Browse > Article
http://dx.doi.org/10.9708/jksci.2011.16.2.217

Implementation of Remote Physical Security Systems Using Smart Phone  

Lee, Moon-Goo (Dept. of Internet Information, Kimpo College)
Abstract
Existing wire based physical security system solutions show limitations in time and space. In order to solve these deficiencies, a remote physical security system has been implemented using smart phone based on mobile cloud computing technique. The security functions of mobile cloud computing technique include mobile device user authentication, confidentiality of communication, integrity of information, availability of system, and target system access control, authority management and secure hand off etc. Proposed system has been constructed as remote building management system using smart phone, and also has been efficient to reduce energy cost (5~30%), result of system average access and response time 7.082 second. This systems are evaluated to have high efficiency compared to performance.
Keywords
Authentication; Confidentiality; Integrity; Availability; Access Control;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Daniel Brooker , Thomas Carey , Ian Warren "Middleware for Social Networking on Mobile Devices" IEEE Computer Security. pp. 202-211, April 2010.
2 Yongxiang Bai , Youhua Hou , Dazhong Fang , Xuwei He , Changsheng Zhu, "A Remote Real-Time On-line Monitoring and Control System for Large-Scale Wind Farms" IEEE Security and Privacy, pp. 3220-3223, June 2010.
3 Sumei Dai , Zhiying Song , Ruiqing Jia, "Web Based Fluid Mechanics Experimental System" 2010 International Conference on Electrical and Control Engineering, pp. 3134-3137, June 2010.
4 A. Holopainen , F. Galbiati , K. Voutilainen, "Use of Smart Phone Technologies to Offer Easy-to-Use and Cost-Effective Telemedicine Services", First International Conference on the Digital Society (ICDS'07) pp. 4, Jan. 2007.
5 Liang-Jie Zhang , Jia Zhang , Jinan Fiaidhi , J. Morris Chang, "Hot Topics in Cloud Computing", IT Professional, pp. 17-19, Sept. 2010.
6 Thomas Weigold , Thorsten Kramp , Michael Baentsch, "Remote Client Authentication" IEEE Security and Privacy, pp. 36-43, July 2008.
7 Yi Wei , M. Brian Blake, "Service-Oriented Computing and Cloud Computing: Challenges and Opportunities" IEEE Internet Computing, pp. 72-75, Nov. 2010.
8 Qian Wang , Cong Wang , Kui Ren , Wenjing Lou , Jin Li, "Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing", IEEE Transactions on Parallel and Distributed Systems, Oct. 2010.
9 Nichols, J. Myers, B.A. Sch. of Comput. Sci., Carnegie Mellon Univ., Pittsburgh, PA, Nichols, J. Myers, B.A. "Controlling Home and Office Appliances with Smart Phones" Pervasive Computing, IEEE , 2006 , Page(s): 60-67
10 Eiman Kanjo, Jean Bacon, David Roberts, Peter Landshoff, "Making Smart Phones Smarter", IEEE Computer Security. pp. 50-57 Oct. 2009.