• Title/Summary/Keyword: Data confidentiality

Search Result 319, Processing Time 0.023 seconds

Energy-Aware Data-Preprocessing Scheme for Efficient Audio Deep Learning in Solar-Powered IoT Edge Computing Environments (태양 에너지 수집형 IoT 엣지 컴퓨팅 환경에서 효율적인 오디오 딥러닝을 위한 에너지 적응형 데이터 전처리 기법)

  • Yeontae Yoo;Dong Kun Noh
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.18 no.4
    • /
    • pp.159-164
    • /
    • 2023
  • Solar energy harvesting IoT devices prioritize maximizing the utilization of collected energy due to the periodic recharging nature of solar energy, rather than minimizing energy consumption. Meanwhile, research on edge AI, which performs machine learning near the data source instead of the cloud, is actively conducted for reasons such as data confidentiality and privacy, response time, and cost. One such research area involves performing various audio AI applications using audio data collected from multiple IoT devices in an IoT edge computing environment. However, in most studies, IoT devices only perform sensing data transmission to the edge server, and all processes, including data preprocessing, are performed on the edge server. In this case, it not only leads to overload issues on the edge server but also causes network congestion by transmitting unnecessary data for learning. On the other way, if data preprocessing is delegated to each IoT device to address this issue, it leads to another problem of increased blackout time due to energy shortages in the devices. In this paper, we aim to alleviate the problem of increased blackout time in devices while mitigating issues in server-centric edge AI environments by determining where the data preprocessed based on the energy state of each IoT device. In the proposed method, IoT devices only perform the preprocessing process, which includes sound discrimination and noise removal, and transmit to the server if there is more energy available than the energy threshold required for the basic operation of the device.

Distributed Security for Web Application Contents Protection (웹 어플리케이션 콘텐츠 보호를 위한 분산 보안)

  • Heo, Jin-Kyoung
    • Journal of Digital Contents Society
    • /
    • v.9 no.1
    • /
    • pp.125-130
    • /
    • 2008
  • User web service is increasing by development of internet technology. Quantity of encrypted data that transmitted through the network are increasing by development of encipherment technology. We have many problems; it is caused by technical development and service increase of user requests. It is like that, we have reliability of contents and illegality copy problem of internet contents in web application system. It is contents protection skills in web that encipherment technology, authentication and digital signature. We need message encoding and secret key for solve vulnerability of encipherment in web application system. In this paper, we propose a distributed secure system that can data confidentiality and user authentication. It prevent performance degradation from bottle neck in encipherment server, and improve service quality.

  • PDF

Cryptanalysis of an 'Efficient-Strong Authentiction Protocol (E-SAP) for Healthcare Applications Using Wireless Medical Sensor Networks'

  • Khan, Muhammad Khurram;Kumari, Saru;Singh, Pitam
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.5
    • /
    • pp.967-979
    • /
    • 2013
  • Now a day, Wireless Sensor Networks (WSNs) are being widely used in different areas one of which is healthcare services. A wireless medical sensor network senses patient's vital physiological signs through medical sensor-nodes deployed on patient's body area; and transmits these signals to devices of registered medical professionals. These sensor-nodes have low computational power and limited storage capacity. Moreover, the wireless nature of technology attracts malicious minds. Thus, proper user authentication is a prime concern before granting access to patient's sensitive and private data. Recently, P. Kumar et al. claimed to propose a strong authentication protocol for healthcare using Wireless Medical Sensor Networks (WMSN). However, we find that P. Kumar et al.'s scheme is flawed with a number of security pitfalls. Information stored inside smart card, if extracted, is enough to deceive a valid user. Adversary can not only access patient's physiological data on behalf of a valid user without knowing actual password, can also send fake/irrelevant information about patient by playing role of medical sensor-node. Besides, adversary can guess a user's password and is able to compute the session key shared between user and medical sensor-nodes. Thus, the scheme looses message confidentiality. Additionally, the scheme fails to resist insider attack and lacks user anonymity.

RGB-based Personal Virtual Currency Price Information System (RGB 기반 개인용 가상화폐 가격정보 안내 시스템)

  • Park, Se-il;Jang, Jong-wook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2018.05a
    • /
    • pp.203-204
    • /
    • 2018
  • In recent years, interest in various virtual currencies has been increasing, starting with bit coin, and investment and trading of virtual currencies are being activated. However, since the price of virtual money is unstable and the rate of change of the price is very large, frequent confirmation of the amount of money is required, so that virtual money investors often have to check the virtual money market. Therefore, in this paper, we expect that it will reduce the wasted time on the exchange by using the price information guidance system that collects the virtual currency price information data and express it in RGB, and only the system user can understand the data expression and support the confidentiality.

  • PDF

Perception of Physicians and Nurses on Presence of Family during Invasive Procedures (침습적 시술 시 가족입회에 대한 의사와 간호사의 인식)

  • Sim, Sang-Hee;Lee, Eun-Nam
    • Journal of Korean Academy of Nursing
    • /
    • v.40 no.3
    • /
    • pp.326-335
    • /
    • 2010
  • Purpose: The purpose of this descriptive study was to determine the perception of physicians and nurses on family presence during invasive procedures. Methods: The study population consisted of 100 physicians and 100 nurses from five hospitals which have more than 500 beds in B city. Data collection was done from August 20 to September 19, 2007. The Family Presence During Resuscitation (FPDR) Inventory developed by Fulbrook, Albarran and Latour (2005) was used as the study instrument. The collected data was analyzed by t-test, ANOVA and Duncan's multiple range test using SPSS/WIN 14.0 version. Results: Nurses had more positive attitudes to allowing family members to be present during invasive procedures than physicians did. However, compared to physicians, nurses had more concern about problems of confidentiality, arguing with medical team, and increased rate of legal action if family members were present during invasive procedure. Conclusion: The results of this study indicate that educational programs and policy for family presence be required within the hospital to enhance the perception of physicians and nurses to the family presence.

Ciphertext policy attribute-based encryption supporting unbounded attribute space from R-LWE

  • Chen, Zehong;Zhang, Peng;Zhang, Fangguo;Huang, Jiwu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.4
    • /
    • pp.2292-2309
    • /
    • 2017
  • Ciphertext policy attribute-based encryption (CP-ABE) is a useful cryptographic technology for guaranteeing data confidentiality but also fine-grained access control. Typically, CP-ABE can be divided into two classes: small universe with polynomial attribute space and large universe with unbounded attribute space. Since the learning with errors over rings (R-LWE) assumption has characteristics of simple algebraic structure and simple calculations, based on R-LWE, we propose a small universe CP-ABE scheme to improve the efficiency of the scheme proposed by Zhang et al. (AsiaCCS 2012). On this basis, to achieve unbounded attribute space and improve the expression of attribute, we propose a large universe CP-ABE scheme with the help of a full-rank differences function. In this scheme, all polynomials in the R-LWE can be used as values of an attribute, and these values do not need to be enumerated at the setup phase. Different trapdoors are used to generate secret keys in the key generation and the security proof. Both proposed schemes are selectively secure in the standard model under R-LWE. Comparison with other schemes demonstrates that our schemes are simpler and more efficient. R-LWE can obtain greater efficiency, and unbounded attribute space means more flexibility, so our research is suitable in practices.

On Securing Web-based Educational Online Game Using SSL Protocol (SSL 프로토콜을 이용한 안전한 웹기반 교육용 온라인 게임)

  • Yani, Kadek Restu;Priyana, Yoga;Rusmin, Pranoto H.;RHEE, Kyung-Hyune
    • Journal of Fisheries and Marine Sciences Education
    • /
    • v.28 no.3
    • /
    • pp.790-798
    • /
    • 2016
  • Currently, web-based online games is becoming popular in supporting learning process due to their effective and efficient tool. However, online games have lack of security aspect, in particular due to increase in the number of personal information leakage. Since the data are transmitted over insecure channel, it will be vulnerable of being intercepted by attackers who want to exploit user's identity. This paper aims to propose an online web-based educational game, Vidyanusa which allows the students to register their personal information using a unique code, a user name and a password. It manages the users according to their schools, subject teachers and class levels. In addition, by adopting a unique code, the confidentiality of the user identity can be kept away from attackers. Moreover, in order to provide a secure data communication between client and server, Secure Socket Layer (SSL) protocol is adopted. The performance of the system after implementing SSL protocol is examined by loading a number of requests for various users. From the experiment result, it can be concluded that the SSL protocol can be applied to web-based educational system in order to offer security services and reliable connection.

Smart Message Service Platform for Mobile Environment (모바일용 스마트 메시지 서비스 플랫폼)

  • Kim, Nam-Yun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.11 no.5
    • /
    • pp.73-79
    • /
    • 2011
  • With increasing use of smartphone, users require a new message service to prevent security attack and provide integrated messages. Since smartphone uses data services such as 3G cell network and WiFi, it can provide reliable message transfer through various security policies. In addition, it can transfer various data collected using built-in camera and GPS. This paper proposes a smart message service platform which can provide security services such as authentication, confidentiality and integrity as well as transfer the integrated message including location, picture and text. To verity the functionality of the platform, this paper implements an iPhone app and message transfer server, and then shows the implementation results.

Generation and Verification of a Real Estate Contract Digital Signature Based on XML Security (XML 보안 기반의 부동산 계약서 전자서명 생성 및 검증)

  • Lee, Moon-Goo
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.45 no.6
    • /
    • pp.147-153
    • /
    • 2008
  • Talking about reliability of I-commerce, the security services such as data integrity and non-repudiation are the most crucial elements. This thesis implemented the real estate contract digital signature system that makes this real estate E-commerce Possible. The technical background used in this thesis for the security services is XML (extensible Markup Language) signature technique, which is a signature technique that applies XML on the existing digital signature algorithm. The advantage of using XML signature technique is that it is very efficient since signing for the partial data is possible, and it is easy to apply to the XML-based I-commerce system which is most commonly used.

Factors Affecting Periodic Screening Behaviors for Breast Cancer among Hospital Nurses (병원간호사의 정기적인 유방암 검진행위 영향 요인)

  • Lee, Suk-Ok;Sim, Eun-Soon;Ahn, Suk-Hee
    • Women's Health Nursing
    • /
    • v.16 no.4
    • /
    • pp.390-398
    • /
    • 2010
  • Purpose: The purpose of this study was to analyze periodic screening behaviors for breast cancer and factors affecting the screening behaviors among hospital nurses. Methods: A total of 461 nurses were recruited from 15 hospitals located in two southern areas of Korea. The Champion's Health Beliefs Model Scale-Korean version and a structured study questionnaire were used for data collection. Data were collected during July and August 2008. Results: Nurses who performed periodic mammography accounted for 15.6% of the total, while 22.8% performed periodic breast self-examination (BSE). Among married nurses, the rates of periodic mammography and BSE were significantly different by age, menopausal status, delivery experience, family history of breast cancer, and experiences of cervical cancer screening. Significant factors affecting periodic mammography were family history of breast cancer, experiences of cervical cancer screening, age above 40, and performance of periodic BSE. For health beliefs, levels of severity, confidentiality and barrier were significant factors for periodic BSE. Conclusion: Nurses, who are role models for health promoting behaviors, did not adequately performing periodic BSE and mammography. A health promotion program for breast cancer designed for hospital nurses is needed to improve performance rates for periodic screening behaviors for breast cancer.