Skip to main content

An Improved Protection Profile for Multifunction Peripherals in Consideration of Network Separation

  • Conference paper
  • First Online:
IT Convergence and Services

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 107))

  • 1007 Accesses

Abstract

Multifunction peripherals, capable of networking and equipped with several hardcopy functions with various security functions, are taking place of printers and other printing devices in office workplaces. However, the security functions within a multifunction peripheral and its IT environments may have vulnerabilities. The information transmitted in multifunction peripherals includes very sensitive data since the device is networked to transmit data including confidential information. There have been international efforts to mitigate this anxiety of consumers through common criteria. In 2009, a series of standards for multifunction peripherals were developed. These protection profiles are classified in accordance to four different operational environments. However, though multifunction peripherals treat confidential information, network separation issue is not regarded in classifying the operational environments. Thus, in this paper, we present an operational environment and propose a protection profile that is appropriate for the new environment.

This research was supported by the The Ministry of Knowledge Economy (MKE), Korea, under the “ITRC” support program supervised by the National IT Industry Promotion Agency (NIPA) (NIPA-2011-C1090-1001-0004).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Lee H, Won D, Kim S (2010) Protection profile for E-certificate issuance system. In: Proceedings of ICCC 2010, 11th international common criteria conference

    Google Scholar 

  2. Lee K, Lee Y, Won D, Kim S (2010) Protection profile for secure E-voting systems. In: Proceedings of ISPEC 2010, information security practice and experience conference 2010, Springer, LNCS 6047, Seoul, pp 386–397

    Google Scholar 

  3. Common Criteria (2009) Common Criteria for Information Technology Security Evaluation; Part 3: Security assurance components, Version 3.1 R3, CCMB-2009-07-003

    Google Scholar 

  4. IEEE: IEEE Standard for Information Technology (2008) Hardcopy device and system security, IEEE Std. 2600-2008

    Google Scholar 

  5. IEEE (2009) IEEE standard for a protection profile in operational environment A, IEEE Std. 2600.1-2009

    Google Scholar 

  6. Lee K, Lee C, Park N, Kim S, Won D (2011) An analysis of multi-function peripheral with a digital forensics perspective. In: Proceedings of CNSI 2011, international conference on computers, networks, systems, and industrial engineering, Jeju Island, May 23–25, 2011, pp 252–257

    Google Scholar 

  7. Smith TF, Waterman MS (1981) Identification of common molecular subsequences. J Mol Biol 147:195–197

    Article  Google Scholar 

  8. Common Criteria (2009) Common criteria for information technology security evaluation; Part 1: Introduction and general model, Version 3.1 R3, CCMB-2009-07-001

    Google Scholar 

  9. Common Criteria (2009) Common criteria for information technology security evaluation; Part 2: Security functional components, Version 3.1 R3, CCMB-2009-07-002

    Google Scholar 

  10. IEEE (2009) U.S. government protection profile for hardcopy devices, IEEE 2600.2-2009

    Google Scholar 

  11. Park N, Song Y, Won D, Kim H (2008) Multilateral approaches to the mobile RFID security problem using web service. In: Zhang Y, Yu G, Bertino E, Xu G (eds) APWeb 2008. LNCS, vol 4976. Springer, Heidelberg, pp 331–341

    Google Scholar 

  12. Park N, Kwak J, Kim S, Won D, Kim H (2006) WIPI mobile platform with secure service for mobile RFID network environment. In: Shen HT, Li J, Li M, Ni J, Wang W (eds) APWeb Workshops 2006. LNCS, vol 3842. Springer, Heidelberg, pp 741–748

    Google Scholar 

  13. Park N, Kim H, Kim S, Won D (2005) Open location-based service using secure middleware infrastructure in web services. In: Gervasi O, Gavrilova ML, Kumar V, Laganá A, Lee HP, Mun Y, Taniar D, Tan CJK (eds) ICCSA 2005. LNCS, vol 3481. Springer, Heidelberg, pp 1146–1155

    Google Scholar 

  14. Park N, Kim S, Won D (2007) Privacy preserving enhanced service mechanism in mobile RFID network. In: ASC, advances in soft computing, vol 43. Springer, Heidelberg, pp 151–156

    Google Scholar 

  15. Park N (2010) Security scheme for managing a large quantity of individual information in RFID environment. In: CCIS, communications in computer and information science, vol 106. Springer, Heidelberg, pp 72–79

    Google Scholar 

  16. Park N, Kim S, Won D, Kim H (2006) Security analysis and implementation leveraging globally networked mobile RFIDs. In: PWC 2006. LNCS, vol 4217. Springer, Heidelberg, pp 494–505

    Google Scholar 

  17. Park N, Kim Y (2010) Harmful adult multimedia contents filtering method in mobile RFID service environment. In: LNAI, lecture notes in artificial intelligence, vol 6422. Springer, Heidelberg, pp 193–202

    Google Scholar 

  18. Park N, Song Y (2010) Secure RFID application data management using all-or-nothing transform encryption. In: WASA 2010. LNCS, vol 6221. Springer, Heidelberg, pp 245–252

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Dongho Won .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer Science+Business Media B.V.

About this paper

Cite this paper

Lee, C., Lee, K., Park, N., Won, D. (2011). An Improved Protection Profile for Multifunction Peripherals in Consideration of Network Separation. In: Park, J., Arabnia, H., Chang, HB., Shon, T. (eds) IT Convergence and Services. Lecture Notes in Electrical Engineering, vol 107. Springer, Dordrecht. https://doi.org/10.1007/978-94-007-2598-0_23

Download citation

  • DOI: https://doi.org/10.1007/978-94-007-2598-0_23

  • Published:

  • Publisher Name: Springer, Dordrecht

  • Print ISBN: 978-94-007-2597-3

  • Online ISBN: 978-94-007-2598-0

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics