Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Su-Wan Park is active.

Publication


Featured researches published by Su-Wan Park.


The Journal of Supercomputing | 2016

SecureDom: secure mobile-sensitive information protection with domain separation

Su-Wan Park; Jeong-Nyeo Kim; Deok Gyu Lee

The virtualization techniques are receiving more attention lately in mobile device security. In this study, we present SecureDom which is the device security of data-centric that aims to protect private, enterprise or sensitive data from various attacks and threats. To achieve it, we provide the mobile device security platform based on domain separation and suggests three essential secure functions which should be offered for secure domain: authentication/access control (AAC) module, secure storage (STR) module and encryption/key management (EKM) module. In secure functions, the AAC module applies two-factor authentication by user and app to access SD, the STR module introduces the enhanced abilities of secure filesystem and EKM module is in charge of security algorithms for data encryption, integrity validation or key generation. Here, EKM module can utilize the existing encryption module that is certified by cryptographic validation program. In the experiment, it demonstrates that some notable overheads are caused in the performance of virtualization engine and inter-domain communication (IDC) performance based on hypervisor, while it provides the strong isolation in domain, IDC, filesystem and resource and the separation of processes.


Archive | 2015

Functional Considerations in Military-Grade Security Platform Using a Mobile Hypervisor

Kyung-Soo Lim; Su-Wan Park; Jeong-Nye Kim; Deok-Gyu Lee

Smart devices with easy Internet accessibility, mobility and usability are changing various service environment such as mobile office, smart work, mobile finance, e-government and so on. Meanwhile, these smart device has widened into military area in an effort to enhance mission command and situational awareness. This paper describes functional considerations in military-grade mobile security platform based on a mobile hypervisor. The military-grade mobile platform will be provided more security enhancement than current mobile services. We suggest four features for enhancing a mobile platform including domain separation, secure file management, secure middleware and access control.


Archive | 2012

Videos Analytic Retrieval System for CCTV Surveillance

Su-Wan Park; Kyung-Soo Lim; Jong Wook Han

The proposed system demonstrates an efficient framework of video retrieval system and the video analysis retrieval scheme using object color for CCTV surveillance. The video analysis retrieval scheme consists of metadata generation function, multiple-video search function and evidence-video generation function. The proposed retrieval scheme uses the dominant colors of object and applies the similarity measurement method of absolute (or fixed) range or relative (or variable) range. Thus, it provides the compactness of object data and the low computational cost in the color extraction and similarity measure.


Archive | 2012

EVM: A New Methodology for Evidential Video Management in Digital CCTV Systems

Kyung-Soo Lim; Su-Wan Park; Jong-Wook Han

The current video surveillance systems, due to the increases in the use of IP camera and NVR have made the transition from analog to digital transmission and storage. In means, acquiring or recovering a CCTV video is same as file recovery techniques in digital forensics. A CCTV video uses crucial evidence in the court to prove a suspect was in the crime scene. On the other hand, a lack of research on evidential video management can be damaged reliability and admissibility in a court of law. This paper present EVM which is a methodology for evidence video management establishing chain of the custody and backup archiving mechanism of evidence-video to prevent deletion or overwritten.


The Journal of Supercomputing | 2014

Automated and coupled services of advanced smart surveillance systems toward green IT: tracking, retrieval and digital evidence

Su-Wan Park; Deok Gyu Lee; Jong Wook Han; Jeong-Nyeo Kim

Green Security is a new research field defining and investigating security solutions using an energy-aware perspective. Growing efforts and interests for an intelligent or smart surveillance system which is capable of automatically detecting and tracking target objects is in the spotlight in the security community. So far, these technologies are mainly aimed at single camera applications and are evolving with the demand for wide-area surveillance systems currently. However, the tracking techniques used on a single camera have limitations in providing effective crime prevention and countermeasures when an incident occurs since an object is not linked to other cameras. In addition, the use of multi-camera systems for wide-area surveillance not only produces large amounts of video data to be stored, but also have more technical requirements in the interrelation between cameras or server. It require a considerable amount of time, manpower and energy in multi-camera tracking and back-tracking of objects. Therefore, we propose the advanced smart surveillance system for wide-areas which is capable of the automated tracking and retrieval of target object and digital evidence-video collection. Furthermore, we considered the multiple-camera environment with non-overlapping views which includes more constraint conditions by various light changes. This system enables real-time object tracking, fast post-retrieval and selective digital evidence collection with economy of time, manpower, memory devices, and energy consumption. Also, this system is more energy-efficient since our schemes are organically connected to each other.


Archive | 2016

A Protection Method of Mobile Sensitive Data and Applications Over Escrow Service

Su-Wan Park; Deok Gyu Lee; Jeong Nyeo Kim

Recently, mobile devices are gradually increasingly used even in companies and governmental institutions and the exchange of company data and military secret data through mobile devices is increased. As a result, the illegitimate leakage and collection of user data related to mobile devices has greatly increased. In this paper, we propose a method of managing the sensitive data of a mobile device using an escrow server. The proposed scheme is advantageous in that it is capable of storing the entrusted sensitive data of a user within the mobile device and verifying the validity of app software installed on the mobile device using an escrow server. Thereby it enhances data protection, minimizes damage resulting from the exposure of data attributable to the loss of a mobile device, and prevents the installation of illegitimate software.


Archive | 2015

Secure Filesystem for Trusted Virtual Domain in Mobile Device

Su-Wan Park; Deok Gyu Lee; Jeong Nyeo Kim

Recently, the development of smart phones has been reported the number of security vulnerabilities. In spite of these smart phones have a concept of Sandbox for the security, sensitive personal information has been still exposed by internal data exchange or root privilege acquisition. In this paper, we propose a domain group which is separated into general domain and trusted virtual domain (TVD) by virtualization techniques. TVD provides a secure execution environment in mobile device and makes it possible to protect sensitive personal information in the domain. Thus, we suggest together the secure filesystem in TVD to securely store and manage significant data of user. This results presented by secure filesystem based on TVD would raise expectation about the following security virtualization techniques.


Archive | 2014

Object Retrieval Scheme Using Color Features in Surveillance System

Su-Wan Park; Jeong-Nyeo Kim; Jong Wook Han

In this paper, we have described the object retrieval scheme based on color for video surveillance that is influenced by the different light changes and overlapping/non-overlapping view cameras setting. The proposed video retrieval scheme separates object into top and bottom, and extracted dominant colors from each region. Each dominant color includes hue, saturation, value in HSV space and proportion of hue color. In addition, it uses the various threshold values and pre-defined weights based on the experiment and processes the similarity measurement to order the search results. Therefore, our retrieval scheme provides the delicateness and the robustness in varying surveillance environmental conditions. As well, it can be applied in real-time surveillance system.


Archive | 2013

Apparatus and method for generating evidence video

Su-Wan Park; Kyung-Soo Lim; Geon-Woo Kim; Min-Ho Han; SuGil Choi; Chi-Yoon Jeong; Mooseop Kim; Jong-Wook Han


Archive | 2015

Method of providing evidence collection tool, and apparatus and method for collecting digital evidence in domain separation-based mobile device

Kyung-Soo Lim; Geonlyang Kim; Jeong-Nyeo Kim; Jae-Chan Moon; Su-Wan Park; JaeDeok Lim

Collaboration


Dive into the Su-Wan Park's collaboration.

Top Co-Authors

Avatar

Kyung-Soo Lim

Electronics and Telecommunications Research Institute

View shared research outputs
Top Co-Authors

Avatar

Deok Gyu Lee

Electronics and Telecommunications Research Institute

View shared research outputs
Top Co-Authors

Avatar

Jeong-Nyeo Kim

Electronics and Telecommunications Research Institute

View shared research outputs
Top Co-Authors

Avatar

Jong Wook Han

Electronics and Telecommunications Research Institute

View shared research outputs
Top Co-Authors

Avatar

Jong-Wook Han

Electronics and Telecommunications Research Institute

View shared research outputs
Top Co-Authors

Avatar

Jeong Nyeo Kim

Electronics and Telecommunications Research Institute

View shared research outputs
Top Co-Authors

Avatar

Min-Ho Han

Electronics and Telecommunications Research Institute

View shared research outputs
Top Co-Authors

Avatar

Chi-Yoon Jeong

Electronics and Telecommunications Research Institute

View shared research outputs
Top Co-Authors

Avatar

Geon-Woo Kim

Electronics and Telecommunications Research Institute

View shared research outputs
Top Co-Authors

Avatar

Geonlyang Kim

Electronics and Telecommunications Research Institute

View shared research outputs
Researchain Logo
Decentralizing Knowledge