Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
The KIPS Transactions:PartC
Journal Basic Information
Journal DOI :
Korea Information Processing Society
Editor in Chief :
Volume & Issues
Volume 18C, Issue 6 - Dec 2011
Volume 18C, Issue 5 - Oct 2011
Volume 18C, Issue 4 - Aug 2011
Volume 18C, Issue 3 - Jun 2011
Volume 18C, Issue 2 - Apr 2011
Volume 18C, Issue 1 - Feb 2011
Selecting the target year
Distributed Access Privilege Management for Secure Cloud Business
Song, You-Jin ; Do, Jeong-Min ;
The KIPS Transactions:PartC, volume 18C, issue 6, 2011, Pages 369~378
DOI : 10.3745/KIPSTC.2011.18C.6.369
To ensure data confidentiality and fine-grained access control in business environment, system model using KP-ABE(Key Policy-Attribute Based Encryption) and PRE(Proxy Re-Encryption) has been proposed recently. However, in previous study, data confidentiality has been effected by decryption right concentrated on cloud server. Also, Yu`s work does not consider a access privilege management, so existing work become dangerous to collusion attack between malicious user and cloud server. To resolve this problem, we propose secure system model against collusion attack through dividing data file into header which is sent to privilege manager group and body which is sent to cloud server. And we construct the model of access privilege management using AONT based XOR threshold Secret Sharing, In addition, our scheme enable to grant weight for access privilege using XOR Share. In chapter 4, we differentiate existing scheme and proposed scheme.
An Authentication Model based Fingerprint Recognition for Electronic Medical Records System
Lee, Yong-Joon ;
The KIPS Transactions:PartC, volume 18C, issue 6, 2011, Pages 379~388
DOI : 10.3745/KIPSTC.2011.18C.6.379
Ensuring the security of medical records is becoming an increasingly important problem as modern technology is integrated into existing medical services. As a consequence of the adoption of EMR(Electronic Medical Records) in the health care sector, it is becoming more and more common for a health professional to edit and view a patient`s record. In order to protect the patient`s privacy, a secure authentication model to access the electronic medical records system must be used. A traditional identity based digital certificate for the authenticity of EMR has private key management and key escrow of a user`s private key. In order to protect the EMR, The traditional authentication system is based on the digital certificate. The identity based digital certificate has many disadvantages, for example, the private key can be forgotten or stolen, and can be easily escrow of the private key. Nowadays, authentication model using fingerprint recognition technology for EMR has become more prevalent because of the advantages over digital certificate -based authentication model. Because identity-based fingerprint recognition can eliminate disadvantages of identity-based digital certificate, the proposed authentication model provide high security for access control in EMR.
A Framework for Trustworthy Open Shared Authentication Protocol
Park, Seung-Chul ;
The KIPS Transactions:PartC, volume 18C, issue 6, 2011, Pages 389~396
DOI : 10.3745/KIPSTC.2011.18C.6.389
Recently, researches on the shared authentication based on single sign-on have been actively performed so as to solve the problems of current service provider-centric and isolated Internet authentications, including low usability, high cost structure, and difficulty in privacy protection. In order for the shared authentication model, where the authentications of an authentication provider are shared by several Internet service providers, to be accepted in real Internet environment, trustworthiness among users, service providers, and authentication providers on the level of authentication assurance and the level of authentication information protection is necessarily required. This paper proposes a framework for trustworthy and privacy-protected shared authentication protocol based on the user-centric operation and open trust provider network. The proposed framework is differentiated from previous works in the points that it is able to provide interoperable shared authentication services on the basis of open trust infrastructure.
A Study on ID-based Authentication Scheme in AMI SmartGird Environment
Kim, Hong-Gi ; Lee, Im-Yeong ;
The KIPS Transactions:PartC, volume 18C, issue 6, 2011, Pages 397~404
DOI : 10.3745/KIPSTC.2011.18C.6.397
Recently the existing one-way electricity system that combines information and communications technology to develop smart grid technology is made active. The core infrastructure of the smart grid, AMI smart meters to AMR system, the amount of power measured at the top to MDMS transmits data store. Smart meters utilizing information and communication technology to transfer data and power because of the existing security threats are expected, including the additional security threats. It exposes the privacy of consumers and industrial systems, such as paralysis is likely to result in the loss. In this paper to respond to these security threats in the environment smart grid. Also, We propose data transfer methods between smartmeter and MDMS and between home device and MDMS.
Performance Analysis of Integrated HIP-PMIPv6 with Multicasting Handoff Scheme in Mobile Vehicular Networks
Gil, Myung-Soo ; Lee, Seung-Hyun ; Jeong, Jong-Pil ;
The KIPS Transactions:PartC, volume 18C, issue 6, 2011, Pages 405~412
DOI : 10.3745/KIPSTC.2011.18C.6.405
Our proposed mobility management scheme is based on Multicasting and HIP(Host Identity Protocol) in PMIPv6(Proxy Mobile IPv6) Networks, and allows users to handoff within and across different administrative domains. The main advantage of our scheme is to enable the inter-domain handoff of both types of nodes with a reduced signalling overhead and packet losses. Specifically, the scheme enables the interworking between host-based and network-based mobility support, by means of the interaction between PMIPv6 with Multicasting and HIP. Performance evaluations demonstrate that our scheme improves the handoff latency and packet losses compared to other global mobility management protocols.
A NetFPGA-based IP Service Gateway for the Composition of Service Overlay Networks
Jo, Jin-Yong ; Lee, So-Yeon ; Kong, Jong-Uk ; Kim, Jong-Won ;
The KIPS Transactions:PartC, volume 18C, issue 6, 2011, Pages 413~422
DOI : 10.3745/KIPSTC.2011.18C.6.413
Overlay network is a ready-to-use solution to enable new network functionality with existing Internet connectivity intact. This paper introduces a network service which helps users easily compose their own service overlay networks through software-defined networks. We look into the structure of service gateway which enables 1 Gbps packet processing on composed overlay networks. We also provide examples for the way of composing service overlay for support multicast applications. Experiment results carried over the KREONET (Korea Research Environment Open NETwork) show the forwarding performance of the service gateway.
Deployment and Performance Analysis of Nation-wide OpenFlow Networks over KREONET
Hong, Won-Taek ; Kong, Jong-Uk ; Chung, Jin-Wook ;
The KIPS Transactions:PartC, volume 18C, issue 6, 2011, Pages 423~432
DOI : 10.3745/KIPSTC.2011.18C.6.423
Recently, OpenFlow has been paid attention to as a fundamental technology which provides a function of virtualization and programmability in network. In Korea, deployment of OpenFlow networks in campuses and the interconnection between them through tunneling in layer 3 has been performed. However, the performance of the interconnected networks is decreased due to delay in IP layer. In this paper, we design and deploy nation-wide, not local, OpenFlow networks in a pure layer 2 environment over KREONET. After that, we do end-to-end Round-trip Time measurements and TCP/UDP performance tests in OpenFlow and normal networks, and do comparison and analysis on the test results. The results show that the nation-wide OpenFlow networks provide equal performance to normal networks except for the initial packet loss for UDP streaming. In regards to the performance decrease due to early UDP packet loss, we can mitigate it by implementing exceptional procedures in a controller which deal with the same continuous "Packet_in" events.
A Scheduling Method to Ensure a Stable Delay Variation of Video Streaming Service Traffic
Kim, Hyun-Jong ; Choi, Won-Seok ; Choi, Seong-Gon ;
The KIPS Transactions:PartC, volume 18C, issue 6, 2011, Pages 433~440
DOI : 10.3745/KIPSTC.2011.18C.6.433
In this paper, we propose a new scheduling method that can guarantee reliable jitter by minimizing the queue length variation in the streaming service provisioning such as IPTV and VoD. The amount of traffic to be delivered within a certain time is very fluid because MPEG-4 and H.264 encoders use VBR(Variable Bit Rate) for delivering video streaming traffic. This VBR characteristic increases the end-to-end propagation delay variation when existing scheduling methods are used for delivering video frames. Therefore, we propose the new scheduling method that can minimize change rate of queue length by adaptively controling service rate taking into account the size of bulk incoming packets and arrival rate for bulk streaming traffic. Video frames can be more reliably transmitted through the minimization of the queue length variation using the proposed method. We use the queueing model and also carry out OPNET simulation to validate the proposed method.
Spanning Tree Aggregation Using Attribute of Service Boundary Line
Kwon, So-Ra ; Jeon, Chang-Ho ;
The KIPS Transactions:PartC, volume 18C, issue 6, 2011, Pages 441~444
DOI : 10.3745/KIPSTC.2011.18C.6.441
In this study, we present a method for efficiently aggregating network state information. It is especially useful for aggregating links that have both delay and bandwidth in an asymmetric network. Proposed method reduces the information distortion of logical link by integration process after similar measure and grouping of logical links in multi-level topology transformation to reduce the space complexity. It is applied to transform the full mesh topology whose Service Boundary Line (SBL) serves as its logical link into a spanning tree topology. Simulation results show that aggregated information accuracy and query response accuracy are higher than that of other known method.
A Clustering Mechanism based on Vehicle Local Information in the Vehicular Ad Hoc Network
Ahn, Sang-Hyun ; Lim, Yu-Jin ;
The KIPS Transactions:PartC, volume 18C, issue 6, 2011, Pages 445~450
DOI : 10.3745/KIPSTC.2011.18C.6.445
In the vehicular ad hoc network environment, the clustering mechanism is one of the efficient mechanisms to deliver broadcast messages. Most clustering mechanisms require message exchanges between vehicles to build stable clusters, which causes overhead. In order to reduce this overhead, CF-IVC  proposes the mechanism to construct clusters based on the vehicle speed. However, since CF-IVC does not consider the road traffic condition and the driver`s behavior, it may result in inefficient clusters. Therefore, in this paper, we propose a mechanism to establish efficient clusters based on the vehicle local information with considering the road maximum speed limit and the road traffic condition. The performance of the proposed mechanism is validated by comparing with those of the simple flooding and CF-IVC through NS-2 simulations.