• Title/Summary/Keyword: Decentralized

Search Result 957, Processing Time 0.023 seconds

Proposal of SMPC Biometric Authentication System Based on Public Blockchain (퍼블릭 블록체인 기반 SMPC 생체인증 시스템 제안)

  • Ji-Su Doo;Hyeok Kang;Keun-Ho Lee
    • Journal of Internet of Things and Convergence
    • /
    • v.9 no.2
    • /
    • pp.77-82
    • /
    • 2023
  • As the method of collecting and utilizing structured and unstructured data develops due to the influence of the Fourth Industrial Revolution, unwanted personal information data is also being collected and utilized, and hackers are attempting various attacks to steal information. As a result, the importance of information protection has increased, and various protection techniques have emerged, among which many studies have been conducted using decentralized techniques of blockchain and various algorithms to strengthen the security of biometric authentication techniques. This paper proposed a public blockchain biometric authentication system that allows users to protect their data in a safer biometric authentication method in the public blockchain and use it in the blockchain through signature with authenticated information.

Molding the East Asian Dragons: The Creation and Transformation of Various Ecological and Political Discourses

  • NGUYEN Ngoc Tho;PHAN Thi Thu Hien
    • Journal of Daesoon Thought and the Religions of East Asia
    • /
    • v.2 no.2
    • /
    • pp.73-99
    • /
    • 2023
  • The dragon is a special imaginary figure created by the people of East Asia. Its archetypes appeared primarily as totemic symbols of different tribes and groups in the region. The formation of early dynasties probably generated the molding of the dragon symbol. Dragon symbols carried deep imprints of nature. They concealed alternative messages of how ancient people at different locations dealt with or interacted with nature. Under pressure to standardize in the medieval and late imperial periods, the popular dragon had to transform physically and ideologically. It became imposed, unified, and framed, conveying ideas of caste classification and power, and losing itsecological implications. The dragon transitioned from a semi-ecological domain into a total social caste system. However, many people considered the "standardized" dragon as the symbol of the oppressor. Because of continuous orthopraxy and calls for imperial reverence, especially under orthopractic agenda and the surveillance of local elites, the popularized dragon was imbued within local artworks or hidden under the sanctity of Buddhas or popular gods in order to survive. Through disguise, the popular dragon partially maintained its ecological narratives. When the imperial dynasties ended in East Asia (1910 in Korea, 1911 in China, 1945 in Vietnam), the dragon was dramatically decentralized. However, trends of re-standardization and re-centralization have emerged recently in China, as the country rises in the global arena. In this newly-emerging "re-orthopraxy", the dragon has been superimposed with a more externally political discourse ("soft power" in international relations) rather than the old-style standardization for internal centralization in the late imperial period. In the contemporary world, science and technology have advanced humanity's ability to improve the world; however, it seems that people have abused science and technology to control nature, consequently damaging the environment (pollution, global warming, etc.). The dragon symbol needs to be re-defined, "re-molded", re-evaluated and reinterpreted accordingly, especially under the newly-emerging lens-the New Confucian "anthropocosmic" view.

The Types and Characteristics of Transformational Design Ideas in Contemporary Military Look (현대 밀리터리 룩에 나타난 전환적 디자인 발상 유형과 특성)

  • XUEJIAO, JIA;Kim, Hyun-joo;Youn, Ji-young
    • Journal of Digital Convergence
    • /
    • v.20 no.1
    • /
    • pp.265-275
    • /
    • 2022
  • This study analyzes and categorizes the cases of military look's transitional design ideas in recent women's fashion collections, and derives characteristics. The research method is a theoretical review of military look and an analysis of fashion collection cases. The research results were classified into a total of six transformational design ideas. As a structural change in design, it is a decentralized type, a type of expansion and reduction, a change in the entire material, or a transition of some materials, and finally a type according to heterogeneous harmony and organic combination corresponding to styling. Finally, a total of three characteristics are the reconstruction of structural elements, the expansion of the metric of the second mix match, and the emotional fusion of styling. I hope that the study of the transformative type of idea of the new military look will be the driving force for creative design development and will be a basic study that can read the current status and changes of the times throughout fashion design.

A Study on the Application of Security Reinforcement Technology Reflecting Zero Trust Principles (제로 트러스트 원리를 반영한 보안 강화 요소 기술 적용 방안 연구)

  • DA-IN Lee;Hoo-Ki Lee
    • Convergence Security Journal
    • /
    • v.22 no.3
    • /
    • pp.3-11
    • /
    • 2022
  • With increasingly sophisticated cyber threats, accelerating cloud adoption, and the adoption of remote and hybrid work environments due to the COVID-19 pandemic, the traditional security model, in which many businesses implicitly trust everything within their boundaries, is changing without boundaries, allowing data and users The concept of zero trust is getting more and more attention as the fact that it is not suitable for today's increasingly decentralized environment has been highlighted. Zero Trust is a cyber security model on the premise that 'no one trusts'. In principle, there is no safe area or user in the entire system, and internal users are also verified. is a way As telecommuting becomes commonplace due to the COVID-19 pandemic, and existing cyber security measures are facing limitations, Zero Trust technology is drawing more attention. Accordingly, it is expected that the Korean government will also check the status of acceptability of the domestic public and private sectors and tasks that need improvement when introducing Zero Trust with reference to the NIST standard. In this paper, the basic principles, philosophy, and considerations of Zero Trust and Zero Trust are explained, and practical basic measures to strengthen security by combining Zero Trust technology are presented.

Low Impact Urban Development For Climate Change and Natural Disaster Prevention

  • Lee, Jung-Min;Jin, Kyu-Nam;Sim, Young-Jong;Kim, Hyo-Jin
    • International conference on construction engineering and project management
    • /
    • 2015.10a
    • /
    • pp.54-55
    • /
    • 2015
  • Increase of impervious areas due to expansion of housing area, commercial and business building of urban is resulting in property change of stormwater runoff. Also, rapid urbanization and heavy rain due to climate change lead to urban flood and debris flow damage. In 2010 and 2011, Seoul had experienced shocking flooding damages by heavy rain. All these have led to increased interest in applying LID and decentralized rainwater management as a means of urban hydrologic cycle restoration and Natural Disaster Prevention such as flooding and so on. Urban development is a cause of expansion of impervious area. It reduces infiltration of rain water and may increase runoff volume from storms. Low Impact Development (LID) methods is to mimic the predevelopment site hydrology by using site design techniques that store, infiltrate, evaporate, detain runoff, and reduction flooding. Use of these techniques helps to reduce off-site runoff and ensure adequate groundwater recharge. The contents of this paper include a hydrologic analysis on a site and an evaluation of flooding reduction effect of LID practice facilities planned on the site. The region of this Case study is LID Rainwater Management Demonstration District in A-new town and P-new town, Korea. LID Practice facilities were designed on the area of rainwater management demonstration district in new town. We performed analysis of reduction effect about flood discharge. SWMM5 has been developed as a model to analyze the hydrologic impacts of LID facilities. For this study, we used weather data for around 38 years from January 1973 to August 2014 collected from the new town City Observatory near the district. Using the weather data, we performed continuous simulation of urban runoff in order to analyze impacts on the Stream from the development of the district and the installation of LID facilities. This is a new approach to stormwater management system which is different from existing end-of-pipe type management system. We suggest that LID should be discussed as a efficient method of urban disasters and climate change control in future land use, sewer and stormwater management planning.

  • PDF

Modeling and experimental verification of phase-control active tuned mass dampers applied to MDOF structures

  • Yong-An Lai;Pei-Tzu Chang;Yan-Liang Kuo
    • Smart Structures and Systems
    • /
    • v.32 no.5
    • /
    • pp.281-295
    • /
    • 2023
  • The purpose of this study is to demonstrate and verify the application of phase-control absolute-acceleration-feedback active tuned mass dampers (PCA-ATMD) to multiple-degree-of-freedom (MDOF) building structures. In addition, servo speed control technique has been developed as a replacement for force control in order to mitigate the negative effects caused by friction and inertia. The essence of the proposed PCA-ATMD is to achieve a 90° phase lag for a structure by implementing the desired control force so that the PCA-ATMD can receive the maximum power flow with which to effectively mitigate the structural vibration. An MDOF building structure with a PCA-ATMD and a real-time filter forming a complete system is modeled using a state-space representation and is presented in detail. The feedback measurement for the phase control algorithm of the MDOF structure is compact, with only the absolute acceleration of one structural floor and ATMD's velocity relative to the structure required. A discrete-time direct output-feedback optimization method is introduced to the PCA-ATMD to ensure that the control system is optimized and stable. Numerical simulation and shaking table experiments are conducted on a three-story steel shear building structure to verify the performance of the PCA-ATMD. The results indicate that the absolute acceleration of the structure is well suppressed whether considering peak or root-mean-square responses. The experiment also demonstrates that the control of the PCA-ATMD can be decentralized, so that it is convenient to apply and maintain to real high-rise building structures.

Anonymous Electronic Promissory Note System Based on Blockchain (블록체인 기반 익명 전자 어음 시스템)

  • HyunJoo Woo;Hyoseung Kim;Dong Hoon Lee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.6
    • /
    • pp.947-960
    • /
    • 2023
  • In Korea, traditional paper promissory notes are currently undergoing a transformation, being gradually replaced by electronic notes. This transformation is being steered under the Korea Financial Telecommunications Institute, a trusted authority. However, existing electronic systems have security vulnerabilities, including the risk of hacking and internal errors within the institute. To this end, we have defined a novel anonymous electronic promissory note system based on blockchain. We have constructed a concrete protocol and conducted security analysis of our protocol. Note that, in our protocol, every note information is committed so that the note remains undisclosed until the point of payment. Once the note information becomes public on the blockchain, it enables the detection of illicit activities, such as money laundering and tax evasion. Furthermore, our protocol incorporates a feature of split endorsement, which is a crucial functionality permitted by the Korean electronic note system. Consequently, our proposed protocol is suitable for practical applications in financial transactions.

Configurable Smart Contracts Automation for EVM based Blockchains

  • ZAIN UL ABEDIN;Muhammad Shujat Ali;Ashraf Ali;Sana Ejaz
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.10
    • /
    • pp.147-156
    • /
    • 2023
  • Electronic voting machines (EVMs) are replacing research ballots due to the errors involved in the manual counting process and the lengthy time required to count the votes. Even though these digital recording electronic systems are advancements, they are vulnerable to tampering and electoral fraud. The suspected vulnerabilities in EVMs are the possibility of tampering with the EVM's memory chip or replacing it with a fake one, their simplicity, which allows them to be tampered with without requiring much skill, and the possibility of double voting. The vote data is shared among all network devices, and peer-to-peer verification is performed to ensure the vote data's authenticity. To successfully tamper with the system, all of the data stored in the nodes must be changed. This improves the proposed system's efficiency and dependability. Elections and voting are fundamental components of a democratic system. Various attempts have been made to make modern elections more flexible by utilizing digital technologies. The fundamental characteristics of free and fair elections are intractability, immutability, transparency, and the privacy of the actors involved. This corresponds to a few of the many characteristics of blockchain-like decentralized ownership, such as chain immutability, anonymity, and distributed ledger. This working research attempts to conduct a comparative analysis of various blockchain technologies in development and propose a 'Blockchain-based Electronic Voting System' solution by weighing these technologies based on the need for the proposed solution. The primary goal of this research is to present a robust blockchain-based election mechanism that is not only reliable but also adaptable to current needs.

Research on User-Centric Inter-Organizational Collaboration (UCICOIn) framework (사용자 제어 기반 다중 도메인 접근 제어에 대한 연구)

  • Sunghyuck Hong
    • Journal of Industrial Convergence
    • /
    • v.21 no.12
    • /
    • pp.37-43
    • /
    • 2023
  • In today's business landscape, collaboration and interoperability are crucial for organizational success and profitability. However, integrating operations across multiple organizations is challenging due to differing roles and policies in Identity and Access Management (IAM). User-centric identity (UCI) adopts a personalized approach to digital identity management, centering on the end-user for authentication and access control. It provides a decentralized system that ensures secure and customized access for each user. UCI aims to address complex security challenges by aligning access privileges with individual user requirements. This research delves into UCI's ability to streamline resource access amidst conflicting IAM roles and protocols across various organizations. The study presents a UCI-based multi-domain access control (MDAC) framework, which encompasses an ontology, a unified method for articulating access roles and policies across domains, and software services melding with UCI infrastructure. The goal is to enhance organizational resource management and decision-making by offering clear guidelines on access roles and policy management across diverse domains, ultimately boosting companies' return on investment.

Self-Sovereign Identity Management: A Comparative Study and Technical Enhancements

  • Noot A. Alissa;Waleed A. Alrodhan
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.12
    • /
    • pp.27-80
    • /
    • 2023
  • Nowadays usage of different applications of identity management IDM demands prime attention to clarify which is more efficient regarding preserve privacy as well as security to perform different operations concerning digital identity. Those operations represent the available interactions with identity during its lifecycle in the digital world e.g., create, update, delete, verify and so on. With the rapid growth in technology, this field has been evolving with a number of IDM models being proposed to ensure that identity lifecycle and face some significant issues. However, the control and ownership of data remines in the hand of identity service providers for central and federated approaches unlike in the self-sovereign identity management SSIM approach. SSIM is the recent IDM model were introduced to solve the issue regarding ownership of identity and storing the associated data of it. Thus, SSIM aims to grant the individual's ability to govern their identities without intervening administrative authorities or approval of any authority. Recently, we noticed that numerous IDM solutions enable individuals to own and control their identities in order to adapt with SSIM model. Therefore, we intend to make comparative study as much of these solutions that have proper technical documentation, reports, or whitepapers as well as provide an overview of IDM models. We will point out the existing research gaps and how this study will bridge it. Finally, the study will propose a technical enhancement, everKEY solution, to address some significant drawbacks in current SSIM solutions.