• Title/Summary/Keyword: 금융정보시스템

Search Result 578, Processing Time 0.027 seconds

Implementation of Secure System for Blockchain-based Smart Meter Aggregation (블록체인 기반 스마트 미터 집계 보안 시스템 구축)

  • Kim, Yong-Gil;Moon, Kyung-Il
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.20 no.2
    • /
    • pp.1-11
    • /
    • 2020
  • As an important basic building block of the smart grid environment, smart meter provides real-time electricity consumption information to the utility. However, ensuring information security and privacy in the smart meter data aggregation process is a non-trivial task. Even though the secure data aggregation for the smart meter has been a lot of attention from both academic and industry researchers in recent years, most of these studies are not secure against internal attackers or cannot provide data integrity. Besides, their computation costs are not satisfactory because the bilinear pairing operation or the hash-to-point operation is performed at the smart meter system. Recently, blockchains or distributed ledgers are an emerging technology that has drawn considerable interest from energy supply firms, startups, technology developers, financial institutions, national governments and the academic community. In particular, blockchains are identified as having the potential to bring significant benefits and innovation for the electricity consumption network. This study suggests a distributed, privacy-preserving, and simple secure smart meter data aggregation system, backed up by Blockchain technology. Smart meter data are aggregated and verified by a hierarchical Merkle tree, in which the consensus protocol is supported by the practical Byzantine fault tolerance algorithm.

Implementation and Performance Analysis of the Group Communication Using CORBA-ORB, JAVA-RMI and Socket (CORBA-ORB, JAVA-RMI, 소켓을 이용한 그룹 통신의 구현 및 성능 분석)

  • 한윤기;구용완
    • Journal of Internet Computing and Services
    • /
    • v.3 no.1
    • /
    • pp.81-90
    • /
    • 2002
  • Large-scale distributed applications based on Internet and client/server applications have to deal with series of problems. Load balancing, unpredictable communication delays, and networking failures can be the example of the series of problems. Therefore. sophisticated applications such as teleconferencing, video-on-demand, and concurrent software engineering require an abstracted group communication, CORBA does not address these paradigms adequately. It mainly deals with point-to-point communication and does not support the development of reliable applications that include predictable behavior in distributed systems. In this paper, we present our design, implementation and performance analysis of the group communication using the CORBA-ORB. JAVA-RML and Socket based on distributed computing Performance analysis will be estimated latency-lime according to object increment, in case of group communication using ORB of CORBA the average is 14.5172msec, in case of group communication using RMI of Java the average is 21.4085msec, in case of group communication using socket the average is becoming 18.0714msec. Each group communication using multicast and UDP can be estimated 0.2735msec and 0.2157msec. The performance of the CORBA-ORB group communication is increased because of the increased object by the result of this research. This study can be applied to the fault-tolerant client/server system, group-ware. text retrieval system, and financial information systems.

  • PDF

REffects of Surge Protective Devices with Respect to Types of System Grounding and Wiring Methods (전원계통의 접지방식 및 배선방식에 따른 서지보호기의 효과)

  • 이수봉;이복희;길형준
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.18 no.2
    • /
    • pp.90-99
    • /
    • 2004
  • High speed info-communications equipment are required with development of highly information-oriented society, the intelligent industrial facilities and social systems such as administrative, financial and traffic systems, are gradually becoming to automation, which are composed of the integrated circuits and micro-semiconductors, remote control and operation. Thus modern micro-electronic circuits can frequently be damaged by lightning surge. The protection of electronic circuits from lightning overvoltages is concentrated very interesting. In this paper, for the purpose of providing the effective protection method of electronic devices such micro-computers from lightning surges in a residential building, the protection effect of surge protective devices according to types of system groundings were experimentally analyzed. Also the effective installation method of surge protective devices was examined and proposed. The installation of SPDs in retrofits was a high remnant voltage across the protected device owing to the inductance in the long wires to the SPDs. Finally the method of installing the SPD by twisted pain wires is remarkably effective for fast rising transient overvoltages.

A Study on the Effective Selection of Tunnel Reinforcement Methods using Decision Tree Technique (의사결정트리 기법을 이용한 터널 보조공법 선정방안 연구)

  • Kim, Jong-Gyu;Sagong, Myung;Lee, Jun S.;Lee, Yong-Joo
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.26 no.4C
    • /
    • pp.255-264
    • /
    • 2006
  • The auxiliary reinforcement method is normally applied to prevent a possible collapse of the tunnel face where the ground condition is not favorable or geologic information is not sufficient. Recently, several engineering approaches have been made to choose the effective reinforcement methods using expert system such as neural network and fuzzy theory field, among others. Even if the expert system has offered many decision aid tools to properly select the reinforcement method, the quantitative assessment items are not easy to estimate and this is why the data mining technique, widely used in the field of social science, medical treatment, banking and agriculture, is introduced in this study. Using decision tree together with PDA, the decision aids for reinforcement method based on field construction data are created to derive the field rules and future study will be concentrated on the application of the proposed methods in a variety of underground development cases.

Research of Specific Domestic De-identification Technique for Protection of Personal Health Medical Information in Review & Analysis of Overseas and Domestic De-Identification Technique (국내외 비식별화 기술에 관한 검토 분석에 따른 개인건강의료정보 보호를 위한 국내 특화 비식별화 기술 제안에 관한 연구)

  • Lee, Pilwoo;In, Hanjin;Kim, Cheoljung;Yeo, Kwangsoo;Song, Kyoungtaek;Yu, Khigeun;Baek, Jongil;Kim, Soonseok
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.6 no.7
    • /
    • pp.9-16
    • /
    • 2016
  • As life in a rapidly changing Internet age at home and abroad, large amounts of information are being used medical, financial, services, etc. Accordingly, especially hospitals, is an invasion of privacy caused by leakage and intrusion of personal information in the system in medical institutions, including clinics institutions. To protect the privacy & information protection of personal health medical information in medical institutions at home and abroad presented by national policies and de-identification processing technology standards in accordance with the legislation. By comparative analysis in existing domestic and foreign institutional privacy and de-identification technique, derive a advanced one of pseudonymization and anonymization techniques for destination data items that fell short in comparison to the domestic laws and regulations, etc. De-identification processing technology for personal health information is compared to a foreign country pharmaceutical situations. We propose a new de-identification techniques by reducing the risk of re-identification processing to enable the secondary use of domestic medical privacy.

BR2K: A Replication and Recovery Technique Using Kubernetes for Blockchain Services

  • Kwon, Min-Ho;Lee, Myung-Joon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.10
    • /
    • pp.77-86
    • /
    • 2020
  • In this paper, we propose a technique for blockchain service replication and recovery using kubernetes(BR2K) that robustly executes blockchain services based on replication and supports systematic recovery in case of the service failure. Blockchain services are being developed and applied in various fields such as administration, finance, and medical systems based on the features of blockchain, such as decentralization, high security, and data integrity. In such areas where service continuity is important, it is necessary to provide robustness for execution of blockchain services, and a recovery plan for service failure is also required. To this end, BR2K provides an execution replication technique that systematically supports the sustainable execution of blockchain application services. Also, it introduces a robust container registry based on the blockchain service registry, systematically supporting the recovery of service failures by using it. In addition, Truffle, a blockchain service development framework, is extended to utilize the Kubernetes container management tool, and BR2K provides a technique for rapidly deploying blockchain services using the extended framwork.

A Study on the Trade Risk Management of Korean Companies in Incheon Area Trading with China (인천지역 무역업체의 중국과의 무역리스크 관리에 관한 연구)

  • Shim, Sang-Ryul;Bae, Sang-Pil;Wang, Tian-Jiao
    • International Commerce and Information Review
    • /
    • v.14 no.3
    • /
    • pp.513-536
    • /
    • 2012
  • This study aims to examine the status and problems of trade risk management of Korean companies in Incheon area trading with China and to suggest some improvement measures. On the survey with twenty five questions on company profiles, business process and transactions, claims and trade risks, etc. with Chinese trading partners, the following facts are found. In general, Chinese policies on foreign trade, finance, labour, investment, etc. and China's logistics system have caused great worries to Korean companies in Incheon area. This kind of risks from Chinese government policies and China's economic structure are beyond control of each company. Korean government should take more effective measures to negotiate with Chinese government. In the stage of contract, procurement and transportation, settlement, disputes resolution and etc. Korean companies in Incheon area also have many problems with relatively high risks with Chinese trading partners. Based on these survey results, some suggestions for better trade risk management are given.

  • PDF

An Entry Strategies on the Western China of Korean Logistics Corporations (한국물류기업의 중국서부지역 진출 전략)

  • Choi, Hyuk-Jun
    • International Commerce and Information Review
    • /
    • v.18 no.3
    • /
    • pp.131-151
    • /
    • 2016
  • The Korea-China FTA and China's huge development policy for its western regions could create a strategic opportunity for Korean Companies. This study suggests a strategy for expanding the domestic activities of Korean logistics Corporations and supporting the activities of Korean Companies operating in China. Using surveys of 32 Korean Logistics Corporations, important factors to consider when expanding into western China were analyzed. The results identified factors in the order of government, local markets, strategy, infrastructure, and finance and budget. The "development of Chinese Logistics specialists," "economic cooperation with the local governments of western China," and "holding investment Fairs and exhibitions" were important government-related factors. "Understanding entry permits and procedures for logistics corporations in China" and "understanding the logistics system of western China" were also shown to be important factors. Furthermore, governmental factors were suggested to be significant by large, medium-sized, and small businesses alike, while the factor of local markets was suggested to be significant by small-scale businesses.

  • PDF

A Design and Implementation of In/Out Bound Call Flow Module for SOHO CTI (SOHO CTI용 인/아웃바운드 콜 플로우 모듈 설계 및 구현)

  • Park Chan Il;Moon Seung-Jin
    • Journal of Internet Computing and Services
    • /
    • v.6 no.3
    • /
    • pp.71-84
    • /
    • 2005
  • Recently, the expert call center solution has become the center of interest, since finance and tele-marketing system, which is focused on a communication industry, have been increasing, Specially, the call center market is growing up with a supporting Caller-ID for a cellular phone in Korea, In the present, although large size companies are developing expensive solutions and instruments to service only for the big companies, there little solutions for SOHO markets, Therefore, in this paper we have shown a design and an implementation of a CTI system which is capable of in/outbound call processing by using CTI, and providing stable services by linking the customer's DB. And these functionalities have become possible by integrating functions of PBX and the computer control of the PBX. First, we have constructed call flows and analyzed packets for the standard communication through the PBX in call. Then, we have designed and implemented a middleware which linked a call between a client and a customer. Finally, we have constructed a database module for applying the CRM technology to the management of customer's contents.

  • PDF

Certificate-based SSO Protocol Complying with Web Standard (웹 표준을 준수하는 인증서기반 통합 인증 프로토콜)

  • Yun, Jong Pil;Kim, Jonghyun;Lee, Kwangsu
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.8
    • /
    • pp.1466-1477
    • /
    • 2016
  • Public key infrastructure(PKI), principle technology of the certificate, is a security technology providing functions such as identification, non-repudiation, and anti-forgery of electronic documents on the Internet. Our government and financial organizations use PKI authentication using ActiveX to prevent security accident on the Internet service. However, like ActiveX, plug-in technology is vulnerable to security and inconvenience since it is only serviceable to certain browser. Therefore, the research on HTML5 authentication system has been conducted actively. Recently, domestic bank introduced PKI authentication complying with web standard for the first time. However, it still has inconvenience to register a certification on each website because of same origin policy of web storage. This paper proposes the certificate based SSO protocol that complying with web standard to provide user authentication using certificate on several sites by going around same origin policy and its security proof.