• Title/Summary/Keyword: verification metadata

Search Result 13, Processing Time 0.035 seconds

A Rapid Locating Protocol of Corrupted Data for Cloud Data Storage

  • Xu, Guangwei;Yang, Yanbin;Yan, Cairong;Gan, Yanglan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.10
    • /
    • pp.4703-4723
    • /
    • 2016
  • The verification of data integrity is an urgent topic in remote data storage environments with the wide deployment of cloud data storage services. Many traditional verification algorithms focus on the block-oriented verification to resolve the dispute of dynamic data integrity between the data owners and the storage service providers. However, these algorithms scarcely pay attention to the data verification charge and the users' verification experience. The users more concern about the availability of accessed files rather than data blocks. Moreover, the data verification charge limits the number of checked data in each verification. Therefore, we propose a mixed verification protocol to verify the data integrity, which rapidly locates the corrupted files by the file-oriented verification, and then identifies the corrupted blocks in these files by the block-oriented verification. Theoretical analysis and simulation results demonstrate that the protocol reduces the cost of the metadata computation and transmission relative to the traditional block-oriented verification at the expense of little cost of additional file-oriented metadata computation and storage at the data owner. Both the opportunity of data extracted and the scope of suspicious data are optimized to improve the verification efficiency under the same verification cost.

A Study on Establishing the Requirements Verification Matrix (RVM) for the Space Launch Vehicle (우주발사체 요구조건 검증 매트릭스(RVM) 수립 연구)

  • Jang, Junyouk;Cho, Dong Hyun;Yoo, Il Sang
    • Journal of the Korean Society of Systems Engineering
    • /
    • v.14 no.2
    • /
    • pp.16-23
    • /
    • 2018
  • The intended system's function and performance can be assured through implementing the development process, the verification compliance against corresponding requirements, in accordance with the fundamental principle from the Systems Engineering. For the effective verification implementation, related core metadata should be selected and managed throughout the development life cycle. And these have to be included in the configuration document such as specification so that taking them as development baselines each phases if necessary. In this paper, associated case study results are introduced to establish the Requirements Verification Matrix (RVM) for the verification management on the space launch vehicle development program.

Efficient Public Verification on the Integrity of Multi-Owner Data in the Cloud

  • Wang, Boyang;Li, Hui;Liu, Xuefeng;Li, Fenghua;Li, Xiaoqing
    • Journal of Communications and Networks
    • /
    • v.16 no.6
    • /
    • pp.592-599
    • /
    • 2014
  • Cloud computing enables users to easily store their data and simply share data with others. Due to the security threats in an untrusted cloud, users are recommended to compute verification metadata, such as signatures, on their data to protect the integrity. Many mechanisms have been proposed to allow a public verifier to efficiently audit cloud data integrity without receiving the entire data from the cloud. However, to the best of our knowledge, none of them has considered about the efficiency of public verification on multi-owner data, where each block in data is signed by multiple owners. In this paper, we propose a novel public verification mechanism to audit the integrity of multi-owner data in an untrusted cloud by taking the advantage of multisignatures. With our mechanism, the verification time and storage overhead of signatures on multi-owner data in the cloud are independent with the number of owners. In addition, we demonstrate the security of our scheme with rigorous proofs. Compared to the straightforward extension of previous mechanisms, our mechanism shows a better performance in experiments.

A Study on Ontology Design for Research Data Management (연구데이터 관리를 위한 온톨로지 설계에 대한 연구)

  • Park, Ok Nam
    • Journal of Korean Society of Archives and Records Management
    • /
    • v.18 no.1
    • /
    • pp.101-127
    • /
    • 2018
  • The systematic management of research data is vital because it increases research data's value for research reproduction, verification, and reusability. Standard metadata will play a key role in research data registration, management, and data extraction. Research data has various structural relationships, such as research, research data, data sets, and files, and associated with entities such as citations and research results. The study proposes an ontology model for research data management. It also suggests the application of ontology to NTIS. Previous studies, metadata standard analyses, and research data repository case studies were conducted.

Smartphone Forensic of Military Data Information Leakage (군사자료 정보유출의 스마트폰 포렌식 연구)

  • Kim, Yong-youn;Park, Dea-woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.05a
    • /
    • pp.238-241
    • /
    • 2022
  • North Korea launched an ICBM and declared Moratorium for the September 19 military talks. The Armed Forces must protect military security for national defense and security. The Ministry of National Defense, which received a hacking attack from North Korea, must protect its military security even more. Recently, the leakage of military data through smartphones is occurring through smartphones. Officers and non-commissioned officers can use smartphones while working. Therefore, smartphone forensics is required to check information leakage of military data from smartphones. In this study, forensic leaks of military data from the Galaxy S20 model of S company. Research integrity verification for securing smartphone forensic evidence, securing metadata, and adopting evidence. This study will contribute to the development of military security and forensic technology.

  • PDF

Metadata Design and Verification Test Bed System for Augmented Broadcasting (증강방송 메타데이터 설계 및 검증용 테스트 베드 시스템 구현)

  • Choi, Bumsuk;Kim, Suncheol;Jeong, Youngho;Hong, Jinwoo;Lee, Wondon
    • Journal of Broadcast Engineering
    • /
    • v.19 no.5
    • /
    • pp.736-745
    • /
    • 2014
  • In this paper we introduce augmented broadcasting service scenarios which combines augmented reality service with broadcasting environment. As the broadcasting environment is different from mobile service environment, there are many restrictions in developing full AR services in TV. However TV has strong benefit of large screen, high quality contents, advanced user interface for motion and voice, and smart TV applications, which means that they will enhance the possibility of success for augmented broadcasting service. This paper proposes metadata structure containing information for augmentation region, time, augmented contents, and registration information for natural composition. We also implemented test bed system comprised of authoring server, broadcasting server, and user terminal for verifying metadata in broadcasting system.

Meta-server Model for Middleware Supporting for Context Awareness (상황인식을 지원하는 미들웨어를 위한 메타서버 모델)

  • Lee, Seo-Jeong;Hwang, Byung-Yeon;Yoon, Yong-Ik
    • Journal of Korea Spatial Information System Society
    • /
    • v.6 no.2 s.12
    • /
    • pp.39-49
    • /
    • 2004
  • An increasing number of distributed applications will be achieved with mobile technology. These applications face temporary loss of network connectivity when they move. They need to discover other hosts in an ad-hoc manner, and they are likely to have scarce resources including CPU speed, memory and battery power. Software engineers building mobile applications need to use a suitable middleware that resolves these problems and offers appropriate support for developing mobile applications. In this paper, we describe the meta-server building for middleware that addresses reflective context awareness and present usability with demonstration. Metadata is consist of user configuration, device configuration, user context, device context and dynamic image metadata. When middleware send a saving or retrieval request to meta-server, it returns messages to middleware after the verification of the request. This meta-server has the application for multimedia stream services with context awareness.

  • PDF

A Study of Verification Methods for File Carving Tools by Scenario-Based Image Creation (시나리오 기반 이미지 개발을 통한 파일 카빙 도구 검증 방안 연구)

  • Kim, Haeni;Kim, Jaeuk;Kwon, Taekyoung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.4
    • /
    • pp.835-845
    • /
    • 2019
  • File Carving is a technique for attempting to recover a file without metadata, such as a formated storage media or a damaged file system, and generally looks for a specific header / footer signature and data structure of the file. However, file carving is faced with the problem of recovering fragmented files for a long time, and it is very important to propose a solution for digital forensics because important files are relatively fragmented. To overcome these limitations, various carving techniques and tools are continuously being developed, and data sets from various researches and institutions are provided for functional verification. However, existing data sets are ineffective in verifying tools because of their limited environmental conditions. Therefore, this paper refers to the importance of fragmented file carving and develops 16 images for carving tool verification based on scenarios. The developed images' carving rate and accuracy of each media is shown through Foremost which is well known as a commercial carving tool.

A Study on Data Requirements and Quality Verification for Legal Deposit and Acquisition Tasks of Domestic Electronic Publications (국내 유통 전자출판물의 납본 및 수집을 위한 데이터 요구사항 및 품질 검증 연구)

  • Gyuhwan Kim;Soojung Kim;Daekeun Jeong
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.35 no.1
    • /
    • pp.127-148
    • /
    • 2024
  • This study aimed to propose considerations for attributes and their standardization strategies during the data collection process for electronic publications by domestic distributors for the National Library of Korea. The research identified a total of 21 essential and optional attributes based on a survey and a Focused Group Interview (FGI) with the staff responsible for legal deposit and acquisition tasks at the National Library of Korea. Additional attributes were found necessary during the data quality verification process, leading to the specification of essential and optional attributes for various types of materials, including eBooks, audiobooks, webtoons, and web novels. The standardization of attribute values, essential for enhancing the identifiability and management efficiency of electronic publications, included adherence to ISO 8601 rules for dates and times, clear designation of limited-range attribute values such as file format and adult content, and detailed description of information related to titles. Furthermore, the study highlighted the need for establishing standardized metadata requirements and continuous data quality management and monitoring systems.

Modeling and Verification of A data registry-based Management System for Network Object (데이타 레지스트리에 기반한 네트워크 객체 관리 시스템의 모델링 및 검증)

  • 최오훈;백두권
    • Proceedings of the Korea Society for Simulation Conference
    • /
    • 2002.05a
    • /
    • pp.61-65
    • /
    • 2002
  • These days, in order to satisfy the complex and various demands of the customers, the telecommunication networks must provide rapid and flexible services, with the support of efficient service and network management systems. To satisfy these requirements, many objects for management have been released to manage network services and elements. But there are no efficient ways to manage these newly managed objects in object-oriented software. Therefore, we study several problems, when a subsystem using object-oriented technique is implemented. The first problem is that interface works between realized application programs using its technique. The second problem is that reusability of internal managed objects is difficult. In this paper, we will point out some problems and to solve these problems, we have proposed the Object Management System (OMS) architecture, which supports a transparent interface between object-oriented applications and the distributed data repositories. Also in order to manage efficient business objects stored in the different repositories, we suggest a method for integrating dynamic information resources in heterogeneous and distributed network environments. Finally, we applied OMS to TINA(Telecommunication Information Network Architecture) domain, implemented OMS, and verified it with SMV(Symbolic Model Verifier) which is model checking technology.

  • PDF