Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Namje Park is active.

Publication


Featured researches published by Namje Park.


asia-pacific web conference | 2006

WIPI mobile platform with secure service for mobile RFID network environment

Namje Park; Jin Kwak; Seungjoo Kim; Dongho Won; Howon Kim

Recently, RFID (Radio Frequency Identification) technology is practically applied to a number of logistics processes as well as asset management, and RFID is also expected to be permeated in our daily life with the name of ’Ubiquitous Computing’ or ‘Ubiquitous Network’ within the near future. The R&D groups in global now have paid attention to integrate RFID with mobile devices as well as to associate with the existing mobile telecommunication network. Such a converged technology and services would lead to make new markets and research challenges. However, the privacy violation on tagged products has become stumbling block. We propose light-weight security mechanism which is constructed by mobile RFID security mechanism based on WIPI (Wireless Internet Platform for Interoperability). WIPI-based light-weight mobile RFID security platform can be applicable to various mobile RFID services that required secure business applications in mobile environment.


ubiquitous computing | 2011

Implementation of terminal middleware platform for mobile RFID computing

Namje Park

The typical Radio Frequency Identification (RFID) architecture, defined by EPCglobal, comprises RFID tags, which are embedded or attached to objects, an RFID reader and Information Services (ISs) server. The RFID reader can be stationary or mobile; the latter enables more applications. This paper describes the core components required for realising a mobile RFID application, such as mobile RFID reader and the platform and network architectures. Although several types of mobile RFID readers are available, we propose and analyse the characteristics of customised mobile RFID technology, which affords several advantages related to security, network architecture, and operation scenario etc.


international conference on information computing and applications | 2010

Security Scheme for Managing a Large Quantity of Individual Information in RFID Environment

Namje Park

Mobile RFID environment means that mobile RFID devices like mobile (cellular) phone and PDA employing cellular network can be used at querying information of the consumer product related a tag. The mobile RFID devices should have mobile RFID readers which are made for them and are, in particular, compliant with EPC Class-1 Generation-2 UHF (860-960 MHz) standard. Ensuring the security of mobile RFID’s large-capacity database system by depending only on existing encryption schemes is unrealistic. In this paper, we propose a security service solution for managing a large quantity of individual information in mobile RFID environment. It aims to become aware of distribution of large quantity of individual information with RFID tags and to provide information service to general consumers with mobile RFID devices like mobile phone or PDA which has a mobile RFID.


Archive | 2011

Secure Data Access Control Scheme Using Type-Based Re-encryption in Cloud Environment

Namje Park

Cloud computing service provider cannot be totally trusted due to data security reasons, risk of data security and violation of privacy factors should be considered. Especially, guaranteeing data confidentiality is required. To solve these problems, S.C. Yu etc. proposed scheme which guarantees data confidentiality and fine-grained access control. However, data confidentiality can be violated by collusion attack of revoked user and cloud server. To solve this problem, we guaranteed data confidentiality by storing and dividing data file into header and body. In addition, the method of selective delegation regarding the whole or partial message according to delegator’s reliability towards delegate using type-based re-encryption was specified.


international conference on computational collective intelligence | 2011

Secure UHF/HF dual-band RFID: strategic framework approaches and application solutions

Namje Park

In the mobile RFID (Radio-Frequency Identification) environment, scanning RFID tags which are personalized can bring some privacy infringement issues. In spite of the case that private information is not stored in those tags, one can identify entities, analyze their preferences, and track them by collecting data related with the tags and aggregating it. Especially, it might be more serious at the point of that data collection may be done not only by enterprises and government, but also by individuals. In this paper, we describe privacy infringements for the mobile RFID service environment. The proposed framework provides a means for securing the stability of mobile RFID services by suggesting personal policy based access control for personalized tags.


international conference on hybrid information technology | 2011

Customized Healthcare Infrastructure Using Privacy Weight Level Based on Smart Device

Namje Park

Personalized radio-frequency identification (RFID) tags can be exploited to infringe on privacy even when not directly carrying private information, as the unique tag data can be read and aggregated to identify individuals, analyze their preferences, and track their location. This is a particularly serious problem because such data collection is not limited to large enterprise and government, but within reach of individuals. In this paper, we describe the security analysis and implementation leveraging globally networked mobile RFID service. We propose a secure mobile RFID service framework leveraging mobile networking. Here we describe the proposed framework and show that it is secure against known attacks. The framework provides a means for safe use of mobile phone-based RFID services by providing security to personalized RFID tags.


wireless algorithms systems and applications | 2010

Secure RFID application data management using all-or-nothing transform encryption

Namje Park; You-Jin Song

Ensuring the security of RFIDs large-capacity database system by depending only on existing encryption schemes is unrealistic. Therefore, data sharing for security management to supplement it is drawing attention as an extremely secure scheme. However, applying the existing secret sharing scheme to this method makes the size of the share equal to that of the original data. Thus, it is not suitable for application to large-scale database. This paper proposes secret sharing algorithms that enable efficient data sharing security management based on the characteristics of the All-Or-Nothing Transform encryption mode. The proposed algorithms enable fast sharing and reconstruction in terms of processing speed and allow the sum of shares to be equal to that of the plaintext, thereby making them suitable for large-capacity database storage.


international conference on computational collective intelligence | 2010

Harmful adult multimedia contents filtering method in mobile RFID service environment

Namje Park; Youngsoo Kim

This paper provides a privacy-enhanced method of verifying adults in mobile RFID environment. It can be applied to check whether a user is an adult or not when he or she would like to use some adult contents using mobile terminals playing a role of tag readers in mobile RFID environment. Instead of current adult verification method utilizing the users own mobile terminals, the proposed method uses any mobile terminal and provides users with anonymity. Additionally, instead of a conventional rating system based on the users age, we proposed four-level rating system (0 to 3) in detail. The adult content is classified based on each category (for example, swear word, nudity, sex, and foul language) and the rating information gets assigned to the adult content based on each category. The rating information is assigned to the user data region of the RFID tag. Through this method, the rating of multi-media content can be expressed with respect to each category using the detailed rating criteria. The weight factors may be differently applied to the categories according to applications.


international conference on computational collective intelligence | 2010

AONT encryption based application data management in mobile RFID environment

Namje Park; You-Jin Song

Mobile RFID (radio frequency identification) is a new application that allows the use of a mobile phone as a wireless RFID reader and provides new services to users by integrating RFID and the ubiquitous sensor network infrastructure with mobile communication and wireless internet services. Ensuring the security of mobile RFIDs large-capacity database system by depending only on existing encryption schemes is unrealistic. In this regard, data sharing for security management has drawn attention as an extremely secure scheme. However, applying the existing secret sharing scheme to this method makes the size of the share equal to that of the original data, making it unsuitable for application to a large-scale database. To address this problem, this paper proposes secret sharing algorithms that enable efficient data security management through the use of the characteristics of the all-or-nothing transform (AONT) encryption in RFID middleware.


acis/jnu international conference on computers, networks, systems and industrial engineering | 2011

Attribute Based Proxy Re-encryption for Data Confidentiality in Cloud Computing Environments

Jeong-Min Do; You-Jin Song; Namje Park

To ensure data confidentiality and fine-grained access control in cloud computing environments, a recent study proposed system model using Key Policy-Attribute Based Encryption(KP-ABE) and Proxy Re-Encryption(PRE). But, existing work has effected the violation of data confidentiality through collusion attack of revoked user in system and cloud server. To resolve this problem, we propose system model that store and divide data file into header, body. In addition, our scheme selectively delegate decryption right using Type-based Proxy re-encryption.

Collaboration


Dive into the Namje Park's collaboration.

Top Co-Authors

Avatar

Dongho Won

Sungkyunkwan University

View shared research outputs
Top Co-Authors

Avatar

Donghyeok Lee

Jeju National University

View shared research outputs
Top Co-Authors

Avatar

Sungwon Sohn

Electronics and Telecommunications Research Institute

View shared research outputs
Top Co-Authors

Avatar

Howon Kim

Pusan National University

View shared research outputs
Top Co-Authors

Avatar

Kiyoung Moon

Electronics and Telecommunications Research Institute

View shared research outputs
Top Co-Authors

Avatar

Kyoil Chung

Electronics and Telecommunications Research Institute

View shared research outputs
Top Co-Authors

Avatar

Seungjoo Kim

Sungkyunkwan University

View shared research outputs
Top Co-Authors

Avatar

Hyochan Bang

Electronics and Telecommunications Research Institute

View shared research outputs
Top Co-Authors

Avatar

Youngsoo Kim

Electronics and Telecommunications Research Institute

View shared research outputs
Top Co-Authors

Avatar

Mijin Kim

Sungkyunkwan University

View shared research outputs
Researchain Logo
Decentralizing Knowledge