• 제목/요약/키워드: Digital Computing Environment

검색결과 282건 처리시간 0.027초

A Study on the Authentication of Digital Content in Cloud Computing Environment

  • Jang, Eun-Gyeom
    • 한국컴퓨터정보학회논문지
    • /
    • 제27권11호
    • /
    • pp.99-106
    • /
    • 2022
  • 본 논문은 클라우딩 컴퓨팅 환경에서 디지털 콘텐츠 관리 기술을 제안한다. 네트워크를 활용한 컴퓨팅 서비스는 4차 산업혁명 시대에 빠질 수 없는 기본 인프라 서비스이다. 스마트폰을 활용한 금융 서비스, 디지털 콘텐츠 서비스, 산업 및 홈 네트워크 서비스는 국부적인 영역의 서비스에서 전체 서비스가 가능한 클라우드 서비스 환경으로 변화하고 있다. 이에 본 연구에서는 클라우드 컴퓨팅 환경에 적합한 디지털 콘텐츠 서비스가 안전하게 지원되도록 시스템을 제안하였다. 제안 시스템은 사용자의 시스템 접근의 편의성과 안전성을 제공하고, 디지털 콘텐츠 저작자의 저작권을 보호하며, 안전한 디지털 콘텐츠 유통 및 관리 시스템을 제공한다. 본 연구의 목적은 클라우드 컴퓨팅 환경에 적합한 디지털 콘텐츠 유통구조를 제공하여 디지털 콘텐츠 시장을 안정화시키고 활성화하는데 있다.

Development of Digital Contents to Improve Computational Thinking

  • Ryu, Mi-Young;Han, Sun-Gwan
    • 한국컴퓨터정보학회논문지
    • /
    • 제22권12호
    • /
    • pp.87-93
    • /
    • 2017
  • The purpose of this study is to design and develop of digital contents to improve computational thinking in the online education environment. First, we planned the design and development of contents with 19 experts of Software education. Digital content was designed from the point of view of improving the educational quality and the quality of contents for the improve of computing thinking. The content type is classified into the SW education area; computer science, programming, physical computing, convergent computing, computing thinking, and software education that improves the computing thinking. And we designed 45 learning programs for each SW education area. Designed learning contents were developed in 464 lessons to suit the online education environment. The content validity of the proposed content was verified by the expert group and the average CVI value was over .83. Through this, we could analyze that the developed contents will help learners to expand their computing thinking.

데스크톱 가상화에 따른 디지털콘텐츠 통제방안: 가상폴더방식의 구현사례 (Digital Contents Control for Desktop Virtualization: A Case of Virtual Folder Based Implementation)

  • 윤한성
    • 디지털산업정보학회논문지
    • /
    • 제10권4호
    • /
    • pp.1-9
    • /
    • 2014
  • Recently, with the enlargement of cloud computing, virtual desktop infrastructure(VDI) can be an alternative of the existing personal computer based information environment. For the case of partially introduced VDI coexisting with personal computer environment, we suggest a virtual folder based approach to control the overall digital contents within an organization with a case of implementation. Although a centralizing device was used for storage and sharing of organization's digital contents, it was not easy to accomplish centralizing digital contents completely. It is tried to prevent users from utilizing their own storage in their personal computers or virtual machines and to use virtual folder which transfer and store digital contents to and in EDMS. The virtual folder system of this paper looks like a real folder in a personal computer, but it is another virtual device for outer storage devices including EDMS. It can be an alternative and reference of digital contents control for future applications of cloud computing.

클라우드 컴퓨팅의 신뢰성 향상 방안에 관한 연구 (A Study on Improving the Reliability of Cloud Computing)

  • 양정모
    • 디지털산업정보학회논문지
    • /
    • 제8권4호
    • /
    • pp.107-113
    • /
    • 2012
  • Cloud computing has brought changes to the IT environment. Due to the spread of LTE, users of cloud services are growing more. This which provides IT resources to meet the needs of users of cloud services are noted as a core industry. But it is not activated because of the security of personal data and the safety of the service. In order to solve this, intrusion detection system is constructed as follows. This protects individual data safely which exists in the cloud and also protects information exhaustively from malicious attack. The cause of most attack risk which exists to cloud computing can find in distributed environment. In this study, we analyzed about necessary property of network-based intrusion detection system that process and analyze large amount of data which occur in cloud computing environment. Also, we studied functions which detect and correspond attack occurred in interior of virtualization.

퍼베이시브 컴퓨팅 환경에서 소셜네트워크를 이용한 프로액티브 친구 추천 기법 (Proactive Friend Recommendation Method using Social Network in Pervasive Computing Environment)

  • 권준희
    • 디지털산업정보학회논문지
    • /
    • 제9권1호
    • /
    • pp.43-52
    • /
    • 2013
  • Pervasive computing and social network are good resources in recommendation method. Collaborative filtering is one of the most popular recommendation methods, but it has some limitations such as rating sparsity. Moreover, it does not consider social network in pervasive computing environment. We propose an effective proactive friend recommendation method using social network and contexts in pervasive computing environment. In collaborative filtering method, users need to rate sufficient number of items. However, many users don't rate items sufficiently, because the rating information must be manually input into system. We solve the rating sparsity problem in the collaboration filtering method by using contexts. Our method considers both a static and a dynamic friendship using contexts and social network. It makes more effective recommendation. This paper describes a new friend recommendation method and then presents a music friend scenario. Our work will help e-commerce recommendation system using collaborative filtering and friend recommendation applications in social network services.

가상화 기술의 취약점을 이용한 공격 대응에 관한 연구 (A Study against Attack using Virtualization Weakness)

  • 양환석
    • 디지털산업정보학회논문지
    • /
    • 제8권3호
    • /
    • pp.57-64
    • /
    • 2012
  • Computing environment combined with development of internet and IT technology is changing to cloud computing environment. In addition, cloud computing is revitalized more because of propagation of LTE and suggestion of N-screen Service. Virtualization is the point technology for suggest IT resource to service form to users in this cloud computing. This technology combines other system physically or divides one system logically and uses resource efficiently. Many users can be provided application and hardware as needed using this. But, lately various attack using weak point of virtualization technology are increasing rapidly. In this study, we analyze type and weak point of virtualization technology, the point of cloud computing. And we study about function and the position which intrusion detection system has to prepare in order to detect and block attack using this.

유비쿼터스 컴퓨팅 환경에서 RFID보안 기술에 대한 연구 (A Study on the RFID Security Technologies in Ubiquitous Computing Environment)

  • 방기천
    • 디지털콘텐츠학회 논문지
    • /
    • 제6권4호
    • /
    • pp.267-272
    • /
    • 2005
  • 유비쿼터스 컴퓨팅 환경은 미래 생활을 대변하는 새로운 패러다임으로 IT와 개인 생활에 많은 변화를 일으킬 것으로 기대된다. 그러나 유비쿼터스 컴퓨팅 환경은 방대한 정보를 언제 어디서든 획득할 수 있고, 공유할 수 있어서 보안위협 및 개인의 프라이버시 침해와 같은 역기능의 문제가 심화되고 있는 추세이다. 본 논문에서는 유비쿼터스 컴퓨팅 환경에서 RFID 기술 도입에 따른 역기능을 최소화하기 위한 방안에 대해 연구하였다. 본 논문에서는 유비쿼터스 컴퓨팅 환경의 중요한 부분인 RFID시스템에서 발생할 수 있는 보안 및 프라이버시 위험요인들과 보안 요구사항에 대해 알아보았다. 그리고 이러한 위험요인에 대해 현재 진행되고 있는 기술적 해결방법들을 살펴보았다.

  • PDF

유비쿼터스 환경의 교실 공간 계획에 관한 기초적 연구 (A Fundamental Study on the Planning of Classroom Space in the Ubiquitous Environments)

  • 조현호;이재훈
    • 교육시설
    • /
    • 제14권4호
    • /
    • pp.4-13
    • /
    • 2007
  • In 21st century, mankind greets an era of ubiquitous computing where physical and virtual space are merged through the innovation of digital and IT(Information Technology), meanwhile ubiquitous computing and network paradigm suggest a new direction which our future educational system should head for. A society where people, computers, and objects can be connected with each other anytime and anywhere, that is, a society of ubiquitous computing where everything in our living space are interconnected by a immense network system may bring a variety of changes into our educational environment in schools. In this study I analysed the forecast of school educational orientation and ubiquitous educational environment and facilities in developed countries, and on the basis of the result, I performed a fundamental work for formation of a ubiquitous classroom environment which is feasible in Korea. In the section of conclusion, I present a model of ubiquitous classroom as a scenario based on ubiquitous computing technology applicable to future classroom environment.

개인정보관리체계계(PIMS)를 이용한 클라우드컴퓨팅 개인정보 보안 개선 방안 연구 (Personal Information Management System (PIMS) improvement research using cloud computing security)

  • 정혜인;김성준
    • 디지털산업정보학회논문지
    • /
    • 제12권3호
    • /
    • pp.133-155
    • /
    • 2016
  • Recently, in the adoption of cloud computing are emerging as locations are key requirements of security and privacy, at home and abroad, several organizations recognize the importance of privacy in cloud computing environments and research-based transcription and systematic approach in progress have. The purpose of this study was to recognize the importance of privacy in the cloud computing environment based on personal information security methodology to the security of cloud computing, cloud computing, users must be verified, empirical research on the improvement plan. Therefore, for existing users of enhanced security in cloud computing security consisted framework of existing cloud computing environments. Personal information protection management system: This is important to strengthen security for existing users of cloud computing security through a variety of personal information security methodology and lead to positive word-of-mouth to create and foster the cloud industry ubiquitous expression, working environments.

디지털 콘텐츠 컴퓨팅 환경에서의 컴퓨터 포렌식스 정보 수집에 관한 연구 기술에 관한 연구 (A Study of Information Collection for Computer Forensics on Digital Contents Computing Environment)

  • 이종섭;장은겸;최용락
    • 한국콘텐츠학회:학술대회논문집
    • /
    • 한국콘텐츠학회 2008년도 춘계 종합학술대회 논문집
    • /
    • pp.507-513
    • /
    • 2008
  • 디지털 콘텐츠 컴퓨팅 환경에서 서비스를 제공하는 서버시스템의 레지스터, 캐시메모리, 네트워크 정보 등의 휘발성 정보는 침해사고 이후 시간의 경과나 외부의 조작으로 사라지거나 변조되기 쉽기 때문에 실시간으로 확보하는 것이 중요하다. 본 논문에서는 디지털 콘텐츠 컴퓨팅 환경의 서버 시스템에서 휘발성 정보를 메모리를 기반으로 수집하는 기법을 활용하여 동작 중인 서버에서 위급상황이 발생할 시 필요한 정보를 실시간으로 수집할 수 있는 휘발성 정보 수집 모듈을 제안한다.

  • PDF