Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
The KIPS Transactions:PartC
Journal Basic Information
Journal DOI :
Korea Information Processing Society
Editor in Chief :
Volume & Issues
Volume 19C, Issue 4 - Aug 2012
Volume 19C, Issue 3 - Jun 2012
Volume 19C, Issue 2 - Apr 2012
Volume 19C, Issue 1 - Feb 2012
Selecting the target year
The Trace Analysis of SaaS from a Client's Perspective
Kang, Sung-Lim ; Park, Jung-Heum ; Lee, Sang-Jin ;
The KIPS Transactions:PartC, volume 19C, issue 1, 2012, Pages 1~8
DOI : 10.3745/KIPSTC.2012.19C.1.001
Recently, due to the development of broadband, there is a significant increase in utilizing on-demand Saas (Software as a Service) which takes advantage of the technology. Nevertheless, the academic and practical levels of digital forensics have not yet been established in cloud computing environment. In addition, the data of user behavior is not likely to be stored on the local system. The relevant data may be stored across the various remote servers. Therefore, the investigators may encounter some problems in performing digital forensics in cloud computing environment. it is important to analysis History files, Cookie files, Temporary Internet Files, physical memory, etc. in a viewpoint of client, since the SaaS basically uses the web to connects the internet service. In this paper, we propose the method that analysis the usuage trace of the Saas which is the one of the most popular cloud computing services.
An RFID Distance Bounding Protocol Based on Cryptographic Puzzles Providing Strong Privacy and Computational Efficiency
Ahn, Hae-Soon ; Yoon, Eun-Jun ; Nam, In-Gil ;
The KIPS Transactions:PartC, volume 19C, issue 1, 2012, Pages 9~18
DOI : 10.3745/KIPSTC.2012.19C.1.009
In 2010, Pedro et al. proposed RFID distance bounding protocol based on WSBC cryptographic puzzle. This paper points out that Pedro et al.'s protocol not only is vulnerable to tag privacy invasion attack and location tracking attack because an attacker can easily obtain the secret key(ID) of a legal tag from the intercepted messages between the reader and the tag, but also requires heavy computation by performing symmetric key operations of the resource limited passive tag and many communication rounds between the reader and the tag. Moreover, to resolve the security weakness and the computation/communication efficiency problems, this paper also present a new RFID distance bounding protocol based on WSBC cryptographic puzzle that can provide strong security and high efficiency. As a result, the proposed protocol not only provides computational and communicational efficiency because it requires secure one-way hash function for the passive tag and it reduces communication rounds, but also provides strong security because both tag and reader use secure one-way hash function to protect their exchanging messages.
User Authentication and Secure Data Communication Based on Mobile Phone for Medical Sensor Network
Kim, Jee-Hyun ; Doh, In-Shil ; Park, Jung-Min ; Chae, Ki-Joon ;
The KIPS Transactions:PartC, volume 19C, issue 1, 2012, Pages 19~28
DOI : 10.3745/KIPSTC.2012.19C.1.019
Wireless sensor network provides services anytime and anywhere they are requested. Especially, medical sensor network based on biosensors is applied a lot to biotechnology and medical engineering. In medical sensor network, people can make their health checked at home free from temporal and spatial constraints. In ubiquitous healthcare environment, people can get instant help even in the emergency, and in hospital, patients can be taken care of efficiently. In this environment, health and life related data are delivered, and the privacy and security of personal data are very important. In this paper, we propose user authentication and data communication mechanism in two modes, normal and urgent situation using cellular phone. Through our proposal, data can be transferred in quick and secure manner.
DM : An Improved Identity Management Protocol for Internet Applications in Mobile Networks
Park, In-Shin ; Jeong, Jong-Pil ;
The KIPS Transactions:PartC, volume 19C, issue 1, 2012, Pages 29~38
DOI : 10.3745/KIPSTC.2012.19C.1.029
Due to rapid spread of smart phones and SNS(Social Network Service), using of Internet applications has increased and taking up bandwidth more than 3G network's capacity recently. This caused reduction of speed and service quality, and occurred strong needs that backbone network company to increasing investment costs. Also a great rise of mobile network users causing identity management problems on mobile service provider through mobile network. This paper proposes advanced IDM3G - to solve user ID management and security problems on mobile internet application services over 3G network and more - authentication management protocol.
protocol breakup loads which made by existing IDM3G protocol's mutual authentication via mobile operator, via sending some parts to internet application service provider, enhancing mobile and ID management of service provider and network load and process load from information handling and numbers of transmitting packets, to suggest more optimized protocol against further demanding of 3G mobile network.
Key Distribution Scheme for Supporting Multiple Set-Top Box in Chipset Pairing Conditional Access System
Lee, Hoon-Jung ; Son, Jung-Gab ; Oh, Hee-Kuck ;
The KIPS Transactions:PartC, volume 19C, issue 1, 2012, Pages 39~46
DOI : 10.3745/KIPSTC.2012.19C.1.039
In this paper, we propose a key distribution scheme for flexible chipset pairing conditional access system. Chipset pairing conditional access system is the implementation of CA (Conditional Access) module by using both embedded secure chip in a Set-Top Box(STB) and smartcard, and the secure chip embedded in a STB forms a secure channel between the smartcard and the STB. In short, it is the system that a smartcard outputs encrypted CW (Control Word) to the STB, and the STB decrypts an encrypted CW by using the embedded secure chip. The drawback of this chipset pairing conditional access system is that one smartcard is able to be used for only one specified STB since it is the system using the STB bound to a smartcard. However, the key distribution scheme proposed in this paper overcomes a drawback of current chipset pairing conditional access system by using Chinese Remainder Theorem(CRT). To be specific, with this scheme, one smartcard can be used for multiple, not single, STBs, and applied to current chipset pairing without great changes.
Detecting Malicious Scripts in Web Contents through Remote Code Verification
Choi, Jae-Yeong ; Kim, Sung-Ki ; Lee, Hyuk-Jun ; Min, Byoung-Joon ;
The KIPS Transactions:PartC, volume 19C, issue 1, 2012, Pages 47~54
DOI : 10.3745/KIPSTC.2012.19C.1.047
Sharing cross-site resources has been adopted by many recent websites in the forms of service-mashup and social network services. In this change, exploitation of the new vulnerabilities increases, which includes inserting malicious codes into the interaction points between clients and services instead of attacking the websites directly. In this paper, we present a system model to identify malicious script codes in the web contents by means of a remote verification while the web contents downloaded from multiple trusted origins are executed in a client's browser space. Our system classifies verification items according to the origin of request based on the information on the service code implementation and stores the verification results into three databases composed of white, gray, and black lists. Through the experimental evaluations, we have confirmed that our system provides clients with increased security by effectively detecting malicious scripts in the mashup web environment.
Security Analysis of Block Cipher KT-64
Kang, Jin-Keon ; Jeong, Ki-Tae ; Lee, Chang-Hoon ;
The KIPS Transactions:PartC, volume 19C, issue 1, 2012, Pages 55~62
DOI : 10.3745/KIPSTC.2012.19C.1.055
KT-64 is a 64-bit block cipher which use CSPNs suitable for the efficient FPGA implementation. In this paper, we propose a related-key amplified boomerang attack on the full-round KT-64. The attack on the full-round KT-64 requires
related-key chosen plaintexts and
KT-64 encryptions. This work is the first known cryptanalytic result on KT-64.
Remote Healthcare Monitoring System Using Attribute based Encryption
Song, You-Jin ; Do, Jeong-Min ;
The KIPS Transactions:PartC, volume 19C, issue 1, 2012, Pages 63~70
DOI : 10.3745/KIPSTC.2012.19C.1.063
To ensure privacy of individual information in remote healthcare service, health data should be protected through a secure technology such as encryption scheme. Only user who delegated decryption right can access to sensitive health data and delegator needs capability for revocating access privilege. Recently, in ubiquitous environment, CP-ABTD(Ciphertext-Policy Attribute-Based Threshold Decryption with Flexible Delegation and Revocation of User Attributes) which extends CP-ABE(Ciphertext-Policy Attribute-Based Encryption) has been proposed for these requirements. In this paper, we construct remote healthcare monitoring system with delegation and revocation capability for attribute in CP-ABTD. Finally, we analyze collusion attack between users in our system.
SePH: Seamless Proxy-based Handoff Scheme in IP-based Heterogeneous Mobile Networks
Lee, Seung-Hyun ; Shin, Dong-Ryeol ; Jeong, Jong-Pil ;
The KIPS Transactions:PartC, volume 19C, issue 1, 2012, Pages 71~82
DOI : 10.3745/KIPSTC.2012.19C.1.071
In Next Generation Wireless Networks (NGWN), lots of information, such as voice and video data, will be used in All-IP networks. It is important note that seamless service for users and handoff between heterogeneous networks must be taken into account in such environments. Therefore, in this paper, we propose a SePH(Seamless Proxy based Handoff) using PMIPv6-based proxy model which is enable to improve the performance of handoff in NGWN. The SePH can efficiently support seamless and IP-based mobility by reducing the search process. The performance results show that our proposed scheme outperforms in terms of QoS (Quality of Service) such as throughput, handoff latency, packet loss, and signaling overhead comparing to the existing schemes.