DOI QR코드

DOI QR Code

Image Features Based Secure Access Control for Data Content Protection

데이터 내용 보호를 위한 이미지 특징 기반의 보안 접근 제어

  • Ha, Sunju (Dept. of Information and Communication Engineering) ;
  • Park, Daechul (Dept. of Information and Communication Engineering)
  • 하선주 (한남대학교 정보통신공학과) ;
  • 박대철 (한남대학교 정보통신공학과)
  • Received : 2012.12.10
  • Accepted : 2013.02.08
  • Published : 2013.02.28

Abstract

Data security is always an important issue. In particular, the current emerging cloud computing system inevitably raises the issue of data security. However, data security is no longer safe with a simple way, but requires rather advanced method to secure the data. In this paper, instead of exploiting the existing text-based cryptography approach an image-based access control of data content is studied to present a higher level of data security. Color key chain is generated both using histogram value of the original image, and the location information and featured color information extracted by geometric transformation to form the security key to access secure data content. Finally, the paper addresses design interface and implementation for data content access control for evaluation of the proposed scheme.

데이터의 보안은 항상 중요한 문제이다. 특히 현재 각광받고 있는 클라우드 컴퓨팅 시스템은 필연적으로 데이터 보안의 문제가 제기되고 있다. 그러나 단순한 보안방법으로는 더 이상 데이터가 안전하지 않으며, 데이터 보안을 위해서 보다 진보된 방법을 요구하고 있다. 본 논문에서는 기존의 텍스트 기반의 암호 방식보다 더 높은 레벨의 보안방식을 제시하기 위해 이미지 정보 기반의 데이터 내용 접근 제어 방식에 관하여 연구하였다. 원본 이미지에서 히스토그램 값을 이용하여 칼라키를 생성하고 이미지를 변환시켜 위치정보와 색상정보를 추출하여 보안 키를 생성하여 보안처리된 데이터 내용을 접근한다. 끝으로 본 몬문은 제안한 기법를 평가하기 위해 데이터 내용의 접근을 제어할 수 있는 인터페이스를 설계하고 구현하였다.

Keywords

References

  1. S.K. Un, N.S. Jho, Y.H. Kim, D.S. Choi, "Cloud Computing Security Technology", Electronics and Telecommunications Trends, Vol.24, No.4, pp27- 31, 2009, 08.
  2. C.H. Lim, "Cloud Computing Security Technology", Journal of Korea Institute of Information Security, Vol.19, No.3, pp.14-17, 2009.06
  3. Ji-Soo Park, Jong-Hyuk Park, "A Study on Cloud Computing Security", Journal of Korea Information Processing Society Spring Symposium No.35, Vol.18, No.1, p.187-189, 2011.05
  4. O.G. Min, H.Y. Kim, G.H. Nam, "Trends in Technology of Cloud Computing", Electronics and Telecommunications Trends, Vol.24, No.4, pp.1-13, 2009. 08
  5. Choon-sik Park, "Study on Security Considerations in the Cloud Computing", Journal of academiaindustrial technology, Vol.12, No.3, pp.1408-1416, 2011.03
  6. Shepard. R., 1967. Recognition memory for words, sentences, and pictures. Journal of Verbal Learning and Verbal Behavior, vol. 6, pp. 156-163. https://doi.org/10.1016/S0022-5371(67)80067-7
  7. Perrig A. and Song D., "Hash Visualization: A New Technique to Improve Real-World Security", In Proceedings of the International Workshop on Cryptographic Techniques and E-Commerce, 1999.
  8. Jaehoon Sun, Kuinam J. Kim, "Cloud Computing in the Vulnerability Analysis for Personal Information Security", Journal of Information Security, Vol. 10, No.4, pp.77-82, 2010.12.
  9. http://drupal.org/project/confident_captcha
  10. www.mininfo.co.kr/ Dementor-SGP technical data
  11. Haichang Gao et. al, , "Design and Analysis of a Graphical Password Scheme", 2009 Fourth International Conference on Innovative Computing, Information and Control (ICICIC), 7-9, pp. 675-678, Dec 2009,
  12. Qibin Sun1 et. al, "An Interactive and Secure User Authentication Scheme for Mobile Devices", IEEE International Symposium on Circuits and Systems, 2008: 18-21, pp. 2973-2976, May 2008.
  13. Daechul Park, "Scalable 2-level Indexing Schemes of Large Color Image Archives Based on Color Energy Keys", Journal of Sci. Research Institution, Hannam University, Vol. 3, No.1, pp.319-332, 2002.
  14. M.J. Swain and D.H. Ballard, "Color indexing," Int. Journal of Computer Vision, Vol. 7, no. 1, pp.11-32, 1991. https://doi.org/10.1007/BF00130487
  15. G. Wolberg, "Digital Image Warping", IEEE Computer Society Press, 1990