• Title/Summary/Keyword: Access-based Consumption

Search Result 245, Processing Time 0.03 seconds

A Study on Information Access Control Policy Based on Risk Level of Security Incidents about IT Human Resources in Financial Institutions (금융IT인력의 보안사고 위험도에 기반한 정보접근 통제 정책 연구)

  • Sim, Jae-Yoon;Lee, Kyung-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.2
    • /
    • pp.343-361
    • /
    • 2015
  • The financial industry in South Korea has witnessed a paradigm shift from selling traditional loan/deposit products to diversified consumption channels and financial products. Consequently, personification of financial services has accelerated and the value of finance-related personal information has risen rapidly. As seen in the 2014 card company information leakage incident, most of major finance-related information leakage incidents are caused by personnel with authorized access to certain data. Therefore, it is strongly required to confirm whether there are problems in the existing access control policy for personnel who can access a great deal of data, and to complement access control policy by considering risk factors of information security. In this paper, based on information of IT personnel with access to sensitive finance-related data such as job, position, sensitivity of accessible data and on a survey result, we will analyze influence factors for personnel risk measurement and apply data access control policy reflecting the analysis result to an actual case so as to introduce measures to minimize IT personnel risk in financial companies.

A Design of RAID-1 Storage using Hard Disk Drive and Flash Memory Drive (하드 디스크 드라이브와 플래시 메모리 드라이브를 활용한 레이드-1 저장장치의 설계)

  • Byun, Si-Woo
    • Transactions of the Society of Information Storage Systems
    • /
    • v.6 no.2
    • /
    • pp.41-46
    • /
    • 2010
  • Recently, Flash Memory Drives are one of the best media to support portable and desktop computers' storage devices. Their features include non-volatility, low power consumption, and fast access time for read operations, which are sufficient to present flash memories as major database storage components for desktop and server computers. However, we need to improve traditional storage management schemes based on HDD(Hard Disk Drive) and RAID(Redundant Array of Independent Disks) due to the relatively slow or freezing characteristics of write operations of SSDs, as compared to fast read operations. In order to achieve this goal, we propose a new storage management scheme called Hetero-Mirroring based on traditional HDD mirroring scheme. Hetero-Mirroring-based storage management improves RAID-1 operation performance by balancing write-workloads and delaying write operations to avoid SSD freezing.

A Study on Design and Cache Replacement Policy for Cascaded Cache Based on Non-Volatile Memories (비휘발성 메모리 시스템을 위한 저전력 연쇄 캐시 구조 및 최적화된 캐시 교체 정책에 대한 연구)

  • Juhee Choi
    • Journal of the Semiconductor & Display Technology
    • /
    • v.22 no.3
    • /
    • pp.106-111
    • /
    • 2023
  • The importance of load-to-use latency has been highlighted as state-of-the-art computing cores adopt deep pipelines and high clock frequencies. The cascaded cache was recently proposed to reduce the access cycle of the L1 cache by utilizing differences in latencies among banks of the cache structure. However, this study assumes the cache is comprised of SRAM, making it unsuitable for direct application to non-volatile memory-based systems. This paper proposes a novel mechanism and structure for lowering dynamic energy consumption. It inserts monitoring logic to keep track of swap operations and write counts. If the ratio of swap operations to total write counts surpasses a set threshold, the cache controller skips the swap of cache blocks, which leads to reducing write operations. To validate this approach, experiments are conducted on the non-volatile memory-based cascaded cache. The results show a reduction in write operations by an average of 16.7% with a negligible increase in latencies.

  • PDF

Design and Implementation of MAC Protocol for Underwater Mobile Ad-hoc Networks (수중 모바일 애드 혹 네트워크를 위한 MAC 프로토콜 설계 및 구현)

  • Lee, Jin-Young;Yun, Nam-Yeol;Park, Soo-Hyun
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.51 no.4
    • /
    • pp.76-89
    • /
    • 2014
  • In this paper, we propose a MAC(Media Access Control) protocol based on flexible RWT(RTS Waiting Time) for underwater mobile ad-hoc networks with a three-way handshaking mechanism. This protocol can solve a problem of collision between RTS(Request-To-Send) and CTS(Clear-To-Send) packets in existing MACA(Multiple Access with Collision Avoidance) protocol. This proposed MAC protocol is also an effective protocol which can apply to underwater mobile ad-hoc networks in a real field by using implementable technologies. We set flexible RTS Waiting Time called RWT, considering various characteristics of underwater environment. It is possible to support variable network size according to node mobility. Finally, we conduct a performance evaluation between proposed MAC protocol and existing MACA based MAC protocol through practical implementation and experiment. As a result, we verify the superiority of our proposed MAC protocol in terms of throughput, packet drop rate, average transmission time, energy consumption and channel utilization.

Positioning testbed implementation for performance evaluation of ship wireless network (선내 무선 네트워크 특성조사를 통한 측위 테스트베드 구축)

  • Lee, Su-Bong;Kang, Dong-Hoon;Lee, Jong-Hyeon;Lee, Jae-Chul;Kim, Young-Hoon;Lee, Soon-Sup
    • Journal of Advanced Marine Engineering and Technology
    • /
    • v.41 no.4
    • /
    • pp.353-361
    • /
    • 2017
  • As ship-based tourism increases, safe sailing and management are necessary to prevent maritime accidents. Because external rescue support cannot arrive rapidly in the case of ship-related accidents, the initial response is very important for damage minimization. Further, for secondary damage prevention, it is necessary to accurately determine passenger positions. In this paper, considering the characteristics of a ship, the enhanced-Zigbee(e-Zigbee) position determination technology (PDT) is applied, which improved upon the Zigbee PDT by having advantages such as low power consumption and smaller size. According to user needs, a low-cost and high-precision passenger positioning tag and access point(AP) is provided. A ship testbed that yields improved positioning accuracy based on a performance evaluation is constructed.

Privacy-Preserving Cloud Data Security: Integrating the Novel Opacus Encryption and Blockchain Key Management

  • S. Poorani;R. Anitha
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.11
    • /
    • pp.3182-3203
    • /
    • 2023
  • With the growing adoption of cloud-based technologies, maintaining the privacy and security of cloud data has become a pressing issue. Privacy-preserving encryption schemes are a promising approach for achieving cloud data security, but they require careful design and implementation to be effective. The integrated approach to cloud data security that we suggest in this work uses CogniGate: the orchestrated permissions protocol, index trees, blockchain key management, and unique Opacus encryption. Opacus encryption is a novel homomorphic encryption scheme that enables computation on encrypted data, making it a powerful tool for cloud data security. CogniGate Protocol enables more flexibility and control over access to cloud data by allowing for fine-grained limitations on access depending on user parameters. Index trees provide an efficient data structure for storing and retrieving encrypted data, while blockchain key management ensures the secure and decentralized storage of encryption keys. Performance evaluation focuses on key aspects, including computation cost for the data owner, computation cost for data sharers, the average time cost of index construction, query consumption for data providers, and time cost in key generation. The results highlight that the integrated approach safeguards cloud data while preserving privacy, maintaining usability, and demonstrating high performance. In addition, we explore the role of differential privacy in our integrated approach, showing how it can be used to further enhance privacy protection without compromising performance. We also discuss the key management challenges associated with our approach and propose a novel blockchain-based key management system that leverages smart contracts and consensus mechanisms to ensure the secure and decentralized storage of encryption keys.

A MAC Protocol for Underwater Acoustic Sensor Networks (수중 음파 센서 네트워크를 위한 매체접근제어 프로토콜)

  • Jang, Kil-Woong
    • Journal of KIISE:Information Networking
    • /
    • v.35 no.4
    • /
    • pp.337-344
    • /
    • 2008
  • Underwater acoustic sensor networks exhibit characteristics such as high propagation delay and low data rates, which are different from those of terrestrial wireless networks. Therefore, the conventional protocols used in wireless networks can be restrictive and inefficient when applied to underwater acoustic sensor networks. In this paper, we propose a medium access control protocol (MAC) to enhance the energy efficiency and throughput in underwater acoustic sensor networks. The proposed protocol employs a slot-based competition mechanism that reserves a time slot to send a data packet in advance. In the proposed protocol, collision between nodes can occur due to competition to obtain a slot. However, the proposed protocol minimizes the collisions between nodes because the nodes store the reservation information of the neighboring nodes, this reduces unnecessary energy consumption and increases throughput. We perform a simulation to evaluate the performance of the proposed protocol with regard to the energy consumption, the number of collision, channel utilization, throughput and transmission delay. We compare the proposed protocol with the conventional protocol, and the performance results show that the proposed protocol outperforms the conventional protocol.

Time Synchronization with Oceanic Movement Pattern in Underwater Wireless Networks (해수운동의 특성을 활용한 수중 무선 네트워크 시각 동기화)

  • Kim, Sungryul;Park, Seongjin;Yoo, Younghwan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38C no.5
    • /
    • pp.486-496
    • /
    • 2013
  • Time synchronization in underwater environment is challenging due to high propagation delay and mobility of sensor nodes. Previous researches do not consider practical issues affecting on the accuracy of time synchronization such as high-channel access delay and relative position between sensor nodes. Also, those protocols using bidirectional message exchange shorten the network lifetime and decrease the network throughput because numerous transmission, reception and unnecessary overhearing can be occurred. Therefore, in our research, we suggest enhanced time synchronization based on features of underwater environment. It controls the instant of transmission by exploiting the feature of an oceanic movement and node deployment. Moreover, the protocol uses more accurate time information by removing channel access delay from the timestamp. The proposed scheme is also practical on the underwater sensor network requiring low-power consumption because the scheme conducts time-synchronization with smaller transmission and reception compared with previous works. Finally, simulation results show that the proposed protocol deceases time error by 2.5ms and 0.56ms compared with TSHL and MU-Sync respectively, reducing energy consumption by 68.4%.

Low-Power FFT Design for NC-OFDM in Cognitive Radio Systems (Cognitive Radio 시스템의 NC-OFDM을 위한 저전력 FFT 설계)

  • Jang, In-Gul;Chung, Jin-Gyun
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.48 no.6
    • /
    • pp.28-33
    • /
    • 2011
  • Recently, the investigation of the cognitive radio (CR) system is actively progressed as one of the methods for using the frequency resources more efficiently. In CR systems, when the frequency band allocated to the incumbent user is not used, the unused frequency band is assigned to the secondary user. Thus, the FFT input signals corresponding to the actually used frequency band by the incumbent user are assigned as '0'. In this paper, based on the fact that there are many '0' input signals in CR systems, a low-power FFT design method for NC-OFDM is proposed. An efficient zero flag generation technique for each stage is first presented. Then, to increase the utility of the zero flag signals, modified architectures for memory and arithmetic circuits are presented. To verify the performance of the proposed algorithm, 2048 point FFT with radix-24SDFstructureisdesignedusingVerilog HDL. The simulation results show that the power consumption of FFT is reduced considerably by the proposed algorithm.

Cache memory system for high performance CPU with 4GHz (4Ghz 고성능 CPU 위한 캐시 메모리 시스템)

  • Jung, Bo-Sung;Lee, Jung-Hoon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.2
    • /
    • pp.1-8
    • /
    • 2013
  • TIn this paper, we propose a high performance L1 cache structure on the high clock CPU of 4GHz. The proposed cache memory consists of three parts, i.e., a direct-mapped cache to support fast access time, a two-way set associative buffer to exploit temporal locality, and a buffer-select table. The most recently accessed data is stored in the direct-mapped cache. If a data has a high probability of a repeated reference, when the data is replaced from the direct-mapped cache, the data is selectively stored into the two-way set associative buffer. For the high performance and low power consumption, we propose an one way among two ways set associative buffer is selectively accessed based on the buffer-select table(BST). According to simulation results, Energy $^*$ Delay product can improve about 45%, 70% and 75% compared with a direct mapped cache, a four-way set associative cache, and a victim cache with two times more space respectively.