• Title/Summary/Keyword: Data Provider

Search Result 756, Processing Time 0.029 seconds

A Secure Subscription-Push Service Scheme Based on Blockchain and Edge Computing for IoT

  • Deng, Yinjuan;Wang, Shangping;Zhang, Qian;Zhang, Duo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.2
    • /
    • pp.445-466
    • /
    • 2022
  • As everything linking to the internet, people can subscribe to various services from a service provider to facilitate their lives through the Internet of Things (IoT). An obligatory thing for the service provider is that they should push the service data safely and timely to multiple IoT terminal devices regularly after the IoT devices accomplishing the service subscription. In order to control the service message received by the legal devices as while as keep the confidentiality of the data, the public key encryption algorithm is utilized. While the existing public encryption algorithms for push service are too complicated for IoT devices, and almost of the current subscription schemes based on push mode are relying on centralized organization which may suffer from centralized entity corruption or single point of failure. To address these issues, we design a secure subscription-push service scheme based on blockchain and edge computing in this article, which is decentralized with secure architecture for the subscription and push of service. Furthermore, inspired by broadcast encryption and multicast encryption, a new encryption algorithm is designed to manage the permissions of IoT devices together with smart contract, and to protect the confidentiality of push messages, which is suitable for IoT devices. The edge computing nodes, in the new system architecture, maintain the blockchain to ensure the impartiality and traceability of service subscriptions and push messages, meanwhile undertake some calculations for IoT devices with limited computing power. The legalities of subscription services are guaranteed by verifying subscription tags on the smart contract. Lastly, the analysis indicates that the scheme is reliable, and the proposed encryption algorithm is safe and efficient.

ITU-T International Standard based Trust-enabled Service Provisioning Technology (ITU-T 국제표준 중심의 신뢰 서비스 프로비저닝 기술)

  • Hoan-Suk Choi;Jun-Kyun Choi;Woo-Seop Rhee
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.16 no.6
    • /
    • pp.420-433
    • /
    • 2023
  • With the development of ICT technologies, various systems and services based on data have been introduced. Also, raising the importance of technologies that provide trust to a data, infrastructure, and services. for ICT services. However, in the existing ICT service environment, there is no way to objectively judge and manage the trust of various components (content, infrastructure, process, service provider, etc) that constitute a specific service, and there is a limitation that we can only rely on the service provider's own quality standards. This paper provides requirements, functional archtecture, and procedures for providing reliable ICT services from the perspective of ITU-T international standards. Trust-enabled service provisioning adds additional functions for providing trust to existing ICT service entities (service resources, stakeholders, and users), collecting, analyzing, and providing trust related information. Therefore, a users can consider the trust of various service components based on analyzed trust information based on their trust requirements.

Estimating Willingness to Switch to MVNO for Activation of Mobile Data Services (무선데이터서비스 활성화를 위한 MVNO 전환의사비용 추정)

  • Lee, Sang Woo;Ko, Chang Youl
    • Journal of Internet Computing and Services
    • /
    • v.16 no.4
    • /
    • pp.1-11
    • /
    • 2015
  • This study uses the contingent valuation method to estimate the switching cost for adopting the MVNO service. The findings are as follows.: First, Willingness To Switch(WTS) increases as users' using pattern and perceived degree of MVNO service, but satisfaction with current service provider does not play a significant role in predicting Switching Cost. This means that as amount of money users can save exceeds a certain level, users decide to willingly change their service provider to MVNO regardless of their level of satisfaction with current service provider. Second, there are differences in WTS among service subscribers in SKT, KT and LGU+. It means that there will be a difference in the tendency to switch to MVNO among subscribers of service providers. This study suggest the following mangerial perspective to effectively promote the MVNO and boost the MVNO market for activation of mobile data services.: First, MVNOs are better off applying differentiated pricing scheme at attractive rates than using a differentiation of service product and quality. Second, regulators should consider how to implement an MVNO regulatory policy when there is an asymmetric customer loyalty among MNOs. This research will be used to set the MVNO's pricing strategy and to build up a successful regulatory policies.

Comparison of Droplet Infection Prevention Activity and Knowledge of Cough Etiquette among Nursing Hospital Workers (요양병원 종사자들의 비말감염 예방 활동과 기침예절 지식 비교)

  • Park, Kyung-Hye;Kang, Sook
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.3
    • /
    • pp.360-369
    • /
    • 2020
  • This study examined and compared the droplet infection prevention activity and cough etiquette knowledge among nursing hospital workers. Data were collected from March 4 to 29, 2019, through personal interviews using a questionnaire in 177 nursing hospital workers (health care provider: n=61, non-health care provider: n=116). The data were analyzed using a x2-test, Fisher's exact test, independent t-test, and ANOVA. The general characteristics were statistically significant between the two groups in terms of sex and age. The prevention activities of droplet infection showed statistically significant differences between the two groups in usually carrying a tissue, usually carrying a handkerchief, usually carrying a mask, carrying a handkerchief at respiratory symptoms, hand washing frequency, and cough etiquette compliance. Knowledge of cough etiquette showed significant differences between the two groups. The knowledge of cough etiquette, according to the non-health provider's prevention activities of droplet infection, was statistically significant in usually carrying a mask and cough etiquette education. Therefore, it is necessary to raise the knowledge about cough etiquette and develop strategies for habitual cough etiquette for each nursing hospital worker.

A Study on Adult's Perception of Nursing Concept (간호 개념의 의미에 대한 조사연구(경인지역 성인을 대상으로))

  • Yang Kwang Hee
    • Journal of Korean Public Health Nursing
    • /
    • v.4 no.1
    • /
    • pp.5-16
    • /
    • 1990
  • 'What is nursing' this question could always be arised and such a question could bring forth the new possibility to definete the nursing concept more clearly. At the middle of 19th Centry, Mrs. Nightingale defined the concept of nursing as follows; 'Nursing is a kind of treatment act to aid the patient so that the health of patients may be recovered naturally, as keeping the most comfortable circumstances.' But after then, the role and function of nurses about purpose and method of nursing has continuously been studied, as the social circumstance has been changed. The fact that care provider and client have the same concept about nursing is very important at the first step of assessment. But at the present time, the care provider and client have not same concept yet, so the difference of unrsing concept between care provider and client is analyzed in this study. This study would be belived to be helpful for the advance of nursing in the future. In this study, 20 questionare from nursing objectives developed by Abdellah(basic care needs, sustenal care needs, remedial care needs and restorative care needs) are used for adult. The data of this study by the 6 point rating scale are analyzed by SAS as follows; 1. Respondent's view is that nursing is necessary in case of group(school or company) rather than private and in case of abnormal conditions rather than normal conditions. 2. Every questionares of nursing objectives are divided into 4 points of view such as basic care needs, sustenal care needs, remedial care needs and restorative care needs are examined. The evaluation by 6 point rating scale revealed that $5.08\pm0.65$ point in basic care needs $4.93\pm0.68$ point in sustenal care needs $4.91\pm0.80$ point in remedial care needs and $4.61\pm0.91$ point in restorative care needs. While basic care needs and substenal care needs that need more physical care show high points, remedial care needs and restorative care needs that need more psychological, social and spiritual care show low points. 3. It was checked whether there is any significant difference between above 4 point of views in nursing objectives and qeneral characteristics or not. As a result, there is significant difference between 4 point of view and ages, educational level, marriage, composition of children. And also there is significant difference between religion and basic care needs, remedial care needs and restorative care needs. But there is no significant difference between any point of view and sex, occupation, experience of admission and experience of family admission. As this study is based on the data gethered from a restricted area, the result can not represent the opinion of all the clients. Therefore the same kind of study should be carried out on many areas repeatedly and also it should be tried to extract objective concept. And also periodical study is needed to observe the changing process of nursing concept.

  • PDF

IAM Architecture and Access Token Transmission Protocol in Inter-Cloud Environment (Inter-Cloud 환경에서의 IAM 구조 및 액세스 토큰 전송 프로토콜)

  • Kim, Jinouk;Park, Jungsoo;Yoon, Kwonjin;Jung, Souhwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.3
    • /
    • pp.573-586
    • /
    • 2016
  • With the adoption of cloud computing, the number of companies that take advantage of cloud computing has increased. Additionally, various of existing service providers have moved their service onto the cloud and provided user with various cloud-based service. The management of user authentication and authorization in cloud-based service technology has become an important issue. This paper introduce a new technique for providing authentication and authorization with other inter-cloud IAM (Identity and Access Management). It is an essential and easy method for data sharing and communication between other cloud users. The proposed system uses the credentials of a user that has already joined an organization who would like to use other cloud services. When users of a cloud provider try to obtain access to the data of another cloud provider, part of credentials from IAM server will be forwarded to the cloud provider. Before the transaction, Access Agreement must be set for granting access to the resource of other Organization. a user can access the resource of other organization based on the control access configuration of the system. Using the above method, we could provide an effective and secure authentication system on the cloud.

Enhanced Privacy Preservation of Cloud Data by using ElGamal Elliptic Curve (EGEC) Homomorphic Encryption Scheme

  • vedaraj, M.;Ezhumalai, P.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.11
    • /
    • pp.4522-4536
    • /
    • 2020
  • Nowadays, cloud is the fastest emerging technology in the IT industry. We can store and retrieve data from the cloud. The most frequently occurring problems in the cloud are security and privacy preservation of data. For improving its security, secret information must be protected from various illegal accesses. Numerous traditional cryptography algorithms have been used to increase the privacy in preserving cloud data. Still, there are some problems in privacy protection because of its reduced security. Thus, this article proposes an ElGamal Elliptic Curve (EGEC) Homomorphic encryption scheme for safeguarding the confidentiality of data stored in a cloud. The Users who hold a data can encipher the input data using the proposed EGEC encryption scheme. The homomorphic operations are computed on encrypted data. Whenever user sends data access permission requests to the cloud data storage. The Cloud Service Provider (CSP) validates the user access policy and provides the encrypted data to the user. ElGamal Elliptic Curve (EGEC) decryption was used to generate an original input data. The proposed EGEC homomorphic encryption scheme can be tested using different performance metrics such as execution time, encryption time, decryption time, memory usage, encryption throughput, and decryption throughput. However, efficacy of the ElGamal Elliptic Curve (EGEC) Homomorphic Encryption approach is explained by the comparison study of conventional approaches.

The care giving experience of middle-aged child care providers (중년기 아이돌보미 여성의 돌봄활동 경험)

  • Chu, Min-Sun;Lee, Young-Ran
    • Journal of Home Health Care Nursing
    • /
    • v.24 no.1
    • /
    • pp.23-33
    • /
    • 2017
  • Purpose: The purpose of this phenomenological study was to explore middle-aged child care providers' experience in caring for children in the community. Methods: The participants were 10 middle-aged child care providers. In-depth interviews were conducted between August and September, 2014 until data. Colaizzi's method of data analysis was applied to inductively determine themes and formulated meanings. Data saturation was achieved and methodological rigor was established Results: Four themes were extracted from 12 meanings. The four themes of the child care providers' experience in caring for children were: 1) weariness from care-giving, 2) the search for one's own solutions, 3) a cheerful attitude to life, 4) the opportunity to start a new life. Conclusion: The results of this study provide useful information for understanding child care providers' experiences in caring for children and establishing effective strategies to support these child care providers.

Device Authentication Protocol for Smart Grid Systems Using Homomorphic Hash

  • Kim, Young-Sam;Heo, Joon
    • Journal of Communications and Networks
    • /
    • v.14 no.6
    • /
    • pp.606-613
    • /
    • 2012
  • In a smart grid environment, data for the usage and control of power are transmitted over an Internet protocol (IP)-based network. This data contains very sensitive information about the user or energy service provider (ESP); hence, measures must be taken to prevent data manipulation. Mutual authentication between devices, which can prevent impersonation attacks by verifying the counterpart's identity, is a necessary process for secure communication. However, it is difficult to apply existing signature-based authentication in a smart grid system because smart meters, a component of such systems, are resource-constrained devices. In this paper, we consider a smart meter and propose an efficient mutual authentication protocol. The proposed protocol uses a matrix-based homomorphic hash that can decrease the amount of computations in a smart meter. To prove this, we analyze the protocol's security and performance.

A Study on the Development of CITIS(Contractor Integrated Technical Information Services) (CITIS(Contractor Integrated Technical Information Services)구현에 관한 연구)

  • Jeong, Seok-Chan;Woo, Hoon-Shik;Cho, Chang-Hyuk;Paik, Jong-Myung;Ju, Kyung-Joon
    • IE interfaces
    • /
    • v.10 no.3
    • /
    • pp.1-10
    • /
    • 1997
  • CALS, being widely adopted by industry, is a strategy to share integrated digital product data through a set of standards to achieve effieciencies and competition in business. For CALS implemetation, creating a shared information system is necessary and CITIS is proposed for that. CITIS shall provide on-line access and automated exchange of all the technical information between contractor and service provider, and the function of CITIS is difined in MIL-STD-974. In this paper, regarding CITIS as a infrastructure of information for CALS, we proposed CITIS server system which comprise global data sharing software, global data management system, workflow manager, and configuration management maneger.

  • PDF