449
    • /
    • 2018
  • Dynamic data possession verification is a common requirement in cloud storage systems. After the client outsources its data to the cloud, it needs to not only check the integrity of its data but also verify whether the update is executed correctly. Previous researches have proposed various schemes based on Merkle Hash Tree (MHT) and implemented some initial improvements to prevent the tree imbalance. This paper tries to take one step further: Is there still any problems remained for optimization? In this paper, we study how to raise the efficiency of data dynamics by improving the parts of query and rebalancing, using a new data structure called Rank-Based Merkle AVL Tree (RB-MAT). Furthermore, we fill the gap of verifying multiple update operations at the same time, which is the novel batch updating scheme. The experimental results show that our efficient scheme has better efficiency than those of existing methods.

The Interconnection Technology of Small Self-generating System with Distribution Line

  • Park, Kyung-sun;Chiu Hwang
    • 에너지공학
    • /
    • 제8권1호
    • /
    • pp.76-84
    • /
    • 1999
  • The demand of Small Self-generating System (SSS) including Small Cogeneration System (SCS) is constantly increasing with the need of electricity and/or thermal in office, hospital, hotel, and small factory, etc. It is especially recommended to operate SCS in the heat-following mode to maximize the efficiency of generator. In case of the heat-following mode SCS has got to be connected to distribution system so as to send surplus power to the utility or receive the short power from utility. But the interconnection of SSS with distribution system causes a few problems such as the bad power quality, and low security. If SSS is not promptly disconnected after faults occur (Islanding of SSS), it can not only damage equipment of utility and adjacent customers but also endanger life of human due to overvoltage or overcurrent. In this paper it has been deeply discussed if interconnection of engine self-generator/control system satisfies the protective requirement for SSS or not. 500 kW engine generator running in the Jodo island has been used to perform the analysis of interconnection.

  • PDF

사용자 인증 소프트웨어 개발 프로세스에 관한 연구 (A Study on the Development Process of User Authentication Software)

  • 이상준;배석찬
    • 한국전자거래학회지
    • /
    • 제9권1호
    • /
    • pp.255-268
    • /
    • 2004
  • 컴퓨터 로그인이나 인터넷 뱅킹에서 사용자 인증은 필수적인 요소이다. 사용자 인증 소프트웨어에서 보안성은 당연히 중요할뿐 아니라 사용하기도 쉬워야 한다. 소프트웨어 개발을 체계적으로 진행하기 위해서는 개발 프로세스가 정의되어 있어야 하고, 개발 프로세스는 소프트웨어 성숙도를 향상시킬 수 있다. 본 논문에서는 비주얼 패스워드 입력 소프트웨어를 개발한 사례를 통하여 사용자 인증 소프트웨어를 체계적으로 개발할 수 있는 프로세스를 제안한다. 제안한 프로세스는 6단계, 15개 활동으로 구성된다. 제안한 프로세스는 사용성 요구분석, 계획수립, 통합시험, 인수시험 활동을 통하여 사용성을 향상시킬 수 있다.

  • PDF

글로벌 소싱 활성화를 위한 지식요건에 관한 연구 : 네러티브 분석 (Required Skill Set for Global Sourcing : Narrative Analysis)

  • 김경민
    • 한국IT서비스학회지
    • /
    • 제13권2호
    • /
    • pp.55-69
    • /
    • 2014
  • As Korea's global IT sourcing is sluggish and supply of qualified IT personnel does not meet the demand, IT developers currently do not worry about their job security. The sluggish global sourcing is attributed to the lack of system design and analysis skills as well as lack of communication skills of IT personnel. Most of big Korean IT service firms operate in captive market. This is also attributed to the cause of the sluggish global sourcing. Some IT managers, especially in global IT service firms, concerned about the negative long term effect of the sluggish global sourcing on competitiveness and human infra capability of Korea's IT service industry. Managers in IT service firms expect skill requirement changes in the future when global sourcing becomes active. The skills and knowledge that they wish to retain in-house is business knowledge, system analysis and design knowledge, customer relation management skills, project management skills and industry knowledge. The jobs with the above knowledge usually involve customers.

Functional Requirements of Data Repository for DMP Support and CoreTrustSeal Authentication

  • Kim, Sun-Tae
    • International Journal of Knowledge Content Development & Technology
    • /
    • 제10권1호
    • /
    • pp.7-20
    • /
    • 2020
  • For research data to be shared without legal, financial and technical barriers in the Open Science era, data repositories must have the functional requirements asked by DMP and CoreTrustSeal. In order to derive functional requirements for the data repository, this study analyzed the Data Management Plan (DMP) and CoreTrustSeal, the criteria for certification of research data repositories. Deposit, Ethics, License, Discovery, Identification, Reuse, Security, Preservation, Accessibility, Availability, and (Meta) Data Quality, commonly required by DMP and CoreTrustSeal, were derived as functional requirements that should be implemented first in implementing data repositories. Confidentiality, Integrity, Reliability, Archiving, Technical Infrastructure, Documented Storage Procedure, Organizational Infrastructure, (Meta) Data Evaluation, and Policy functions were further derived from CoreTrustSeal. The functional requirements of the data repository derived from this study may be required as a key function when developing the repository. It is also believed that it could be used as a key item to introduce repository functions to researchers for depositing data.

e-Navigation 실현을 위한 디지털 VHF 데이터 시스템의 요구사항 분석 (Analysis of Digital VHF data system requirement for electronic Navigation)

  • 박옥선;김대호
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국해양정보통신학회 2010년도 추계학술대회
    • /
    • pp.593-596
    • /
    • 2010
  • 오늘날 해상에서 이동통신 서비스는 인공위성, 레이더, VHF 장비 등 다양한 장비를 이용하여 서로 독립적인 시스템 규격과 프로토콜로 운영되고 있다. 그러나 해양산업이 점차 발달함에 따라 효율적인 해상업무와 해상 안전을 확보하기 위해 고속 무선 통신의 필요성이 증가하고 여러 가지 시스템을 통합하여 끊김없는 통신을 제공할 수 있는 e-Navigation이 출현하게 되었다. 이와 같이 해상 이동통신 서비스 요구를 만족하기 위한 차세대 VHF 데이터 시스템의 특징과 요구사항들을 시스템, 성능, 서비스 등 다양한 관점에서 제안하고자 한다.

  • PDF

Reducing Rekeying Time Using an Integrated Group Key Agreement Scheme

  • Gu, Xiaozhuo;Zhao, Youjian;Yang, Jianzu
    • Journal of Communications and Networks
    • /
    • 제14권4호
    • /
    • pp.418-428
    • /
    • 2012
  • With the requirement for providing multiple levels of access control for group members, many group key management schemes designed for hierarchical access control have been put forward. However, most of these schemes focus on the efficiency of group key establishment and rekeying in centralized environments. This paper proposes an integrated group key agreement (IGK) scheme for contributory environments. The IGK scheme employs the integrated key graph to remove key redundancies existing in single key trees, and reduces key establishment and rekeying time while providing hierarchical access control. Performance analyses and simulations conducted with respect to computation and communication overheads indicate that our proposed IGK scheme is more efficient than the independent group key agreement scheme.

Configuration of Mail Delivery System Based on Reinforcement Learning

  • Morishita, Soichiro;Hiraoka, Kazuyuki;Kobayashi, Hidetsune;Mishima, Taketoshi
    • 대한전자공학회:학술대회논문집
    • /
    • 대한전자공학회 2002년도 ITC-CSCC -2
    • /
    • pp.830-833
    • /
    • 2002
  • To solve the internal security problem such as human error and bad faith, the automation of computer system management is significant. For this purpose, we focus attention in the automation of Mail Delivery Service. Today, requirement for reliable mail delivery system becomes larger and larger. However, existing systems are too strict about their configuration. Hence, we propose the method based on Reinforcement Learning (RL) to achieve proper MX record ordering. A measure on validity of the design of system, such as network topology number of servers and so on, is also obtained as side benefit. In order to verify the usability of the presented method, we did on a small model of mail delivery system. As a result, we show that RL is available for determination of the proper MX record ordering. Additionally, we suggest that it is also available for comparing validity of setting of MTA and the network design.

  • PDF

계통 안전성을 고려한 원자력발전의 부하추종 요건연구 (A Study on Requirement of Nuclear Power Plant Load Following Operation Condition Considering Power System Security)

  • 이현철;백영식;이근준
    • 전기학회논문지
    • /
    • 제61권11호
    • /
    • pp.1565-1570
    • /
    • 2012
  • Nuclear power generation is increasing domestic power supply ratio by lower CO2 emission and fuel prices. Currently, nuclear power generator has been operated with maximum power output. Therefore, nuclear power generator could be no effect to managing the reactive power reserve on power system. The reactive power reserve is calculated to the difference between maximum facility and operation generation capacity of the power system. This paper was proposed that load following of nuclear power is control by using 15-bus power system model. In the simulation result, power system is shown to safety state by operating load following of nuclear power generator. This method has be improved the supplied reliability through economic and efficient operation.

블록 암호 ARIA를 위한 고속 암호기/복호기 설계 (Design of High Speed Encryption/Decryption Hardware for Block Cipher ARIA)

  • 하성주;이종호
    • 전기학회논문지
    • /
    • 제57권9호
    • /
    • pp.1652-1659
    • /
    • 2008
  • With the increase of huge amount of data in network systems, ultimate high-speed network has become an essential requirement. In such systems, the encryption and decryption process for security becomes a bottle-neck. For this reason, the need of hardware implementation is strongly emphasized. In this study, a mixed inner and outer round pipelining architecture is introduced to achieve high speed performance of ARIA hardware. Multiplexers are used to control the lengths of rounds for 3 types of keys. Merging of encryption module and key initialization module increases the area efficiency. The proposed hardware architecture is implemented on reconfigurable hardware, Xilinx Virtex2-pro. The hardware architecture in this study shows that the area occupied 6437 slices and 128 BRAMs, and it is translated to throughput of 24.6Gbit/s with a maximum clock frequency of 192.9MHz.