• Title/Summary/Keyword: 모바일 컴퓨팅(Mobile computing)

Search Result 548, Processing Time 0.026 seconds

An Efficient Encryption Technique for Cloud-Computing in Mobile Environments (모바일환경에서 클라우드 컴퓨팅 보안을 위한 효율적인 암호화기술)

  • Hwang, Jae-Young;Choi, Dong-Wook;Chung, Yeon-Ho
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.12 no.4
    • /
    • pp.298-302
    • /
    • 2011
  • In this paper, we propose an efficient encryption algorithm for ensuring data privacy and security for cloud computing in mobile environments. As part of the evaluation of the proposed algorithm, we have implemented the algorithm in a PC environment and compared with the well-known encryption algorithm of the Data Encryption Standard (DES). The conventional DES algorithm is hard to maintain privacy, due to the fact that its initial and final permutation are known to the network To prevent this critical weakness, a triple DES algorithm has been reported, but it has a disadvantage of long encryption time. In this study, we propose random interleaving algorithm that uses the permutation table for improving privacy further. The proposed algorithm is found to run faster than the triple DES algorithm and also offers improved security in a wireless communication system.

Mobile Cloud Computing-based Agent Application Model (모바일 클라우드 기반 에이전트 모델)

  • Ahn, Kwang-Min;Lee, Bong-Hwan
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.05a
    • /
    • pp.608-611
    • /
    • 2012
  • In this paper, a mobile cloud-based agent model is proposed in order to overcome the resource constraints and the difficulties of installing a variety of complex applications in mobile devices. The proposed software architecture overcomes the disadvantages of mobile devices and maximizes usage of cloud services by implementing the function of mobile agent concept. The significant portion of the cloud services is run in the cloud server and the client application implemented in the mobile device can call and control appropriate service from the cloud server. Thus, the inherent weakness of the mobile can be overcome by executing the target applications on cloud nodes.

  • PDF

Developing a Mobile-Business Framework Considering Ubiquitous Computing Environment (유비쿼터스 컴퓨팅 환경을 고려한 모바일 비즈니스 프레임워크 개발)

  • Park, Chul-Woo;Yang, Hee-Dong;Ahn, Joong-Ho
    • Information Systems Review
    • /
    • v.5 no.2
    • /
    • pp.37-51
    • /
    • 2003
  • Mobile business noticed as a constructive alternative of e-commerce and e-business is being diversely considered as a new form or subset of e-business. In this study, mobile business is defined as a comprehensive alternative including e-business. The framework of the superset of e-business has two axes: connectivity and mobility. In addition, various cases based on the combination of the components are provided and explained. It is the main characteristic of this study that the element of off-line "mobility" is added to "connectivity" generally used while explaining e-commerce and e-business. For place (or location) is a prerequisite for the feature of mobility, we grope for why and how Location-Based Service (LBS) will take an important role in the development of new e-business models and services. As the real and full-scale beginning of IMT-2000 service and the rapid progress and diffusion of mobile communications services including wireless LAN require an immense and innovative way of thinking about e-commerce and e-business, the framework suggested in this study is considered to go far toward satisfying the new needs in this area.

An Intelligent P2P Mobile Agent for sharing Users' Context and Service Information (사용자 상황 인식 정보 및 서비스 정보의 공유를 위한 지능형 P2P 모바일 에이전트)

  • Yun Hyo-Gun;Lee Sang-Yong
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.15 no.5
    • /
    • pp.538-544
    • /
    • 2005
  • The service supporting structure for users in ubiquitous computing environment requires technology that divides efficiently resources shared around users according to users context. So, needs research that analyze service items and resources that is offered according to users context information and divide adaptively necessary service and resources. Therefore, in this paper we proposes an intelligent P2P mobile agent that recognizes users context using portable mobile devices and is available for intelligent service by sharing serviced item according to users' context. The proposed structure removes monopoly for specific resources, and supports effective users context-awareness and service.

A Study on the Wireless Total Service System for the Electric Power Industry with the Mobile Computing Technology (모바일컴퓨팅 기술을 활용한 전력산업 무선통신 서비스체제 구축 연구)

  • Yi, Bong-Jae
    • Proceedings of the KIEE Conference
    • /
    • 2003.07d
    • /
    • pp.2597-2599
    • /
    • 2003
  • 전력산업 환경변화에 따라 전력산업 전반에 걸친 고기능, 고효율의 정보기술(IT) 적용 필요성이 증대되고 있으며, 특히 향후 모바일 통신기술은 현장업무 처리능률과 고객에 대한 서비스를 대폭 향상시킬 수 있는 기술분야로서 연구개발의 필요성이 매우 클 것으로 예상되고 있다. 향후 무선인터넷 수요의 폭발적 증가가 예상되는 가운데 국내외적으로 이동통신업체를 포함한 제반 솔루션 공급업체, 민간/Utility 등 활용위주의 기업체, 학계 및 관련 연구소 등에서 향후 막대한 시장성과 성장성을 예측하여 모바일 컴퓨팅의 연구개발과 투자를 집중하고 있으며, 한전의 경우 G2B, B2B, B2E, B2C를 전반적으로 아우르는 다양한 업무범위와 전력업무 고유의 특수성을 감안한 때 모바일컴퓨팅 적용연구는 향후 이동통신의 최적 활용을 대비한다는 측면에서 연구개발을 추진하고 있으며, 본 논문에서는 연구개요 및 방향을 전반적으로 소개하고자 한다.

  • PDF

A Secure Maintenance Scheme of Secret Data on Trusted Mobile Platform Environment (Trusted Mobile Platform 환경에서의 안전한 비밀 데이터 유지(이전) 방안)

  • Kang, Dong-Wan;Lee, Im-Yeong;Han, Jin-Hee;Jun, Sung-Ik
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.4
    • /
    • pp.79-91
    • /
    • 2008
  • Modern society as an information society, a lot of information is communicated in on-line. Specially, mobile environment based on radio communication has a characteristic of flexibility compared with wire communication and is developed rapidly. However, the more mobile technology is developed the more security for sensitive information is needed. Therefore, MTM(Mobile Trusted Module) is developed and promoted by TCG(Trusted Computing Group), which is an industry standard body to enhance the security level in the mobile computing environment. MTM, hardware security module for mobile environment, offers user's privacy protection, platform integrity verification, and individual platform attestation. On the other hand, secure migration scheme is required in case secret data or key is transferred from one platform to the other platform. In this paper, we analyze migration schemes which were described in TCG standard and other papers and then propose security maintenance scheme for secret data using USIM(Universal Subscriber Identity Module).

Design of Wi-Fi based Mobile Game App for a Smart Phone (스마트 폰을 위한 Wi-Fi 기반 모바일 게임 앱의 설계)

  • Oh, Sun-Jin
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.11 no.1
    • /
    • pp.67-73
    • /
    • 2011
  • With the rapid growth of recent smart phone technology, the interests for the design of online game in mobile computing environment are highly focussed on with great attention. Smart phone as a mobile terminal device, however, has many restrictions for implementing online mobile game since the limitation of relatively low performance of a processor, low resolution of GUI, small memory spaces, and short battery power. Therefore, most of games are very restricted on online and multi-play functions. In this paper, we design and implement mobile online game app in component based smart phone environment in order to take over these restrictions in mobile environment. Especially, the implemented mobile game is able to play online game among Wi-Fi based game server and another smart phone.

Design and Implementation of the Spatial Data Cache Based on Agents for Providing Mobile Map Services (모바일 지도 서비스를 위한 에이전트 기반의 공간 데이터 캐쉬의 설계 및 구현)

  • Lim, Duk-Sung;Lee, Jai-Ho;Hong, Bong-Hee
    • The KIPS Transactions:PartD
    • /
    • v.10D no.2
    • /
    • pp.175-186
    • /
    • 2003
  • Mobile clients like a PDA need a cache and a spatial index to search and access map data efficiently. When a server transmits spatial objects to a mobile client which has a low storage capacity, some of them can be duplicated in a cache of the mobile client. Moreover, the cost for strong added data in the cache and reconfiguring spatial index is very high in the mobile client with low computing power. The scheme for processing duplicated objects and disturbing tasks of the mobile client which has low computing power is needed. In this paper, we classfy the method for strorng duplicated objects and present the scheme for the both caching objects and reconfiguring a spatial index of cached objects using the clipping technique. We propose the caching system based on an agent in order to distribute the overhead of a mobile client as well as to provide efficiently map services. We design and implement it, and evaluate the performance.

A Secure Ubiquitous Storage System for Mobile Devices (모바일 기기를 위한 안전한 유비쿼터스 스토리지 시스템)

  • They, Yu-Shu;Lee, Ern-Yu;Lee, Hoon-Jae;Lim, Hyo-Taek
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.2
    • /
    • pp.269-275
    • /
    • 2008
  • The rapid growth of ubiquitous technology has increased the demand of storage capacity in mobile computing. iSCSI(Internet Small Computer Interface), a virtual storage protocol would be one of the possible solutions to resolve this problem. However, the insecure nature of this protocol makes it vulnerable to malicious attacks. In this paper, we aims to design and propose a new secure lightweight iSCSI-based virtual storage scheme for mobile devices. Suitable security mechanisms are considered in the design of our proposed solution in order to overcome existing security problems in iSCSI. Relevant experiments are tarried out and the results revealed that the efficiency of proposed algorithm in which it introduces over 100% Read/Write performance improvement compared with the IPsec approach.

Geocomputation with Spatio-Temporal Database for Time Geography Application (시간지리학 응용을 위한 시공간데이터베이스 기반의 GIS 컴퓨팅 연구)

  • Park Key-Ho;Lee Yang-Won;Ahn Jae-Seong
    • Spatial Information Research
    • /
    • v.13 no.3 s.34
    • /
    • pp.221-237
    • /
    • 2005
  • This study attempts at building a GIS computing environment that incorporates object-relational spatio-temporal database for the time geography model with space-time path, space-time prism and space-time accessibility. The proposed computing environment is composed of ( i ) mobile GIS application for collecting spatio-temporal trajectory data of an individual, ( ii ) spatio-temporal database server that includes time geography model, and (iii) geovisualization client that performs time geographic queries to the spatio-temporal database. The spatio-temporal trajectory data collected by GPS-PDA client is automatically processed and sent to server through data management middleware. The spatio-temporal database implemented by extending a generic DBMS provides spatio-temporal objects, functions, and SQL. The geovisualization client illustrates 3D visual results of the queries about space-time path, space-time prism, and space-time accessibility. This study confirms the possibility of integrating mobile GIS and DBMS for time geography model, and it presents the appropriate database model with spatio-temporal objects and functions that may handle very large data for time geography application.

  • PDF