DOI QR코드

DOI QR Code

A Scheme of Computational Time Reduction on Back-End Server Using Computational Grid

계산 그리드를 이용한 백엔드 서버의 계산시간 단축 방안

  • Received : 2012.06.15
  • Accepted : 2012.07.18
  • Published : 2012.12.31

Abstract

We need privacy protection protocols, that satisfy three essential security requirements; confidentiality, indistinguishability and forward security, in order to protect user's privacy in RFID system. The hash-chain based protocol that Ohkubo et. al proposed is the most secure protocol, that satisfies all of the essential security requirements, among existing protocols. But, this protocol has a disadvantage that it takes very long time to identify a tag in the back-end server. In this paper, we propose a scheme to keep security just as it is and to reduce computation time for identifying a tag in back-end server. The proposed scheme shows the results that the identification time in back-end server is reduced considerably compared to the hash-chain based protocol.

RFID 시스템에서 사용자의 프라이버시를 보호하기 위해서는 기밀성, 불구분성, 전방 보안성 등의 3가지 필수 보안 요건을 만족시키는 프라이버시 보호 프로토콜이 필요하다. Ohkubo et. al[2]가 제안한 Hash-Chain 기반 프로토콜은 기존에 제안된 프로토콜 중에서 필수 보안 요건을 만족하는 안전한 RFID 프라이버시 보호 프로토콜이나, 백엔드 서버에서 태그를 판별하는 시간이 매우 길다는 단점이 있다. 본 논문에서는 Hash-Chain 기반 프로토콜의 안전성은 그대로 유지하면서 백엔드 서버에서 태그를 판별하는데 걸리는 계산 시간을 단축하는 방안을 제안한다. 제안 기법은 Hash-Chain 기반 프로토콜 기법보다 백엔드 서버에서의 계산 시간을 현저하게 단축시키는 결과를 보여준다.

Keywords

References

  1. Yu Tian-tian, Feng Quan-yuan, "A Security RFID Authentication Protocol Based on Hash Function", 2009 International Symposium on Information Engineering and Electronic Commerce, pp.804-807, 2009.
  2. M. Ohkubo, K. Suzuki, and S. Kinoshita, "Cryptographic approach to privacy-friendly tags", In RFID Privacy Workshop, 2003.
  3. M. Ohkubo, K.Suzuki and S. Kinoshita, "Hash-Chain Based Forward-Secure Privacy Protection Scheme for Low-Cost RFID", Proceedings of the SCIS 2004, pp.719-724, 2004.
  4. Boyeon Song, and Chris J Mitchell, "RFID Authentication Protocol for Low-cost Tags", ACM Conference on Wireless Network Security(WiSec'08), 2008.
  5. D. Molnar and D. Wagner, "Privacy and Security in Library RFID: Issues, Practices, and Architectures," ACM Conference Commun. Comput. Security(CCS '04), pp. 210-219, 2004.
  6. S. Sarma, S. Weis, and D. Engels, "RFID Systems and Security and Privacy Implications," Workshop on Cryptographic Hardware and Embedded Systems, pp.454-470, 2002.
  7. S. S. Yeo, K. Sakurai, S. E. Choi, K. S. Yang, and S. K. Kim, "Forward Secure Privacy Protection Scheme for RFID System Using Advanced Encryption Standard", In Proceedings of Frontiers of High Performance Computing and Networking ISPA 2007 Workshops, Vol. 4743, pp.245-254, 2007.
  8. V. Berstis, Fundamentals of Grid Computing, Reading Mass, IBM Redbook, 2002.
  9. I. Foster and C. Kesselman and S. Tuecke, "The Anatomy of the Grid", The International Journal of High Performance Computing Applications, vol. 15, no.3, pp.200-222, 2001. https://doi.org/10.1177/109434200101500302
  10. Li, C., Xiao, N., Yang, X., "Application availability measurement in computational grid", Proceedings of the 2nd workshop on Grid and Cooperative Computing (GCC2003), Springer LNCS 3032, pp. 151-154, 2003.
  11. Chunjiang Li, Nong Xiao, and Xuejun Yang., "Predicting the Reliability of Resources in Computational Grid," Grid and Cooperative Computing 2004, LNCS 3251, pp. 233-240, 2004
  12. 이춘희, "그리드퓨팅(Grid Computing)", 정보처리학회논문지, Vol 10(1), 2003.