Abstract:Decentralization in every walk of life has resulted in the development of Global Grid networking. Data sharing and access depends on their availability, capability, cost and user requirements. One of the needs for a secure Grid Environment is a strong authentication for users. Since Authentication is the entry point into every network, a novel smart card based authentication scheme has been proposed. The proposed authentication scheme utilizes the biometric data embedded in a smart card along with the ID and p… Show more
“…Secure functions of the proposed system can be classified into three modules: authentication/access control [31,32], encryption/key management, and SFS. The role and method of functions are as follows.…”
Section: Secure Functions In Secure Platformmentioning
Recently, the development of smart phones has been reported the number of security vulnerabilities. Although these smart phones have a concept of Sandbox for the security, sensitive personal information has been still exposed by internal data exchange or root privilege acquisition. In this paper, we propose a system framework for secure storage of sensitive data in smartphone. The system is divided into general domain (GD) and secure domain (SD) in mobile device utilizing domain separation technique of virtualization, and SD provides a secure execution environment to protect sensitive data and secure services. In addition, our system introduces the secure functions such as authentication/access control, and encryption/key management and secures filesystem to be run in SD and addresses a detailed secure filesystem as a key function for secure storage. Lastly, the experiments are conducted to measure the performance overhead imposed by security features in SD and by overall system with interdomain communication from GD to SD. These experiment results show suitability of our system and suggest applicability of various secure functions which can be applied in our secure storage system.
“…Secure functions of the proposed system can be classified into three modules: authentication/access control [31,32], encryption/key management, and SFS. The role and method of functions are as follows.…”
Section: Secure Functions In Secure Platformmentioning
Recently, the development of smart phones has been reported the number of security vulnerabilities. Although these smart phones have a concept of Sandbox for the security, sensitive personal information has been still exposed by internal data exchange or root privilege acquisition. In this paper, we propose a system framework for secure storage of sensitive data in smartphone. The system is divided into general domain (GD) and secure domain (SD) in mobile device utilizing domain separation technique of virtualization, and SD provides a secure execution environment to protect sensitive data and secure services. In addition, our system introduces the secure functions such as authentication/access control, and encryption/key management and secures filesystem to be run in SD and addresses a detailed secure filesystem as a key function for secure storage. Lastly, the experiments are conducted to measure the performance overhead imposed by security features in SD and by overall system with interdomain communication from GD to SD. These experiment results show suitability of our system and suggest applicability of various secure functions which can be applied in our secure storage system.
“…By centralizing the network control layers, the companies can flexibly and efficiently manage the network, and also, through dynamic and automated programming, companies can optimize network resources and directly develop the application to manage network resources. The SDN architecture provides APIs for the users to implement customized services for certain purposes: switching, routing, network resource allocation, bandwidth management, traffic engineering, system optimization, quality of service (QoS), security, access control lists (ACLs) and policy management [4,6,[9][10][11][12]. …”
Legacy networks do not open the precise information of the network domain because of scalability, management and commercial reasons, and it is very hard to compute an optimal path to the destination. According to today's ICT environment change, in order to meet the new network requirements, the concept of software-defined networking (SDN) has been developed as a technological alternative to overcome the limitations of the legacy network structure and to introduce innovative concepts. The purpose of this paper is to propose the application that calculates the optimal paths for general data transmission and real-time audio/video transmission, which consist of the major services of the National Research & Education Network (NREN) in the SDN environment. The proposed SDN routing computation (SRC) application is designed and applied in a multi-domain network for the efficient use of resources, selection of the optimal path between the multi-domains and optimal establishment of end-to-end connections.
“…In particular, in sensor network environment [4][5][6][7], embedded system needs more security technique to improve reliability and efficiency. We call it to secure embedded system.…”
The process of creating secure embedded systems with sensor network is highly challenging and complex, particularly from a technical viewpoint. A secure embedded system is used for a specific purpose and operation, and needs hardware-software codesign methodology. As such, there are many considerations in terms of system design when the system developer creates or constructs a secure embedded system with sensor network. However, there is a lack of research into quality models in the area of secure embedded systems in sensor network. This paper seeks to redress this issue by presenting a quality model for a secure embedded system with sensor network. Each quality for the secure embedded system is constructed according to DeLone and McLean's success information system, and has subcriteria according to their characteristics. The present research also focuses on making a quality model network which considers the correlation between the qualities' attributes.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.