• Title/Summary/Keyword: Context-aware Security

Search Result 49, Processing Time 0.026 seconds

An automatic Notification Service Using the OSGi Service Platform and SMS module

  • Kang, Kyu-Chang;Kang, Dong-Oh;Lee, Jeon-Woo
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2002.10a
    • /
    • pp.55.1-55
    • /
    • 2002
  • In the era of home automation, we need more context-aware and intelligent service applications than before. For these applications, a service gateway as a platform is required to bridge the gap between external data networks to internal home networks. Also, the sonics gateway enables customers to receive new classes of home services. The OSGi service platform is a good solution for the service gateway since it can deliver new applications dynamically from a broader network. In the near future, every home will be equipped with a residential gateway powered by the OSGi, and will demand value-added service applications, such as home security monitoring and safety alerts. In this pa...

  • PDF

Security Problems for Ubiquitous Computing Frameworks (편재 컴퓨팅 기반에서의 보안 문제)

  • Kim, Hyung-Chan;Shin, Wook;Lee, Dong-Ik
    • Annual Conference of KIPS
    • /
    • 2002.04b
    • /
    • pp.895-898
    • /
    • 2002
  • 현재 활발하게 진행되고 있는 편재 컴퓨팅을 위한 기반에 대한 연구들은, 문맥-인식(Context-Aware) 어플리케이션 및 이를 지원하는 서비스 컴포넌트들을 기반으로 하는 능동 공간(Active Spaces, Smart Spaces)[1][2]을 규모 있게 구현할 수 있도록 해준다. 이러한 기반들의 근간에는 편재 컴퓨팅 디바이스들간의 통신을 위한 분산 서비스가 자리잡게 되며, 환경 내에 있는 주체들과 객체들간의 상호 작용이 이러한 분산 서비스를 통하여 이루어진다. 본 논문에서는 능동 공간을 위한 기반에 대한 설명과 이와 관련한 연구들을 소개하고 공간 내에 있는 주체와 객체들 사이에서 일어날 수 있는 보안 문제에 대한 고려사항을 살펴본다. 또한 편재 컴퓨팅 환경 기반의 보안 서비스를 위한 인증 및 접근 통제 컴포넌트를 제안한다.

  • PDF

A Study on Security Association Based on Context-Aware for Privacy Protection in U-City (U-City 환경에서의 개인정보보호 향상을 위한 상황인지기반 보안 기법 연구)

  • Lee, Jun-Gyu;Lee, Chang-Hun;Kim, Ji-Ho;Song, Oh-Young
    • Annual Conference of KIPS
    • /
    • 2008.05a
    • /
    • pp.1132-1134
    • /
    • 2008
  • 현재 우리나라는 미래형 첨단도시, U-City구현을 현실화 하고 있다. 유비쿼터스 기반기술이 총망라되는 U-City의 건설은 우리에게 편리하고 윤택한 삶을 약속하지만 U-City속의 수많은 유 무선 단말을 통해 수집되는 개인이나 사물, 환경에 대한 정보는 전자감시에 대한 우려와 이용자 프라이버시 침해를 유발하는 원인이 될 수 있으며 그에 심각성은 작금의 정보화 사회에 비할 수 없이 클 것으로 예상된다. 이에 본 논문에서는 U-City에서 발생할 수 있는 개인정보 침해위협을 통합적으로 살펴보고 개인정보보호 향상을 위한 보안 기법을 연구하였다.

User Dynamic Access Control for Privacy Protection in Smart Home (스마트 홈에서 프라이버시 보호를 위한 사용자 동적 접근제어)

  • Cho, Do-eun;Kim, Si-jung
    • Journal of Platform Technology
    • /
    • v.6 no.3
    • /
    • pp.17-22
    • /
    • 2018
  • Smart home is a technology for monitoring and controlling all the information about a house by integrating various home applications like cooling, heating, lighting, kitchen and security systems into a network. Although home appliances have become more convenient to use due to the development of smart home technology, they are also more vulnerable to information security hazards. Unauthorized visitors may have access to any of home appliance to arbitrarily control it or acquire information. This causes serious privacy and security problems, which should be solved to further smart home technology. This present paper proposed a dynamic user access control system for privacy protection in smart homes. The proposed system defines the role of a user of smart home services by automatically identifying the status information of the user and dynamically controls the access range for the service. In this way, the privacy of a user can be protected and the inter-smart device service is effectively provided. Consequently, the proposed dynamic user access control for smart home will improve the security service for protecting privacy in smart home devices.

Computational Analytics of Client Awareness for Mobile Application Offloading with Cloud Migration

  • Nandhini, Uma;TamilSelvan, Latha
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.11
    • /
    • pp.3916-3936
    • /
    • 2014
  • Smartphone applications like games, image processing, e-commerce and social networking are gaining exponential growth, with the ubiquity of cellular services. This demands increased computational power and storage from mobile devices with a sufficiently high bandwidth for mobile internet service. But mobile nodes are highly constrained in the processing and storage, along with the battery power, which further restrains their dependability. Adopting the unlimited storage and computing power offered by cloud servers, it is possible to overcome and turn these issues into a favorable opportunity for the growth of mobile cloud computing. As the mobile internet data traffic is predicted to grow at the rate of around 65 percent yearly, even advanced services like 3G and 4G for mobile communication will fail to accommodate such exponential growth of data. On the other hand, developers extend popular applications with high end graphics leading to smart phones, manufactured with multicore processors and graphics processing units making them unaffordable. Therefore, to address the need of resource constrained mobile nodes and bandwidth constrained cellular networks, the computations can be migrated to resourceful servers connected to cloud. The server now acts as a bridge that should enable the participating mobile nodes to offload their computations through Wi-Fi directly to the virtualized server. Our proposed model enables an on-demand service offloading with a decision support system that identifies the capabilities of the client's hardware and software resources in judging the requirements for offloading. Further, the node's location, context and security capabilities are estimated to facilitate adaptive migration.

Exploring the dynamic knowledge structure of studies on the Internet of things: Keyword analysis

  • Yoon, Young Seog;Zo, Hangjung;Choi, Munkee;Lee, Donghyun;Lee, Hyun-woo
    • ETRI Journal
    • /
    • v.40 no.6
    • /
    • pp.745-758
    • /
    • 2018
  • A wide range of studies in various disciplines has focused on the Internet of Things (IoT) and cyber-physical systems (CPS). However, it is necessary to summarize the current status and to establish future directions because each study has its own individual goals independent of the completion of all IoT applications. The absence of a comprehensive understanding of IoT and CPS has disrupted an efficient resource allocation. To assess changes in the knowledge structure and emerging technologies, this study explores the dynamic research trends in IoT by analyzing bibliographic data. We retrieved 54,237 keywords in 12,600 IoT studies from the Scopus database, and conducted keyword frequency, co-occurrence, and growth-rate analyses. The analysis results reveal how IoT technologies have been developed and how they are connected to each other. We also show that such technologies have diverged and converged simultaneously, and that the emerging keywords of trust, smart home, cloud, authentication, context-aware, and big data have been extracted. We also unveil that the CPS is directly involved in network, security, management, cloud, big data, system, industry, architecture, and the Internet.

Introducing Smart Learning Framework in the Digital World: Towards the Enhancement of Technology-Driven Innovation of Arabic Smart Learning

  • Alkhammash, Eman H.
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.11
    • /
    • pp.331-337
    • /
    • 2022
  • Smart learning is augmented with digital, context-aware, and adaptable technologies to encourage students to learn better and faster. To ensure that digital learning is successful and that implementation is efficient, it is critical that the dimensions of digital learning are arranged correctly and that interactions between the various elements are merged in an efficient and optimal manner. This paper builds and discusses a basic framework for smart learning in the digital age, aimed to improve students' abilities and performance in learning. The proposed framework consists of five dimensions: Teacher, Technology, Learner, Digital content, and Evaluation. The Teacher and Learner dimensions operate on two levels: (a) an abstract level to fit in knowledge and skills or interpersonal characteristics and (b) a concrete level in the form of digital devices used by teachers and learners. Moreover, this paper proposes asynchronous online course delivery model. An Arabic smart learning platform has been developed, based on these smart learning core dimensions and the asynchronous online course delivery model, because despite the official status of this language in many countries, there is a lack of Arabic platforms to teach Arabic. Moreover, many non-native Arabic speakers around the world have expressed an interest in learning it. The Arabic digital platform consists of over 70 lessons classified into three competence levels: beginner, intermediate, and advanced, delivered by Arabic experts and Arabic linguists from various Arab countries. The five dimensions are described for the Arabic platform in this paper. Learner dimension is the Arabic and non-Arabic speakers, Teacher dimension is Arabic experts and Arabic linguistics, Technology dimension consists of technology for Arabic platform that includes web design, cloud computing, big data, etc. The digital contents dimension consists of web-based video, records, etc. The evaluation dimension consists of Teachers rating, comments, and surveys.

Malaysia's 13th General Election: Sabah-Barisan Nasional Fixed-Deposit State? (말레이시아 13대 총선: 사바주(Sabah)는 국민전선의 텃밭인가?)

  • ZAINI, Othman;EKO, Prayitno Joko;RAMLI, Dollah;AMRULLAH, Maraining;KIM, Jong Eop
    • The Southeast Asian review
    • /
    • v.26 no.3
    • /
    • pp.91-118
    • /
    • 2016
  • As all are aware, the results of the Malaysia 12th General Election (GE-12) in 2008 have surprised many. Not only the dominant parties Barisan Nasional (BN) were shocked by the loss of significant numbers of seats but for the first time in the history of Malaysia politics, vis-${\grave{a}}$-vis, electoral affairs, they were denied a two-thirds majority in the Parliament. Notwithstanding the opposition parties such as Parti Islam Se-Malaysia (PAS), Democratic Action Party (DAP) and Parti Keadilan Rakyat (PKR: The People's Justice Party) that form the opposition coalition called Pakatan Rakyat (People's Alliance: PR), has come to a surprised with the GE-12 result, in which they not even think that were able to challenge hegemonic politics of BN, managed to capture and formed a government at the state level namely Kedah, Penang, Perak, and Selangor, except Kelantan which has been under the control of PAS since the 1990 general election. This article aims to analyze whether Sabah as a "fixed deposit"state is still relevant in understanding the continuity and survival of the BN political hegemony in the context of Malaysia political developments post-13th general election.

Examining the Influencing Factors of Third-Party Mobile Payment Adoption: A Comparative Study of Alipay and WeChat Pay

  • Mu, Hong-Lei;Lee, Young-Chan
    • The Journal of Information Systems
    • /
    • v.26 no.4
    • /
    • pp.247-284
    • /
    • 2017
  • Purpose The first purpose of this study is to investigate factors that are likely to influence user's intention to adopt third-party mobile payment platform. A comprehensive study about mobile payment services have used various variables to explain user's use intention based on the theory of reasoned action (TRA) or the theory of planned behavior (TPB). Variables such as simplicity, security, costs, relative advantage, individual mobility, subjective norm, trust, satisfaction, attitude towards use, perceived usefulness, perceived ease of use and so on. Among these factors, we expect to find out the most influential factors effecting user's use intention of the third-party mobile payment services. Second, we also examine whether the most influential factors have the same influence to different third-party mobile payment services by conducting comparative study of Alipay and WeChat Pay. Design/methodology/approach Empirical data for this study were collected from Chinese who has the experience using or have used Alipay or WeChat Pay. Participants needed to be familiar with Alipay or WeChat Pay because such users may be more aware of both the advantages and disadvantages of Alipay and WeChat Pay. We conduct a pilot test using Smart PLS 2.0, which includes 50 Alipay users and 82 WeChat Pay users. The result indicates that all the measurement fit for the context. And then 980 questionnaires were mainly sent out to the college students and the e-mails users randomly. To encourage participation, we give the participants a small gift as a present. Finally, we received a total of 683 replied. Data from respondents who gave incomplete or invalid answers were excluded to assure the validity of the constructs. 79 questionnaires were rejected, finally the valid data are 604 (with 372 Alipay users and 232 WeChat Pay users). Findings The results suggest that users' intention is determined by their trust on third-party mobile payment service and perceived usefulness of use. Comparative study results also indicated that the factors have different influence on Alipay group and WeChat Pay group, which offers a new aspect for academic field, and provides useful information to mobile payment service providers in China.