Namje Park
Jeju National University
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Namje Park.
asia-pacific web conference | 2006
Namje Park; Jin Kwak; Seungjoo Kim; Dongho Won; Howon Kim
Recently, RFID (Radio Frequency Identification) technology is practically applied to a number of logistics processes as well as asset management, and RFID is also expected to be permeated in our daily life with the name of ’Ubiquitous Computing’ or ‘Ubiquitous Network’ within the near future. The R&D groups in global now have paid attention to integrate RFID with mobile devices as well as to associate with the existing mobile telecommunication network. Such a converged technology and services would lead to make new markets and research challenges. However, the privacy violation on tagged products has become stumbling block. We propose light-weight security mechanism which is constructed by mobile RFID security mechanism based on WIPI (Wireless Internet Platform for Interoperability). WIPI-based light-weight mobile RFID security platform can be applicable to various mobile RFID services that required secure business applications in mobile environment.
ubiquitous computing | 2011
Namje Park
The typical Radio Frequency Identification (RFID) architecture, defined by EPCglobal, comprises RFID tags, which are embedded or attached to objects, an RFID reader and Information Services (ISs) server. The RFID reader can be stationary or mobile; the latter enables more applications. This paper describes the core components required for realising a mobile RFID application, such as mobile RFID reader and the platform and network architectures. Although several types of mobile RFID readers are available, we propose and analyse the characteristics of customised mobile RFID technology, which affords several advantages related to security, network architecture, and operation scenario etc.
international conference on information computing and applications | 2010
Namje Park
Mobile RFID environment means that mobile RFID devices like mobile (cellular) phone and PDA employing cellular network can be used at querying information of the consumer product related a tag. The mobile RFID devices should have mobile RFID readers which are made for them and are, in particular, compliant with EPC Class-1 Generation-2 UHF (860-960 MHz) standard. Ensuring the security of mobile RFID’s large-capacity database system by depending only on existing encryption schemes is unrealistic. In this paper, we propose a security service solution for managing a large quantity of individual information in mobile RFID environment. It aims to become aware of distribution of large quantity of individual information with RFID tags and to provide information service to general consumers with mobile RFID devices like mobile phone or PDA which has a mobile RFID.
Archive | 2011
Namje Park
Cloud computing service provider cannot be totally trusted due to data security reasons, risk of data security and violation of privacy factors should be considered. Especially, guaranteeing data confidentiality is required. To solve these problems, S.C. Yu etc. proposed scheme which guarantees data confidentiality and fine-grained access control. However, data confidentiality can be violated by collusion attack of revoked user and cloud server. To solve this problem, we guaranteed data confidentiality by storing and dividing data file into header and body. In addition, the method of selective delegation regarding the whole or partial message according to delegator’s reliability towards delegate using type-based re-encryption was specified.
international conference on computational collective intelligence | 2011
Namje Park
In the mobile RFID (Radio-Frequency Identification) environment, scanning RFID tags which are personalized can bring some privacy infringement issues. In spite of the case that private information is not stored in those tags, one can identify entities, analyze their preferences, and track them by collecting data related with the tags and aggregating it. Especially, it might be more serious at the point of that data collection may be done not only by enterprises and government, but also by individuals. In this paper, we describe privacy infringements for the mobile RFID service environment. The proposed framework provides a means for securing the stability of mobile RFID services by suggesting personal policy based access control for personalized tags.
international conference on hybrid information technology | 2011
Namje Park
Personalized radio-frequency identification (RFID) tags can be exploited to infringe on privacy even when not directly carrying private information, as the unique tag data can be read and aggregated to identify individuals, analyze their preferences, and track their location. This is a particularly serious problem because such data collection is not limited to large enterprise and government, but within reach of individuals. In this paper, we describe the security analysis and implementation leveraging globally networked mobile RFID service. We propose a secure mobile RFID service framework leveraging mobile networking. Here we describe the proposed framework and show that it is secure against known attacks. The framework provides a means for safe use of mobile phone-based RFID services by providing security to personalized RFID tags.
wireless algorithms systems and applications | 2010
Namje Park; You-Jin Song
Ensuring the security of RFIDs large-capacity database system by depending only on existing encryption schemes is unrealistic. Therefore, data sharing for security management to supplement it is drawing attention as an extremely secure scheme. However, applying the existing secret sharing scheme to this method makes the size of the share equal to that of the original data. Thus, it is not suitable for application to large-scale database. This paper proposes secret sharing algorithms that enable efficient data sharing security management based on the characteristics of the All-Or-Nothing Transform encryption mode. The proposed algorithms enable fast sharing and reconstruction in terms of processing speed and allow the sum of shares to be equal to that of the plaintext, thereby making them suitable for large-capacity database storage.
international conference on computational collective intelligence | 2010
Namje Park; Youngsoo Kim
This paper provides a privacy-enhanced method of verifying adults in mobile RFID environment. It can be applied to check whether a user is an adult or not when he or she would like to use some adult contents using mobile terminals playing a role of tag readers in mobile RFID environment. Instead of current adult verification method utilizing the users own mobile terminals, the proposed method uses any mobile terminal and provides users with anonymity. Additionally, instead of a conventional rating system based on the users age, we proposed four-level rating system (0 to 3) in detail. The adult content is classified based on each category (for example, swear word, nudity, sex, and foul language) and the rating information gets assigned to the adult content based on each category. The rating information is assigned to the user data region of the RFID tag. Through this method, the rating of multi-media content can be expressed with respect to each category using the detailed rating criteria. The weight factors may be differently applied to the categories according to applications.
international conference on computational collective intelligence | 2010
Namje Park; You-Jin Song
Mobile RFID (radio frequency identification) is a new application that allows the use of a mobile phone as a wireless RFID reader and provides new services to users by integrating RFID and the ubiquitous sensor network infrastructure with mobile communication and wireless internet services. Ensuring the security of mobile RFIDs large-capacity database system by depending only on existing encryption schemes is unrealistic. In this regard, data sharing for security management has drawn attention as an extremely secure scheme. However, applying the existing secret sharing scheme to this method makes the size of the share equal to that of the original data, making it unsuitable for application to a large-scale database. To address this problem, this paper proposes secret sharing algorithms that enable efficient data security management through the use of the characteristics of the all-or-nothing transform (AONT) encryption in RFID middleware.
acis/jnu international conference on computers, networks, systems and industrial engineering | 2011
Jeong-Min Do; You-Jin Song; Namje Park
To ensure data confidentiality and fine-grained access control in cloud computing environments, a recent study proposed system model using Key Policy-Attribute Based Encryption(KP-ABE) and Proxy Re-Encryption(PRE). But, existing work has effected the violation of data confidentiality through collusion attack of revoked user in system and cloud server. To resolve this problem, we propose system model that store and divide data file into header, body. In addition, our scheme selectively delegate decryption right using Type-based Proxy re-encryption.