• 제목/요약/키워드: Data Server Network

Search Result 1,019, Processing Time 0.026 seconds

Homomorphic Encryption as End-to-End Solution for Smart Devices

  • Shanthala, PT;Annapurna, D;Nittala, Sravanthi;Bhat, Arpitha S;Aishwarya, Aishwarya
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.6
    • /
    • pp.57-62
    • /
    • 2022
  • The recent past has seen a tremendous amount of advancement in the field of Internet of Things (IoT), allowing the influx of a variety of devices into the market. IoT devices are present in almost every aspect of our daily lives. While this increase in usage has many advantages, it also comes with many problems, including and not limited to, the problem of security. There is a need for better measures to be put in place to ensure that the users' data is protected. In particular, fitness trackers used by a vast number of people, transmit important data regarding the health and location of the user. This data is transmitted from the fitness device to the phone and from the phone onto a cloud server. The transmission from device to phone is done over Bluetooth and the latest version of Bluetooth Light Energy (BLE) is fairly advanced in terms of security, it is susceptible to attacks such as Man-in-the-Middle attack and Denial of Service attack. Additionally, the data must be stored in an encrypted form on the cloud server; however, this proves to be a problem when the data must be decrypted to use for running computations. In order to ensure protection of data, measures such as end-to-end encryption may be used. Homomorphic encryption is a class of encryption schemes that allow computations on encrypted data. This paper explores the application of homomorphic encryption for fitness trackers.

Improvement of Upload Traffic through Negotiation in UCC Broadcasting System (P2P 기반의 UCC 방송에서 협상을 통한 업로드 트래픽의 개선)

  • Kim, Ji Hoon
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.10 no.3
    • /
    • pp.171-179
    • /
    • 2014
  • Among the P2P based multimedia streaming architecture, multiple chain architecture has advantage in adapting to dynamically changing network topology simply and rapidly, so this architecture is used for UCC broadcasting system. In UCC broadcasting system, general peer involved in DSLAM becomes UCC server rather than broadcasting system that transfers data from ISP servers. Therefore UCC data generated from UCC server peers is transmitted to peers through DSLAM, and this transmission uses uplink bandwidth of DSLAM. In this paper, I propose an efficient management method of DSLAM uplink bandwidths through negotiating tracker and UCC server peer or head peers of DSLAM. I propose the method that tracker restricts a bitrate of uplink stream of UCC servers when used uplink bandwidth of DSLAM exceeds a certain point of maximum uplink bandwidths. I will show the improved performance of proposed scheme rather than general method with respect to the uplink bandwidth of DSLAM by numerical analysis and simulation.

Performance Analysis of TNS System for Improving DDS Discovery (DDS 검색 방식 개선을 위한 TNS 시스템 성능 분석)

  • Yoon, Gunjae;Choi, Jeonghyun;Choi, Hoon
    • The Journal of Korean Institute of Next Generation Computing
    • /
    • v.14 no.6
    • /
    • pp.75-86
    • /
    • 2018
  • The DDS (Data Distribution Service) specification defines a discovery method for finding participants and endpoints in a DDS network. The standard discovery mechanism uses the multicast protocol and finds all the endpoints in the network. Because of using multicasting, discovery may fail in a network with different segments. Other problems include that memory space wastes due to storing information of all the endpoints. The Topic Name Service (TNS) solves these problems by unicasting only the endpoints, which are required for communication. However, an extra delay time is inevitable in components of TNS, i.e, a front-end server, topic name servers, and a terminal server. In this paper, we analyze the performance of TNS. Delay times in the servers of TNS and time required to receive endpoint information are measured. Time to finish discovery and number of receiving endpoints compare with the standard discovery method.

Video Data Management based on Time Constraint Multiple Access Technique in Video Proxy Server (비디오 프록시 서버에서의 시간 제약 다중 요청 기법 기반 동영상 데이터 관리)

  • Lee, Jun-Pyo;Cho, Chul-Young;Kwon, Cheol-Hee;Lee, Jong-Soon;Kim, Tae-Yeong
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.10
    • /
    • pp.113-120
    • /
    • 2010
  • Video proxy server which is located near clients can store the frequently requested video data in storage space in order to minimize initial latency and network traffic significantly. However, due to the limited storage space in video proxy server, an appropriate video selection method is needed to store the videos which are frequently requested by users. Thus, we present a time constraint multiple access technique to efficiently store the video in video proxy server. If the video is requested by user, it is temporarily stored during the predefined interval and then, delivered to the user. A video which is stored is deleted or moved into the storage space of video proxy server depending on the request condition. In addition, we propose a video deletion method in video proxy server for newly stored video data. The simulation results show that the proposed method performs better than other methods in terms of the block hit rate and the number of block deletion.

Storage System Performance Enhancement Using Duplicated Data Management Scheme (중복 데이터 관리 기법을 통한 저장 시스템 성능 개선)

  • Jung, Ho-Min;Ko, Young-Woong
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.37 no.1
    • /
    • pp.8-18
    • /
    • 2010
  • Traditional storage server suffers from duplicated data blocks which cause an waste of storage space and network bandwidth. To address this problem, various de-duplication mechanisms are proposed. Especially, lots of works are limited to backup server that exploits Contents-Defined Chunking (CDC). In backup server, duplicated blocks can be easily traced by using Anchor, therefore CDC scheme is widely used for backup server. In this paper, we propose a new de-duplication mechanism for improving a storage system. We focus on efficient algorithm for supporting general purpose de-duplication server including backup server, P2P server, and FTP server. The key idea is to adapt stride scheme on traditional fixed block duplication checking mechanism. Experimental result shows that the proposed mechanism can minimize computation time for detecting duplicated region of blocks and efficiently manage storage systems.

Development of Automatic Data Transmitting System of Arterial Blood Gas Results via Local Area Network( LAN) (LAN을 이용한 혈액가스 검사결과 전송시스템)

  • 김남현;김원기
    • Journal of Biomedical Engineering Research
    • /
    • v.14 no.4
    • /
    • pp.327-332
    • /
    • 1993
  • Automatic transmission of data from the blood analyzer to the request site is one of the most important part in hospital computerization. We have developed a system that transmits data from the arterial blood gas analyzer to the request site automatically In this system HOST computer, FILE server,'LAN(Local Area Network) , 3270 Emulator and bfulti-port card are integrated with 3 blood gas analyzers(NOVA Inc., USA) which are connected to a single multi-port card in a personal computer. When specimen are collected from tramp)inly sites, they are transferee to the laboratory In the Yonsei Cardiovascular Center After analysis, the result is transmitted to the personal computer via serial commnunication between machine and multi-port card using interrupt method. Then, the patient's information (Name, Patient ID No., etc.) is obtained from the HOST computer througth the emulator. The combined data (patient information & lab data) is transmitted to each request site via LAN automatically These results are stored in the File Server for one year and they can be reviewed anytime. Also, it could be used for the various statistics and the flow chart for clinical research. Additionally, we found thal this system reduces the personal labor.

  • PDF

Asset tracking system architecture using sensor network technology (센서 네트워크를 이용한 자산 모니터링 시스템 구조)

  • Kang, Jeong-Hoon;Lee, Min-Goo;Lee, Sang-Won;Ham, Kyung-Sun;Lee, Sang-Hak
    • Proceedings of the KIEE Conference
    • /
    • 2004.11c
    • /
    • pp.426-428
    • /
    • 2004
  • Sensor network supports data delivery from physical world to cyber space Sensors get physical events then wireless network transfers sensor data to service server. We use sensor network technology to manage location information of asset. In ubiquitous computing environment, user localization is basic context for intelligent service. A lot of research group make effort to develop low cost localization technology. In this paper, we propose asset monitoring system using wireless sensor network. It is implemented using ad hoc network technology which can be adopted to smart home and this system can monitor the asset location and movement.

  • PDF

Performance Improvement of Object Recognition System in Broadcast Media Using Hierarchical CNN (계층적 CNN을 이용한 방송 매체 내의 객체 인식 시스템 성능향상 방안)

  • Kwon, Myung-Kyu;Yang, Hyo-Sik
    • Journal of Digital Convergence
    • /
    • v.15 no.3
    • /
    • pp.201-209
    • /
    • 2017
  • This paper is a smartphone object recognition system using hierarchical convolutional neural network. The overall configuration is a method of communicating object information to the smartphone by matching the collected data by connecting the smartphone and the server and recognizing the object to the convergence neural network in the server. It is also compared to a hierarchical convolutional neural network and a fractional convolutional neural network. Hierarchical convolutional neural networks have 88% accuracy, fractional convolutional neural networks have 73% accuracy and 15%p performance improvement. Based on this, it shows possibility of expansion of T-Commerce market connected with smartphone and broadcasting media.

Server State-Based Weighted Load Balancing Techniques in SDN Environments (SDN 환경에서 서버 상태 기반 가중치 부하분산 기법)

  • Kyoung-Han, Lee;Tea-Wook, Kwon
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.17 no.6
    • /
    • pp.1039-1046
    • /
    • 2022
  • After the COVID-19 pandemic, the spread of the untact culture and the Fourth Industrial Revolution, which generates various types of data, generated so much data that it was not compared to before. This led to higher data throughput, revealing little by little the limitations of the existing network system centered on vendors and hardware. Recently, SDN technology centered on users and software that can overcome these limitations is attracting attention. In addition, SDN-based load balancing techniques are expected to increase efficiency in the load balancing area of the server cluster in the data center, which generates and processes vast and diverse data. Unlike existing SDN load distribution studies, this paper proposes a load distribution technique in which a controller checks the state of a server according to the occurrence of an event rather than periodic confirmation through a monitoring technique and allocates a user's request by weighting it according to a load ratio. As a result of the desired experiment, the proposed technique showed a better equal load balancing effect than the comparison technique, so it is expected to be more effective in a server cluster in a large and packet-flowing data center.

Implementation of a System for RFID Education to be based on an EPC global Network Standard (EPC global Network 표준을 따르는 RFID 교육용 시스템의 구현)

  • Kim, Dae-Hee;Chung, Joong-Soo;Kim, Hyu-Chan;Jung, Kwang-Wook;Kim, Seog-Gyu
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.11
    • /
    • pp.90-99
    • /
    • 2009
  • This paper presents the implementation of RFID EPC global network educational system based on using 900MHz air interface between the reader and the active tag. The software of reader and the active tag is developed on embedded environment, and the software of PC controlling the reader is based on window OS operated as the server. The ATmega128 VLSI chip is used for the processor of the reader and the active tag. As the development environment, AVR compiler is used for the reader and the active tag of which the programming language is C. The visual C++language of the visual studio on the PC activated as the server is used for development language. Main functions of this system are to control tag containing EPC global Data by PC through the reader, to obtain information of tag through the internet and to read/write data on tag memory. Finally the data written from the active tag's memory is sent to the PC via the reader as "read" operation and compare the received data with one already sent to the tag. Software implementation of 900MHz EPC global RFID educational system is done on the basis of these functions.