• Title/Summary/Keyword: Application Service Provider

Search Result 214, Processing Time 0.039 seconds

An Appraoch for Preserving Loaction Privacy using Location Based Services in Mobile Cloud Computing

  • Abbas, Fizza;Hussain, Rasheed;Son, Junggab;Oh, Heekuck
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2013.05a
    • /
    • pp.621-624
    • /
    • 2013
  • Mobile Cloud Computing is today's emerging technology. Customers enjoy the services and application from this combination of mobile technology and cloud computing. Beside all these benefits it also increases the concerns regarding privacy of users, while interacting with this new paradigm One of the services is Location based services, but to get their required services user has to give his/her current location to the LBS provider that is violation of location privacy of mobile client. Many approaches are in literature for preserve location privacy but some has computation restriction and some suffer from lack of privacy. In this paper we proposed a novel idea that not only efficient in its protocol but also completely preserves the user's privacy. The result shows that by sharing just service name and a large enough geographic area (e.g. a city) user gets required information from the server by doing little client side processing We perform experiments at client side by developing and testing an android based mobile client application to support our argument.

Improving evaluation metric of mobile application service with user review data (사용자 리뷰 데이터를 활용한 모바일 어플리케이션 서비스 평가 척도 개선)

  • Lee, Burmguk;Son, Changho
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.1
    • /
    • pp.380-386
    • /
    • 2020
  • The mobile application market has grown over the past decade since the advent of smartphones, making it the largest market for electronic device software. As competition intensifies in the mobile application market, the impact of application evaluations on the consumption and usage patterns of users has also significantly increased. Therefore, research has been conducted on measures to evaluate mobile applications, but most of the research has relied on qualitative methods such as expert-centered interviews or surveys. In addition, evaluation measures are being constructed from the service provider's perspective, not from the service user's perspective. However, the possibility of application-specific analyses that minimize the subjectivity of researchers is growing, as large amounts of user review data enable quantitative analysis of actual users' assessment of applications. Therefore, this study presents a methodology that can complement current problems with existing quality assessments for mobile applications by utilizing user review data. To this end, the Topic Modeling technique LDA (Latent Dirichlet allocation) is applied in order to elucidate ways to improve existing evaluation measures from a user's perspective. The study is expected to reduce bias in service assessment due to the subjectivity of service providers and researchers as well as provide a measure of assessment by area of mobile applications from a consumer perspective.

Implementation of Facility Management System for Plant Factory (식물공장 시설관리 시스템의 구현)

  • Lee, Yong-Woong;Seo, Beom-Seok;Kim, Chan-Woo;Kim, Kyung-Hee;Park, Yang-Ho;Shin, Chang-Sun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.2
    • /
    • pp.141-151
    • /
    • 2011
  • This paper suggests the Facility Management System for plant factory promising to be a core technology of the agriculture in the future. This system makes diagnoses that status from sensors or facilities in the factory for exact operation and monitors the internal environment with the control status in real-time. It is expected that we could operate a plant factory safely and effectively by using the system. The system consists of the data management module, the context provider module, the context interpreter module, the service provider module, the data storage and user interface. The system provide with the failure diagnosis service, the facility control service, and the high-reliability monitoring service via the interactions between above modules. The failure diagnosis service determines whether the sensors or facility devices are in failure or not, and informs the administrator of their conditions. The facility control service is activated in case if the facilities need to be managed during the diagnosis for failure or malfunction processes. The high-reliability monitoring service provides the administrator with verified data through the failure diagnosis service. Then we confirmed that the suggested system operates correctly through the system simulation.

A Study on the Secure Database Controlled Under Cloud Environment (클라우드 환경하에서의 안전한 데이터베이스 구축에 관한 연구)

  • Kim, SungYong;Kim, Ji-Hong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.6
    • /
    • pp.1259-1266
    • /
    • 2013
  • Nowadays, the databases are getting larger and larger. As the company has difficulty in managing the database, they want to outsource the database to the cloud system. In this case the database security is more important because their database is managed by the cloud service provider. Among database security techniques, the encryption method is a well-certified and established technology for protecting sensitive data. However, once encrypted, the data can no longer be easily queried. The performance of the database depends on how to encrypt the sensitive data, and on the approach for searching, and the retrieval efficiency that is implemented. In this paper we propose the new suitable mechanism to encrypt the database and lookup process on the encrypted database under control of the cloud service provider. This database encryption algorithm uses the bloom filter with the variable keyword based index. Finally, we demonstrate that the proposed algorithm should be useful for database encryption related research and application activities.

Information Security Management System on Cloud Computing Service (클라우드 컴퓨팅 서비스에 관한 정보보호관리체계)

  • Shin, Kyoung-A;Lee, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.1
    • /
    • pp.155-167
    • /
    • 2012
  • Cloud computing service is a next generation IT service which has pay-per-use billing model and supports elastically provisioning IT infra according to user demand. However it has many potential threats originating from outsourcing/supporting service structure that customers 'outsource' their own data and provider 'supports' infra, platform, application services, the complexity of applied technology, resource sharing and compliance with a law, etc. In activation of Cloud service, we need objective assessment standard to ensure safety and reliability which is one of the biggest obstacles to adopt cloud service. So far information security management system has been used as a security standard for a security management and IT operation within an organization. As for Cloud computing service it needs new security management and assessment different from those of the existing in-house IT environment. In this paper, to make a Information Security Management System considering cloud characteristics key components from threat management system are drawn and all control domain of existing information security management system as a control components are included. Especially we designed service security management to support service usage in an on-line self service environment and service contract and business status.

A Study on Application of Integrated Marketing Communication (IMC) Strategy for the Efficiency in Information Services of a Public Information Service Institution (공공정보서비스기관의 정보서비스 효율화를 위한 IMC 전략 적용 방안에 관한 연구)

  • Kim, Chan-Ho;Park, Kyong-Seok;Song, Hye-Eun;You, Yong-Bok
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2004.11a
    • /
    • pp.516-530
    • /
    • 2004
  • With the advent of knowledge-based society where knowledge generates power, the importance of information is growing than ever before. However, it is not easy to find necessary information in time. Collecting, processing and disseminating valuable information is getting more and more important. If those information include scientific and technical issues, it is more difficult to connect the sender and receiver, provider and consumer and also creates various factors and situation. This study aims to provide an application method of IMC(Integrated Marketing Communication) Strategy for efficient information services of science and technology which is one of KISTI's major functions. An analysis was proceeded in 3 categories with provider and receiver, and medium and message. The current problem in system was reviewed through each analysis and a feasible plan for the realization of IMC Strategy in future is proposed.

  • PDF

Development of Half-Mirror Interface System and Its Application for Ubiquitous Environment (유비쿼터스 환경을 위한 하프미러형 인터페이스 시스템 개발과 응용)

  • Kwon Young-Joon;Kim Dae-Jin;Lee Sang-Wan;Bien Zeungnam
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.11 no.12
    • /
    • pp.1020-1026
    • /
    • 2005
  • In the era of ubiquitous computing, human-friendly man-machine interface is getting more attention due to its possibility to offer convenient services. For this, in this paper, we introduce a 'Half-Mirror Interface System (HMIS)' as a novel type of human-friendly man-machine interfaces. Basically, HMIS consists of half-mirror, USB-Webcam, microphone, 2ch-speaker, and high-speed processing unit. In our HMIS, two principal operation modes are selected by the existence of the user in front of it. The first one, 'mirror-mode', is activated when the user's face is detected via USB-Webcam. In this mode, HMIS provides three basic functions such as 1) make-up assistance by magnifying an interested facial component and TTS (Text-To-Speech) guide for appropriate make-up, 2) Daily weather information provider via WWW service, 3) Health monitoring/diagnosis service using Chinese medicine knowledge. The second one, 'display-mode' is designed to show decorative pictures, family photos, art paintings and so on. This mode is activated when the user's face is not detected for a time being. In display-mode, we also added a 'healing-window' function and 'healing-music player' function for user's psychological comfort and/or relaxation. All these functions are accessible by commercially available voice synthesis/recognition package.

The design and implementation of the Event and Service registry engineering for USN application (USN 응용을 위한 이벤트 및 서비스 레지스트리 설계 및 구현)

  • Yeom, Sung-Kun;Kim, Yong-Woon;Yoo, Sang-Keun;Kim, Hyung-Jun;Jung, Hoe-Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.10a
    • /
    • pp.327-330
    • /
    • 2008
  • Resently as ubiquitous environment rapidly emerges due to the development of network and information communication technology, ubiquitous computing is being noticed as a technology that will take the lead in information technology industry of the future. For the realization of this Ubiquitous Service requires some technique such as situations of environment and recognition of locations by the Sensor Network, then sensor data have to be transferred to an application service after processes. Also the creation rule of registration and search of the event is necessary because the USN sensor data must be possible to specific the multi condition of event which relates on using time. And for using a numerous sensor data provision service, service provider can publish its service in standardized registry for users to search and use the service registry. Currently there is the web service for a WS-Eventing and a UDDI with standard, but the event and the service registry is unnecessary or there is a portion which is insufficient. In this paper, I design and implementated standardzation of event definition for USN application service and service registry structure, standard API.

  • PDF

An Empirical Analysis on the Persistent Usage Intention of Chinese Personal Cloud Service (개인용 클라우드 서비스에 대한 중국 사용자의 지속적 사용의도에 관한 실증 연구)

  • Yu, Hexin;Sura, Suaini;Ahn, Jong-chang
    • Journal of Internet Computing and Services
    • /
    • v.16 no.3
    • /
    • pp.79-93
    • /
    • 2015
  • With the rapid development of information technology, the ways of usage have changed drastically. The ways and efficiency of traditional service application to data processing already could not satisfy the requirements of modern users. Nowadays, users have already understood the importance of data. Therefore, the processing and saving of big data have become the main research of the Internet service company. In China, with the rise and explosion of 115 Cloud leads to other technology companies have began to join the battle of cloud services market. Although currently Chinese cloud services are still mainly dominated by cloud storage service, the series of service contents based on cloud storage service have been affirmed by users, and users willing to try these new ways of services. Thus, how to let users to keep using cloud services has become a topic that worth for exploring and researching. The academia often uses the TAM model with statistical analysis to analyze and check the attitude of users in using the system. However, the basic TAM model obviously already could not satisfy the increasing scale of system. Therefore, the appropriate expansion and adjustment to the TAM model (i. e. TAM2 or TAM3) are very necessary. This study has used the status of Chinese internet users and the related researches in other areas in order to expand and improve the TAM model by adding the brand influence, hardware environment and external environments to fulfill the purpose of this study. Based on the research model, the questionnaires were developed and online survey was conducted targeting the cloud services users of four Chinese main cities. Data were obtained from 210 respondents were used for analysis to validate the research model. The analysis results show that the external factors which are service contents, and brand influence have a positive influence to perceived usefulness and perceived ease of use. However, the external factor hardware environment only has a positive influence to the factor of perceived ease of use. Furthermore, the perceived security factor that is influenced by brand influence has a positive influence persistent intention to use. Persistent intention to use also was influenced by the perceived usefulness and persistent intention to use was influenced by the perceived ease of use. Finally, this research analyzed external variables' attributes using other perspective and tried to explain the attributes. It presents Chinese cloud service users are more interested in fundamental cloud services than extended services. In private cloud services, both of increased user size and cooperation among companies are important in the study. This study presents useful opinions for the purpose of strengthening attitude for private cloud service users can use this service persistently. Overall, it can be summarized by considering the all three external factors could make Chinese users keep using the personal could services. In addition, the results of this study can provide strong references to technology companies including cloud service provider, internet service provider, and smart phone service provider which are main clients are Chinese users.

A study on prospects of new digital contents service based on Web 2.0 (웹 2.0 환경의 새로운 디지털 콘텐츠 서비스 전망에 관한 연구)

  • Kim, Jae-Ha
    • Journal of Broadcast Engineering
    • /
    • v.12 no.5
    • /
    • pp.452-459
    • /
    • 2007
  • The Internet is encountering a new turning point owing to the raising Web 2.0. A user Just receives the information and service provided by a service provider in the existing web 2.0, but a user can create a new service for himself using an application program and data provided in web 2.0. The digital content market is producing a new service according to Web 2.0. The specific service among them is User Created Contents(UCC) and it is leading to the participation and interesting of user SecondLife also which is the type as Social Network Service(SNS) and VR, is placing as a new service type. This paper defines Web 2.0 environment and classifies as UCC, SNS and Virtual Reality(VR) and defines a variety services shown in new environment. It also analyzes shortcomings and then prospect a new type of service which will be shown in the future.