Fig. 1. Proposed service model
Fig. 2. User registration flow
Fig. 3. User login flow
Fig. 4. User registration screen
Fig. 5. User list screen
Fig. 6. Login screen and main screen
Fig. 7. File upload screen and notification screen
Table 1. Javascript API by Cordova
Table 2. USERS table scheme
Table 3. IMAGES table scheme
Table 4. RESULTS table scheme
Table 5. Comparison between proposed algorithm and other algorithm
References
- S. Y. Lee, Y. T. Cho & S. E. Yoo. (2015). An Effect of Smartwork Center Design and Smartwork on Job Satisfaction Work and Life Balance, and Work Productivity. Journal of Korea Design Knowledge, 34, 183-191.
- C. Kwan. (2018). Issues and Improvements of Secure Coding for Preventing Cyber Crime: Focus on the Private Company Systems. Journal of Information and Security, 18(2), 69-76.
- J. S. Park & J. C. Ha. (2012). Vulnerability Analysis of Security Document Management in Multi Function Peripheral and Its Countermeasure. Journal of Korean Institute of Information Technology, 10(6), 133-143.
- J. H. Lee, D. H. Lee & H. K. Kim. (2012). Decision Support System to Detect Unauthorized Access in Smart Work Environment. Journal of the Korea Institute of Information Security & Cryptology, 22(4), 797-808.
- B. H. Kang. (2018). 5 Topics for Education and Research in Business Ethics. Journal of Digital Convergence, 16(8), 137-150. https://doi.org/10.14400/JDC.2018.16.8.137
- C. Kwan. (2015). Rethinking of Situational Context and Characteristic of Industrial Secrets Leakage: Some National Security and Psychological Perspectives. The Korean Journal of Forensic Psychology, 6(1), 1-11.
- B. G. Song. (2014). Differences of Small Enterprise' Industrial Security Management System : Focus on the Trade Secrets. The Journal of Social Science, 21(3), 326-358.
- S. R. Kang, S. R. Kim, M. S. Park & J. S. Kim. (2018). Study on Windows Event Log-Based Corporate Security Audit and Malware Detection. Journal of the Korea Institute of Information Security & Cryptology, 28(3), 591-603. https://doi.org/10.13089/JKIISC.2018.28.3.591
- B. C. Kim. (2015). The SME Informatization Level Analysis and Design for Privacy. Journal of Digital Convergence, 13(2), 121-126. https://doi.org/10.14400/JDC.2015.13.2.121
- T. S. Jeong, M. S. Yim & J. B. Lee. (2012). A Development of Comprehensive Framework for Continuous Information Security, Journal of Digital Convergence, 10(2), 1-10. https://doi.org/10.14400/JDPM.2012.10.2.001
- S. H. Lee. (2013). A Security Enhancement Method for Web Service, Journal of Digital Convergence, 11(12), 361-366. https://doi.org/10.14400/JDPM.2013.11.12.361
- G. C. Ko, J. S. Jung, S. K. Choi & K. S. Han (2017). A Study on the Affecting Factors in Performance of Internal Leakage Prevention on Industrial Technology, Journal of Digital Convergence, 15(7), 159-167. https://doi.org/10.14400/JDC.2017.15.7.159
- Apache Cordova. (2018). Apache Cordova Documentation. Apache Cordova Documentation(Online). https://cordova.apache.org/docs/en/latest
- Mozilla. (2018). Base64 encoding and decoding. MDN web docs(Online). https://developer.mozilla.org/en-US
- Google. (2018). Firebase Documentation. Firebase(Online). https://firebase.google.com/docs