Earticle

현재 위치 Home

Design and Implementation of Reliable Content Transaction System in Smartphone Environment

첫 페이지 보기
  • 발행기관
    보안공학연구지원센터(IJSH) 바로가기
  • 간행물
    International Journal of Smart Home 바로가기
  • 통권
    Vol.7 No.6 (2013.11)바로가기
  • 페이지
    pp.333-342
  • 저자
    Seng-Phil Hong, Sungmin Kang, Jaejung Kim
  • 언어
    영어(ENG)
  • URL
    https://www.earticle.net/Article/A218006

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

원문정보

초록

영어
As the growth of the Internet has given consumers an access to unprecedented amounts of digital contents from almost anywhere, thanks to a variety of smart devices, it has raised concerns about the safety of personal data with current digital content transaction model when purchasing the online digital contents. Smartphone use is increasing rapidly and it is affecting every aspect of people’s lives and working environment. Thus, smartphone has become an essential personal tool and individuals have much dependence on it. We examine the security issues of smartphone and smart work environment in terms of describing the threats and problems with respect to privacy information protection. In order to solve this problem, we propose a transparent and reliable online distribution infrastructure system equipped with improved protection of consumer rights, supplier revenue, and enhanced prevention of copyright infringement. To be precise, this secure digital content transaction system enables N-screen based consolidated authentication model from various smart devices to process transaction confirmation anonymously so that consumer’s personal information can be protected. In addition, this anonymous authentication technology between user and service provider also allows possible security threats to be traceable by using traceable anonymous technology.

목차

Abstract
 1. Introduction
 2. Related Research
  2.1. Smartphone and Smart Work Environment Security
  2.2 Threats of Smartphone-related Security
  2.3 Problem Statements of Smartphone Security
  2.4. The Current Digital Content Purchasing Process
 3. Design of Secure Digital Content Transaction System
  3.1. Overview
  3.2. PKI of Anonymity
  3.3. Consolidated Authentication Model (CAM)
 4. Prototyping and Implementation
 5. Comparison and Simulation
 6. Conclusions and Future Work
 Acknowledgements
 References

키워드

PKI User Authentication Anonymous Technology Digital Contents Smartphone Security Threats Privacy Information Protection

저자

  • Seng-Phil Hong [ School of Media and Information, Sungshin Women's University, Seongbuk-gu, Seoul, Korea ]
  • Sungmin Kang [ The College of Business and Economics, Chung-Ang University, Dongjak-gu, Seoul, Korea, ] Corresponding Author
  • Jaejung Kim [ School of Media and Information, Sungshin Women's University, Seongbuk-gu, Seoul, Korea ]

참고문헌

자료제공 : 네이버학술정보

간행물 정보

발행기관

  • 발행기관명
    보안공학연구지원센터(IJSH) [Science & Engineering Research Support Center, Republic of Korea(IJSH)]
  • 설립연도
    2006
  • 분야
    공학>컴퓨터학
  • 소개
    1. 보안공학에 대한 각종 조사 및 연구 2. 보안공학에 대한 응용기술 연구 및 발표 3. 보안공학에 관한 각종 학술 발표회 및 전시회 개최 4. 보안공학 기술의 상호 협조 및 정보교환 5. 보안공학에 관한 표준화 사업 및 규격의 제정 6. 보안공학에 관한 산학연 협동의 증진 7. 국제적 학술 교류 및 기술 협력 8. 보안공학에 관한 논문지 발간 9. 기타 본 회 목적 달성에 필요한 사업

간행물

  • 간행물명
    International Journal of Smart Home
  • 간기
    격월간
  • pISSN
    1975-4094
  • 수록기간
    2008~2016
  • 십진분류
    KDC 505 DDC 605

이 권호 내 다른 논문 / International Journal of Smart Home Vol.7 No.6

    피인용수 : 0(자료제공 : 네이버학술정보)

    함께 이용한 논문 이 논문을 다운로드한 분들이 이용한 다른 논문입니다.

      페이지 저장