• Title/Summary/Keyword: 모바일 컴퓨팅(Mobile computing)

Search Result 547, Processing Time 0.025 seconds

A Design of User Authentication Protocol using Biometric in Mobile-cloud Environments (모바일 클라우드 환경에서 생체인식을 이용한 사용자 인증 프로토콜 설계)

  • Kim, Hyung-Uk;Kim, Bumryong;Jun, Moon-Seog
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.1
    • /
    • pp.32-39
    • /
    • 2017
  • Recently, usage of mobile cloud services has been increasing. In particular, beyond the constraints of a single cloud computing service, studies on the multi-cloud have been actively pursued. A user must authenticate multiple cloud service providers to use additional cloud services in a multi-cloud. In previous studies, an authentication method using single sign-on (SSO) was not available in all cloud services. Cloud services will not be available when the SSO server is not available due to malicious attacks, because all authentication is done via the SSO server. Additionally, using a broker, there is a vulnerability that can expose authentication information for the service provider to a user who did not sign up. In this paper, we propose a secure user authentication protocol using biometric authentication that does not expose user information when using additional cloud services. The proposed protocol can use a single biometric authentication for multi-cloud services without storing authentication information in each cloud service. In terms of key stability (to ensure stability through the key agreement process and the key area), by disabling various attack methods, such as man-in-the-middle attacks and replay attacks, we provide secure mobile cloud services.

A Design of Authority Management Protocol for Secure Storage Access Control in Cloud Environment (클라우드 환경에서 안전한 스토리지 접근 제어를 위한 권한 관리 프로토콜 설계)

  • Min, So-Yeon;Lee, Kwang-Hyong;Jin, Byung-Wook
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.9
    • /
    • pp.12-20
    • /
    • 2016
  • With the enhancements in existing major industries, cloud computing-based converging services have been created, as well as value-added industries. A variety of converging services are now provided, from personalized services up to industrial services. In Korea, they have become the driving force behind existing industries throughout the whole economy, but mainly in finance, mobile systems, social computing, and home services, based on cloud services. However, not only denial of service (DOS) and distributed DOS (DDOS) attacks have occurred, but also attack techniques targeting core data in storage servers. Even security threats that are hardly detected, such as multiple attacks on a certain target, APT, and backdoor penetration have also occurred. To supplement defenses against these, in this article, a protocol for authority management is designed to provide users with safe storage services. This protocol was studied in cases of integration between a cloud environment and big data-based technology, security threats, and their requirements. Also studied were amalgamation examples and their requirements in technology-based cloud environments and big data. With the protocol suggested, based on this, security was analyzed for attack techniques that occur in the existing cloud environment, as well as big data-based techniques, in order to find improvements in session key development of approximately 55%.

A Mining-based Healthcare Multi-Agent System in Ubiquitous Environments (마이닝 기반 유비쿼터스 헬스케어 멀티에이전트 시스템)

  • Kang, Eun-Young
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.10 no.9
    • /
    • pp.2354-2360
    • /
    • 2009
  • Healthcare is a field where ubiquitous computing is most widely used. We propose a mining-based healthcare multi-agent system for ubiquitous computing environments. This proposed scheme select diagnosis patterns using mining in the real-time biosignal data obtained from a patient's body. In addition, we classify them into normal, emergency and be ready for an emergency. This proposed scheme can deal with the enormous quantity of real-time sensing data and performs analysis and comparison between the data of patient's history and the real-time sensory data. We separate Association rule exploration into two data groups: one is the existing enormous quantity of medical history data. The other group is real-time sensory data which is collected from sensors measuring body temperature, blood pressure, pulse. Proposed system has advantage that can handle urgent situation in the far away area from hospital through PDA and mobile device. In addition, by monitoring condition of patient in a real time base, it shortens time and expense and supports medical service efficiently.

TLDP: A New Broadcast Scheduling Scheme for Multiple Broadcast-Channel Environments (TLDP: 다중 방송 채널 환경을 위한 새로운 방송 스케쥴링 기법)

  • Kwon, Hyeok-Min
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.11 no.2
    • /
    • pp.63-72
    • /
    • 2011
  • Broadcast-based data dissemination has become a widely accepted approach of communication in the mobile computing environment. However, with a large set of data items, the expected delay of receiving a desired data increases due to the sequential nature of the broadcast channel. With the objective of minimizing this wait time, this paper explores the problem of data broadcast over multiple channels. In traditional approaches, data items are partitioned based on their access probabilities and allocated on multiple channels, assuming flat data scheduling per channel. If the data items allocated on the same channel are broadcast in different frequencies based on their access probabilities, the performance will be enhanced further. In this respect, this paper proposes a new broadcast scheduling scheme named two level dynamic programming(TLDP) which can reflect a variation of access probabilities among data items allocated on the same channel.

An Android BLE Emulator for Developing Wearable Apps (웨어러블 어플리케이션 개발을 위한 안드로이드 BLE 에뮬레이터)

  • Moon, Hyeonah;Park, Sooyong;Choi, Kwanghoon
    • KIISE Transactions on Computing Practices
    • /
    • v.24 no.2
    • /
    • pp.67-76
    • /
    • 2018
  • BLE (Bluetooth Low Energy) has been extensively used for communication between mobile applications and wearable devices in IoT (Internet of Things). In developing Android applications, wearable devices, on which the applications can run, should be available because the existing Android SDK does not support any BLE emulation facility. In this study, we have designed and implemented the first Android BLE emulator. Using this, we are able to develop and test BLE-based Android applications even when without wearable devices. We have also proposed an automatic generation method of Android BLE scenarios based on graph model. We have shown that the method is useful for systematically testing BLE application protocols by running the generated scenarios on the Android BLE emulator.

Spatial-Temporal Moving Sequence Pattern Mining (시공간 이동 시퀀스 패턴 마이닝 기법)

  • Han, Seon-Young;Yong, Hwan-Seung
    • The Korean Journal of Applied Statistics
    • /
    • v.19 no.3
    • /
    • pp.599-617
    • /
    • 2006
  • Recently many LBS(Location Based Service) systems are issued in mobile computing systems. Spatial-Temporal Moving Sequence Pattern Mining is a new mining method that mines user moving patterns from user moving path histories in a sensor network environment. The frequent pattern mining is related to the items which customers buy. But on the other hand, our mining method concerns users' moving sequence paths. In this paper, we consider the sequence of moving paths so we handle the repetition of moving paths. Also, we consider the duration that user spends on the location. We proposed new Apriori_msp based on the Apriori algorithm and evaluated its performance results.

Improved First-Phoneme Searches Using an Extended Burrows-Wheeler Transform (확장된 버로우즈-휠러 변환을 이용한 개선된 한글 초성 탐색)

  • Kim, Sung-Hwan;Cho, Hwan-Gue
    • KIISE Transactions on Computing Practices
    • /
    • v.20 no.12
    • /
    • pp.682-687
    • /
    • 2014
  • First phoneme queries are important functionalities that provide an improvement in the usability of interfaces that produce errors frequently due to their restricted input environment, such as in navigators and mobile devices. In this paper, we propose a time-space efficient data structure for Korean first phoneme queries that disassembles Korean strings in a phoneme-wise manner, rearranges them into circular strings, and finally, indexes them using the extended Burrows-Wheeler Transform. We also demonstrate that our proposed method can process more types of query using less space than previous methods. We also show it can improve the search time when the query length is shorter and the proportion of first phonemes is higher.

On the Distribution of the Movement Speed of Smartphone Users (스마트폰으로 측정된 사용자의 이동속도분포에 관한 연구)

  • Kim, Woojin;Jang, Woncheol;Song, Ha Yoon
    • KIISE Transactions on Computing Practices
    • /
    • v.22 no.11
    • /
    • pp.567-575
    • /
    • 2016
  • With the popularity of smartphone, user's location information is of great interest as mobile apps based on the location information are increasing. In this paper, we are interested in analyzing user's speed data based on the location information. It is not uncommon to observe locations with great measurement errors, removing them is necessary. The distribution of speed can be considered as a mixture model in accordance with transportation means. We identify a tail part as a component of a mixture model and fit a simple parametric model to the tail part of the speed distribution.

Analysis of Global Research Trend on Information Security (정보보안에 대한 연구 트렌드 분석)

  • Kim, Won-pil
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.5
    • /
    • pp.1110-1116
    • /
    • 2015
  • This paper analyzes global research trend on information security. All technical fields based on information requires security so that discovering technologies (technical terms) which are developing newly or dramatically is able to guide the future direction of the field of information security. In this paper, the ultimate of this research is to figure out the technologies related to information security and to forecast the future through understanding their trends. The paper, as a beginning for the analysis on macroscopic viewpoint, contains measurement of yearly relatedness between technical terms from 2001 to 2014 by using temporal co-occurrence and interpretation of its meaning through comparing the relatedness with trends of top-related technical terms. And to conclude, we could find that Android platform, Big data, Internet of things, Mobile technologies, and Cloud computing are emerging technologies on information security.

TwittsIn: Twitter Friend Notification Service for Mobile Devices Using Place Recognition (TwittsIn: 장소 인식을 이용한 모바일 트위터 친구 알림 서비스)

  • Chang, Lae-Young;Lee, Min-Kyu;Cho, Jun-Hee;Han, Dong-Soo
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.16 no.7
    • /
    • pp.814-818
    • /
    • 2010
  • Online social networking services help people to migrate social networks from offline to online. Twitter, which has achieved incredible growth, showed that an online social networking service without offline bases can become large and successful. In this paper, we propose a twitter friend notification service using user‘s twitter messages and place recognizing technology. When there is a friend in user‘s nearby place, the service notifies the information to the users. Through the friend notification service, a user can easily extend his online social network to offline.