• Title/Summary/Keyword: Bio-security

Search Result 146, Processing Time 0.029 seconds

Privacy Enhanced Data Security Mechanism in a Large-Scale Distributed Computing System for HTC and MTC

  • Rho, Seungwoo;Park, Sangbae;Hwang, Soonwook
    • International Journal of Contents
    • /
    • v.12 no.2
    • /
    • pp.6-11
    • /
    • 2016
  • We developed a pilot-job based large-scale distributed computing system to support HTC and MTC, called HTCaaS (High-Throughput Computing as a Service), which helps scientists solve large-scale scientific problems in areas such as pharmaceutical domains, high-energy physics, nuclear physics and bio science. Since most of these problems involve critical data that affect the national economy and activate basic industries, data privacy is a very important issue. In this paper, we implement a privacy enhanced data security mechanism to support HTC and MTC in a large-scale distributed computing system and show how this technique affects performance in our system. With this mechanism, users can securely store data in our system.

Identification via Retinal Vessels Combining LBP and HOG

  • Ali Noori;Esmaeil Kheirkhah
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.3
    • /
    • pp.187-192
    • /
    • 2023
  • With development of information technology and necessity for high security, using different identification methods has become very important. Each biometric feature has its own advantages and disadvantages and choosing each of them depends on our usage. Retinal scanning is a bio scale method for identification. The retina is composed of vessels and optical disk. The vessels distribution pattern is one the remarkable retinal identification methods. In this paper, a new approach is presented for identification via retinal images using LBP and hog methods. In the proposed method, it will be tried to separate the retinal vessels accurately via machine vision techniques which will have good sustainability in rotation and size change. HOG-based or LBP-based methods or their combination can be used for separation and also HSV color space can be used too. Having extracted the features, the similarity criteria can be used for identification. The implementation of proposed method and its comparison with one of the newly-presented methods in this area shows better performance of the proposed method.

A Survey on Detecting Interactions among Different Devices/Apps in IoT (IoT 분야의 다양한 기기/앱 간 상호작용 검출에 관한 연구동향)

  • Yicheng Zhen;Yeonjoon Lee
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2023.05a
    • /
    • pp.101-103
    • /
    • 2023
  • With the recent advances in communication technology and Internet of Things (IoT) infrastructure, home automation systems have emerged as a new paradigm for providing users with convenient smart home services. The IoT ecosystem has merged digital systems with the physical world, dramatically changing the way people live and work. However, at the same time, security remains one of the most significant research issues in IoT, as the deployment and application of high-availability systems come with various security risks that cause serious threats to users. Among them, the security issues arising from the interaction among devices/applications should not be underestimated. Attackers can exploit interactions among devices/applications to hack into the user's home. In this paper, we present a survey of research on detecting various types of interactions among devices/applications in IoT.

Including P4 and AI: A Survey on SDN Security (P4 와 AI 포함된 SDN 보안 기술 동향 연구 )

  • Xiang Li;Yeonjoon Lee
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2023.05a
    • /
    • pp.200-202
    • /
    • 2023
  • SDN (Software Defined Networking) is an emerging networking system which differs from traditional network architecture. Moreover SDN has many advantages and special capabilities that traditional networks do not have. SDN and P4 are related in that they can be combined to create more advanced and intelligent networking systems. Additionally, Al has emerged as a transformative force in various fields, including SDN. By applying Al and P4 to SDN, network administrators can leverage the power of them to make impact on SDN security. We offer an overview of recent trend of SDN security integrating P4 a nd Al in this study.

Rejection of DNA, Protein-DNA Complexes and Chromatin by Hollow Fiber Membranes

  • Higuchi, Akon;Hara, Mariko;Sato, Tetsuo;Ishikawa, Gen;Nakano, Hiroo;Satoh, Sakae
    • Proceedings of the Membrane Society of Korea Conference
    • /
    • 1996.10a
    • /
    • pp.18-21
    • /
    • 1996
  • Virus and DNA removal in bio-drug manufacturing processes has received a great deal of attention in recent years. Removing of a virus using a membrane process is a promising method, because inactivated virus can be removed from the bio-drug and the process can be used as an additional and security inactivation after the method of general heat-inactivation of the virus in the bio-drug. The FDA and the biopharmaceutical industry have recently announced strict guidelines for impurities of virus and DNA contamination. The regulatory guidelines on residual amounts of DNA in mammalian cell culture products require DNA contamination of less than 100 pg/dose. Therefore, permeation and rejection of DNA through the porous membranes have become important in the application of DNA removal in bio-drug manufacturing using membrane technology. In this study, the permeation of DNA and chromatin through regenerated cellulose hollow fibers that have a mean pore diameter of 15 nm was investigated.

  • PDF

Research Trends and Considerations for u-Healthcare Security in Wellness Services (웰니스 서비스의 u-Healthcare 보안 연구동향 및 고찰)

  • Oh, Hyun Seok;Joo, Jae Woong;Kang, Won Min;Yi, Gangman;Jeong, Hwa Young;Park, Jong Hyuk
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2014.11a
    • /
    • pp.457-459
    • /
    • 2014
  • 최근 Wellness 산업과 스마트 디바이스가 융합되면서 기존의 질병관리 체계보다 앞서 예방하는 건강관리 u-Healthcare 가 개발되고 있다. 하지만 u-Healthcare 에서 취급되는 개인정보 및 의료정보는 메시지 탈취/변조로 인해 공격자에게 악용되어 의료사고를 유발하고 환자의 생명까지 앗아갈 수 있으며 또한 프라이버시 침해로 인해 사용자의 신변을 보장 받을 수 없다. 본 논문에서는 웰니스 서비스의 u-Healthcare 보안의 고려사항과 연구동향에 대해 살펴보고 현재 u-Healthcare 분야에서 보안이 적용된 시스템에 대해 분석하고 취급되는 정보보호의 중요성에 대해 고찰한다.

Electrical Energy Production Using Biomass (바이오매스 기반 전기에너지 생산기술 동향 분석)

  • Jongseo Lee;Sang-Soo Han;Doyeun Kim;JuHyun Kim;Sangjin Park
    • New & Renewable Energy
    • /
    • v.19 no.1
    • /
    • pp.12-21
    • /
    • 2023
  • Governments and global companies are working towards using renewable sources of energy, such as solar, wind, and biomass, to reduce dependency on fossil fuels. In the defense sector, the new strategy seeks to increase the sustainable use of renewable energy sources to improve energy security and reduce military transportation. Renewable energy technologies are affected by factors such as climate, resources, and policy environments. Therefore, governments and global companies need to carefully select the optimal renewable energy sources and deployment strategies. Biomass is a promising energy source owing to its high energy density and ease of collection and harvesting. Many techniques have been developed to convert the biomass into electrical energy. Recently, diverse types of fuel cells have been suggested that can directly convert the chemical energy of biomass into electrical energy. The recently developed biomass flow fuel cell has significantly enhanced the power density several hundred times, reaching to ~100 mW/cm2. In this review, we explore various strategies for producing electrical energy from biomass using modern methods, and discuss the challenges and potential prospects of this method.

Assessment of the Impacts of Rice Self-sufficiency on National Rresources in Korea through Water-Energy-Food-Land Nexus Approach (물-에너지-식량-토지 넥서스를 통한 미래 쌀 수급 변화에 따른 자원별 이용량 변화 분석)

  • Lee, Sang-Hyun;Choi, Jin-Yong;Yoo, Seung-Hwan;Hur, Seung-Oh
    • Journal of The Korean Society of Agricultural Engineers
    • /
    • v.60 no.4
    • /
    • pp.93-103
    • /
    • 2018
  • The aim of this study is to apply the Water-Energy-Food-Land Nexus approach which can analyze the trade-offs among resources, and assess the holistic impacts of food security. First, we applied rice as a study crop and analyzed the trend of consumption of rice and the area of paddy fields. Second, the portfolios of water, energy, and land for rice production were constructed using data of footprints and productivity. Finally, the self-sufficiency ratio (SSR) of rice in target year was set as food security scenario and assessed the impacts of food security on water, energy, and land availability. In 2030, the SSR of rice decreased to 87 %, and water use for producing rice decreased from 4,728 to $3,350million\;m^3$, and the water availability index increased from 0.33 to 0.53. However, food security is essential issue and we set the 50 % and 100 % SSR of rice as high and low food security scenarios. For 100% SSR in 2030, about $3,508million\;m^3$ water was required and water availability index reached to 0.5. In other words, there is the trade-off between food security and water-energy-lands availability. Therefore, it is difficult to make a decision whether a high level of SSR is better or worse. However, this study showed the both positive and negative impacts by change of food security and it can be useful for setting the policy decision considering both food security and sustainable resource management at the same time.

Public Key Infrastructure of Electronic Bidding System using the Fingerprint Information (지문 정보를 이용한 공개키 기반의 전자입찰시스템)

  • Park, So-Ah;Chae, Cheol-Joo;Cho, Han-Jin;Lee, Jae-Kwang
    • The Journal of the Korea Contents Association
    • /
    • v.12 no.2
    • /
    • pp.69-77
    • /
    • 2012
  • In the case of the password-based PKI technology, because it protects by using the password which is easy that user memorizes the private key, he has the problem about the password exposure. In addition, in the system of electronic bidding, the illegal use using the authentic certificate of the others increases. Recently, in order to solve this problem, the research about the PKI technology using the biometrics is actively progressed. If the bio information which the user inputs for the bio authentication is converted to the template, the digest access authentication in which the security is strengthened than the existing authentication technology can be built. Therefore, in this paper, we had designed and developed the system of electronic bidding which it uses the most widely used fingerprint information in the biometrics, it stores the user fingerprint information and certificate in the fingerprint security token and can authenticate the user. In case of using the system of electronic bidding of the public key infrastructure using the fingerprint information proposed in this paper the agent bid problem that it uses the certificate of the others in not only user authentication intensification but also system of electronic bidding can be concluded.

Survey on Personal Information Encryption Technology (개인정보 암호화 기술에 관한 연구)

  • Kim, Ji Hyun;Lee, Dong Hoon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.10a
    • /
    • pp.769-772
    • /
    • 2012
  • Personal Information Article2 defines personal authentication information, secret information, bio information for personal information and it is stipulated under article29 that the one who have duties must take adequate technological, administrative, physical measures to prevent from illegal reading and sneaking. Also it is stipulated under information communication network law28(1), enforcement regulation9, Korea Communications Commitee notice. To satisfy this, the one who have to take security actions of personal information are required to take technological measures and establish positive measures to continuously manage it.The insurance of technological security is possible by encryption of personal information, secure management and operation of encryption key,taking personal information security level of providin access control of personal information reading and audit.In this paper, we will analyze various technologies of personal information encryption which are essencial component in technological security measuresof personal information. This paper will help choose which technological measures you should take in personal information security.

  • PDF