Nowadays,intelligence communications technology is developing rapidly in a cloud computing environment with big data services. With the change of the network environment, the protection function for increasing information exchange process on the Internet and important intelligence materials needs to be further developed. Intelligence protection based on the internet has OTP authentication and encryption technology for network for the detection technology with non-normal general access. But the weaknesses of these technologies are being discovered in a variety of attack technologies. In particular, attackers with high-end illegal access technologies frequently try IP spoofing attacks. That is, it uses the cloud hosting intelligence that can build mutual trust to constantly try increase the trust relationship in the cloud service environment by illegal attacks. In order to improve the accessibility of information service in the cloud computing environment, this study analyzes the traceback information by using the Euclidean distance law in mathematics. In this study, the IP value of each hop is dually grouped, and the Euclidean distance is calculated by the two sets of coordinates. The chart changes composed of these datas are then calculated. Then the study will analyze and change the appropriate information for OTP authentication or encryption, and then obtain information to reduce the implementation process of OTP authentication.
[journal]
J. z. Li
/ 2013
/ An important aspectt of big data: Data usability
/ school of computer science and technology, Harbin Institute of Technology
: 1147~1162
[journal]
R-W. Huang
/ 2011
/ Privacy-preserving computable encryption scheme of cloud computing
/ Chinese Journal of Computers
34(12)
: 2391~2402
[other]
A. Lee
/ 1999
/ Guideline for Implementing Cryptography in the Federal Government
/ Nist SP 800-21
: 112~
[book]
S. Gueron
/ 2008
/ Advanced encryption standard (AES) instructions set. White paper of Inter
[journal]
X-F. Meng
/ 2013
/ Data management : Concepts, techniques and challenges
/ School of Information, Renmin University of China
: 146~169
[confproc]
M-S Kim
/ 2011
/ A function of a variety of distance in accordance with the definition of a regular polygon
/ The Korean Soc. Math. Ed. Proceedings of the 47th National Meeting of Math. Ed
: 4~5
@article{ART002277522}, author={Yang Liu and 백현철 and PARK JAE HEUNG and KimSangBok}, title={Model Design for Reduce OTP Reauthorization Based on Euclidean Distance}, journal={Journal of Knowledge Information Technology and Systems}, issn={1975-7700}, year={2017}, volume={12}, number={5}, pages={737-745}, doi={10.34163/jkits.2017.12.5.014}
TY - JOUR AU - Yang Liu AU - 백현철 AU - PARK JAE HEUNG AU - KimSangBok TI - Model Design for Reduce OTP Reauthorization Based on Euclidean Distance JO - Journal of Knowledge Information Technology and Systems PY - 2017 VL - 12 IS - 5 PB - Korea Knowledge Information Technology Society SP - 737 EP - 745 SN - 1975-7700 AB - Nowadays,intelligence communications technology is developing rapidly in a cloud computing environment with big data services. With the change of the network environment, the protection function for increasing information exchange process on the Internet and important intelligence materials needs to be further developed. Intelligence protection based on the internet has OTP authentication and encryption technology for network for the detection technology with non-normal general access. But the weaknesses of these technologies are being discovered in a variety of attack technologies. In particular, attackers with high-end illegal access technologies frequently try IP spoofing attacks. That is, it uses the cloud hosting intelligence that can build mutual trust to constantly try increase the trust relationship in the cloud service environment by illegal attacks. In order to improve the accessibility of information service in the cloud computing environment, this study analyzes the traceback information by using the Euclidean distance law in mathematics. In this study, the IP value of each hop is dually grouped, and the Euclidean distance is calculated by the two sets of coordinates. The chart changes composed of these datas are then calculated. Then the study will analyze and change the appropriate information for OTP authentication or encryption, and then obtain information to reduce the implementation process of OTP authentication. KW - Cloud Computing;Euclidean distance;OTP;Traceback DO - 10.34163/jkits.2017.12.5.014 ER -
Yang Liu, 백현철, PARK JAE HEUNG and KimSangBok. (2017). Model Design for Reduce OTP Reauthorization Based on Euclidean Distance. Journal of Knowledge Information Technology and Systems, 12(5), 737-745.
Yang Liu, 백현철, PARK JAE HEUNG and KimSangBok. 2017, "Model Design for Reduce OTP Reauthorization Based on Euclidean Distance", Journal of Knowledge Information Technology and Systems, vol.12, no.5 pp.737-745. Available from: doi:10.34163/jkits.2017.12.5.014
Yang Liu, 백현철, PARK JAE HEUNG, KimSangBok "Model Design for Reduce OTP Reauthorization Based on Euclidean Distance" Journal of Knowledge Information Technology and Systems 12.5 pp.737-745 (2017) : 737.
Yang Liu, 백현철, PARK JAE HEUNG, KimSangBok. Model Design for Reduce OTP Reauthorization Based on Euclidean Distance. 2017; 12(5), 737-745. Available from: doi:10.34163/jkits.2017.12.5.014
Yang Liu, 백현철, PARK JAE HEUNG and KimSangBok. "Model Design for Reduce OTP Reauthorization Based on Euclidean Distance" Journal of Knowledge Information Technology and Systems 12, no.5 (2017) : 737-745.doi: 10.34163/jkits.2017.12.5.014
Yang Liu; 백현철; PARK JAE HEUNG; KimSangBok. Model Design for Reduce OTP Reauthorization Based on Euclidean Distance. Journal of Knowledge Information Technology and Systems, 12(5), 737-745. doi: 10.34163/jkits.2017.12.5.014
Yang Liu; 백현철; PARK JAE HEUNG; KimSangBok. Model Design for Reduce OTP Reauthorization Based on Euclidean Distance. Journal of Knowledge Information Technology and Systems. 2017; 12(5) 737-745. doi: 10.34163/jkits.2017.12.5.014
Yang Liu, 백현철, PARK JAE HEUNG, KimSangBok. Model Design for Reduce OTP Reauthorization Based on Euclidean Distance. 2017; 12(5), 737-745. Available from: doi:10.34163/jkits.2017.12.5.014
Yang Liu, 백현철, PARK JAE HEUNG and KimSangBok. "Model Design for Reduce OTP Reauthorization Based on Euclidean Distance" Journal of Knowledge Information Technology and Systems 12, no.5 (2017) : 737-745.doi: 10.34163/jkits.2017.12.5.014