• Title/Summary/Keyword: Data Storage Device

Search Result 372, Processing Time 0.034 seconds

A Study on Data Security of Web Local Storage (웹 로컬스토리지 데이터 보안을 위한 연구)

  • Kim, Ji-soo;Moon, Jong-sub
    • Journal of Internet Computing and Services
    • /
    • v.17 no.3
    • /
    • pp.55-66
    • /
    • 2016
  • A local storage of HTML5 is a Web Storage, which is stored permanently on a local computer in the form of files. The contents of the storage can be easily accessed and modified because it is stored as plaintext. Moreover, because the internet browser classifies the local storages of each domain using file names, the malicious attacker can abuse victim's local storage files by changing file names. In the paper, we propose a scheme to maintain the integrity and the confidentiality of the local storage's source domain and source device. The key idea is that the client encrypts the data stored in the local storage with cipher key, which is managed by the web server. On the step of requesting the cipher key, the web server authenticates whether the client is legal source of local storage or not. Finally, we showed that our method can detect an abnormal access to the local storage through experiments according to the proposed method.

Improved Hot data verification considering the continuity and frequency of data update requests (데이터 갱신요청의 연속성과 빈도를 고려한 개선된 핫 데이터 검증기법)

  • Lee, Seungwoo
    • Journal of Internet of Things and Convergence
    • /
    • v.8 no.5
    • /
    • pp.33-39
    • /
    • 2022
  • A storage device used in the mobile computing field should have low power, light weight, durability, etc., and should be able to effectively store and manage large-capacity data generated by users. NAND flash memory is mainly used as a storage device in the field of mobile computing. Due to the structural characteristics of NAND flash memory, it is impossible to overwrite in place when a data update request is made, so it can be solved by accurately separating requests that frequently request data update and requests that do not, and storing and managing them in each block. The classification method for such a data update request is called a hot data identification method, and various studies have been conducted at present. This paper continuously records the occurrence of data update requests using a counting filter for more accurate hot data validation, and also verifies hot data by considering how often the requested update requests occur during a specific time.

Development of a Deterioration Diagnostic Device for ZnO Arrester by Leakage Current Detection (누설전류 검출에 의한 ZnO 피뢰기의 열화진단장치 개발)

  • Kim, Jae-Chul;Lee, Bo-Ho;Oh, Jung-Hwan;Lee, Young-Gil;Moon, Sun-Ho;Kim, Young-Chun
    • The Transactions of the Korean Institute of Electrical Engineers A
    • /
    • v.48 no.3
    • /
    • pp.184-189
    • /
    • 1999
  • In this paper, we develope a diagnosis device for ZnO arrester by detecting the leakage current in service. To diagnose the deterioration of ZnO arrester, the device detects the total leakage current which flows between an arrester and ground, and analyzes the resistive current(third harmonic current) which is an indicator of deterioration of ZnO arrester. We use the optical cable which can transfer a detected data without a noise, also use a microprocessor for a data storage, processing, and trend analysis. Experiment are executed to verify its performance in laboratory and the results show that the diagnosis device exactly detects the total leakage current and the resistive current, so it can diagnose the deterioration of ZnO arrester. Also the leakage current of ZnO arrester is detected using the developed diagnostic device in field, these results are presented.

  • PDF

Realization of Fractal/Angle Multiplexing using X-Y Galvano Mirrors and Evaluation of Random Access Performance in Holographic Digital Data Storage (X-Y 갈바노 미러를 이용한 홀로그래픽 저장 장치의 프랙탈/각 다중화 구현 및 임의 탐색 성능의 평가)

  • Choi, Jin-Young;Lee, Jae-Sung;Kim, Sang-Hoon;Kim, Jang-Hyun;Yang, Hyun-Seok;Park, No-Cheol;Park, Young-Pil;Park, Joo-Youn
    • Transactions of the Society of Information Storage Systems
    • /
    • v.2 no.1
    • /
    • pp.43-49
    • /
    • 2006
  • Fractal/angle multiplexing is a $LiNBO_3$ crystal using a X-Y Galvano mirror, and the random access concept in fractal/angle multiplexing are discussed in this paper. First, the brief introduction of the designed holographic digital data storage system is presented. Then, the average access time concept for the storage system is newly defined, and the comparison of the average access time between the holographic storage and a conventional optical disk is performed. Second, the basic simulation and experiment to find the X-Y Galvano mirror dynamics are conducted. From this analysis, we find that the average access time in our HDDS which has 6 degree scan angle is about 5 msec. This result is very high performance when it compared with the average access time of a conventional optical disk. Finally, some recording results using fractal/angle multiplexing are presented, then, the relationship between bit error rate and angle mismatch for the each multiplexing are discussed.

  • PDF

A Study on Optimizing Disk Utilization of Software-Defined Storage (소프트웨어 정의 스토리지의 디스크 이용을 최적화하는 방법에 관한 연구)

  • Lee Jung Il;Choi YoonA;Park Ju Eun;Jang, Minyoung
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.12 no.4
    • /
    • pp.135-142
    • /
    • 2023
  • Recently, many companies are using public cloud services or building their own data center because digital transformation is expanding. The software-defined storage is a key solution for storing data on the cloud platform and its use is expanding worldwide. Software-defined storage has the advantage of being able to virtualize and use all storage resources as a single storage device and supporting flexible scale-out. On the other hand, since the size of an object is variable, an imbalance occurs in the use of the disk and may cause a failure. In this study, a method of redistributing objects by optimizing disk weights based on storage state information was proposed to solve the imbalance problem of disk use, and the experimental results were presented. As a result of the experiment, it was confirmed that the maximum utilization rate of the disk decreased by 10% from 89% to 79%. Failures can be prevented, and more data can be stored by optimizing the use of disk.

Two-Dimensional 8/9 Error Correcting Modulation Code

  • Lee, Kyoungoh;Kim, Byungsun;Lee, Jaejin
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39A no.5
    • /
    • pp.215-219
    • /
    • 2014
  • In holographic data storage (HDS), a high transmission rate is accomplished through the use of a charge coupled device array for reading two-dimensional (2D) pixel image data. Although HDS has many advantages in terms of storage capacity and data transmission rates, it also features problems, such as 2D intersymbol interference (ISI) by neighboring pixels and interpage interference (IPI) by multiple images stored in the same holographic volume. Modulation codes can be used to remove these problems. We introduce a 2D 8/9 error-correcting modulation code. The proposed modulation code exploits the trellis-coded modulation scheme, and the code rate is larger (about 0.889) than that of the conventional 6/8 balanced modulation code (an increase of approximately 13.9%). The performance of the bit error rate (BER) with the proposed scheme was improved compared with that of the 6/8 balanced modulation code and the simple 8/9 code without the trellis scheme.

Performance Analysis of Parity Cache enabled RAID Level 5 for DDR Memory Storage Device (패리티 캐시를 이용한 DDR 메모리 저장 장치용 RAID 레벨 5의 성능 분석)

  • Gu, Bon-Gen;Kwak, Yun-Sik;Cheong, Seung-Kook;Hwang, Jung-Yeon
    • Journal of Advanced Navigation Technology
    • /
    • v.14 no.6
    • /
    • pp.916-927
    • /
    • 2010
  • In this paper, we analyze the performance of the parity cache enabled RAID level-5 via the simulation. This RAID system consists of the DDR memory-based storage devices. To do this, we develop the simulation model and suggest the basic performance analysis data which we want to get via the simulation. And we implement the simulator based on the simulation model and execute the simulator. From the result of the simulation, we expect that the parity cache enabled RAID level-5 configured by the DDR memory based storage devices has the positive effectiveness to the enhancing of the storage system performance if the storage access patterns of applications are tuned.

A Study to Prevent the Occurrence and Spread of Fire Caused by ESS Storage (ESS 저장창고로 인한 화재의 발생 및 확산방지를 위한 연구)

  • Shin, Joung Hyeon;Jo, Su Yeon;Kim, Geon-Woo;Jung, Ui In;Kim, Bong Joo
    • Proceedings of the Korean Institute of Building Construction Conference
    • /
    • 2021.11a
    • /
    • pp.140-141
    • /
    • 2021
  • ESS refers to a device that can store electrical energy produced by renewable energy generation, etc. and use it when necessary. Lithium-ion batteries are composed of high energy density and combustible electrolyte, so once ignited, it is difficult to extinguish. Many studies have been conducted to solve the problem of the battery itself as the cause of the fire. However, there is also a problem with the structure in which ESS(hereinafter referred to as ESS storage) is installed itself. Therefore, the purpose of this paper is to provide data to solve the problems related to ignition and fire spread due to the problem of ESS storage. In summer, the internal temperature of the ESS storage rises due to solar radiation to trigger a fire, so it is necessary to prevent an internal temperature rise due to solar radiation. Research on standards, materials used, structures, etc. for ESS storage and new regulations are required.

  • PDF

Vector Data Compression Method using K-means Clustering (K평균 군집화를 이용한 벡터 데이터 압축 방법)

  • Lee, Dong-Heon;Chun, Woo-Je;Park, Soo-Hong
    • Journal of Korea Spatial Information System Society
    • /
    • v.7 no.3 s.15
    • /
    • pp.45-53
    • /
    • 2005
  • Nowadays, using the mobile communication devices, such as a mobile phone, PDA, telematics device, and so forth, are increasing. The large parts of the services with these mobile devices are the position tracking and the route planning. For offering these services, it is increasing the use of the spatial data on the mobile environment. Although the storage of mobile device expands more than before, it still lacks the necessary storage on the spatial data. In this paper, lossy compression technique on the spatial data is suggested, and then it is analyzed the compression ratio and the amount of loss data by the test. Suggested compression technique on the spatial data at this paper is applied to the real-data, and others methods, suggested at the previous studies, is applied to same data. According as the results from both are compared and analyzed, compression technique suggested at this study shows better performance when the compression result is demanded the high position accuracy.

  • PDF

Design and Implementation of a Crypto Processor and Its Application to Security System

  • Kim, Ho-Won;Park, Yong-Je;Kim, Moo-Seop
    • Proceedings of the IEEK Conference
    • /
    • 2002.07a
    • /
    • pp.313-316
    • /
    • 2002
  • This paper presents the design and implementation of a crypto processor, a special-purpose microprocessor optimized for the execution of cryptography algorithms. This crypto processor can be used fur various security applications such as storage devices, embedded systems, network routers, etc. The crypto processor consists of a 32-bit RISC processor block and a coprocessor block dedicated to the SEED and triple-DES (data encryption standard) symmetric key crypto (cryptography) algorithms. The crypto processor has been designed and fabricated as a single VLSI chip using 0.5 $\mu\textrm{m}$ CMOS technology. To test and demonstrate the capabilities of this chip, a custom board providing real-time data security for a data storage device has been developed. Testing results show that the crypto processor operates correctly at a working frequency of 30MHz and a bandwidth o1240Mbps.

  • PDF