논문윤리하기 논문투고규정
  • 오늘 가입자수 0
  • 오늘 방문자수 353
  • 어제 방문자수 609
  • 총 방문자수 2790
2024-12-25 15:26pm
논문지
HOME 자료실 > 논문지

발간년도 : [2015]

 
논문정보
논문명(한글) [Vol.10, No.6] An Encrypted Response Model using Application Access Failure information for the Attack of IP Spoofing in a Cloud Computing Environment
논문투고자 Yang Liu, Sang-Bok Kim, Jae-Heung Park, Jong-Min Bae
논문내용 The big data is typically collect a large amount of information. It is processed of receiving a service and is based on a cloud computing environment. These environments are easily exposed to illegal accesses, which use IP Spoofing compared to that of a single system. In this study traceback information is used to identify normal users in order to response to illegal accesses in a cloud computing environment. Then, services are provided after the identification process for the normal access frequency of users by comparing it with access failure information within a specific time. If there exists mismatches in traceback information or the access failure information exceeds a critical value, the access will be identified as an illegal access. Then, the access is immediately interrupted and is recorded as illegal access information. In addition, as an access that is attempted at an unexpected location, which is not registered in the existing user traceback information due to movements of normal users, is presented, the data will be provided after encrypting it for responding illegal accesses due to leaks of OTP. The model presented in this study is safe for authorized users against illegal accesses, which use IP Spoofing in a cloud computing based big data collecting environment, and improves service availabilities.
첨부논문
   2015-10-6-03.pdf (2.8M) [7] DATE : 2016-01-26 13:01:13