• Title/Summary/Keyword: 모바일 클라우드 서비스

Search Result 268, Processing Time 0.04 seconds

Design of the Smart Application based on IoT (사물 인터넷 기반 스마트 응용의 설계)

  • Oh, Sun-Jin
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.17 no.5
    • /
    • pp.151-155
    • /
    • 2017
  • With the rapid growth of the up-to-date wireless network and Internet technologies, huge and various types of things around us are connected to the Internet and build the hyper-connected society, and lots of smart applications using these technologies are actively developed recently. IoT connects human, things, space, and data with various types of networks to construct the hyper-connected network that can create, collect, share and appling realtime information. Furthermore, most of the smart applications are concentrated on the service that can collect and store realtime contexts using various sensors and cloud technology, and provide intelligence by making inferences and decisions from them nowadays. In this paper, we design a smart application that can accurately control and process the current state of the specific context in realtime by using the state-of-the-art ICT techniques such as various sensors and cloud technologies on the IoT based mobile computing environment.

A Study on the Intelligent Service Selection Reasoning for Enhanced User Satisfaction : Appliance to Cloud Computing Service (사용자 만족도 향상을 위한 지능형 서비스 선정 방안에 관한 연구 : 클라우드 컴퓨팅 서비스에의 적용)

  • Shin, Dong Cheon
    • Journal of Intelligence and Information Systems
    • /
    • v.18 no.3
    • /
    • pp.35-51
    • /
    • 2012
  • Cloud computing is internet-based computing where computing resources are offered over the Internet as scalable and on-demand services. In particular, in case a number of various cloud services emerge in accordance with development of internet and mobile technology, to select and provide services with which service users satisfy is one of the important issues. Most of previous works show the limitation in the degree of user satisfaction because they are based on so called concept similarity in relation to user requirements or are lack of versatility of user preferences. This paper presents cloud service selection reasoning which can be applied to the general cloud service environments including a variety of computing resource services, not limited to web services. In relation to the service environments, there are two kinds of services: atomic service and composite service. An atomic service consists of service attributes which represent the characteristics of service such as functionality, performance, or specification. A composite service can be created by composition of atomic services and other composite services. Therefore, a composite service inherits attributes of component services. On the other hand, the main participants in providing with cloud services are service users, service suppliers, and service operators. Service suppliers can register services autonomously or in accordance with the strategic collaboration with service operators. Service users submit request queries including service name and requirements to the service management system. The service management system consists of a query processor for processing user queries, a registration manager for service registration, and a selection engine for service selection reasoning. In order to enhance the degree of user satisfaction, our reasoning stands on basis of the degree of conformance to user requirements of service attributes in terms of functionality, performance, and specification of service attributes, instead of concept similarity as in ontology-based reasoning. For this we introduce so called a service attribute graph (SAG) which is generated by considering the inclusion relationship among instances of a service attribute from several perspectives like functionality, performance, and specification. Hence, SAG is a directed graph which shows the inclusion relationships among attribute instances. Since the degree of conformance is very close to the inclusion relationship, we can say the acceptability of services depends on the closeness of inclusion relationship among corresponding attribute instances. That is, the high closeness implies the high acceptability because the degree of closeness reflects the degree of conformance among attributes instances. The degree of closeness is proportional to the path length between two vertex in SAG. The shorter path length means more close inclusion relationship than longer path length, which implies the higher degree of conformance. In addition to acceptability, in this paper, other user preferences such as priority for attributes and mandatary options are reflected for the variety of user requirements. Furthermore, to consider various types of attribute like character, number, and boolean also helps to support the variety of user requirements. Finally, according to service value to price cloud services are rated and recommended to users. One of the significances of this paper is the first try to present a graph-based selection reasoning unlike other works, while considering various user preferences in relation with service attributes.

Marine Contents Use and Service Plans for the Educational Purpose (교육용 해양 콘텐츠 활용 및 서비스 방안)

  • Youn, Jae-Hong;Choi, Hyo-Seung;Jeong, Seung-Moon
    • The Journal of the Korea Contents Association
    • /
    • v.12 no.3
    • /
    • pp.480-486
    • /
    • 2012
  • There has been an increasing interest in new industry and demand creations by the convergence and integration between IT and infrastructure and BT, NT, and CT and the convergence of IT and spread of cloud computing have changed the IT service environment. Even in the educational field, the convergence and integration of contents with various IT have rapidly emerged and learning equipments for the educational purpose have expanded to the mobile media platform from PCs so that learning without limitations to time, place and equipment has become possible. Contents necessary for the smart education are under way by research development utilizing cyber reality and simulation, and 3D technologies. The purpose of this study is to propose marine contents use and service plans for the educational purpose in order to produce various types of contents for the marine life and environment, to improve the school achievement by stimulating interest and to provide individually customized learning.

A K-Nearest Neighbour Query Processing Algorithm for Encrypted Spatial Data in Road Network (도로 네트워크 환경에서 암호화된 공간데이터를 위한 K-최근접점 질의 처리 알고리즘)

  • Jang, Mi-Young;Chang, Jae-Woo
    • Spatial Information Research
    • /
    • v.20 no.3
    • /
    • pp.67-81
    • /
    • 2012
  • Due to the recent advancement of cloud computing, the research on database outsourcing has been actively done. Moreover, the number of users who utilize Location-based Services(LBS) has been increasing with the development in w ireless communication technology and mobile devices. Therefore, LBS providers attempt to outsource their spatial database to service provider, in order to reduce costs for data storage and management. However, because unauthorized access to sensitive data is possible in spatial database outsourcing, it is necessary to study on the preservation of a user's privacy. Thus, we, in this paper, propose a spatial data encryption scheme to produce outsourced database from an original database. We also propose a k-Nearest Neighbor(k-NN) query processing algorithm that efficiently performs k-NN by using the outsourced database. Finally, we show from performance analysis that our algorithm outperforms the existing one.

스마트 사회의 보안위협과 정보보호 정책추진에 관한 제언

  • Lee, Gi-Ju
    • Information and Communications Magazine
    • /
    • v.30 no.1
    • /
    • pp.24-32
    • /
    • 2012
  • 우리는 지금 스마트 사회에 살아가고 있다. 언제 어디서든 스마트 디바이스를 통해 기존에 PC에서 하던 작업들을 손쉽게 하고 있다. 한편 스마트폰의 확산으로 이용자 수가 급증하고 있는 소셜네트워크 서비스(SNS)는 이용자들이 자신의 일상적인 이야기를 사이버공간에 게시함으로 인해 개인의 사생활 정보들이 노출되고, 그러한 정보들이 범죄에 악용되는 사례들이 눈에 띄게 증가하고 있다. 또한 SNS를 이용한 악성코드의 유포 및 빠른 전파 등도 새로운 보안위협으로 나타나고 있다. 그 밖에 스마트 기기를 대상으로 한 해킹 및 악성코드 감염 등 위협이 증가하고 있는 형편이다. 본고에서는 스마트 사회의 주요 보안위협을 살펴보고 미국, 유럽, 일본, 호주 등 선진국의 관련 정책 동향과 국내 정책과 실태를 분석하여 새로운 정보보호 정책 수립 방향을 제언하고자 한다. 스마트 사회 위험 요소로 가장 보편적으로 사용되고 있는 스마트폰과 스마트폰을 통해 이용되고 있는 소셜네트워크 서비스, 클라우드 서비스의 보안위협을 제기하고 최근 글로벌 이슈로 떠오르고 있는 빅 데이터 환경의 보안위협을 분석하였다. 스마트 사회의 위협을 대비하고 있는 주요국 정책을 살펴보면, 미국의 경우 사회적 합의를 바탕으로한 감시와 통제를 강화하는 정책을 추진 중에 있으며 유럽의 5개국 EU5(영국, 독일, 프랑스, 스페인, 이탈리아)는 스마트폰 위협을 중심으로 공동 대응 방안을 마련하고 있다. 일본은 스마트 워크중심의 보안대책을 강구하고 있으며 호주는 스마트 사회 보안위협에 대한 국민의 인식제고에 주력하고 있다. 국내의 경우도 스마트 사회의 보안위협에 선제적 대응을 위하여 "스마트 모바일 시큐리티 종합계획"을 수립하여 추진중에 있다. 하지만 보안 실태를 보면 스마트 사회 보안위협에 대한 이용자들의 우려는 높은 반면 기업의 보안 대책 마련에 대한 투자는 여전히 미흡한 상황이다. 향후 우리 사회가 디바이스간 융합을 넘어 모든 사물이 연결되는 초(超)연결(Hyper-Connectivity) 시대로 진화되어 가면 편리성이 증대되는 만큼 더 많은 위협에 우리의 일상이 노출되는 문제가 발생하게 될 것이다. 안전한 미래 사회로 진입하기 위해서는 보다 체계적이고 종합적인 정보보호 정책마련이 필요하다. 본고에서는 이를 위한 정책수립의 방향을 제언했다.

An Empirical Study on the Influence Factors of the Mobile Cloud Storage Service Satisfaction (모바일 클라우드 스토리지 서비스 이용만족에 영향을 미치는 요인에 관한 실증연구)

  • Choi, Kwangdoo;Cho, Insu;Park, Heejun;Lee, Kiwon;Kang, Junmo
    • Journal of Korean Society for Quality Management
    • /
    • v.41 no.3
    • /
    • pp.381-394
    • /
    • 2013
  • Purpose: Nowadays, Mobile Cloud Storage services are used widely. For sustainable use of this service, we need to determine what factors affect satisfaction. Therefore, the purpose of this study is to identify the factors that influence satisfaction. Methods: To analyze factors that influence satisfaction, this study sets the factors into three dimensions such as service quality, perceived risk, and individual characteristics and analyze the causal relationship between influence factors and satisfaction through Structural Equation Model. Results: The results of this study are as follows; among service quality, user interface and reliability influenced satisfaction, but adaptability did not have any influence. Perceived risk of illegal access had a negative influence on satisfaction, while perceived risk of privacy leakage did not have significant influence on satisfaction in perceived risk. At last, self-efficacy had a significant influence on satisfaction. Conclusion: We identified the influence factors that influence satisfaction. Our findings will be necessary for Mobile Cloud Storage service providers to strengthen their service.

Standardization Trends of Open Web Data (개방형 웹 데이터 표준화 동향)

  • Kim, Chang-su;Kim, Sung-han;Lee, Seung-yun;Jung, Hoe-kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.10a
    • /
    • pp.836-838
    • /
    • 2013
  • In recent years, the future direction of information technology social computing, mobile computing, cloud computing. Web technology industries beyond IT convergence technology for the service side of the parameters has been developed. In particular, the rapid increase of data in a web-based open Web and the importance of the next generation Web technology is increasing. In this paper, the next generation Web technology, an open Web and the importance of increasing domestic and international standardization trends were studied.

  • PDF

Design of the Environmental Data Monitoring and Prediction System for the Fish Farms (양식장 환경 데이터 모니터링 및 예측 시스템의 설계)

  • Rijayanti, Rita;Kadam, Ashwini;Wahyutama, Aria B.;Lee, Bonyeong;Hwang, Mintae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.05a
    • /
    • pp.178-180
    • /
    • 2021
  • In this paper, we design a system to monitor environmental data in fish farms in real-time and provide machine learning-based prediction services to prevent damage on fish farms caused by changes in the sea environment. The proposed system will install an IoT device module consisting of sensors that can measure hydrogen concentration, salinity, dissolved oxygen, and water temperature, which can be transferred to Cloud DB using LTE or LoRa communication technology and then monitor the real-time condition through a web or mobile application. In addition, it has a function to prepare for changes within the environment of fish farms by applying machine learning-based prediction technology using collected data.

  • PDF

Malware Behavior Analysis based on Mobile Virtualization (모바일 가상화기반의 악성코드 행위분석)

  • Kim, Jang-Il;Lee, Hee-Seok;Jung, Yong-Gyu
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.2
    • /
    • pp.1-7
    • /
    • 2015
  • As recent smartphone is used around the world, all of the subscribers of the mobile communication is up to 47.7% about 24 million people. Smartphone has a vulnerability to security, and security-related incidents are increased in damage with the smartphone. However, precautions have been made, rather than analysis of the infection of most of the damage occurs after the damaged except for the case of the expert by way of conventional post-countermeasure. In this paper, we implement a mobile-based malware analysis systems apply a virtualization technology. It is designed to analyze the behavior through it. Virtualization is a technique that provides a logical resources to the guest by abstracting the physical characteristics of computing resources. The virtualization technology can improve the efficiency of resources by integrating with cloud computing services to servers, networks, storage, and computing resources to provide a flexible. In addition, we propose a system that can be prepared in advance to buy a security from a user perspective.

Design of Encryption/Decryption IP for Lightweight Encryption LEA (경량 블록암호 LEA용 암·복호화 IP 설계)

  • Sonh, Seungil
    • Journal of Internet Computing and Services
    • /
    • v.18 no.5
    • /
    • pp.1-8
    • /
    • 2017
  • Lightweight Encryption Algorithm(LEA) was developed by National Security Research Institute(NSRI) in 2013 and targeted to be suitable for environments for big data processing, cloud service, and mobile. LEA specifies the 128-bit message block size and 128-, 192-, and 256-bit key sizes. In this paper, block cipher LEA algorithm which can encrypt and decrypt 128-bit messages is designed using Verilog-HDL. The designed IP for encryption and decryption has a maximum throughput of 874Mbps in 128-bit key mode and that of 749Mbps in 192 and 656Mbps in 256-bit key modes on Xilinx Vertex5. The cryptographic IP of this paper is applicable as security module of the mobile areas such as smart card, internet banking, e-commerce and IoT.