Development of a Physical Security Gateway for Connectivity to Smart Media in a Hyper-Connected Environment

  • Chapter
  • First Online:
Computational Science/Intelligence & Applied Informatics (CSII 2018)

Part of the book series: Studies in Computational Intelligence ((SCI,volume 787))

Abstract

Due to the rapid technological growth of smart media and the rapid spread of convenience through increased convenience, most individuals have smart media, and many person information is stored on a server connected to smart media. As a result, there is always a risk of leakage of personal information, and there is a great need for a method of protecting the personal data of the server from the invasion of the server. In this paper, we propose a method of blocking the intrusion from the external through unidirectional communication method.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
EUR 29.95
Price includes VAT (France)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
EUR 85.59
Price includes VAT (France)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
EUR 105.49
Price includes VAT (France)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free ship** worldwide - see info
Hardcover Book
EUR 105.49
Price includes VAT (France)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free ship** worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Wellman, B.: Physical place and cyberspace: the rise of personalized networking. Int. J. Urban Reg. Res. 25(2), 227–252 (2001)

    Article  Google Scholar 

  2. Freeman, L.: The sociological concept of group: an empirical test of two models. Am. J. Sociol. 98, 152–166 (1992)

    Article  Google Scholar 

  3. Waterfall Security Solutions Ltd. http://www.waterfallsecurity.com

  4. OwlComputing Technologies, Inc. http://owlcti.com

  5. Eun-Ae, C.H.O., et al.: Database security system for applying sophisticated access control via database firewall server. Comput. Informat. 32, 1192–1211 (2013)

    MATH  Google Scholar 

  6. Emil BURTESCU, Database security-attacks and control methods. J. Appl. Quant. Methods 4, 449–454 (2009)

    Google Scholar 

  7. Daniel, C.: Access control in database management systems. Datasem 98, 153–163 (1998)

    Google Scholar 

  8. Change Data Capture. http://en.wikipedia.org/wiki/Change_data_capture

  9. Mitchell, J., Eccles et al.: True real-time change data capture with web service database encapsulation. In: IEEE 6th World Congress on Service, pp. 128–131 (2010)

    Google Scholar 

  10. Peter Gilbert et al.: The duality between message routing and epidemic data replication. In: Eighth ACM Workshop on Hot Topics in Networks, October (2009)

    Google Scholar 

Download references

Acknowledgments

This work was supported by Institute for Information & Communications Technology Promotion (MSIP) grant funded by the Korea government (MSIT) (2018-0-00226).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Seoung-Hyeon Lee .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer International Publishing AG, part of Springer Nature

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Kim, YK., Kim, G.W., Lee, SH. (2019). Development of a Physical Security Gateway for Connectivity to Smart Media in a Hyper-Connected Environment. In: Lee, R. (eds) Computational Science/Intelligence & Applied Informatics. CSII 2018. Studies in Computational Intelligence, vol 787. Springer, Cham. https://doi.org/10.1007/978-3-319-96806-3_12

Download citation

Publish with us

Policies and ethics

Navigation