Skip to main content

Development of a Physical Security Gateway for Connectivity to Smart Media in a Hyper-Connected Environment

  • Chapter
  • First Online:
Computational Science/Intelligence & Applied Informatics (CSII 2018)

Part of the book series: Studies in Computational Intelligence ((SCI,volume 787))

Abstract

Due to the rapid technological growth of smart media and the rapid spread of convenience through increased convenience, most individuals have smart media, and many person information is stored on a server connected to smart media. As a result, there is always a risk of leakage of personal information, and there is a great need for a method of protecting the personal data of the server from the invasion of the server. In this paper, we propose a method of blocking the intrusion from the external through unidirectional communication method.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Wellman, B.: Physical place and cyberspace: the rise of personalized networking. Int. J. Urban Reg. Res. 25(2), 227–252 (2001)

    Article  Google Scholar 

  2. Freeman, L.: The sociological concept of group: an empirical test of two models. Am. J. Sociol. 98, 152–166 (1992)

    Article  Google Scholar 

  3. Waterfall Security Solutions Ltd. http://www.waterfallsecurity.com

  4. OwlComputing Technologies, Inc. http://owlcti.com

  5. Eun-Ae, C.H.O., et al.: Database security system for applying sophisticated access control via database firewall server. Comput. Informat. 32, 1192–1211 (2013)

    MATH  Google Scholar 

  6. Emil BURTESCU, Database security-attacks and control methods. J. Appl. Quant. Methods 4, 449–454 (2009)

    Google Scholar 

  7. Daniel, C.: Access control in database management systems. Datasem 98, 153–163 (1998)

    Google Scholar 

  8. Change Data Capture. http://en.wikipedia.org/wiki/Change_data_capture

  9. Mitchell, J., Eccles et al.: True real-time change data capture with web service database encapsulation. In: IEEE 6th World Congress on Service, pp. 128–131 (2010)

    Google Scholar 

  10. Peter Gilbert et al.: The duality between message routing and epidemic data replication. In: Eighth ACM Workshop on Hot Topics in Networks, October (2009)

    Google Scholar 

Download references

Acknowledgments

This work was supported by Institute for Information & Communications Technology Promotion (MSIP) grant funded by the Korea government (MSIT) (2018-0-00226).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Seoung-Hyeon Lee .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer International Publishing AG, part of Springer Nature

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Kim, YK., Kim, G.W., Lee, SH. (2019). Development of a Physical Security Gateway for Connectivity to Smart Media in a Hyper-Connected Environment. In: Lee, R. (eds) Computational Science/Intelligence & Applied Informatics. CSII 2018. Studies in Computational Intelligence, vol 787. Springer, Cham. https://doi.org/10.1007/978-3-319-96806-3_12

Download citation

Publish with us

Policies and ethics