무기체계 데이터 보호를 위한 데이터 파편화, 분산화 기술 적용 방안 연구

Vol. 34, No. 5, pp. 907-914, 10월. 2024
10.13089/JKIISC.2024.34.5.907, Full Text:
Keywords: Data Active Defense, fragmentation and decentralization
Abstract

As technologies for data protection such as data encryption, information leak prevention, access permission setting, and data de-identification are being developed and used. Since the technologies manage the original data, if an attacker steals the data or succeeds in decrypting it, the data may be leaked. Unlike these data protection technologies, if the original data is fragmented and stored multiple distributed servers, data leakage can be prevented because only some fragmented data of the original data is leaked. Additionally, when fragmented data is copied and stored distributedly, even if some servers are damaged, the original data can be restored using the fragmented data stored on others. This paper explains data fragmentation and decentralization technologies for data protection, analyzes the data operation environment of weapon systems, and suggests ways to apply them to weapon systems.

Statistics
Show / Hide Statistics

Statistics (Cumulative Counts from December 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.


Cite this article
[IEEE Style]
이수원, 황세영, 홍석규, "A Research on Ways to Apply Data Fragmentation and Decentralization Technology to Protect Data of Weapon Systems," Journal of The Korea Institute of Information Security and Cryptology, vol. 34, no. 5, pp. 907-914, 2024. DOI: 10.13089/JKIISC.2024.34.5.907.

[ACM Style]
이수원, 황세영, and 홍석규. 2024. A Research on Ways to Apply Data Fragmentation and Decentralization Technology to Protect Data of Weapon Systems. Journal of The Korea Institute of Information Security and Cryptology, 34, 5, (2024), 907-914. DOI: 10.13089/JKIISC.2024.34.5.907.