Browse > Article
http://dx.doi.org/10.22156/CS4SMB.2020.10.04.018

A Privacy Approach Model for Multi-Access to IoT Users based on Society 5.0  

Jeong, Yoon-Su (Department of information Communication Convergence Engineering, Mokwon University)
Yon, Yong-Ho (Department of Software Liberal Art, Mokwon University)
Publication Information
Journal of Convergence for Information Technology / v.10, no.4, 2020 , pp. 18-24 More about this Journal
Abstract
Recently, research on Society 5.0 has been actively carried out in Japan. The Society 5.0 is used in various areas using IoT sensors. This paper proposes a privacy approach model of multiple approaches to IoT users based on Society 5.0. The proposed model used multiple methods of synchronizing important information of IoT devices with one another in the virtual environment. The proposed model improved the efficiency of IoT information by accumulating the weight of IoT information on a probability-based basis. Further, it improves the accuracy of IoT information by segmenting it so that attribute information is linked to IoT information. As a result of the performance evaluation, the efficiency of IoT devices has improved by an average of 5.6 percent, depending on the number of IoT devices and the number of IoT hub devices. Accuracy has improved by an average of 15.9% depending on information collection and processing.
Keywords
Society 5.0; IoT; Privacy; Multi Access; Big data;
Citations & Related Records
Times Cited By KSCI : 6  (Citation Analysis)
연도 인용수 순위
1 Y. S. Jeong, D. R. Kim & S. S. Shin. (2019). Efficient Mutual Authentication Protocol between Hospital Internet of Things Devices Using Probabilistic Attribute Information. sustainability, 11(24), 7214.   DOI
2 A. Iera, G. Morabito & L. Atzori. (2016). The internet of things moves into the cloud. Proceedings of the 2016 IEEE International Conference on Cloud Engineering Workshop (IC2EW), 191.
3 H. N. Saha, A. Mandal & A. Sinha. (2017). Recent trends in the internet of things. Proceedings of the 2017 IEEE 7th Annual Computing and Communication Workshop and Conference (CCWC), 1-4.
4 J. S. KIm. (2019). Specialized on HPC Convergence Technology. Communications of the Korean Institute of Information Scientists and Engineers, 37(10), 3.
5 Y. Wu, X. Xiong, X. Gang, & T. R. Nyberg. (2013). Study on intelligent port under the construction of smart city. 2013 IEEE International Conference on Service Operations and Logistics, and Informatics (SOLI), Dongguan, 175-179.
6 A. Belfkih, C. Duvallet & B. Sadeg. (2017). The Internet of Things for Smart Ports: Application to the Port of Le Havre. Proceedings of the International Conference on Intelligent Platform for Smart Port (IPaSPort 2017), 1-2.
7 A. Valsamis, K. Tserpes, D. Zissis, D. Anagnostopoulos & T. Varvarigou. (2017). Employing traditional machine learning algorithms for big data streams analysis: The case of object trajectory prediction. J. Syst. Softw., 127, 249-257.   DOI
8 Y. S. Jeong. (2015) An Efficiency Management Scheme using Big Data of Healthcare Patients using Puzzy AHP. Journal of Digital Convergence, 13(4), 227-233. DOI : 10.14400/JDC.2015.13.4.227   DOI
9 A. Celesti, D. Mulfari, M. Fazio, M. Villari & A. Puliafito. (2016). Exploring container virtualization in iot clouds. Proceedings of the 2016 IEEE International Conference on Smart Computing (SMARTCOMP), 1-6.
10 K. S. Dar, A. Taherkordi & F. Eliassen. (2016). Enhancing dependability of cloud-based iot services through virtualization. Proceedings of the 2016 IEEE First International Conference on Internet-of-Things Design and Implementation (IoTDI), 106-116.
11 Y. S. Jeong. (2016). An Efficient IoT Healthcare Service Management Model of Location Tracking Sensor. Journal of Digital Convergence, 14(3), 261-267. DOI : 10.14400/JDC.2016.14.3.261   DOI
12 Y. S. Jeong. (2014). Tracking Analysis of User Privacy Damage using Smartphone. Journal of Convergence Society for SMB, 4(4), 13-18.
13 Y. S. Jeong. (2016). Measuring and Analyzing WiMAX Security adopt to Wireless Environment of U-Healthcare. Journal of Digital Convergence, 11(3), 279-284. DOI : 10.14400/JDPM.2013.11.3.279   DOI
14 D. S. Zois. (2016). Sequential decision-making in healthcare IoT: Real-time health monitoring treatments and interventions. Internet of Things (WF-IoT), 2016 IEEE 3rd World Forum on. IEEE, 24-29.
15 N. Gonzalez., C. Miers., F. Redigolo., T. Carvalho., M. Simplicio., M. Naslund & M. Pourzandi. (2011). A Quantitative Analysis of Current Security Concerns and Solutions for Cloud Computing. 2011 IEEE Third International Conference on Cloud Computing Technology and Science, 231-238.
16 Y. S. Jeong, D. B. Yoon & S. S. Shin. (2019). An IoT Information Security Model for Securing Bigdata Information for IoT Users. Journal of Convergence for Information Technology, 9(11), 8-14. DOI : 10.22156/CS4SMB.2019.9.11.008