• Title/Summary/Keyword: Cloud services

Search Result 1,013, Processing Time 0.024 seconds

The Conceptual Model of a SNS Platform for Co-creation (Co-creation을 위한 SNS 플랫폼의 개념 모델)

  • Hong, Soon-Goo;Kim, Hyun-Jong;Choi, Hyung-Rim
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.17 no.3
    • /
    • pp.95-104
    • /
    • 2012
  • The companies have employed SNS for marketing, promotion, and customer relationship management. The SNS is a good tool to collect customers' opinions and to collaborate with internal and external employees, however, the function of SNS are limited in implementing a co-creation. Therefore, the purpose of this research is to suggest a SNS platform for co-creation that creates a corporate's values with customers. For this purpose, the limitations of SNS are defined and the new platform of the SNS is suggested. The proposed platform has 3 modules including integration of applications, cloud services, and integration to applications operated by companies. With a scenario method the suggested platform was validated. This is one of pioneer studies in co-creation.

Malware Behavior Analysis based on Mobile Virtualization (모바일 가상화기반의 악성코드 행위분석)

  • Kim, Jang-Il;Lee, Hee-Seok;Jung, Yong-Gyu
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.2
    • /
    • pp.1-7
    • /
    • 2015
  • As recent smartphone is used around the world, all of the subscribers of the mobile communication is up to 47.7% about 24 million people. Smartphone has a vulnerability to security, and security-related incidents are increased in damage with the smartphone. However, precautions have been made, rather than analysis of the infection of most of the damage occurs after the damaged except for the case of the expert by way of conventional post-countermeasure. In this paper, we implement a mobile-based malware analysis systems apply a virtualization technology. It is designed to analyze the behavior through it. Virtualization is a technique that provides a logical resources to the guest by abstracting the physical characteristics of computing resources. The virtualization technology can improve the efficiency of resources by integrating with cloud computing services to servers, networks, storage, and computing resources to provide a flexible. In addition, we propose a system that can be prepared in advance to buy a security from a user perspective.

A Case study on the Utilization of Emulation Based Network Testbeds (에뮬레이션 기반 테스트베드 활용 사례 연구)

  • Lee, Minsun;Yoo, Kwan-Jong
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.9
    • /
    • pp.61-67
    • /
    • 2018
  • Emulab software was developed by the team of University of Utah and it has been replicated at dozens of other sites in the world. Although KREONET Emulab, which established by the Korea Institute of Science and Technology Information, has only a modest number of compute nodes it has been provided an ideal playground to conduct various research for network protocols, cyber security and convergence research. A testbed is a critical enabler of experimental research and researchers only carry out the experiments that are supported by the testbed. This paper outlines the Utah Emulab's status and use types among the last 10 years of operation results and compares them with the ones with the KREONET Emulab. In addition, Testbed-as-a-Service(TaaS) is discussed to upgrade the testbed for the convergence research community services.

A Study on Security Improvement in Hadoop Distributed File System Based on Kerberos (Kerberos 기반 하둡 분산 파일 시스템의 안전성 향상방안)

  • Park, So Hyeon;Jeong, Ik Rae
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.5
    • /
    • pp.803-813
    • /
    • 2013
  • As the developments of smart devices and social network services, the amount of data has been exploding. The world is facing Big data era. For these reasons, the Big data processing technology which is a new technology that can handle such data has attracted much attention. One of the most representative technologies is Hadoop. Hadoop Distributed File System(HDFS) designed to run on commercial Linux server is an open source framework and can store many terabytes of data. The initial version of Hadoop did not consider security because it only focused on efficient Big data processing. As the number of users rapidly increases, a lot of sensitive data including personal information were stored on HDFS. So Hadoop announced a new version that introduces Kerberos and token system in 2009. However, this system is vulnerable to the replay attack, impersonation attack and other attacks. In this paper, we analyze these vulnerabilities of HDFS security and propose a new protocol which complements these vulnerabilities and maintains the performance of Hadoop.

Image Security System Using Push Server and Smart Device (푸시 서버와 스마트 디바이스를 이용한 영상보안 시스템)

  • Park, Seung-Hwan;Oh, U-Chul;Kim, Chang-Bok
    • Journal of Advanced Navigation Technology
    • /
    • v.18 no.6
    • /
    • pp.588-593
    • /
    • 2014
  • Recently, the smart devices has been possessed by a large majority of the adult, and offered various personalization services. This paper proposed the lightweight Intelligent Image Security System that notice the existence of any intruder in real time at the place of requiring the security by using smart device. The proposed image security system recognized whether or not intruder exists using the difference frame on the basis of Integral Image and the dynamic background updating algorithms. The intrusion notification is achieved by using the GCM push server that send massages in the application unit of user mobile device, and the SMTP mail server which is use of e-mail standard protocol. In case of the occurrence of intruder, GCM push server send an push-massage by the private mobile device, and SMTP mail server send the intruder's photograph and intrusion time. By the convergence of the various image processing algorithms and the performance of smart device, The proposed image security system can be applied to the various Intelligent Image Security field.

OTP-Based Dynamic Authentication Framework for Virtual Machine Migration (가상머신 마이그레이션을 위한 OTP 기반 동적인증 프레임워크)

  • Lee, Eun-Ji;Park, Choon-Sik;Kwak, Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.2
    • /
    • pp.315-327
    • /
    • 2017
  • Security threats such as unauthorized access and data tampering can occur during the virtual machine migration process. In particular, since virtual machine migration requires users to transfer important data and infrastructure information, it is relatively risky to other cloud services in case of security threats. For this reason, there is a need for dynamic authentication for virtual machine migration. Therefore, this paper proposes an OTP-based dynamic authentication framework to improve the vulnerabilities of the existing authentication mechanism for virtual machine migration. It consists of a virtual machine migration request module and an operation module. The request module includes an OTP-based user authentication process and a migration request process to a data center when a user requests a migration. The operation module includes a secure key exchange process between the data centers using SPEKE and a TOTP-based mutual authentication process between the data center and the physical server.

Service Function Chaining Architecture for Distributed 5G Mobile Core Networks (분산 모바일 코어기반 5G 네트워크에서의 Service Function Chaining 적용구조)

  • Sun, Kyoungjae;Kim, Younghan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.12
    • /
    • pp.1914-1924
    • /
    • 2016
  • In this paper, considering virtualized Evolved Packet Core(vEPC) network for 5G mobile network, we propose architecture for supporting Service Function Chaining(SFC) in 5G mobile network. Using SFC in 5G network, dynamic path configuration and providing network services based on subscriber and traffic information. SFC technology provides logical ordered set of network functions and delivers packet through providing logical path over the physical network. Based on the perspective of 5G core network in distributed manner, we design hierarchical SFC architecture to manage SFC for global path including vEPC and SGi-LAN network, and internal path between virtualized network functions in each cloud. In this paper, we define architecture and call flow for establishing data path using SFC. Finally, we design testbed architecture for real implementation based on open source software.

A Study on the Effect of HMD VR Technology on Design Application: Focusing on 3DEXPERIENCE Platform VR (HMD VR 기술이 디자인 활용에 미치는 영향에 관한 연구: 3DEXPERIENCE 플랫폼의 VR을 중심으로)

  • Lee, Kyoung-Soon;Yoon, Jeong Shick
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.4
    • /
    • pp.49-55
    • /
    • 2020
  • Recently, companies are growing by introducing rational and optimized technology for all processes, including design. In particular, the emergence of ICT-based cloud platforms has given rise to solutions that are equipped with all the necessary business services in corporations and schools, affecting technical education and corporate growth that have not been experienced thus far. The virtual reality technology and convergence of HMD devices utilizing this platform is a new turning point in corporate development. Therefore, this study tested the VR functions used in design based on 3DEXP and HMD VR devices. Second, design utilization and this issue were examined through a survey based on the experimental data. The results showed that 3DEXP and HMD VR technologies are closely related in terms of design utilization and have demonstrated their mediated effects through statistical analysis. Nevertheless, it is not enough to generalize some engineering students as a result of the study. On the other hand, the introduction of HMD VR technology is one of the pillars of education and the implementation of virtual reality technology.

Economic Evaluation Analysis of Effect of Train Freight Car Safety Transport Integrated Quality Management System Based on Internet of Things(IoT) (IoT기반 철도 화차 안전운송 통합 품질관리시스템에 관한 경제성 평가지표 분석)

  • Won, Jong-Un;Yoon, Chiho;Park, Sang-Chan
    • Journal of Korean Society for Quality Management
    • /
    • v.44 no.4
    • /
    • pp.869-881
    • /
    • 2016
  • Purpose: The objective of this study is to verify the economic validation of quality management integrated train freight car by analyzing economic evaluation indicators such as benefit and cost, net present value, and inter rate of return. Methods: First, we itemize benefit and cost field by reviewing literatures; Benefit consists of 1)Safety, 2)Operation, and 3)Maintenance; Cost consists of 1)Set-up fee, 2)Wireless internet fee, and 3)Cloud storage using fee. Second, based on these estimated values, we conduct an economic evaluation analysis. Among them, benefit and cost, net present value, and internal rate of return are selected. Results: As a result, all estimated values are highly over criterion of economic validity($$B/C{\geq}_-1$$, $$NPV{\geq}_-0$$, $$IRR{\geq}_-R$$); 1)benefit over cost ratio is 28.22, 2)Net present value is 8,121.66million KRW, and 3)Internal rate of return value is 2272%. Conclusion: The findings of this study will help making a decision when train industry adopts IoT technology for improving the effectiveness.

COMPARISON OF SUB-SAMPLING ALGORITHM FOR LRIT IMAGE GENERATION

  • Bae, Hee-Jin;Ahn, Sang-Il
    • Proceedings of the KSRS Conference
    • /
    • 2007.10a
    • /
    • pp.109-113
    • /
    • 2007
  • The COMS provides the LRIT/HRIT services to users. The COMS LRIT/HRIT broadcast service should satisfy the 15 minutes timeliness requirement. The requirement is important and critical enough to impact overall performance of the LHGS. HRIT image data is acquired from INRSM output receiving but LRIT image data is generated by sub-sampling HRIT image data in the LHGS. Specially, since LRIT is acquired from sub-sampled HRIT image data, LRIT processing spent more time. Besides, some of data loss for LRIT occurs since LRIT is compressed by lossy JPEG. Therefore, algorithm with the fastest processing speed and simplicity to be implemented should be selected to satisfy the requirement. Investigated sub-sampling algorithm for the LHGS were nearest neighbour algorithm, bilinear algorithm and bicubic algorithm. Nearest neighbour algorithm is selected for COMS LHGS considering the speed, simplicity and anti-aliasing corresponding to the guideline of user (KMA: Korea Meteorological Administration) to maintain the most cloud itself information in a view of meteorology. But the nearest neighbour algorithm is known as the worst performance. Therefore, it is studied in this paper that the selection of nearest neighbour algorithm for the LHGS is reasonable. First of all, characteristic of 3 sub-sampling algorithms is studied and compared. Then, several sub-sampling algorithm were applied to MTSAT-1R image data corresponding to COMS HRIT. Also, resized image was acquired from sub-sampled image with the identical sub-sampling algorithms applied to sub-sampling from HRIT to LRIT. And the difference between original image and resized image is compared. Besides, PSNR and MSE are calculated for each algorithm. This paper shows that it is appropriate to select nearest neighbour algorithm for COMS LHGS since sub-sampled image by nearest neighbour algorithm is little difference with that of other algorithms in quality performance from PSNR.

  • PDF