• Title/Summary/Keyword: End-user computing

Search Result 132, Processing Time 0.023 seconds

Outsourcing decryption algorithm of Verifiable transformed ciphertext for data sharing

  • Guangwei Xu;Chen Wang;Shan Li;Xiujin Shi;Xin Luo;Yanglan Gan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.18 no.4
    • /
    • pp.998-1019
    • /
    • 2024
  • Mobile cloud computing is a very attractive service paradigm that outsources users' data computing and storage from mobile devices to cloud data centers. To protect data privacy, users often encrypt their data to ensure data sharing securely before data outsourcing. However, the bilinear and power operations involved in the encryption and decryption computation make it impossible for mobile devices with weak computational power and network transmission capability to correctly obtain decryption results. To this end, this paper proposes an outsourcing decryption algorithm of verifiable transformed ciphertext. First, the algorithm uses the key blinding technique to divide the user's private key into two parts, i.e., the authorization key and the decryption secret key. Then, the cloud data center performs the outsourcing decryption operation of the encrypted data to achieve partial decryption of the encrypted data after obtaining the authorization key and the user's outsourced decryption request. The verifiable random function is used to prevent the semi-trusted cloud data center from not performing the outsourcing decryption operation as required so that the verifiability of the outsourcing decryption is satisfied. Finally, the algorithm uses the authorization period to control the final decryption of the authorized user. Theoretical and experimental analyses show that the proposed algorithm reduces the computational overhead of ciphertext decryption while ensuring the verifiability of outsourcing decryption.

A Study on Project Performance in Cloud Computing : Focus on User Experience of GoogleDocs (클라우드 컴퓨팅 환경에서의 프로젝트 수행 성과에 관한 연구 : GoogleDocs 사용 경험을 중심으로)

  • Woo, Hyeok-Jun;Shim, Jeong-Hyun;Lee, Jung-Hoon
    • The Journal of Society for e-Business Studies
    • /
    • v.16 no.1
    • /
    • pp.71-100
    • /
    • 2011
  • There are expectations about future internet technology with IT development by end-users. Cloud computing is attracted to satisfy those demands. However, adoption of cloud computing is not active that much. Therefore, this study verified how cloud computing environment affects performance of team project. We conducted empirical study on performance of team project with cloud computing as technology tool focusing on Task-Technology Fit Model. We collected samples that were undergraduate and graduate school students and had experience on initial cloud computing such as Google-Docs and Webhard when they conducted team project for assignment. We focused on accessibility and reliability as task-technology fit and those variables treated as first order factor. Result showed that cloud computing is suitable technology tool for team project. This study suggests positive effects of cloud computing for collaboration by proving perceived fit and performance in initial cloud computing.

Middleware on Hanuri/C as a Multimedia Client-Server Application Development Tool (멀티미디어 클라이언트-서버 응용 개발 도구인 한우리/C의 미들웨어)

  • Im, Chae-Deok
    • The Transactions of the Korea Information Processing Society
    • /
    • v.2 no.5
    • /
    • pp.797-806
    • /
    • 1995
  • The Client-Server model is a computing technique that efficiently uses distributed resources via networks. But, generating an application using Client- Server model requires many different expertises to developers in comparison to that of using the centralized computing method. That is, and application developer must be familiar with network programming and GUI(Graphical User Interface) techniques in addition to conventional programming skills. Accordingly, the time and man power have been issued for building a Client-Server system. To alleviate these problem, the Client-Server applications development tools are needed To meet such a need, we developed a GUI based tool, called Hanuri/C, for generating Client-Server application programs. In comparison to existing Client-Server tools, Hanuri/C is reinforced Multimedia facilities, Hanuri/C is reinforced Multimedia facilities. Hanuri/C is considered as a front-end part of distributed system software. That is, Hanuri/C is a Client-Server tool similar to Forth Generation Language(4GL) supporting multimedia application on top of the Distributed Computing environment(DCE). In this paper, we present the design and implementation method of the middleware part of Hanuri/c.

  • PDF

Analysis and Response of SSH Brute Force Attacks in Multi-User Computing Environment (다중 사용자 컴퓨팅 환경에서 SSH 무작위 공격 분석 및 대응)

  • Lee, Jae-Kook;Kim, Sung-Jun;Woo, Joon;Park, Chan Yeol
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.4 no.6
    • /
    • pp.205-212
    • /
    • 2015
  • SSH provides a secure, encrypted communication channel between two end point systems using public key encryption. But SSH brute force attack is one of the most significant attacks. This kind of attack aims to login to the SSH server by continually guessing a large number of user account and password combinations. In this paper, we analyze logs of SSH brute force attacks in 2014 and propose a failed-log based detection mechanism in high performance computing service environment.

Feature Modeling with Multi-Software Product Line of IoT Protocols

  • Abbas, Asad;Siddiqui, Isma Fara;Lee, Scott Uk-Jin
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2017.01a
    • /
    • pp.79-82
    • /
    • 2017
  • IoT devices are interconnected in global network with different functionalities and manage the data transfer in cloud computing. IoT devices can be used anytime, anywhere with any device with different applications and protocols. Same devices but different applications according to end user requirements such as sensors and Wi-Fi devices, reusability of these applications can enhance the development process. However, large number of variations in cloud computing make it difficult the features selection in application because of compatibility issues of devices. In this paper we have proposed multi-Software Product Lines (multi-SPLs) approach to manage the variabilities and commonalities of IoT applications and protocols. Feature modeling is used to manage the commonalities and variabilities of SPL. We proposed that multi-SPLs feature model is more appropriate for modeling of IoT applications and protocols.

  • PDF

Image Processing Based Virtual Reality Input Method using Gesture (영상처리 기반의 제스처를 이용한 가상현실 입력기)

  • Hong, Dong-Gyun;Cheon, Mi-Hyeon;Lee, Donghwa
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.24 no.5
    • /
    • pp.129-137
    • /
    • 2019
  • Ubiquitous computing technology is emerging as information technology advances. In line with this, a number of studies are being carried out to increase device miniaturization and user convenience. Some of the proposed devices are user-friendly and uncomfortable with hand-held operation. To address these inconveniences, this paper proposed a virtual button that could be used in watching television. When watching a video on television, a camera is installed at the top of the TV, using the fact that the user watches the video from the front, so that the camera takes a picture of the top of the head. Extract the background and hand area separately from the filmed image, extract the outline to the extracted hand area, and detect the tip point of the finger. Detection of the end point of the finger produces a virtual button interface at the top of the image being filmed in front, and the button activates when the end point of the detected finger becomes a pointer and is located inside the button.

A Scheme of Computational Time Reduction on Back-End Server Using Computational Grid (계산 그리드를 이용한 백엔드 서버의 계산시간 단축 방안)

  • Hong, Seong-Pyo;Han, Seung-Jo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.12
    • /
    • pp.2695-2701
    • /
    • 2012
  • We need privacy protection protocols, that satisfy three essential security requirements; confidentiality, indistinguishability and forward security, in order to protect user's privacy in RFID system. The hash-chain based protocol that Ohkubo et. al proposed is the most secure protocol, that satisfies all of the essential security requirements, among existing protocols. But, this protocol has a disadvantage that it takes very long time to identify a tag in the back-end server. In this paper, we propose a scheme to keep security just as it is and to reduce computation time for identifying a tag in back-end server. The proposed scheme shows the results that the identification time in back-end server is reduced considerably compared to the hash-chain based protocol.

A User-Centric Response Time Analyzer for Improving User Experience of Android Applications (스마트폰 응용 프로그램의 사용자 경험 향상을 위한 사용자 중심 반응 시간 분석 도구)

  • Song, Wook;Sung, Nosub;Kim, Jihong
    • KIISE Transactions on Computing Practices
    • /
    • v.21 no.5
    • /
    • pp.379-386
    • /
    • 2015
  • We propose a novel user-perceived performance optimization framework for the Android platform that takes advantage of the user-centric response time analysis. To this end, we propose a new definition of response time, which we call the user-centric response time, as a metric for the quality of user-perceived performance of the smartphone application. In this paper, we describe the design and implementation of an on-line user-centric response time analyzer for Android-based smartphones, which provides smartphone application developers with valuable insight for user-perceived performance optimization. We implemented the user-centric response time analyzer on the Android platform, version 4.0.4 (ICS) running on a Galaxy Nexus smartphone. From our experimental results, the proposed user-centric response time analyzer accurately estimates user-centric response times with an accuracy of 92.0% compared to manually measured times with less than 1% performance penalty. In order to evaluate the efficiency of the proposed framework, we were able to reduce the user-centric response time of the target application by up to 16.4% based on the evaluation results by the proposed framework.

Reducing the User-perceived Latency of Browsers with NVRAM

  • Kim, Kyusik;Cho, Yongwoon;Kim, Seongmin;Kim, Taeseok
    • JSTS:Journal of Semiconductor Technology and Science
    • /
    • v.17 no.1
    • /
    • pp.23-28
    • /
    • 2017
  • Non-volatile RAM (NVRAM) provides many opportunities to improve the performance of computing devices. In this paper, we present an approach that reduces the user-perceived latency of browsers by using NVRAM. To this end, we first analyze the browser launch process, and then employ several techniques that improve the performance of each step by using NVRAM. Specially, we focus on minimizing the launch time of browser by 1) prefetching the block sequence required for browser launch, 2) caching the web resources in the fast NVRAM, and 3) reusing the displayed bitmap data in the frame buffer. Through implementation, we show that our scheme significantly reduces the launch time of browsers.

Real-time Multi-device Control System Implementation for Natural User Interactive Platform

  • Kim, Myoung-Jin;Hwang, Tae-min;Chae, Sung-Hun;Kim, Min-Joon;Moon, Yeon-Kug;Kim, SeungJun
    • Journal of Internet Computing and Services
    • /
    • v.23 no.1
    • /
    • pp.19-29
    • /
    • 2022
  • Natural user interface (NUI) is used for the natural motion interface without using a specific device or tool like a mouse, keyboards, and pens. Recently, as non-contact sensor-based interaction technologies for recognizing human motion, gestures, voice, and gaze have been actively studied, an environment has been prepared that can provide more diverse contents based on various interaction methods compared to existing methods. However, as the number of sensors device is rapidly increasing, the system using a lot of sensors can suffer from a lack of computational resources. To address this problem, we proposed a real-time multi-device control system for natural interactive platform. In the proposed system, we classified two types of devices as the HC devices such as high-end commercial sensor and the LC devices such astraditional monitoring sensor with low-cost. we adopt each device manager to control efficiently. we demonstrate a proposed system works properly with user behavior such as gestures, motions, gazes, and voices.