• Àüü
  • ÀüÀÚ/Àü±â
  • Åë½Å
  • ÄÄÇ»ÅÍ
´Ý±â

»çÀÌÆ®¸Ê

Loading..

Please wait....

±¹³» ³í¹®Áö

Ȩ Ȩ > ¿¬±¸¹®Çå > ±¹³» ³í¹®Áö > Çѱ¹ÀÎÅͳÝÁ¤º¸ÇÐȸ ³í¹®Áö

Çѱ¹ÀÎÅͳÝÁ¤º¸ÇÐȸ ³í¹®Áö

Current Result Document :

ÇѱÛÁ¦¸ñ(Korean Title) À¥ ·ÎÄýºÅ丮Áö µ¥ÀÌÅÍ º¸¾ÈÀ» À§ÇÑ ¿¬±¸
¿µ¹®Á¦¸ñ(English Title) A Study on Data Security of Web Local Storage
ÀúÀÚ(Author) ±èÁö¼ö   ¹®Á¾¼·   Ji-soo Kim   Jong-sub Moon  
¿ø¹®¼ö·Ïó(Citation) VOL 17 NO. 03 PP. 0055 ~ 0066 (2016. 06)
Çѱ۳»¿ë
(Korean Abstract)
HTML5ÀÇ ·ÎÄýºÅ丮Áö´Â HTML5¿¡¼­ Áö¿øÇÏ´Â À¥ ½ºÅ丮Áö·Î, µð¹ÙÀ̽º¿¡ ÆÄÀÏ ÇüÅ·ΠÀúÀåµÇ¾î ¿Â․¿ÀÇÁ¶óÀÎ ¸ðµÎ¿¡¼­ ȣȯ °¡´ÉÇÏ°í ¿µ±¸ º¸°üÀÌ °¡´ÉÇϴٴ Ư¡À» °¡Áø´Ù. ±×·¯³ª ·ÎÄýºÅ丮Áö´Â µ¥ÀÌÅ͸¦ Æò¹®»óÅ·ΠÀúÀåÇϱ⠶§¹®¿¡, ÆÄÀÏ¿¡ ´ëÇÑ Á¢±Ù ¹× ¼öÁ¤ÀÌ °¡´ÉÇÏ´Ù. ¶ÇÇÑ °¢ µµ¸ÞÀο¡ ´ëÇÑ ·ÎÄýºÅ丮Áö¸¦ ÆÄÀϸíÀ» ÅëÇØ ºÐ·ùÇϱ⠶§¹®¿¡, ÆÄÀϸíÀÌ º¯Á¶µÇ°Å³ª ´Ù¸¥ µð¹ÙÀ̽º·Î À¯ÃâµÇ¸é ·ÎÄýºÅ丮Áö ÆÄÀÏÀÇ Àç»ç¿ëÀÌ °¡´ÉÇÏ´Ù´Â ¹®Á¦Á¡ÀÌ Á¸ÀçÇÑ´Ù. º» ³í¹®¿¡¼­´Â ·ÎÄýºÅ丮Áö ÆÄÀÏÀÌ »ý¼ºµÈ µµ¸ÞÀÎ ¹× µð¹ÙÀ̽º¿¡ ´ëÇÑ ¹«°á¼º, ±â¹Ð¼º º¸ÀåÀ» À§ÇÑ ¹æ¹ýÀ» Á¦¾ÈÇÑ´Ù. ·ÎÄýºÅ丮Áö¿¡ ÀúÀåµÇ´Â µ¥ÀÌÅ͸¦ ¾Ï¡¤º¹È£È­ÇÏ¿© º¸°üÇÏ´Â ¹æ¹ýÀ¸·Î, ¾ÏȣŰ´Â ¼­¹ö¿¡ º¸°üµÇ¸ç ¾Ïȣ۸¦ ¿äûÇÏ´Â ´Ü°è¿¡¼­ ·ÎÄýºÅ丮Áö¸¦ »ý¼ºÇÑ µð¹ÙÀ̽º ¹× µµ¸ÞÀο¡ ´ëÇÑ ÀÎÁõÀÌ ÀÌ·ç¾îÁø´Ù. À̸¦ ÅëÇØ ·ÎÄýºÅ丮ÁöÀÇ µµ¸ÞÀÎ ¹× µð¹ÙÀ̽º°£ÀÇ ±â¹Ð¼º°ú ¹«°á¼ºÀ» º¸ÀåÇÑ´Ù. ÃÖÁ¾ÀûÀ¸·Î, Á¦¾È ¹æ¹ý¿¡ µû¸¥ ½ÇÇèÀ» ÁøÇàÇÏ¿© º» ³í¹®¿¡¼­ ¼³¸íÇÏ´Â ·ÎÄýºÅ丮Áö¿¡ ´ëÇÑ ºñÁ¤»óÀûÀÎ Á¢±Ù¿¡ ´ëÇØ Å½ÁöÇÏ´Â °ÍÀ» º¸¿´´Ù.
¿µ¹®³»¿ë
(English Abstract)
A local storage of HTML5 is a Web Storage, which is stored permanently on a local computer in the form of files. The contents of the storage can be easily accessed and modified because it is stored as plaintext. Moreover, because the internet browser classifies the local storages of each domain using file names, the malicious attacker can abuse victim's local storage files by changing file names. In the paper, we propose a scheme to maintain the integrity and the confidentiality of the local storage's source domain and source device. The key idea is that the client encrypts the data stored in the local storage with cipher key, which is managed by the web server. On the step of requesting the cipher key, the web server authenticates whether the client is legal source of local storage or not. Finally, we showed that our method can detect an abnormal access to the local storage through experiments according to the proposed method
Å°¿öµå(Keyword) ·ÎÄýºÅ丮Áö   ¹«°á¼º   ±â¹Ð¼º   ¾Ïȣȭ   Çؽà  Local Storage   Integrity   Confidentiality   Encrypt   Hash  
ÆÄÀÏ÷ºÎ PDF ´Ù¿î·Îµå