This page has only limited features, please log in for full access.

Unclaimed
Su-Hyun Kim
Division of Computer Science, Soonchunhyang University, Asan City, Republic of Korea

Basic Info

Basic Info is private.

Honors and Awards

The user has no records in this section


Career Timeline

The user has no records in this section.


Short Biography

The user biography is not available.
Following
Followers
Co Authors
The list of users this user is following is empty.
Following: 0 users

Feed

Technical note
Published: 19 March 2015 in Symmetry
Reads 0
Downloads 0

In cloud computing environments, user data are encrypted using numerous distributed servers before storing such data. Global Internet service companies, such as Google and Yahoo, recognized the importance of Internet service platforms and conducted self-research and development to create and utilize large cluster-based cloud computing platform technology based on low-priced commercial nodes. As diverse data services become possible in distributed computing environments, high-capacity distributed management is emerging as a major issue. Meanwhile, because of the diverse forms of using high-capacity data, security vulnerability and privacy invasion by malicious attackers or internal users can occur. As such, when various sensitive data are stored in cloud servers and used from there, the problem of data spill might occur because of external attackers or the poor management of internal users. Data can be managed through encryption to prevent such problems. However, existing simple encryption methods involve problems associated with the management of access to data stored in cloud environments. Therefore, in the present paper, a technique for data access management by user authority, based on Attribute-Based Encryption (ABE) and secret distribution techniques, is proposed.

ACS Style

Su-Hyun Kim; Im-Yeong Lee. Study on User Authority Management for Safe Data Protection in Cloud Computing Environments. Symmetry 2015, 7, 269 -283.

AMA Style

Su-Hyun Kim, Im-Yeong Lee. Study on User Authority Management for Safe Data Protection in Cloud Computing Environments. Symmetry. 2015; 7 (1):269-283.

Chicago/Turabian Style

Su-Hyun Kim; Im-Yeong Lee. 2015. "Study on User Authority Management for Safe Data Protection in Cloud Computing Environments." Symmetry 7, no. 1: 269-283.

Journal article
Published: 24 July 2014 in Entropy
Reads 0
Downloads 0

In a cloud computing environment, user data is encrypted and stored using a large number of distributed servers. Global Internet service companies such as Google and Yahoo have recognized the importance of Internet service platforms and conducted their own research and development to utilize large cluster-based cloud computing platform technologies based on low-cost commercial off-the-shelf nodes. Accordingly, as various data services are now allowed over a distributed computing environment, distributed management of big data has become a major issue. On the other hand, security vulnerability and privacy infringement due to malicious attackers or internal users can occur by means of various usage types of big data. In particular, various security vulnerabilities can occur in the block access token, which is used for the permission control of data blocks in Hadoop. To solve this problem, we have proposed a weight-applied XOR-based efficient distribution storage and recovery scheme in this paper. In particular, various security vulnerabilities can occur in the block access token, which is used for the permission control of data blocks in Hadoop. In this paper, a secret sharing-based block access token management scheme is proposed to overcome such security vulnerabilities.

ACS Style

Su-Hyun Kim; Im-Yeong Lee. Block Access Token Renewal Scheme Based on Secret Sharing in Apache Hadoop. Entropy 2014, 16, 4185 -4198.

AMA Style

Su-Hyun Kim, Im-Yeong Lee. Block Access Token Renewal Scheme Based on Secret Sharing in Apache Hadoop. Entropy. 2014; 16 (8):4185-4198.

Chicago/Turabian Style

Su-Hyun Kim; Im-Yeong Lee. 2014. "Block Access Token Renewal Scheme Based on Secret Sharing in Apache Hadoop." Entropy 16, no. 8: 4185-4198.

Conference paper
Published: 10 December 2011 in Lecture Notes in Electrical Engineering
Reads 0
Downloads 0

The group signature and verification using the existing group signature scheme in VANET environment have a shortcoming that there is a possibility of overhead problem as more vehicles use the communication method. Accordingly, In this paper, We proposed a message batch verification scheme using Bloom Filter that can verify multiple messages efficiently even for multiple communications with many vehicles. In addition, We propose a group organization method to prevent frequent sign-in and sing-out of group members.

ACS Style

Su-Hyun Kim; Im-Yeong Lee. A Study on Message Batch Verification Scheme Using Bloom Filter in VANET. Lecture Notes in Electrical Engineering 2011, 821 -829.

AMA Style

Su-Hyun Kim, Im-Yeong Lee. A Study on Message Batch Verification Scheme Using Bloom Filter in VANET. Lecture Notes in Electrical Engineering. 2011; ():821-829.

Chicago/Turabian Style

Su-Hyun Kim; Im-Yeong Lee. 2011. "A Study on Message Batch Verification Scheme Using Bloom Filter in VANET." Lecture Notes in Electrical Engineering , no. : 821-829.