• Title/Summary/Keyword: Dynamic Access

Search Result 873, Processing Time 0.025 seconds

Dynamic Data Migration in Hybrid Main Memories for In-Memory Big Data Storage

  • Mai, Hai Thanh;Park, Kyoung Hyun;Lee, Hun Soon;Kim, Chang Soo;Lee, Miyoung;Hur, Sung Jin
    • ETRI Journal
    • /
    • v.36 no.6
    • /
    • pp.988-998
    • /
    • 2014
  • For memory-based big data storage, using hybrid memories consisting of both dynamic random-access memory (DRAM) and non-volatile random-access memories (NVRAMs) is a promising approach. DRAM supports low access time but consumes much energy, whereas NVRAMs have high access time but do not need energy to retain data. In this paper, we propose a new data migration method that can dynamically move data pages into the most appropriate memories to exploit their strengths and alleviate their weaknesses. We predict the access frequency values of the data pages and then measure comprehensively the gains and costs of each placement choice based on these predicted values. Next, we compute the potential benefits of all choices for each candidate page to make page migration decisions. Extensive experiments show that our method improves over the existing ones the access response time by as much as a factor of four, with similar rates of energy consumption.

Trust and Risk based Access Control and Access Control Constraints

  • Helil, Nurmamat;Kim, Mu-Cheol;Han, Sang-Yong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.5 no.11
    • /
    • pp.2254-2271
    • /
    • 2011
  • Access control in dynamic environments needs the ability to provide more access opportunities of information to users, while also ensuring protection information from malicious users. Trust and risk are essential factors and can be combined together in access control decision-making to meet the above requirement. In this paper, we propose the combination of the trust and risk in access control to balance information accessibility and protection. Access control decision is made on the basis of trustworthiness of users and risk value of permissions. We use potential relations between users and relations between permissions in access control. Our approach not only provides more access opportunities for trustworthy users in accessing permissions, but also enforces traditional access control constraints such as Chinese Wall policy and Separation of Duty (SoD) of Role-Based Access Control (RBAC) model in an effective way.

Access Control Policy of Data Considering Varying Context in Sensor Fusion Environment of Internet of Things (사물인터넷 센서퓨전 환경에서 동적인 상황을 고려한 데이터 접근제어 정책)

  • Song, You-jin;Seo, Aria;Lee, Jaekyu;Kim, Yei-chang
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.4 no.9
    • /
    • pp.409-418
    • /
    • 2015
  • In order to delivery of the correct information in IoT environment, it is important to deduce collected information according to a user's situation and to create a new information. In this paper, we propose a control access scheme of information through context-aware to protect sensitive information in IoT environment. It focuses on the access rights management to grant access in consideration of the user's situation, and constrains(access control policy) the access of the data stored in network of unauthorized users. To this end, after analysis of the existing research 'CP-ABE-based on context information access control scheme', then include dynamic conditions in the range of status information, finally we propose a access control policy reflecting the extended multi-dimensional context attribute. Proposed in this paper, access control policy considering the dynamic conditions is designed to suit for IoT sensor fusion environment. Therefore, comparing the existing studies, there are advantages it make a possible to ensure the variety and accuracy of data, and to extend the existing context properties.

Dynamic Knowledge Map and RDB-based Knowledge Conceptualization in Medical Arena (동적지식도와 관계형 데이터베이스 기반의 의료영역 지식 개념화)

  • Kim, Jin-Sung
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 2004.04a
    • /
    • pp.111-114
    • /
    • 2004
  • Management of human knowledge is an interesting concept that has attracted the attention of philosophers for thousands of years. Artificial intelligence and knowledge engineering has provided some degree of rigor to the study of knowledge systems and expert systems(ES) re able to use knowledge to solve the problems and answer questions. Therefore, the process of conceptualization and inference of knowledge are fundamental problem solving activities and hence, are essential activities for solving the problem of software ES construction Especially, the access to relevant, up-to-date and reliable knowledge is very important task in the daily work of physicians and nurses. In this study, we propose the conceptualization and inference mechanism for implicit knowledge management in medical diagnosis area. To this purpose, we combined the dynamic knowledge map(KM) and relational database(RDB) into a dynamic knowledge map(DKM). A graphical user-interface of DKM allows the conceptualization of the implicit knowledge of medical experts. After the conceptualization of implicit knowledge, we developed an RDB-based inference mechanism and prototype software ES to access and retrieve the implicit knowledge stored in RDB. Our proposed system allows the fast comfortable access to relevant knowledge fitting to the demands of the current task.

  • PDF

Dynamic Channel Assignment Scheme Using Graph Coloring in Femtocell Networks (펨토셀 네트워크에서 그래프 컬러링을 이용한 동적채널할당 방법)

  • Kim, Se-Jin;Cho, IlKwon;Kim, Yi-Kang;Cho, Choong-Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38B no.4
    • /
    • pp.257-265
    • /
    • 2013
  • In this paper, we proposed a Dynamic Channel Assignment (DCA) scheme called Graph Coloring based DCA (GC-DCA) to improve system performance for downlink femtocell networks with high density femto Access Point (AP) deployments. The proposed scheme consists of two steps: one is a femto AP grouping step considering interference and the other is a DCA step considering Signal to Interference plus Noise Ratio (SINR) for femto User Equipments (UEs). Simulation results show that the proposed GC-DCA outperforms other schemes in terms of the mean femto UE capacity and probability of femto UEs which have capacities less than a given transmit rate.

A New Dynamic Bandwidth Assigmnent Algorithm for Ethernet-PON (Ethernet-PON을 위한 새로운 동적 대역 할당 알고리즘)

  • Jang, Seong-Ho;Jang, Jong-Wook
    • The KIPS Transactions:PartC
    • /
    • v.10C no.4
    • /
    • pp.441-446
    • /
    • 2003
  • Earlier efforts on optical access concentrated on the design of PONs for the collection and distribution portion of the access network. The PON architecture is very simple but it requires a MAC protocol for control of upstream traffic. The MAC protocol must support QoS (Quality of Service) administration function by various traffic class, efficient dynamic bandwidth assignment function, CDV (Ceil Delay Variation) minimization function etc. This paper proposes a dynamic bandwidth assignment algorithm of the MAC protocol for a broadband access network using an Ethernet Passive Optical Network supporting various traffic class. We compare our proposed with MDRR algorithm using simulation, and confirmed that our proposed Request-Counter algorithm produces shorter average cell delay.

Terminal-Assisted Hybrid MAC Protocol for Differentiated QoS Guarantee in TDMA-Based Broadband Access Networks

  • Hong, Seung-Eun;Kang, Chung-Gu;Kwon, O-Hyung
    • ETRI Journal
    • /
    • v.28 no.3
    • /
    • pp.311-319
    • /
    • 2006
  • This paper presents a terminal-assisted frame-based packet reservation multiple access (TAF-PRMA) protocol, which optimizes random access control between heterogeneous traffic aiming at more efficient voice/data integrated services in dynamic reservation TDMA-based broadband access networks. In order to achieve a differentiated quality-of-service (QoS) guarantee for individual service plus maximal system resource utilization, TAF-PRMA independently controls the random access parameters such as the lengths of the access regions dedicated to respective service traffic and the corresponding permission probabilities, on a frame-by-frame basis. In addition, we have adopted a terminal-assisted random access mechanism where the voice terminal readjusts a global permission probability from the central controller in order to handle the 'fair access' issue resulting from distributed queuing problems inherent in the access network. Our extensive simulation results indicate that TAF-PRMA achieves significant improvements in terms of voice capacity, delay, and fairness over most of the existing medium access control (MAC) schemes for integrated services.

  • PDF

SIP QoS Support in Broadband Access Networks (광대역 접속망에서 SIP QoS 지원 방안)

  • Park, Seung-Chul
    • Journal of KIISE:Information Networking
    • /
    • v.34 no.1
    • /
    • pp.73-80
    • /
    • 2007
  • This paper presents an approach to support dynamic QoS(Quality of Service) requirements of largely emerging SIP(Session Initiation Protocol) multimedia applications in broadband access networks. The topology of QoS-enabled broadband access networks and its operational model to support SIP QoS are firstly suggested. And then the procedures to bind QoS-enabled SIP signaling into an IP QoS mechanism are presented. In this paper, DiffServ-based IP QoS architecture is deployed due to the complexity problem of the other IntServ architecture, and COPS(Common Open Policy Service) and COPS-PR protocol based signaling mechanisms are used to support dynamic DiffServ QoS, correspondent with dynamic SIP QoS. The broadband access network is assumed to support rapidly expanding Metro Ethernet 802.1 D/Q QoS, and how to translate SIP QoS parameters into IP DiffServ classes and DiffServ classes into 802.1 D/Q QoS parameters is also presented in this paper.

Efficient Differentiated Bandwidth Allocation for QoS based Ethernet PON System (QoS 기반의 EPON 시스템에서 효율적인 차등 대역폭 할당)

  • Eom Jong-Hoon;Jung Min-Suk;Kim Sung-Ho
    • Journal of KIISE:Information Networking
    • /
    • v.32 no.2
    • /
    • pp.156-166
    • /
    • 2005
  • Ethernet passive optical network is an economical and efficient access network that has received significant research attention in recent years. A MAC(Media Access Control) protocol of PON, the next generation access network, is based on TDMA(Time Division Multiple Access) basically. In this thesis, we addressed the problem of dynamic bandwidth allocation in QoS based Ethernet PONs. We augmented the bandwidth allocation to support QoS in a differentiated services framework. Our differentiated bandwidth guarantee allocation(DBGA) allocates effectively and fairly bandwidths among end users. Moreover, we showed that DBGA that perform weighted bandwidth allocation for high priority packets result in better performance in terms of average and maximum packet delay, as well as network throughput compared with existing dynamic bandwidth allocations. We used simulation experiments to study the performance and validate the effectiveness of the proposed bandwidth allocations.

A Multi-Level Access Control Scheme on Dynamic Multicast Services (동적 멀티캐스트 서비스상의 다단계 접근통제 기법)

  • 신동명;박희운;최용락
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.12 no.6
    • /
    • pp.47-58
    • /
    • 2002
  • The access control techniques, which can control unauthorized members to access to multicast service, have not been studied very often while there are a lot of on-going study on secure multicast architecture, multicast key distribution and sender authentication scheme have been studied. Multi level access control scheme in multicast can be used in a remote secure conference or to provide graduated multimedia services to each customers. In fact, multicast network has its own virtual networks according to different security levels. However, Early schemes are not effective when it protects unauthorized access in multi-access network environment. Furthermore this scheme does not provide us with hierarchical access control mechanism. This paper, therefore, proposes hierarchical access control scheme to provide the effectiveness in network layer by security level comparison. And we also suggests hierarchical key distribution scheme for multi level access control in application layer and effective hierarchical key renewal scheme in dynamic multicast environment which is easy to join and leaving the multicast group.