DOI QR코드

DOI QR Code

이질적인 클라우드 환경에 적합한 사용자 서명 보호 모델

User Signature Protection Model for Different Cloud Areas

  • 정윤수 (목원대학교 정보통신융합공학부) ;
  • 김용태 (한남대학교 멀티미디어학과) ;
  • 박길철 (한남대학교 멀티미디어학과)
  • Jeong, Yoon-Su (Department of information Communication Convergence Engineering, Mokwon University) ;
  • Kim, Yong-Tae (Department of multimedia, Hannam University) ;
  • Park, Gil-Cheol (Department of multimedia, Hannam University)
  • 투고 : 2019.10.01
  • 심사 : 2019.12.20
  • 발행 : 2019.12.28

초록

클라우드 서비스는 서로 다른 분야의 업무를 좀 더 다양한 사용자들에게 광범위하게 서비스하기 위해 개발된 서비스이다. 그러나, 클라우드 서비스는 서로 다른 사용자들의 요구 사항을 반영하도록 설계되었지만 그에 따른 다양한 보안 피해가 증가하고 있어 이를 해결하기 위한 기술들이 필요한 상황이다. 본 논문은 이질적인 클라우드 환경에서 제3자가 사용자의 서명을 악용하지 못하록 예방하는 사용자 서명 관리 모델을 제안한다. 제안 모델은 계층적 클라우드를 구성하는 중간 장치들의 기능을 강화하는 동시에 분할 사용되는 사용자의 서명 정보를 통합 관리한다. 성능평가 결과, 제안 모델은 사용자의 서명 관리를 분산 처리할 뿐만 아니라 중간 장치들이 사용자의 서명 처리를 분산 처리하기 때문에 효율성이 평균 8.5% 향상되었고, 사용자의 인증 처리를 수행할 때 사용자의 서명 지연 시간은 평균 13.3% 단축되었다. 사용자의 서명 처리를 중간 장치들이 처리할 때 발생하는 오버헤드는 기존 기법보다 평균 10.1% 낮았다.

Cloud services are services developed to serve a wider variety of users in different fields. However, although cloud services are designed to reflect the needs of different users, a variety of security damages resulting from them are increasing and technologies are needed to address them. This paper proposes a user signature management model that prevents third parties from exploiting the user's signature in a heterogeneous cloud The proposed model strengthens the functionality of the intermediate devices that make up the hierarchical cloud while also managing the signature information of the partitioned user. As a result of the performance assessment, the proposed model not only distributed user signature management, but also improved efficiency by 8.5% on average because intermediate devices distributed user signature processing, and reduced the user's signature latency by 13.3% on average when performing user authentication processing. On average, the overhead generated by intermediate devices processing a user's signature was 10.1 percent lower than that of conventional techniques.

키워드

참고문헌

  1. H. Abwnawar & R. S. Janicke. (2017, July). Towards location-aware access control and data privacy in inter-cloud communications. IEEE EUROCON 2017-17th International Conference on Smart Technologies (pp. 739-744). Macedonia : IEEE DOI : 10.1109/EUROCON.2017.8011209
  2. J. J. Yang, J. Q. Li & Y. Niu. (2015). A hybrid solution for privacy preserving medical data sharing in the cloud environment. Future Generation Computer Systems. 43(44), 74-86. DOI : 10.1016/j.future.2014.06.004
  3. D. P. Gayathri. (2013). Overview of RSA and its enhancements. International Journal of Innovative Research and Development, 2(11), 306-310.
  4. S. Nagaraj, Dr. G. S. V. P. Raju & V. Srinadth. (2015). Data Encryption and Authentication Using Public Key Approach. Elsevier Procedia Computer Science. 48, 126-132. DOI : 10.1016/j.procs.2015.04.161
  5. A. K. Dubey, A. K. Dubey, M. Namdev & S. S. Shrivastava. (2016, November). Cloud-User Security Based on RSA and MD5 Algorithm for Resource Attestation and Sharing in Java Environment. IEEE (pp. 1-8). Indore : IEEE. DOI : 10.1109/CONSEG.2012.6349503
  6. P. Yellapa, C. Narasimham & V. Sreenivas. (2013). Data Security in Cloud using RSA. IEEE. p. 1-6. DOI : 10.1109/ICCCNT.2013.6726471
  7. V. V. S. Mahalle & A. K. Shahade. (2016). Enhancing the data security in Cloud by implementing Hybrid (Rsa & Aes) Encryption Algorithm. IEEE. 146-149. DOI : 10.1109/INPAC.2014.6981152
  8. A. Kahate. (2010). Cryptography and Network Security. Tata McGraw Hill Education Private Ltd., New Delhi.
  9. N. Khanezaei & Z. M. Hanapi. (2016). A framework based on RSA and AES encryption algorithms for cloud computing services. IEEE. 58-62. DOI : 10.1109/SPC.2014.7086230
  10. A. Priya, Y. K. Rana & B. P. Patel. (2015). Design and Implementation of an Algorithm to Enhance Cloud Security. International Journal of Computer Applications. 113(12), 41-46. DOI : 10.5120/19882-1896
  11. G. L. Prakash, Dr. M. Prateek & Dr. I. Singh. (2014). Data Encryption and Decryption Algorithms using Key Rotations for Data Security in Cloud System. International Journal Of Engineering And Computer Science. 3(4), 5216-5223. DOI : 10.1109/ICSPCT.2014.6884895
  12. S. Verma & D. Garg. (2015). Improvement in Rebalanced CRT RSA. The International Arab Journal of Information Technology. 12(6), 524-531.
  13. Y. S. Jeong, Y. T. Kim & G. C. Park. (2017). A hierarchical property-based multi-level approach method for improves user access control in a cloud environment. Journal of the Korea Convergence Society. 8(11), 7-13. https://doi.org/10.15207/JKCS.2017.8.11.007
  14. Y. S. Jeong & Y. H. Yon. (2018). User privacy protection model through enhancing the administrator role in the cloud environment. Journal of Convergence for Information Technology. 8(3), 79-84 https://doi.org/10.22156/CS4SMB.2018.8.3.079
  15. Y. S. Jeong. (2018). User Privacy Security Scheme using Double Replication Key in the Cloud Environment. Journal of the Korea Convergence Society. 9(4), 9-14. https://doi.org/10.15207/JKCS.2018.9.4.009