• Title/Summary/Keyword: Controlling the Access

Search Result 186, Processing Time 0.025 seconds

User Dynamic Access Control Mechanism Using Smart Contracts in Blockchain Environment (블록체인 환경에서 스마트 컨트랙트를 활용한 사용자 동적 접근제어 메커니즘)

  • Cho, Do-Eun
    • Journal of Platform Technology
    • /
    • v.9 no.1
    • /
    • pp.46-57
    • /
    • 2021
  • Recently, research has been actively conducted to utilize blockchain technology in various fields. In particular, blockchain-based smart contracts are applied to various automation systems that require reliability as they have the characteristics of recording data in a distributed ledger environment to verify the integrity and validity of data. However, blockchain does not provide data access control and information security because data is shared among network participants. In this paper, we propose a user dynamic access control mechanism utilizing smart contracts in blockchain environments. The proposed mechanism identifies the user's contextual information when accessing data, allocating the user's role and dynamically controlling the data access range. This can increase the security of the system and the efficiency of data management by granting data access dynamically at the time of user authentication, rather than providing the same services in roles assigned to each user group of the network system. The proposed mechanism is expected to provide flexible authentication capabilities through dynamic data access control by users to enhance the security of data stored within blockchain networks.

User Dynamic Access Control for Privacy Protection in Smart Home (스마트 홈에서 프라이버시 보호를 위한 사용자 동적 접근제어)

  • Cho, Do-eun;Kim, Si-jung
    • Journal of Platform Technology
    • /
    • v.6 no.3
    • /
    • pp.17-22
    • /
    • 2018
  • Smart home is a technology for monitoring and controlling all the information about a house by integrating various home applications like cooling, heating, lighting, kitchen and security systems into a network. Although home appliances have become more convenient to use due to the development of smart home technology, they are also more vulnerable to information security hazards. Unauthorized visitors may have access to any of home appliance to arbitrarily control it or acquire information. This causes serious privacy and security problems, which should be solved to further smart home technology. This present paper proposed a dynamic user access control system for privacy protection in smart homes. The proposed system defines the role of a user of smart home services by automatically identifying the status information of the user and dynamically controls the access range for the service. In this way, the privacy of a user can be protected and the inter-smart device service is effectively provided. Consequently, the proposed dynamic user access control for smart home will improve the security service for protecting privacy in smart home devices.

Design and Implementation of ACM-based Web Security Access Control System for Intranet Security (인트라넷 보안을 위한 ACM기반 웹 보안 접근 제어 시스템의 설계 및 구현)

  • Cho Nam-Deok;Park Hyun-Gun
    • The KIPS Transactions:PartC
    • /
    • v.12C no.5 s.101
    • /
    • pp.643-648
    • /
    • 2005
  • Intranet system for use within an organization, usually a corporation, is to basically pass through user authentication, but information can be leaked, modified, and deleted by malevolent users who disguise an authorized user or due to user's mistakes in using various functions of web browser. Thus, there is a need for measures to protect the information from illegal use, transformation through partial modification, and illegal leakage such as fraudulent use. This paper presents a flexible Web Security Access Control system based ACM which Provide efficient suity Policy to Protect information in intranet. This Web Security Access Control system not only enhances security by Performing encryption/decryption of information in intranet but also, for sharing confidential information among departments, performs effective and useful access control by assigning different authority to the secured web page. And, by controlling the functions of client PC in various ways, information leakage on malicious purpose or by mistake can be prevented.

Performance of MIMO-OFDMA system combining power controlling algorithm with multi-beamformer

  • Kim, Chan Kyu
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.14 no.3
    • /
    • pp.69-78
    • /
    • 2022
  • In this paper, we propose the new technique adopting power control to MIMO(multi-input multi-output)-OFDMA(orthogonal frequency division multiplexing Access) system with multi-beamformer. The proposed power controlling algorithm for MIMO-OFDMA allocates the transmitting power of each subcarrier based on the CSI(channel state information) and the interference signal. CSI is feedback from base station to mobile station to decide the transmitting power of each subcarrier. Through the proposed technique, we can control iteratively the transmitting power and update the weight of beamformer simultaneously. Therefore, the SNIR of each subcarrier become to converge the target SNIR and the beam is formed toward the desired direction. And the performance of MIMO-OFDMA system with the proposed approach is very improved. The improvement in bit error rate is investigated through computer simulation of a MIMO-OFDMA system with the proposed approach.

A QoS Management Scheme on Dynamic SLA in B3G Networks (B3G 네트워크에서 동적 SLA 기반 QoS 방안)

  • Park Sangjoon;Lee Jongchan
    • Journal of the Korea Society for Simulation
    • /
    • v.14 no.1
    • /
    • pp.33-42
    • /
    • 2005
  • Service Level Agreement (SLA) is a service providing scheme by a service class agreement between a user and a service provider SLA allows that a user can select an expected service class in various service classes provided from a service provider. Recently, SLA management is adapted to support the end-to-end Qos for service users in Beyond 3 Generation (B3G) networks. In B3G networks, SLA provides multiple service classes on access networks so that service classes should be managed to assure the service satisfaction for users. In this paper, we propose a dynamic Qos management scheme by IP traffic class controlling based on SLA in B3G networks. Also, to manage dynamic traffic service, we consider Differentiated services (Diffserv) mechanism for the resource management by SLA. An If service traffic class on SLA can be dynamically changed by Diffserv traffic management to support dynamic end-to-end Qos. Hence, in this paper, we consider the buffer threshold scheme for controlling traffic loads and the traffic level control scheme for implementing the dynamic traffic management by the SLA.

  • PDF

Performance Evaluation of Node.js for Web Service Gateway in IoT Remote Monitoring Applications

  • Nkenyereye, Lionel;Jang, Jong-Wook
    • International Journal of Advanced Culture Technology
    • /
    • v.4 no.3
    • /
    • pp.13-19
    • /
    • 2016
  • The growth of mobile devices in Internet of Things (IoT) leads to a number of remote and controlling system related IoT applications. For instance, home automation controlling system uses client system such web apps on smartphone or web service to access the home server by sending control commands. The home server receives the command, then controls for instance the light system. The web service gateway responsible for handling clients' requests attests an internet latency when an increasing number of end users requests submit toward it. Therefore, this web service gateway fails to detect several commands, slows down predefined actions which should be performed without human intervention. In this paper, we investigate the performance of a web server-side platgorm based event-driven, non-blocking approach called Node.js against traditional thread-based server side approach to handle a large number of client requests simultaneously for remote and controlling system in IoT remote monitoring applications. The Node.JS is 40% faster than the traditional web server side features thread-based approach. The use of Node.js server-side handles a large number of clients' requests, then therefore, reduces delay in performing predefined actions automatically in IoT environment.

A GDPR based Approach to Enhancing Blockchain Privacy (GDPR에 기반한 블록체인 프라이버시 강화 방안)

  • Han, Sejin;Kim, Suntae;Park, Sooyoung
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.19 no.5
    • /
    • pp.33-38
    • /
    • 2019
  • In this paper, we propose a new blockchain technology that could comply with GDPR. The proposed model can prevent illegal access by controlling access to the personal information according to a access policy. For example, it can control access to the information on a role-basis and information validation period. The core mechanism of the proposed model is to encrypt the personal information with public key which is associated with users attributes policy, and then decrypt it with a private key and users attributes based on a Attribute-based Encryption scheme. It can reduce a trusted third-part risk by replacing it with a number of nodes selected from the blockchain. And also the private key is generated in the form of one-time token to improve key management efficiency. We proved the feasibility by simulating the proposed model using the chaincode of the Hyperledger Fabric and evaluate the security.

Implementation of the Access Control System for Hangul Document System (한글 문서 접근 제어시스템 구현)

  • Jang, Seung-Ju
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.2
    • /
    • pp.323-329
    • /
    • 2018
  • In this paper, we implemented an access control system that only allows specific users to use documents in Hangul document system. The system structure designed in this paper is to transform header information of Hangul document by analyzing the structure of Hangul document. By modifying the function of a specific field of the header information in Hangul document, it prevents users that do not have data for the modified information to open and view the document. By controlling the access rights to important Hangul documents, it is possible to manage Hangul files more safely. In this paper, the actual design of information was implemented and experiments were carried out. Results of the experiment confirmed that the access control system is operated in normal way. In this paper, we implemented an access control system that only allows specific users to use documents in Hangul document system.

Congestion Control for Best-Effort Services In Wireless Networks (무선망에서 Best-effort 서비스를 위한 폭주제어 방법)

  • 김승천
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.5 no.4
    • /
    • pp.716-722
    • /
    • 2001
  • This paper has defined the 3G and beyond wireless networks as the one that is based on IP network architecture and proposed the congestion control scheme in the access networks. Basically the proposed method is built on the ECN(Explicit Congestion Notification) and utilizing the advantages of the wireless and I networks in broadcasting packet in their access network. Consequently it provides the efficiency in controlling the congestion that can be happened by the mobility support in the future wireless networks.

  • PDF

A Study on the Safety Control System of Child Care Systems Using Interior Lighting and Entry Systems

  • Joo, Dae-Chul;Kwon, Mee-Rhan;Shin, Seung-Jung
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.9 no.1
    • /
    • pp.42-49
    • /
    • 2017
  • Despite the government's various safety measures, the number of safety accidents continues to rise and the interior is more likely to occur indoors than outdoors. Safety accidents involving young children account for more than 70 % of the safety accidents in the safety accidents, and the ratio of safety accidents in the classroom or classroom is more than 50 %. In this thesis the author proposes the system managing the accidents notification service using LED lighting and access entry control. Utilizing IoT technology, remote control or access can be controlled remotely by controlling multiple lights and entrances from each room and by means of a number of lighting and entrances. By monitoring and analyzing real-time status via server PC and mobile interface, it can control the maximum control and incident prevention, automatic control, and automatic control.