A Virtual-Synchronized-File Based Privacy Protection System
|
|
- Alice Chapman
- 5 years ago
- Views:
Transcription
1 Vol.133 (Information Technology and Computer Science 2016), pp A Virtual-Synchronized-File Based Privacy Protection System Hye-Lim Jeong 1, Ki-Woong Park 2 System security Lab Daejeon University, Daejeon, Korea 1, Dept. Information Security, Daejeon University, Daejeon, Korea 2 hyello13@gmail.com 1, woongbak@dju.kr 2 Abstract. Following the revision of the personal information protection law, persons handling the personal information experience difficulties in adjusting to revised laws. In this paper, we propose an automated privacy protection system enhanced with a Virtual Synchronized File (VSF) concept. The VSF allows users to access a privacy file in a same manner with a normal document file and internally performs encryption/decryption and isolated store, which is to comply with the information protection law without user interventions. Keyword: Privacy Protection, Access Control, File Virtualization 1 Introduction About thousands of personal information leak of Korea are hacked every year [1]. To prevent the privacy leakage, Korea government revised personal information protection law in 2015 [2]. By the revised personal information protection laws, files containing private data (ID, mobile phone number, etc.) on PCs must be encrypted and to be deleted in a secure manner when the files are deleted. The privacy files has to be stored in a separate storage system. The revised laws give difficulty of privacy management to user. For instance, a user has to check all files stored in client storage whether the files contain personal information and if the file contains personal information, then the user must encrypts the file manually. Then, a user has to remember a key to access encrypted privacy file. In addition, when a user wants to delete a file containing the personal information, the user must perform a secure delete operation for keeping the file from file recovery techniques [3, 4]. In this paper, we propose the automated privacy protection system enhanced with Virtual Synchronized File, keeping convenience by providing conventional user experience even though performing security operations to comply with the laws. The remainder of this paper is organized as follows: Section II describes overall system design of the proposed system. Section III presents operation flow in more details. Finally, Section IV gives the conclusion and future work. This work was supported by the Human Resource Training Program for Regional Innovation and Creativity through the Ministry of Education and National Research Foundation of Korea (2015H1C1A ) ISSN: ASTL Copyright 2016 SERSC
2 2 Overall System Design Fig 1-(a) describes that a user have to what to do for complying with the personal information protection law. In accordance with the laws, users have to encrypt a file containing personal information. If the file need to be eliminated, the file have to be deleted in an unrecoverable manner. In addition, the file must be stored on an isolated storage. As a remedy to these inconveniences for keeping the laws, we proposed an automated privacy protection system to comply with the laws automatically. Fig 1-(b) shows a proposed privacy protection system enhanced with Virtual Synchronized File(VSF), which manages file containing the personal information. The VSF is a normal file which has a specific extension with a specific rule so that a user can open the VSF like a normal data file. Consequently, VSF gives users a transparent user experience by providing identical file access scheme in comparison to the conventional file system [5, 6] even though the proposed system comply with the laws without user intervention. More specific operation flow for keeping the laws is described in Section III-1 and Section III-2. The main contribution of this paper can be itemized as follow: First, we proposed an automated privacy protection system enhanced with VSF. In a result, VSF enable a user to access personal information file stored in server in an exactly same manner of normal file execution. Second, the system is able to conserve client s storage space by replacing the original file to 1KB size VSF file (regardless of size of original file). Fig. 1. A virtual synchronized file based privacy protection system (a) Required actions (users view) for complying with the personal information protection law (b) Proposed automated privacy protection system 30 Copyright 2016 SERSC
3 3 Overall Operation Flow of Privacy Protection System 3.1 Phase1: Operation flow for privacy detection and VSF creation As shown Fig. 2, a privacy detector detects file containing personal information within the client storage. Then privacy protection agent performs operations to comply with the laws. First, the agent compresses the detected file to reduce network traffic and conserve storage space by using gzip algorithm. After the compression, the agent generates a key(ek) for encryption and encrypts the compressed file. The corresponding metadata for the file including EK, file name and hash value are stored at client database. Then, the encrypted file and the hosting information including an agent id(id), file name, MAC, session are uploaded to a privacy protection server (Msg. 1). On the reception of the Msg. 1, the server manager stores the hosting information (Msg. 1) and the encrypted file in server database to manage the received file containing the personal information. Then, Client received an acknowledgement message (Msg. 2). Finally, agent creates a corresponding VSF and deletes the data region of the original file. 3.2 Phase2: Operation flow of VSF execution Fig.3 shows an operation flow of VSF execution. Once a user open a VSF, client agent checks whether a current session status is valid or not. If a valid session has been established, the agent requests login authentication to user through MSG. 3. Then a generated valid session value by the server is sent to the agent over MSG. 4. Because the session value has the expiration time, the server will re-issue the session if the session is expired. This process is for protecting the personal information from any other third party. After the authentication, the client agent requests a file to server by reading index value of the file stored in server. Fig. 2. Operation flow for privacy detection and VSF creation (Phase 1) Copyright 2016 SERSC 31
4 Then, the server sends the corresponding file to client agent. The client agent decrypts and decompresses the received file and opens the file using corresponding application program. When the opened file is closed by the user, the agent check whether the opened file has been modified or not, and the next process varies according to this result. In case of no-change, it simply finishes. Otherwise, if any part of the file has been modified, then, it leaves new record in client database, encrypts the modified region of the file, and sends it to the server. Fig. 3. Operation flow of VSF execution (Phase 2) 4 Conclusion Following the revision of the personal information protection law, persons handling the personal information experience difficulties in adjusting to revised laws. As a remedy to the challenging issues, we propose the automated privacy protection system enhanced with Virtual Synchronized File, keeping convenience by providing conventional user experience even though performing security operations to comply with the laws. In addition, Virtual synchronized file is efficiency because VSF equally has 1KB size regardless of size of original files 32 Copyright 2016 SERSC
5 References 1. Y.C-W, "Risk of Information Leak Growing in Korea", KOREA IT TIMES, July 2015, url: 2. Korea Personal Information Protection Act. url: 3. Yee, Ka-Ping. "Aligning security and usability." IEEE Security & Privacy 5 (2004): Rozenberg, Yigal, Ulf Mattsson, and Raul Ortega. "Assignment of security contexts to define access permissions for file system objects." U.S. Patent No. 9,230, Jan Yu, Yong, et al. "Remote data possession checking with enhanced security for cloud storage." Future Generation Computer Systems 52 (2015): Yeh, Her-Tyan, Etc. "User authentication of smart mobile devices and cloud storage services." Innovation in Design, Communication and Engineering: Proceedings of the rd International Conference on Innovation, Communication and Engineering (ICICE 2014), Guiyang, Guizhou, PR China, October 17-22, CRC Press, Copyright 2016 SERSC 33
Design and Implementation of Secure OTP Generation for IoT Devices
, pp.75-80 http://dx.doi.org/10.14257/astl.2017.146.15 Design and Implementation of Secure OTP Generation for IoT Devices Young-Sae Kim 1 and Jeong-Nyeo Kim 1 1 Electronics and Telecommunications Research
More informationA Design of Authentication Protocol for a Limited Mobile Network Environment
Vol.29 (SecTech 2013), pp.41-45 http://dx.doi.org/10.14257/astl.2013.29.08 A Design of Authentication Protocol for a Limited Mobile Network Environment Minha Park 1,1, Yeog Kim 2, Okyeon Yi 3 1, 3 Dept.
More informationAn Efficient Provable Data Possession Scheme based on Counting Bloom Filter for Dynamic Data in the Cloud Storage
, pp. 9-16 http://dx.doi.org/10.14257/ijmue.2016.11.4.02 An Efficient Provable Data Possession Scheme based on Counting Bloom Filter for Dynamic Data in the Cloud Storage Eunmi Jung 1 and Junho Jeong 2
More informationResearch on Autonomic Control System Connection Goal-model and Fault-tree
, pp.47-53 http://dx.doi.org/10.14257/astl.2016.129.10 Research on Autonomic Control System Connection Goal-model and Fault-tree Dongbeom Ko 1, Teayoung Kim 1, Sungjoo Kang 2, Ingeol Chun 2, Jeongmin Park
More informationByte Index Chunking Approach for Data Compression
Ider Lkhagvasuren 1, Jung Min So 1, Jeong Gun Lee 1, Chuck Yoo 2, Young Woong Ko 1 1 Dept. of Computer Engineering, Hallym University Chuncheon, Korea {Ider555, jso, jeonggun.lee, yuko}@hallym.ac.kr 2
More informationTime Stamp based Multiple Snapshot Management Method for Storage System
Time Stamp based Multiple Snapshot Management Method for Storage System Yunsoo Lee 1, Dongmin Shin 1, Insoo Bae 1, Seokil Song 1, Seungkook Cheong 2 1 Dept. of Computer Engineering, Korea National University
More informationAn Analysis of Website Accessibility of Private Industries -Focusing on the Time for Compulsory Compliance with Web Accessibility Guidelines in Korea-
, pp.321-326 http://dx.doi.org/10.14257/astl.2013.29.68 An Analysis of Website Accessibility of Private Industries -Focusing on the Time for Compulsory Compliance with Web Accessibility Guidelines in Korea-
More informationA Personal Information Retrieval System in a Web Environment
Vol.87 (Art, Culture, Game, Graphics, Broadcasting and Digital Contents 2015), pp.42-46 http://dx.doi.org/10.14257/astl.2015.87.10 A Personal Information Retrieval System in a Web Environment YoungDeok
More informationSDD: A Novel Technique for Enhancing Cloud Security with Self Destructing Data
SDD: A Novel Technique for Enhancing Cloud Security with Self Destructing Data Kishore K, Ramchand V M.Tech Student, Dept. of CSE, The Oxford College Of Engineering, Bangalore, India Associate Professor,
More informationSurvey Paper on Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 1, January 2014,
More informationA Mobile Device Classification Mechanism for Efficient Prevention of Wireless Intrusion
A obile Device Classification echanism for Efficient Prevention of Wireless Intrusion Hyeokchan Kwon 1, Sin-Hyo Kim 1, 1 Electronics and Telecommunications Research Institue, 218 Gajeong-ro, Yuseong-gu,
More informationImplementation of Digital Contents System for Cleaning Facility management
, pp.126-130 http://dx.doi.org/10.14257/astl.2016.135.32 Implementation of Digital Contents System for Cleaning Facility management Byeongtae Ahn 1, 1 Division of Liberal Arts at Anyang University, Daeshin-Hall
More informationA study on accessibility to mobile websites - Centering on public institution mobile websites in Korea -
, pp.140-144 http://dx.doi.org/10.14257/astl.2013 A study on accessibility to mobile websites - Centering on public institution mobile websites in Korea - Eunju Park 1-1, Yangwon Lim 1, Hankyu Lim 1 1
More informationSecure User Authentication Mechanism in Digital Home Network Environments
Secure User Authentication Mechanism in Digital Home Network Environments Jongpil Jeong, Min Young Chung, and Hyunseung Choo Intelligent HCI Convergence Research Center Sungkyunkwan University 440-746,
More informationSecurity Enhanced IEEE 802.1x Authentication Method for WLAN Mobile Router
Security Enhanced IEEE 802.1x Method for WLAN Mobile Router Keun Young Park*, Yong Soo Kim*, Juho Kim* * Department of Computer Science & Engineering, Sogang University, Seoul, Korea kypark@sogang.ac.kr,
More informationThe Design of Real-time Display Screen Control Techniques for Mobile Devices 1
, pp.189-193 http://dx.doi.org/10.14257/astl.2016.133.36 The Design of Real-time Display Screen Control Techniques for Mobile Devices 1 Jungsoo Hwang 1, Ji Hee Jeong 1, Soon-Bum Lim 1, 1 Dept. of Multimedia
More informationAuthentication Technology for a Smart eid Infrastructure.
Authentication Technology for a Smart eid Infrastructure. www.aducid.com One app to access all public and private sector online services. One registration allows users to access all their online accounts
More informationBioTechnology. An Indian Journal FULL PAPER. Trade Science Inc. Study on secure data storage based on cloud computing ABSTRACT KEYWORDS
[Type text] [Type text] [Type text] ISSN : 0974-7435 Volume 10 Issue 22 BioTechnology 2014 An Indian Journal FULL PAPER BTAIJ, 10(22), 2014 [13778-13783] Study on secure data storage based on cloud computing
More informationTowards Secure Virtual Machine Migration in Vehicular Cloud Environment
, pp.85-89 http://dx.doi.org/10.14257/astl.2014.66.21 Towards Secure Virtual Machine Migration in Vehicular Cloud Environment Nkenyereye Lewis and Kyung Hyune Rhee 1 1 Department of IT Convergence and
More informationApplication of Fuzzy Logic Control to Dynamic Channel Allocation of WiMedia UWB Networks
, pp.60-64 http://dx.doi.org/10.14257/astl.2015.108.14 Application of Fuzzy Logic Control to Dynamic Channel Allocation of WiMedia UWB Networks Dong-Keun Jeon 1, Yeonwoo Lee *2 1 Dept. of Mechatronics,
More informationCryptanalysis of Two Password-Authenticated Key Exchange. Protocols between Clients with Different Passwords
International Mathematical Forum, 2, 2007, no. 11, 525-532 Cryptanalysis of Two Password-Authenticated Key Exchange Protocols between Clients with Different Passwords Tianjie Cao and Yongping Zhang School
More informationTechnical Overview of DirectAccess in Windows 7 and Windows Server 2008 R2. Microsoft Windows Family of Operating Systems
Technical Overview of in Windows 7 and Windows Server 2008 R2 Microsoft Windows Family of Operating Systems Published: January 2009 This document supports a preliminary release of a software product that
More informationTungsten Security Whitepaper
Tungsten Labs UG (haftungsbeschränkt) Email: contact@tungsten-labs.com Web: http://tungsten-labs.com Monbijouplatz 5, 10178 Berlin Tungsten Security Whitepaper Berlin, May 2018 Version 1 Contents Introduction
More informationSingle Sign-On Showdown
Single Sign-On Showdown ADFS vs Pass-Through Authentication Max Fritz Solutions Architect SADA Systems #ITDEVCONNECTIONS Azure AD Identity Sync & Auth Timeline 2009 2012 DirSync becomes Azure AD Sync 2013
More informationAcronis Data Cloud plugin for ConnectWise Automate
Acronis Data Cloud plugin for ConnectWise Automate USER S GUIDE Revision: 17.01.2018 Table of contents 1 Introduction...3 2 What s new in Update 3...3 3 What s new in Update 2...3 4 What s new in Update
More informationOrganize and Deliver Digital Assets Using Adobe Experience Manager v6.x Student Workbook
Organize and Deliver Digital Assets Using Adobe Experience Manager v6.x Student Workbook ADOBE DIGITAL LEARNING SERVICES 2016 Adobe Systems Incorporated. All rights reserved. Organize and Deliver Digital
More informationA Load Balancing Scheme for Games in Wireless Sensor Networks
, pp.89-94 http://dx.doi.org/10.14257/astl.2013.42.21 A Load Balancing Scheme for Games in Wireless Sensor Networks Hye-Young Kim 1 1 Major in Game Software, School of Games, Hongik University, Chungnam,
More informationKohelet Policy Forum R.A. Site Legal Terms. What personal data we collect and why we collect it. Comments. Media. Contact forms and newsletter
Kohelet Policy Forum R.A. Site Legal Terms Our address: 8 Am Ve'loamo Street Jerusalem office@kohelet.org.il www.kohelet.org.il What personal data we collect and why we collect it We collect anonymous
More informationMessage Processing at Integrated PHD Gateways for Servicing Various PHDs
, pp.367-374 http://dx.doi.org/10.14257/ijmue.2014.9.3.35 Message Processing at Integrated PHD Gateways for Servicing Various PHDs KeeHyun Park and Seunghyeon Lim Department of Computer Engineering, Keimyung
More informationAbout This Document 3. Overview 3. System Requirements 3. Installation & Setup 4
About This Document 3 Overview 3 System Requirements 3 Installation & Setup 4 Step By Step Instructions 5 1. Login to Admin Console 6 2. Show Node Structure 7 3. Create SSO Node 8 4. Create SAML IdP 10
More informationCryptography (Overview)
Cryptography (Overview) Some history Caesar cipher, rot13 substitution ciphers, etc. Enigma (Turing) Modern secret key cryptography DES, AES Public key cryptography RSA, digital signatures Cryptography
More informationThe Design and Implementation of a BLE-based WebD2D Service for Android Smartphone
, pp.1-5 http://dx.doi.org/10.14257/astl.2017.146.01 The Design and Implementation of a BLE-based WebD2D Service for Android Smartphone Do-Hyung Kim 1, Seok-Jin Yoon 1, Hyung-Seok Lee 1 and Jae-Ho Lee
More informationDROPBOX.COM - PRIVACY POLICY
Dropbox Privacy Policy Last Modified: October 15, 2012 This Privacy Policy provides our policies and procedures for collecting, using, and disclosing your information. Users can access the Dropbox service
More informationThe Functional User Requirement Analysis of a Web Broadcasting Management System
The Functional User Requirement Analysis of a Web Broadcasting Management System Gyeyoung Lee, Jaegeol Yim Dept. of Computer Engineering, Dongguk University at Gyeongju Korea {lky, yim}@dongguk.ac.kr Abstract.
More informationFast Location Opposite Update Scheme for Minimizing Handover Latency over Wireless/Mobile Networks
Fast Location Opposite Update Scheme for Minimizing Handover Latency over Wireless/Mobile Networks Sunguk Lee Research Institute of Industrial Science and Technology Pohang, Gyeongbuk, 790-330, S.KOREA
More informationKODO for Samsung Knox Enterprise Data Protection & Secure Collaboration Platform
& Secure Collaboration Platform by Paweł Mączka, Storware CTO Table of Contents OVERVIEW 3 WHAT IS KODO? 4 HOW IT WORKS? 5 BACKUP & RESTORE 6 TABLE OF FEATURES 8 END-TO-END ENCRYPTION FOR ANDROID DEVICES
More informationAcronis Data Cloud plugin for ConnectWise Automate
Acronis Data Cloud plugin for ConnectWise Automate USER'S GUIDE Revision: 24.08.2018 Table of contents 1 Introduction...3 2 What's new in Update 4...3 3 What's new in Update 3...3 4 What's new in Update
More informationVoice Annotation Technique for Reading-disabled People on Mobile System
, pp.53-57 http://dx.doi.org/10.14257/astl.2014.60.14 Voice Annotation Technique for Reading-disabled People on Mobile System Joo Hyun Park 1, KyungHee Lee 1, JongWoo Lee 1, Soon-Bum Lim 1, 1 Multimedia
More informationCreating Web Server in Android Mobile and Easy Serving of Information to Clients
Indian Journal of Science and Technology, Vol 9(39), DOI: 10.17485/ijst/2016/v9i39/102073, October 2016 ISSN (Print) : 0974-6846 ISSN (Online) : 0974-5645 Creating Web Server in Android Mobile and Easy
More informationSecurity context. Technology. Solution highlights
Code42 CrashPlan Security Code42 CrashPlan provides continuous, automatic desktop and laptop backup. Our layered approach to security exceeds industry best practices and fulfills the enterprise need for
More informationThe Application Analysis and Network Design of wireless VPN for power grid. Wang Yirong,Tong Dali,Deng Wei
Applied Mechanics and Materials Online: 2013-09-27 ISSN: 1662-7482, Vols. 427-429, pp 2130-2133 doi:10.4028/www.scientific.net/amm.427-429.2130 2013 Trans Tech Publications, Switzerland The Application
More informationSecurity and Privacy in Computer Systems. Lecture 7 The Kerberos authentication system. Security policy, security models, trust Access control models
CS 645 Security and Privacy in Computer Systems Lecture 7 The Kerberos authentication system Last Week Security policy, security models, trust Access control models The Bell-La Padula (BLP) model The Biba
More informationNetwork Intrusion Forensics System based on Collection and Preservation of Attack Evidence
, pp.354-359 http://dx.doi.org/10.14257/astl.2016.139.71 Network Intrusion Forensics System based on Collection and Preservation of Attack Evidence Jong-Hyun Kim, Yangseo Choi, Joo-Young Lee, Sunoh Choi,
More informationKenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data
Kenna Platform Security A technical overview of the comprehensive security measures Kenna uses to protect your data V3.0, MAY 2017 Multiple Layers of Protection Overview Password Salted-Hash Thank you
More informationA Study on Multi-resolution Screen based Conference Broadcasting Technology
2 : (Young-ae Kim et al.: A Study on Multi-resolution Screen based Conference Broadcasting Technology) (Special Paper) 23 2, 2018 3 (JBE Vol. 23, No. 2, March 2018) https://doi.org/10.5909/jbe.2018.23.2.253
More informationConstruction Scheme for Cloud Platform of NSFC Information System
, pp.200-204 http://dx.doi.org/10.14257/astl.2016.138.40 Construction Scheme for Cloud Platform of NSFC Information System Jianjun Li 1, Jin Wang 1, Yuhui Zheng 2 1 Information Center, National Natural
More informationA Study on the IoT Sensor Interaction Transmission System based on BigData
Vol.123 (SoftTech 2016), pp.220-224 http://dx.doi.org/10.14257/astl.2016.123.41 A Study on the IoT Sensor Interaction Transmission System based on BigData Jin-Tae Park 1, Gyung-Soo Phyo 1 and Il-Young
More informationSwitching on our smartphone and sending an to a friend living 5000 km from our home is something that we take for granted, but that involves a
Switching on our smartphone and sending an email to a friend living 5000 km from our home is something that we take for granted, but that involves a lot of very complex processes and has to take into account
More informationA Design of Distributed Data Traffic Algorithm based on Hierarchical Wireless/Mobile Networks
, pp.147-151 http://dx.doi.org/10.14257/astl.2015.117.35 A Design of Distributed Data Traffic Algorithm based on Hierarchical Wireless/Mobile Networks Ronnie Caytiles, Seungyong Shin, Minji Yang and Byungjoo
More informationThe World Wide Web is widely used by businesses, government agencies, and many individuals. But the Internet and the Web are extremely vulnerable to
1 The World Wide Web is widely used by businesses, government agencies, and many individuals. But the Internet and the Web are extremely vulnerable to compromises of various sorts, with a range of threats
More informationDevelopment of Smart-CITY Based Convergent Contents Platform Using Bluetooth Low Energy Beacon Sensors
, pp.16-20 http://dx.doi.org/10.14257/astl.2017.145.04 Development of Smart-CITY Based Convergent Contents Platform Using Bluetooth Low Energy Beacon Sensors Jihoon Seo 1 and Kil-Hong Joo 2* 1 HI-CUBE,
More informationvsphere Replication for Disaster Recovery to Cloud
vsphere Replication for Disaster Recovery to Cloud vsphere Replication 6.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced
More informationSarbanes-Oxley Act (SOX)
Sarbanes-Oxley Act (SOX) Introduction The Sarbanes-Oxley (SOX) Act was introduced in 2002 to protect shareholders and the general public from fraudulent accounting activities by bringing greater accountability
More information905M 67% of the people who use a smartphone for work and 70% of people who use a tablet for work are choosing the devices themselves
67% of the people who use a smartphone for work and 70% of people who use a tablet for work are choosing the devices themselves 905M tablets in use for work and home globally by 2017 Before Now 32% of
More informationCryptography III. Public-Key Cryptography Digital Signatures. 2/1/18 Cryptography III
Cryptography III Public-Key Cryptography Digital Signatures 2/1/18 Cryptography III 1 Public Key Cryptography 2/1/18 Cryptography III 2 Key pair Public key: shared with everyone Secret key: kept secret,
More informationApplicability Estimation of Mobile Mapping. System for Road Management
Contemporary Engineering Sciences, Vol. 7, 2014, no. 24, 1407-1414 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ces.2014.49173 Applicability Estimation of Mobile Mapping System for Road Management
More informationA Novel Model for Home Media Streaming Service in Cloud Computing Environment
, pp.265-274 http://dx.doi.org/10.14257/ijsh.2013.7.6.26 A Novel Model for Home Media Streaming Service in Cloud Computing Environment Yun Cui 1, Myoungjin Kim 1 and Hanku Lee1, 2,* 1 Department of Internet
More informationAT&T Global Network Client for Mac User s Guide Version 2.0.0
Version 1.7.0 AT&T Global Network Client for Mac User s Guide Version 2.0.0 experience may vary. This document is not an offer, commitment, representation or warranty by AT&T and is subject to change..
More informationDecentralized Identity for a Decentralized World. Alex Simons Partner Director Program Management, Identity Division Microsoft
Decentralized Identity for a Decentralized World Alex Simons Partner Director Program Management, Identity Division Microsoft Today Your Identity == App(username, password) However u s e r n a m e Your
More informationDesign of a Processing Structure of CNN Algorithm using Filter Buffers
, pp.37-41 http://dx.doi.org/10.14257/astl.2016.129.08 Design of a Processing Structure of CNN Algorithm using Filter Buffers Kwan-Ho Lee 1, Jun-Mo Jeong 2, Jong-Joon Park 3 1 Dept. of Electronics and
More informationvsphere Replication for Disaster Recovery to Cloud vsphere Replication 6.5
vsphere Replication for Disaster Recovery to Cloud vsphere Replication 6.5 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have comments
More informationOCTOSHAPE SDK AND CLIENT LICENSE AGREEMENT (SCLA)
OCTOSHAPE SDK AND CLIENT LICENSE AGREEMENT (SCLA) This is a License Agreement (the "Agreement") for certain code (the Software ) owned by Akamai Technologies, Inc. ( Akamai ) that is useful in connection
More informationImplementation of Digital Cinema Mastering System
Implementation of Digital Cinema Mastering System Yeonjeong Jeong, Bumho Kim, Dowon Nam, Kisong Yoon Content Distribution Platform Team, ETRI, 218 Gajeong-ro, Yuseong-gu, Daejeon, Korea yjjeong@etri.re.kr,
More informationCryptography Application : SSH. Cyber Security & Network Security March, 2017 Dhaka, Bangladesh
Cryptography Application : SSH Cyber Security & Network Security 20-22 March, 2017 Dhaka, Bangladesh Issue Date: [31-12-2015] Revision: [v.1] What is Safely Authentication I am Assured of Which Host I
More informationResearch and Design of Crypto Card Virtualization Framework Lei SUN, Ze-wu WANG and Rui-chen SUN
2016 International Conference on Wireless Communication and Network Engineering (WCNE 2016) ISBN: 978-1-60595-403-5 Research and Design of Crypto Card Virtualization Framework Lei SUN, Ze-wu WANG and Rui-chen
More informationAn Efficient Flow Table Management Scheme for SDNs Based On Flow Forwarding Paths
, pp.88-93 http://dx.doi.org/10.14257/astl.2016.135.23 An Efficient Flow Table Management Scheme for SDNs Based On Flow Forwarding Paths Dongryeol Kim, Byoung-Dai Lee Kyonggi university, Department of
More informationEkran System v Program Overview
Ekran System v. 6.2 Program Overview Contents About the Program Login Ekran Server & Management Tool Notifying Users about Being Database Management Monitored Licensing User Blocking Client Installation
More informationFirewall XG / SFOS v16 Beta
Firewall XG / SFOS v16 Beta Partner Beta Program Name: Company: Table of Content Welcome... 3 Look & Feel... 4 Base: SFOS migration and performance... 5 Base: HA with dynamic link... 6 Network: Policy
More informationLiveBox Manual IOS APPLICATION V (465)
2015 LiveBox Manual IOS APPLICATION V. 3.0.3 (465) http://www.liveboxcloud.com LiveBox Srl does not release declarations or guarantees about this documentation and its use and decline any expressed or
More informationAttribute Based Encryption with Privacy Protection in Clouds
Attribute Based Encryption with Privacy Protection in Clouds Geetanjali. M 1, Saravanan. N 2 PG Student, Department of Information Technology, K.S.R College of Engineering, Tiruchengode, Tamilnadu, India
More informationData Store and Multi-Keyword Search on Encrypted Cloud Data
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 4, April 2014,
More informationFull Disk Encryption. Larry Carson, Associate Director, Information Security Management
Full Disk Encryption Larry Carson, Associate Director, Information Security Management What Security Really Looks Like at UBC News-worthy Security Incidents VGH Loss of 450 medical records via Resident
More informationAT&T Global Network Client for Mac User s Guide Version 1.7.3
Version 1.7.0 AT&T Global Network Client for Mac User s Guide Version 1.7.3 experience may vary. This document is not an offer, commitment, representation or warranty by AT&T and is subject to change..
More informationSupporting Collaborative 3D Editing over Cloud Storage
, pp.33-37 http://dx.doi.org/10.14257/astl.2015.107.09 Supporting Collaborative 3D Editing over Cloud Storage Yeoun-Ui Ha 1, Jae-Hwan Jin 2, Myung-Joon Lee 3 Department of Electrical/Electronic and Computer
More informationArchitecture for QoS-enabled Application Service Deployment in Virtualized Environment
, pp.121-125 http://dx.doi.org/10.14257/astl.2016.142.22 Architecture for QoS-enabled Application Service Deployment in Virtualized Environment Hyun-Min Yoon, Zeqi Liu, Woo-Suk Yang, Jung-Ho Kim and Jae-Oh
More informationNew research on Key Technologies of unstructured data cloud storage
2017 International Conference on Computing, Communications and Automation(I3CA 2017) New research on Key Technologies of unstructured data cloud storage Songqi Peng, Rengkui Liua, *, Futian Wang State
More informationOnline Version Only. Book made by this file is ILLEGAL. Design and Implementation of Binary File Similarity Evaluation System. 1.
, pp.1-10 http://dx.doi.org/10.14257/ijmue.2014.9.1.01 Design and Implementation of Binary File Similarity Evaluation System Sun-Jung Kim 2, Young Jun Yoo, Jungmin So 1, Jeong Gun Lee 1, Jin Kim 1 and
More informationFortiMail AWS Deployment Guide
FortiMail AWS Deployment Guide FORTINET DOCUMENT LIBRARY http://docs.fortinet.com FORTINET VIDEO GUIDE http://video.fortinet.com FORTINET BLOG https://blog.fortinet.com CUSTOMER SERVICE & SUPPORT https://support.fortinet.com
More informationImplementation of Security in Cloud Systems Based using Encryption and Steganography
Implementation of Security in Cloud Systems Based using Encryption and Steganography 1 A.Mahesh Babu, 2 G.A. Ramachandra, 3 M.Suresh Babu 1,2 Department of Computer Science & Technology, Sri Krishnadevaraya
More informationFive Key Considerations When Implementing Secure Remote Access to Your IIoT Machines. Blanch Huang Product Manager
Five Key Considerations When Implementing Secure Remote Access to Your IIoT Machines Blanch Huang Product Manager Abstract Industrial IoT (IIoT) and smart factory trends are redefining today s OEM business
More informationQ-Pulse Document Retrieval Service User Manual
Q-Pulse Document Retrieval Service User Manual Contents Introduction to the Q-Pulse Document Retrieval Service... 3 Installation Requirements... 3 Installation Procedure... 3 Configuration on Windows Server
More informationPRODUCT AUTHENTICATION USING QR-CODE THROUGH CLOUD
PRODUCT AUTHENTICATION USING QR-CODE THROUGH CLOUD Prof. Sagar Thakare Assistant Professor, ABSTRACT Mr. Vighnesh Gadekar Mr. Mandar Gharat The development of a new product or technology always comes with
More informationMcAfee MVISION Cloud. Data Security for the Cloud Era
McAfee MVISION Cloud Data Security for the Cloud Era McAfee MVISION Cloud protects data where it lives today, with a solution that was built natively in the cloud, for the cloud. It s cloud-native data
More informationLab Zero: A First Experiment Using GENI and Jacks Tool
GENIExperimenter/Tutorials/jacks/GettingStarted_PartI/Procedure GENI: geni 2/27/16, 14:35 Lab Zero: A First Experiment Using GENI and Jacks Tool These instructions are at: http://tinyurl.com/geni-labzero
More informationUnifie X Common Gateway Server (N Tier)
Unifie X Common Gateway Server (N Tier) M.SUPRIYA Dept of IT, Swami Vivekananda Institute of Technology, Telangana, India ABSTRACT The main objective of this project is to develop a generic tool for Common
More informationCourse 832 EC-Council Computer Hacking Forensic Investigator (CHFI)
Course 832 EC-Council Computer Hacking Forensic Investigator (CHFI) Duration: 5 days You Will Learn How To Understand how perimeter defenses work Scan and attack you own networks, without actually harming
More informationData Security and Privacy Principles IBM Cloud Services
Data Security and Privacy Principles IBM Cloud Services 2 Data Security and Privacy Principles: IBM Cloud Services Contents 2 Overview 2 Governance 3 Security Policies 3 Access, Intervention, Transfer
More informationBox Competitive Sheet January 2014
This document is a comparison of file sharing and collaboration capabilities offered by Soonr Workplace and Box. Narrative is provided when there is no direct comparison between the capabilities or when
More informationG/On. G/On is available for Windows, MacOS and Linux (selected distributions).
G/On Soliton G/On is a remote access solution which establishes connections between a remote device and application servers inside an organisations network. A secure gateway is used to separate the remote
More informationImplementation of a Pedestrian Detection Device based on CENTRIST for an Embedded Environment
, pp.123-127 http://dx.doi.org/10.14257/astl.2014.46.29 Implementation of a Pedestrian Detection Device based on CENTRIST for an Embedded Environment Yun-Seop Hwang 1, Jae-Chang Kwak 2, Kwang-Yeob Lee
More informationOneID An architectural overview
OneID An architectural overview Jim Fenton November 1, 2012 Introduction OneID is an identity management technology that takes a fresh look at the way that users authenticate and manage their identities
More information1 Introduction Requirements Architecture Feature List... 4
Contents 1 Introduction... 2 1.1 Requirements... 2 1.2 Architecture... 3 1.3 Feature List... 4 1.3.1 Device Compliance status... 4 1.3.2 Auto grouping for devices... 5 1.3.3 Auto grouping for applications...
More informationBuilding a Modular and Scalable Virtual Network Architecture with Amazon VPC
Building a Modular and Scalable Virtual Network Architecture with Amazon VPC Quick Start Reference Deployment Santiago Cardenas Solutions Architect, AWS Quick Start Reference Team August 2016 (revisions)
More informationLab Zero: A First Experiment Using GENI and Jacks Tool
Lab Zero: A First Experiment Using GENI and Jacks Tool These instructions are at: http://tinyurl.com/geni labzero Overview This is a first, simple experiment on GENI useful for familiarizing new experimenters
More informationSecurity Device Roles
Kennesaw State University DigitalCommons@Kennesaw State University KSU Proceedings on Cybersecurity Education, Research and Practice 2017 KSU Conference on Cybersecurity Education, Research and Practice
More informationRobust EC-PAKA Protocol for Wireless Mobile Networks
International Journal of Mathematical Analysis Vol. 8, 2014, no. 51, 2531-2537 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ijma.2014.410298 Robust EC-PAKA Protocol for Wireless Mobile Networks
More informationImproved Delegation Of Computation Using Somewhat Homomorphic Encryption To Reduce Storage Space
Improved Delegation Of Computation Using Somewhat Homomorphic Encryption To Reduce Storage Space Dhivya.S (PG Scholar) M.E Computer Science and Engineering Institute of Road and Transport Technology Erode,
More informationBuilding Ubiquitous Computing Environment Using the Web of Things Platform
, pp.105-109 http://dx.doi.org/10.14257/astl.2013 Building Ubiquitous Computing Environment Using the Web of Things Platform Woo-Chang Shin Dept. of Computer Science, at SeoKyeong University 16-1 Jungneung-Dong
More informationISSN Vol.08,Issue.16, October-2016, Pages:
ISSN 2348 2370 Vol.08,Issue.16, October-2016, Pages:3146-3152 www.ijatir.org Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation VEDIRE AJAYANI 1, K. TULASI 2, DR P. SUNITHA
More informationPRIVACY PRESERVING RANKED MULTI KEYWORD SEARCH FOR MULTIPLE DATA OWNERS. SRM University, Kattankulathur, Chennai, IN.
Volume 115 No. 6 2017, 585-589 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu PRIVACY PRESERVING RANKED MULTI KEYWORD SEARCH FOR MULTIPLE DATA OWNERS
More information