Earticle

현재 위치 Home

International Journal of Security and Its Applications

간행물 정보
  • 자료유형
    학술지
  • 발행기관
    보안공학연구지원센터(IJSIA) [Science & Engineering Research Support Center, Republic of Korea(IJSIA)]
  • pISSN
    1738-9976
  • 간기
    격월간
  • 수록기간
    2008 ~ 2016
  • 등재여부
    SCOPUS
  • 주제분류
    공학 > 컴퓨터학
  • 십진분류
    KDC 505 DDC 605
Vol.9 No.1 (38건)
No
1

Phishing Sites and Prevention Measures

Zhou Fu-an

보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.9 No.1 2015.01 pp.1-10

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

With the growing number of Internet users in online transactions, the number of phishing sites is also increasing rapidly, the threat of malicious attack front is extended, the means are ever-changing, which gives great economic losses to China's Internet users and businesses, and caused a serious impediment to online financial services and the healthy development of e-business applications. Facing of the growing phishing epidemic, the initiative alone to enhance awareness of Internet users to avoid "phishing" is not enough. This paper analyzes phishing sites based on deception trick, focusing on the Internet user side, made several recommendations to strengthen their resistance to phishing sites.

2

An Enhanced Trust Management Framework for MANET using Fuzzy Prediction Mechanism

V. Hemamalini, G. Zayaraz, V. Vijayalakshmi

보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.9 No.1 2015.01 pp.11-24

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

A Mobile Ad hoc Network (MANET) is a self-sufficient arrangement of portable switch and related hosts associated by remote connections. It is a gathering of autonomous versatile hubs that can speak with one another through radio waves. These systems are completely disseminated, and work at wherever without help of any framework. MANETS are substantially more helpless to assault than the wired system. Because of the rapidly changing system topology, versatile hubs frequently comes in and goes out of the system, along these lines permitting any vindictive hub to join the system without being located . Subsequently, Ad Hoc system needs extremely particular security systems. But there is no single approach fitting all the networks, as the nodes can be any devices. Therefore, in this paper, an Enhanced Trust management framework using Adaptive Fuzzy Logic mechanism is proposed to provide detection of malicious node. The proposed model will be incorporated over Ad hoc On-demand Distance Vector (AODV) routing protocol to pick the most limited course that meets the security prerequisites of information bundle transmission. Investigations have been led to assess the productivity and viability of the proposed component in malignant node identification attack resistance.

3

Improved Tent Map and Its Applications in Image Encryption

Xuefeng Liao

보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.9 No.1 2015.01 pp.25-34

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

In this paper, an improved tent map chaotic system with better chaotic performance is introduced. The improved tent map has stronger randomness, larger Lyapunov exponents and C0 complexity values compare with the tent map. Then by using the improved tent map, a new image encryption scheme is proposed. Based on all analysis and experimental results, it can be concluded that, this scheme is efficient, practicable and reliable, with high potential to be adopted for network security and secure communications. Although the improved tent chaotic maps presented in this paper aims at image encryption, it is not just limited to this area and can be widely applied in other information security fields.

4

A High-security RFID Grouping Proof Protocol

Ping Huang, Haibing Mu

보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.9 No.1 2015.01 pp.35-44

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Several categories of RFID authentication protocols have been proposed recently, among which Jules [5] introduced a novel research direction, named yoking proof. It is used to solve the problem that two tags have to be scanned simultaneously for some reasons. Afterwards, the yoking proof was developed into the grouping proof protocol and many such protocols have been presented. However there are some flaws on security or computational overhead. Based on the existing grouping proof protocols, a new method on key distribution is developed in this paper by means of distributing the points on straight lines to the entities. With this method, the performance of the grouping proof protocol will be improved. In comparison with the previous protocols, it provides security enhancement and performance improvement, which balances security and computational overhead to some extent.

5

Proposal : A Design of E-learning User Authentication System

Byeong Ho Kang, Hyejin Kim

보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.9 No.1 2015.01 pp.45-50

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

6

Implementation : Mobile Face Identity Authentication System on Android Platforms

Pinjie Ye, Mengmeng Yu, Minghui Wu

보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.9 No.1 2015.01 pp.51-60

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

This paper proposes a mobile face identify authentication system. In this system, Android application has to capture face, and verify the face by Web services. It is introduced how to implement an Android Client of this system in details. Using MB-LBP features, AdaBoost and CamShift algorithm, get face images by camera on mobile device. Then, rotate, crop the face images and convert them to grayscale in order to reduce the amount of face data. At last, post data and get validation results using sub-thread to realize real-time face verification.

7

Steganalysis using Regional Correlation and Second-order Markov Features

Su Jinyang, Zeng Xianting, Wang Lei

보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.9 No.1 2015.01 pp.69-76

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

A blind steganalysis based on regional correlation and second-order Markov transition probability matrix is proposed for JPEG images. By analyzing the region correlation of JPEG image, the Markov transition probability matrix is used to capture the correlation of intra-block and inter-block DCT coefficients. In addition, the calibrated features are extracted from the calibrated images. The difference features between the original and calibrated images are used for training and classifying. Three different image libraries are used to detect the five kinds of typical JPEG steganography schemes. Experimental results show that, in comparison to the several effective steganalysis, the proposed scheme improves the detection accuracy on some JPEG-based steganography schemes, including outguess, Steghide and MB1.

8

New Arbitrated Quantum Signature Scheme without Entangled state

Jiang guanXiong, Zhang Jun

보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.9 No.1 2015.01 pp.77-88

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Arbitrated quantum signature (AQS) schemes use quantum cryptography to ensure their security, and the schemes provide that the signature receiver verifies the signature with the arbitrator’s assistance. Very recently, Gao and Choi found in some previous AQS schemes, the receiver, Bob can counterfeit the signer’s signature under known message. Additionally, the paper gives the security analysis of the AQS scheme, and results show that not only the receiver, but also the attacker can forge the signature in the AQS scheme. Furthermore, the signer can successfully disavow any message she ever signed. To conquer these shortcomings, this paper gives a new AQS scheme without quantum entangled state; it uses special quantum logic gate and new quantum one-time pads to ensure its security. Compares with other previous AQS schemes, the new scheme has following advantages: (1) the new scheme guarantees the receiver and the attacker cannot forge the signature; (2) Because the new scheme does not use quantum entangled states, so it can reduce the complexity of implementation and provides a higher efficiency in transmission; (3) The receiver, Bob has verified the signature’s integrity, so Alice cannot disavow her having signed message.

9

FPGA Implementation of Watermarking Scheme Using XSG

Korrapati Rajitha, Usha Rani.Nelakuditi, Venkata Naresh Mandhala, Tai-hoon Kim

보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.9 No.1 2015.01 pp.89-96

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Now a day’s hardware realization of image processing applications using FPGA is an important area of research due to the speed of implementation, low development costs and less time to market. This is due to the parallelism existing in it. In this paper an efficient architecture for Digital Image Watermarking algorithm using Xilinx System Generator (XSG) is proposed. The objective is, to simulate, synthesize and implement Image Watermarking algorithm on FPGA platform. Hardware implementation of watermarking is realized using the Xilinx Block Sets presented in Simulink. The generated hardware software co-simulation block for Virtex6 FPGA, VHDL/Verilog code and the test-benches are tested on the FPGA development board. Then it is validated in terms of area, power and performance metrics.

10

Cross-access Method for Team Confidential Document Based on Offline Key Management

Haoli Luan, Cunxu Wang, Zhenliu Zhou, Zheng Yang

보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.9 No.1 2015.01 pp.97-108

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Existing personal and network encryption application modes are summarized, and a new kind of offline team confidential document application mode is defined and analyzed for satisfying special confidential demand in practical. In this mode, confidential electronic documents are classified by team’s role. Team is the smallest unit of key distribution, and access authority is allowed to be delivered between teams. PKI system dependable on Intranet or Internet is forbidden to use in this mode. In response, a cross-access method based on offline key management for this new mode is proposed, algorithms for authorization, encryption, authentication, and decryption in this method are described in detail through an implement example of transparent encryption system using Microsoft Office plug-in technology.

11

Analysis Method based on Rough Attack-defense Bayes Game Model

Kai Zhang

보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.9 No.1 2015.01 pp.109-118

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

In order to solve the strategic interdependence question during the attack and defense process in a complex network, the dissertation proposes an analysis method based on rough attack-defense Bayes game model. After defining the inner structure of attacking agent and defense agent, the dissertation extends traditional object Petri Net and introduces rough set theory into node domain and transition domain, then propose the network attack-defense confrontation model. By dividing domain attack strategy set into equivalence classes, the extraction method of characteristic attack strategy set is given. Then the rough game model and utility function of attack and defense agents are defined, accordingly, the solution of Bayes equilibrium strategy and maximal attack and defense strategy set are proposed. The analysis method can reduce the scale of strategic space of the game model, and suitable for researching on complex network attack and defense action.

12

Security Challenges for Building Knowledge-Based Economy in Nigeria

L. J. Muhammad, Abdullahi Garba Ali, Ibrahim Sani Iliya

보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.9 No.1 2015.01 pp.119-124

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

The world economy is changing at an unprecedented rate. The forces of globalization and Information and Communication Technologies (ICT) progress are changing the way people all over the world living. Some countries, especially in the emerging world such as China, Malaysia, India, and Singapore among others, are using this wave of change to drive rapid growth in their economies. Nigeria yet to struggle to come to terms with these fundamental shifts in the global economic order. And for it (Nigeria) to secure its place in the global economy, it needs at least a decade to balance the growth that lays the foundation of this ongoing prosperity. This balanced growth can only come from one place, thus the knowledge based economy. Hence, to build the Knowledge-Based Economy in Nigeria, the security challenges of the phenomena (Knowledge-Based Economy) need to be identified and its possible solutions. This paper presents some of the security challenges for building Knowledge-Based Economy in Nigeria and their possible remedies.

13

A Secure Data Transmission Scheme Based on Information Hiding in Wireless Sensor Networks

Baowei Wang, Hongwei Qian, Xingming Sun, Jian Shen, Xiaoyu Xie

보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.9 No.1 2015.01 pp.125-138

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Wireless sensor networks hold the promise of facilitating large-scale and real-time data processing in complex environments, therefore the security is a critical issue that must be resolved. In order to prevent attacks by adversaries with fake identities, we propose a secure data transmission scheme based on information hiding technique. Firstly, one superficial change made to the beacon message of original CTP is to mark the unique identity infor-mation of a sensor node. Secondly, sensitive information is uniformly and randomly embed-ded into the ordinary data by using the space-efficient randomized data structure characteris-tic of Bloom Filter. Experimental results and performance analysis demonstrate that the pro-posed scheme can efficiently detect the malicious node with fake identities through the sensi-tive information. On the other hand, our scheme can protect the sensitive information without affecting the transmission and usability of the ordinary data.

14

A Simple Security Architecture for Mobile Office

Seungcheon Kim, Hoon Jin

보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.9 No.1 2015.01 pp.139-146

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

The Mobile Offices services based on Bring Your Own Device (BYOD) are getting more popular as the use of smart phone grows rapidly. As the free wireless services are being spread, malicious codes can be spread easily. Therefore, how we will provide security in an environment of free wireless has become an issue. This paper suggests security architecture for the better mobile office security and presents required procedures and the analysis of the expected security enhancement.

15

Comment on New Construction of Efficient Certificateless Aggregate Signatures

Yulei Zhang, Caifen Wang

보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.9 No.1 2015.01 pp.147-154

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Aggregate signature can combine n signatures on n messages from n users into single signature, and the verifier should be convinced by the aggregate signature that n users indeed sign n messages. Since aggregate signature can greatly reduce the length of total signature and the cost of verification, it is widely used in environments with low bandwidth communication, low storage and low computability. Recently, Liu et al. [H Liu, S Wang, M Liang and Y Chen, “New Construction of Efficient Certificateless Aggregate Signatures”, International Journal of Security and Its Applications Vol.8, No.1 (2014), pp. 411-422] proposed an efficient certificateless aggregate signature scheme which is proven existentially unforgeable against adaptive chosen-message attacks. Unfortunately, Liu et al.’s new certificateless signature scheme is insecure. In this paper, giving concrete and simple attacks, we demonstrate that type II adversary key generation center can make ordinary-passive attack and malicious-active attack to forge legal certificateless signatures and certificateless aggregate signatures on any messages. Furthermore, we analyze possible reasons why key generation center succeeds in ordinary-passive attack and malicious-active attack.

16

A Systematic Review of Studies on Cyber Physical System Security

Peiyuan Dong, Yue Han, Xiaobo Guo, Feng Xie

보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.9 No.1 2015.01 pp.155-164

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Cyber-Physical System (CPS) is a system of systems which integrates physical system with cyber capability in order to improve the physical performance [1]. So far, it is being widely applied in areas closely related to national economy and people’s daily lives. Therefore, CPS security problems have drawn a global attention and an appropriate risk assessment for CPS is in urgent need. According to the researches and discussions in recent years, we believe that most researchers have already established a comprehensive understanding about CPS. This paper systematically introduced CPS’s conception, development and applications assisted. In addition, concerning about its aspects of safety and security, we also analyzed CPS’s risks and new requirements as an up-to-date technique brings. We elaborate the existing work and propose a research focus that has not been paid enough attention to, and proposed a security framework for CPS. At last, after providing a classic modeling and simulation method of CPS, we bring forward a new idea for accessing the experimental results into existing systems.

17

Feed Forward Networks in Color Extended Visual Cryptography to Generate Meaningful Shares

J. Ida Christy, V. Seenivasagam

보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.9 No.1 2015.01 pp.165-178

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Conventional visual secret sharing schemes generate noise-like random pixels on shares to hide secret images. It suffers a management problem, because of which dealers cannot visually identify each share. This problem is solved by the Extended Visual Cryptography Scheme (EVCS), which adds a meaningful cover image in each share. However, the previous approaches involving the EVCS for color images suffer from a pixel expansion problem. In this paper, we propose a general approach to solve the abovementioned problem; the approach can be used for color images in non computer-aided decryption environments. The proposed approach uses Feed Forward Network to construct the shares. The experimental results indicate that a solution to the pixel expansion problem of the EVCS is achieved. Moreover, the display quality of the recovered image is better than that obtained using other VC schemes.

18

Universally Composable Attribute-based Group Key Exchange

Hui Xie, Yongjie Yan, Sihui Shu

보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.9 No.1 2015.01 pp.179-190

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Several protocols implementing attribute-based group key exchange, which allows users with certain set of attributes to establish a session key, have been proposed in recent years. However, attacks on attribute-based group key exchange in current research have been considered only in stand-alone fashion. Thus these protocols may be vulnerable when run with other protocol sessions concurrently. We treat the security of attribute-based group key exchange in the universal composability framework to ensure that a protocol remains secure when run with arbitrary protocol sessions concurrently. More specifically, we define an ideal functionality for attribute-based group key exchange first, then propose a two-round protocol based on a primitive called encapsulation policy attribute-based key encapsulation mechanism. In addition, a complete security proof of our protocol in the universal composability framework under random oracle model is given.

19

A (n, t, n) Verifiable Multi-secret Sharing Scheme with Secure Secret Reconstruction

Li Meng, Qu Shaoyun, Xun Tiantian, Yu Jia

보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.9 No.1 2015.01 pp.191-204

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

20

SBISurban-Secure Urban Bus Information System based on Smart Devices

Donghyuk Park, Hyunsung Kim

보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.9 No.1 2015.01 pp.205-220

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Bus information system (BIS) has been developed for networking passengers with bus companies that provides public transportation services. The BIS, also denoted as BISgeneralized, supports a passenger with personalized and real time bus information services in all phases of a journey. Today’s BISgeneralized encompasses multiple technologies, including advanced visual displays, public address, emergency intercommunications, digital surveillance systems, IP networks, wireless networks, video streaming, coders, decoders and many more. These systems deliver real time bus information seamlessly on vehicles and in stations, while they are controlled and managed from a single control center. However, lots of small bus companies’ services like urban city’s bus company or small organization’s bus could not afford to operate the profound services to the passenger due to the budget of the city, which requires complicated infrastructure. To provide the BIS services with cheap cost, this paper proposes a secure urban BIS, denoted by SBISurban, based on smart devices and explains the security issues related to the system operation. The SBISurban is to reduce the cost and to ensure security and privacy from the BISgeneralized. The SBISurban is secure from various attacks, provides privacy and has good properties compared with the other systems.

21

On the Security and Robustness with Fingerprint Watermarking Signal via Compressed Sensing

Huimin Zhao, Yanmei Fang

보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.9 No.1 2015.01 pp.221-236

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

In information hiding scheme, the security and robustness of watermarking are two important performances. Based on the design of secure watermarking signal, this paper proposes a robust video information hiding solution for protecting fingerprint content. In our proposed method, construction of fingerprint watermarking signal from the compressed sensing (CS) measurements relies on the knowledge of the measurement matrix used for sensing, in which generation of the CS matrix can offer a natural method for the secret key. The key has the inherent advantage that encryption of the watermarking signal occurs implicitly in the sensing process, and does not require additional computation. Our experimental results indicate that the proposed secure watermarking signal can possess the better robustness in the video watermark application, and can reconstruct highly the original fingerprint image.

22

Hiding Messages using Musical Notes: A Fuzzy Logic Approach

Chandan Kumar, Sandip Dutta, Soubhik Chakraborty

보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.9 No.1 2015.01 pp.237-248

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

“Music can be used as a communicable language”. Musical symbols and musical notes have been used as codes and ciphers from early days. The art of encrypting messages using music is termed as Musical cryptography and it uses predefined set of notes and set of rules for composing musical pieces which in turn are musical cryptograms. Traditional algorithms applied to musical cryptography used simple substitution cipher which merely produced good musical sequences. To overcome this problem a fuzzy logic based algorithm for musical cryptography is proposed in this paper. The paper proposes a symmetric key substitution cipher which uses one of the n candidate notes to encrypt a particular character. The application of fuzzy logic in musical cryptography produces acceptable musical sequences which are hard to be suspected as cipher.

23

Privacy Protection for LBS in Mobile Environments : Progresses, Issues and Challenges

Julong Pan, Zhengwei Zuo, Zhanyi Xu, Qun Jin

보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.9 No.1 2015.01 pp.249-258

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

24

A New (n, n)-threshold Reversible Secret Image Sharing Using Histogram Shifting

Gil-Je Lee, Dae-Soo Kim, Kee-Young Yoo

보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.9 No.1 2015.01 pp.259-270

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

In this paper, we propose a (n, n)-threshold reversible secret image sharing scheme using histogram shifting. Unlike Shamir’s secret sharing, the proposed scheme does not use a polynomial. In the secret image sharing procedure, a histogram is generated by the difference value between the original and copy images. And, the secret image is embedded into original and copy images by using histogram shifting. Lastly, generated shadow images are distributed to each participant. In the experimental results, we measure embedding capacity of secret image and a distortion ratio between original and shadow images. The experimental results show that the embedding capacity and image distortion ratio of the proposed scheme are superior to the previous schemes.

25

A Unified Authentication Scheme Based on Analytic Mechanism

Yong Xu, Yejuan Cheng, Chang Xiao

보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.9 No.1 2015.01 pp.271-282

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

To resolve security issues and management issues of different Certificate Authorities (CAs), this paper proposed a unified authentication scheme, which will make different Certificate Authorities (CAs) be uniformly authenticated. In addition, it showed the whole structure of the scheme, added an extensional registration number to certificates and designed unified authentication process for the scheme. The unified authentication process was modelled and simulated by Coloured Petri Net (CPN) Tools and verified by analyzing the state space of CPN model. In conclusion, this paper provides a unified authentication service and confirms that the proposed scheme is totally controllable, realizable and feasible. The suggested scheme can enhance the efficiency and security of authentication systems and achieve good results in practical applications.

26

An Effective Approach of Distortion-Resistant Video Watermarking for Piracy Deterrence

Nilesh Kumar Dubey, Shishir Kumar

보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.9 No.1 2015.01 pp.283-294

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

An effective approach of distortion-resistant video watermarking has been developed and presented through this paper. This watermarking approach is based on the additive spread spectrum way and periodic watermark concept that make it robust. Objective of this work is to protect the piracy of video files. Some time, many illegal copies of videos are found on street market or on the internet before their official release. During copying or after copying the pirate may distort the video by scaling, rotation, translation etc. In this paper, a deterrent system has been proposed which is robust enough against the distortion and can identify the pirate, by embedding a payload into original video that consist the time stamp of video playback. Many experiments are done to prove that the proposed scheme fulfil the invisibility, real time processing and robustness requirements against distortion.

27

A Novel Preserving Client Privacy and Designate Verifier Auditing Scheme for Cloud Storage

Jiang Xu, Wenliang Chen, Sai Ji, Yongjun Ren, Jin Wang

보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.9 No.1 2015.01 pp.295-304

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Cloud storage is now an important development trend in information technology. To ensure the integrity of data storage in cloud storing, researchers have present some proof of storage schemes. In some cases, the ability to check data possession is delegated by data owners. Hence, the delegable provable data possession and proxy provable data possession are proposed. However the schemes are not secure since the proxy or designated verifier stores some delegation information in cloud storage servers. In this paper, we propose PC-DV POS scheme, which can preserve clients’ privacy and designate a verifier by the client signed the data blocks. In particular, we utilize group signatures and key exchange to construct homomorphic authenticators, so that only the designated verifier is able to check the integrity of shared data for users without retrieving the entire data, and cannot reveal the identities of signers on all blocks in shared data.

28

Watermarking Scheme of MPEG-4 LASeR Object for Mobile Device

Dae-Jea Cho

보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.9 No.1 2015.01 pp.305-312

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

It is important to represent MPEG-4 BIFS with LASeR format to service the existing MPEG-4 scene in mobile environments. 2D and 3D graphics are represented by MPEG-4 BIFS but LASeR supports only 2D nodes. Because it is difficult to represent the 3D geometry nodes of BIFS with LASeR, converting process is needed. In this paper, watermarking scheme of 3D object based on MPEG-4 LASeR is proposed. Watermarks are embedded while MPEG-4 BIFS 3D geometry nodes are converted into LASeR 2D graphic nodes. Proposed watermarking algorithm uses vector information of polygon and original model is needed in extraction procedure. This proposed watermarking algorithm has good imperceptibility and robustness against the geometrical attacks such as noise addition, smoothing, mesh simplification and compression. And it is proved that this proposed algorithm is good for integrity authentication by the experiment.

29

Towards Attacks and Defenses of Anonymous Communication Systems

Tianbo Lu, Puxin Yao1, Lingling Zhao, Yang Li, Feng Xie, Yamei Xia

보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.9 No.1 2015.01 pp.313-328

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Anonymous communication system has been hot topic in the field of information security, and attack techniques against anonymous systems are endless. This paper first classifies and summarizes the study of attacks against anonymous communication system in recent years, then analyzes the trend of the research on different attack technologies; secondly, it provides a comparative analysis of defense capability the mainstream anonymous communication system to the various attacks; Finally, combining the advantages and disadvantages of different systems, the authors propose an improved node selection and router forwarding algorithms for anonymous communication systems, and design an architecture of anonymous communications software based on the algorithm.

30

SMS Spam Filterinig Using Keyword Frequency Ratio

Sin-Eon Kim, Jung-Tae Jo, Sang-Hyun Choi

보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.9 No.1 2015.01 pp.329-336

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

As the amount of cellphone text message use has increased, spam text messages also have increased. Presently in mobile devices, spam filtering methods are in a very basic level such as simple character string comparison or specific number blocking. Typical filtering methods such as bayesian classifier, logistic regression and decision tree for detecting spam messages take quite a long time. In order to perform spam filtering with these methods, high performance computer resources and lots of SMS samples are required. In addition, if servers come to store normal messages, the problem of personal information infringement could arise. For mobile devices to independently perform spam filtering, there are many limitations in the aspects of storage space, memory, and CPU processing capability. Thus, this study tries to propose light and quick algorithm through which SMS filtering can be performed within mobile devices independently.

 
1 2
페이지 저장