• Title/Summary/Keyword: Blockchain information

Search Result 759, Processing Time 0.023 seconds

A Study on the Implementation of a Web-browser-based Global e-Navigation Service Discovery System for Decentralized Maritime Service Registries (탈중앙화 MSR 환경에서의 웹 브라우저 기반 글로벌 이내비게이션 서비스 검색 시스템 구현에 대한 연구)

  • Jinki, Jung;Young-Joong, Ahn
    • Journal of Navigation and Port Research
    • /
    • v.46 no.6
    • /
    • pp.501-508
    • /
    • 2022
  • The flow of global digitalization is leading to the emergence of a decentralized system environment based on blockchain or distributed ledger technology in the fields of economy, identity authentication, and logistics. Accordingly, a requirement that public services be searchable from several decentralized maritime service registries (MSRs) has been derived in terms of the discoverability of e-navigation services. This study describes a decentralized MSR environment composed of the MSR ledger and multiple local MSRs, and it has implemented a service search system that can search global e-navigation services in the environment through a web browser. This system is a decentralized application that dynamically generates service attributes, geometry information, and free text queries, and that provides users with relevant MSR and service access information from search results that are registered in the MSR ledger. In this study, we tested the established decentralized MSR environment and the system that performs service search within that environment, and we discussed its advantages and limitations.

A Predictive Virtual Machine Placement in Decentralized Cloud using Blockchain

  • Suresh B.Rathod
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.4
    • /
    • pp.60-66
    • /
    • 2024
  • Host's data during transmission. Data tempering results in loss of host's sensitive information, which includes number of VM, storage availability, and other information. In the distributed cloud environment, each server (computing server (CS)) configured with Local Resource Monitors (LRMs) which runs independently and performs Virtual Machine (VM) migrations to nearby servers. Approaches like predictive VM migration [21] [22] by each server considering nearby server's CPU usage, roatative decision making capacity [21] among the servers in distributed cloud environment has been proposed. This approaches usage underlying server's computing power for predicting own server's future resource utilization and nearby server's resource usage computation. It results in running VM and its running application to remain in waiting state for computing power. In order to reduce this, a decentralized decision making hybrid model for VM migration need to be proposed where servers in decentralized cloud receives, future resource usage by analytical computing system and takes decision for migrating VM to its neighbor servers. Host's in the decentralized cloud shares, their detail with peer servers after fixed interval, this results in chance to tempering messages that would be exchanged in between HC and CH. At the same time, it reduces chance of over utilization of peer servers, caused due to compromised host. This paper discusses, an roatative decisive (RD) approach for VM migration among peer computing servers (CS) in decentralized cloud environment, preserving confidentiality and integrity of the host's data. Experimental result shows that, the proposed predictive VM migration approach reduces extra VM migration caused due over utilization of identified servers and reduces number of active servers in greater extent, and ensures confidentiality and integrity of peer host's data.

Self-Sovereign Identity Management: A Comparative Study and Technical Enhancements

  • Noot A. Alissa;Waleed A. Alrodhan
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.12
    • /
    • pp.27-80
    • /
    • 2023
  • Nowadays usage of different applications of identity management IDM demands prime attention to clarify which is more efficient regarding preserve privacy as well as security to perform different operations concerning digital identity. Those operations represent the available interactions with identity during its lifecycle in the digital world e.g., create, update, delete, verify and so on. With the rapid growth in technology, this field has been evolving with a number of IDM models being proposed to ensure that identity lifecycle and face some significant issues. However, the control and ownership of data remines in the hand of identity service providers for central and federated approaches unlike in the self-sovereign identity management SSIM approach. SSIM is the recent IDM model were introduced to solve the issue regarding ownership of identity and storing the associated data of it. Thus, SSIM aims to grant the individual's ability to govern their identities without intervening administrative authorities or approval of any authority. Recently, we noticed that numerous IDM solutions enable individuals to own and control their identities in order to adapt with SSIM model. Therefore, we intend to make comparative study as much of these solutions that have proper technical documentation, reports, or whitepapers as well as provide an overview of IDM models. We will point out the existing research gaps and how this study will bridge it. Finally, the study will propose a technical enhancement, everKEY solution, to address some significant drawbacks in current SSIM solutions.

A Study on the Introductioin of Data Trusts System to Expand the Rights of Privacy Self-Determination (개인정보 자기결정권 확대를 위한 데이터 신탁제도 도입 방안 연구)

  • Jang, Keunjae;Lee, Seungyong
    • Journal of Intelligence and Information Systems
    • /
    • v.28 no.1
    • /
    • pp.29-43
    • /
    • 2022
  • With the advent of the Internet and the development of mobile digital devices such as smartphones and tablet PCs, the communication service paradigm began to shift from existing voice services to data services. Recently, as social network services (SNS) are activated and 4th industrial revolution technologies centered on ICT (Information and Communication Technologies) such as Big Data, Blockchain, Cloud, and 5G/6G are rapidly developed, the amount of shared data type and the amount of data are increasing rapidly. As the transition to a digital society begins actively, the importance of using data information, as well as the economic and social values of personal information are becoming increasingly important. As a result, they are actively discussing policies to revitalize the data information industry around the world and ways to efficiently obtain, analyze, and utilize increasingly diverse and vast data, as well as to protect/guarantee the rights of information subjects (providers) in various fields such as society, culture, economy, and politics.. In this paper, in order to improve the self-determination right of personal information on data produced by information subjects, and further expand the use of safe data and the data economy, a differentiated data trusts system was considered and suggested. In addition, the components and data trusts procedures necessary to efficiently operate the data trusts system in Korea were considered, and the non-profit data trusts system and the for-profit data trusts system were considered as a way to flexibly operate the data trusts system. Furthermore, the legal items necessary for the implementation of the data trusts system were investigated and considered. In this paper, in order to propose a domestic data trusts system, cases related to existing data trusts systems such as the United States, Japan, and Korea were reviewed and analyzed. In addition, in order to prepare legislation necessary for the data trusts system, data-related laws in major countries and domestic legal and policy trends were reviewed to study the rights that conflict or overlap with existing laws, and differences were investigated and considered. The Data trusts system proposed in this paper is a reasonable system that is expected to recognize the asset value of data in the capitalist market economy system, to provide legitimate compensation for data produced by data subjects, and further to contribute greatly to the use of safe data and creation of a new service market.

Comparison of Research Performance Between Domestic and International Library and Information Science Scholars (국제 및 국내 문헌정보학 분야의 연구성과 비교 분석)

  • Yang, Kiduk;Kim, SeonWook;Lee, HyeKyung
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.55 no.1
    • /
    • pp.365-392
    • /
    • 2021
  • In order to assess the state of library and information science (LIS) research in Korea, the study analyzed bibliometric data of papers published in past 18 years in Korea Citation Index (KCI) and Social Science Citation Index (SSCI) journals. The analysis of study data, which consisted of 6,301 KCI journal papers with 26,474 citations and 86,727 SSCI journal papers with 1,196,961 citations from 2002 to 2020, involved comparison of research productivity and impact, collaboration trends, and key areas of research between domestic and international LIS scholars with normalizations by units of analysis for size differences. Even with size normalization, the study found a marked difference in citation patterns between domestic and international LIS research. Korean LIS authors were twice as productive as international LIS authors but a little over a half as impactful. The results also showed a much higher level of skewness in international research, where a fraction of top authors, institutions, and journals received a lion's share of citations. The trend of increasing co-authorship was much more pronounced among international publication, where the recent popularity of larger collaboration groups suggests multi-disciplinary and increasingly complex nature of modern LIS research in the world stage. The keyword analysis revealed a much more diverse subject area in international than domestic LIS research with a recent shift towards technology, such as big data, blockchain, and altmetrics. Keywords in SSCI journals also exhibited a less connection between popularity and impact than KCI keywords, where popular keywords did not necessarily correspond to impactful keywords.

Digtal Healthcare Research Trend based on Social Media Data (소셜미디어 데이터에 기반한 디지털 헬스케어 연구 동향)

  • Lee, Taekkyeun
    • The Journal of the Korea Contents Association
    • /
    • v.20 no.3
    • /
    • pp.515-526
    • /
    • 2020
  • Digital healthcare is a combined area of medical field and IT and various information on digital healthcare is provided in social media. This study aims to find the research trend of digital healthcare by collecting and analyzing data related to digital healthcare through the social media. The data were collected from Naver and Daum's news and blogs from January 2008 to June 2019. Major keywords with high frequency were extracted and visualized with wordcloud and network analysis was used to analyze the relationship between major keywords. Research combining medical field and IT from 2008 to 2001, various convergence research based on medical field and IT from 2012 to 2015, convergence research that applied the 4th industrial revolution technologies such as big data, blockchain and AI were actively conducted from 2016 to June 2019.

A study on stock price prediction system based on text mining method using LSTM and stock market news (LSTM과 증시 뉴스를 활용한 텍스트 마이닝 기법 기반 주가 예측시스템 연구)

  • Hong, Sunghyuck
    • Journal of Digital Convergence
    • /
    • v.18 no.7
    • /
    • pp.223-228
    • /
    • 2020
  • The stock price reflects people's psychology, and factors affecting the entire stock market include economic growth rate, economic rate, interest rate, trade balance, exchange rate, and currency. The domestic stock market is heavily influenced by the stock index of the United States and neighboring countries on the previous day, and the representative stock indexes are the Dow index, NASDAQ, and S & P500. Recently, research on stock price analysis using stock news has been actively conducted, and research is underway to predict the future based on past time series data through artificial intelligence-based analysis. However, even if the stock market is hit for a short period of time by the forecasting system, the market will no longer move according to the short-term strategy, and it will have to change anew. Therefore, this model monitored Samsung Electronics' stock data and news information through text mining, and presented a predictable model by showing the analyzed results.

Real Time SW Sizing Model for FP-Based Fintech Software Development Project (FP 기반의 핀테크 소프트웨어 개발 프로젝트 실시간 규모 산정 모델)

  • Koo, Kyung-Mo;Yoon, Byung-Un;Kim, Dong-Hyun
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.10
    • /
    • pp.36-44
    • /
    • 2021
  • Estimation on SW Sizing applied to fintech is very difficult, a task requiring long time, it is difficult for client companies and developer companies to accurately calculate the size of software development. The size is generally estimated based on the experience of project managers and the general functional scoring method. In this paper, propose a model that can be applied to fintech development projects by quantitatively calculating the required functions from the user's point of view, measuring the scale, and calculating the scale in real time. Through the proposed model, the amount of work can be estimated prior to development and the size can be measured, and the M/M and the estimated quotation amount can be calculated based on the program list by each layer. In future studies, by securing size computation data on existing the Fintech Project in mass, research on accurate size computation would be required.

Taking all the Glory of Regional News Media by Seoul-based ones: A YouTube Interview Reporting Case of TV Maeil Shimnum (네트워크 미디어 유튜브에 나타난 서울중심 언론의 지역 언론 콘텐츠 전재: TV매일신문의 원희룡부인 인터뷰 사례 분석)

  • Park, Han Woo;Yoon, Ho Young
    • The Journal of the Korea Contents Association
    • /
    • v.22 no.6
    • /
    • pp.135-144
    • /
    • 2022
  • This study explores that how the logic of network power in the existing digital content distribution structure works against local media. The limitless citation of local media content, in particular, is becoming more common in order to profit from network traffic while not giving appropriate remuneration for local media content. This study tried to demonstrate how network media dominance alienates local media material by using YouTube network analysis of TV Maile Shinmun. According to the research result, it was found that major news media tends to take profits from the local media interview by not properly indicating the source video, or reporting the core content of the local media interview, making it unnecessary to look for the original video source. Despite the viewpoint that the digital environment presents opportunities for local media, the current network logic would not benefit local media, which calls for the need that the digital content distribution strategy of local media develops a new order such as NFT, one of blockchain-based monetary system.h the help of information technology.

An Encrypted Botnet C&C Communication Method in Bitcoin Network (비트코인 네크워크에서의 암호화된 봇넷 C&C 통신기법)

  • Kim, Kibeom;Cho, Youngho
    • Journal of Internet Computing and Services
    • /
    • v.23 no.5
    • /
    • pp.103-110
    • /
    • 2022
  • Botnets have been exploited for a variety of purposes, ranging from monetary demands to national threats, and are one of the most threatening types of attacks in the field of cybersecurity. Botnets emerged as a centralized structure in the early days and then evolved to a P2P structure. Bitcoin is the first online cryptocurrency based on blockchain technology announced by Satoshi Nakamoto in 2008 and is the most widely used cryptocurrency in the world. As the number of Bitcoin users increases, the size of Bitcoin network is also expanding. As a result, a botnet using the Bitcoin network as a C&C channel has emerged, and related research has been recently reported. In this study, we propose an encrypted botnet C&C communication mechanism and technique in the Bitcoin network and validate the proposed method by conducting performance evaluation through various experiments after building it on the Bitcoin testnet. By this research, we want to inform the possibility of botnet threats in the Bitcoin network to researchers.