• Title/Summary/Keyword: Information Use Environments

Search Result 1,202, Processing Time 0.027 seconds

Survey and Prospective on Privacy Protection Methods on Cloud Platform Environment (클라우드 플랫폼 환경에서의 프라이버시 보호기법 연구 동향 및 전망)

  • Park, Tae-hwan;Lee, Ga-ram;Kim, Ho-won
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.5
    • /
    • pp.1149-1155
    • /
    • 2017
  • In these days, cloud environments such as cloud platforms, cloud services like Amazon AWS, IBM Bluemix are used in the Internet of Things for providing efficient services. These cloud platform environments have various security threats according to increasing of use, so the recent research results on cloud security and privacy protection technologies and related regimes and legislations are written in this paper and we suggest prospect of research on cloud platform environment security and privacy preserving.

A Spread Random Interleaver based Efficient DES Algorithm for Personal Cloud Computing Environments (개인 클라우드 컴퓨팅 환경을 위한 스프레드 랜덤 인터리버 기반의 효율적인 DES 알고리즘)

  • Chung, Yeon Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.1
    • /
    • pp.41-48
    • /
    • 2013
  • An efficient encryption algorithm based on the Data Encryption Standard (DES) for personal cloud computing environments is presented. The proposed algorithm improves data privacy, security and also encryption speed, compared with the triple DES. The improvement of the proposed algorithm stems from enhanced privacy inherent from the use of spread random interleaver in the place of the known substitution table for initial and final permutations in the DES algorithm. The simulation results demonstrate that the interleaver based DES (I-DES) is found to run faster than the triple DES algorithm and also offer improved security. The proposed algorithm also offers encryption for variable-length data using the Cipher Block Chaining (CBC).

Hybrid Control Strategy for Autonomous Driving System using HD Map Information (정밀 도로지도 정보를 활용한 자율주행 하이브리드 제어 전략)

  • Yu, Dongyeon;Kim, Donggyu;Choi, Hoseung;Hwang, Sung-Ho
    • Journal of Drive and Control
    • /
    • v.17 no.4
    • /
    • pp.80-86
    • /
    • 2020
  • Autonomous driving is one of the most important new technologies of our time; it has benefits in terms of safety, the environment, and economic issues. Path following algorithms, such as automated lane keeping systems (ALKSs), are key level 3 or higher functions of autonomous driving. Pure-Pursuit and Stanley controllers are widely used because of their good path tracking performance and simplicity. However, with the Pure-Pursuit controller, corner cutting behavior occurs on curved roads, and the Stanley controller has a risk of divergence depending on the response of the steering system. In this study, we use the advantages of each controller to propose a hybrid control strategy that can be stably applied to complex driving environments. The weight of each controller is determined from the global and local curvature indexes calculated from HD map information and the current driving speed. Our experimental results demonstrate the ability of the hybrid controller, which had a cross-track error of under 0.1 m in a virtual environment that simulates K-City, with complex driving environments such as urban areas, community roads, and high-speed driving roads.

An Inquiry of Constructs for an e-Learning Environment Design by Incorporating Aspects of Learners' Participations in Web 2.0 Technologies

  • PARK, Seong Ik;LIM, Wan Chul
    • Educational Technology International
    • /
    • v.12 no.1
    • /
    • pp.67-94
    • /
    • 2011
  • The major concern of e-learning environment design is to create and improve artifacts that support human learning. To facilitate effective and efficient learning, e-learning environment designers focused on the contemporary information technologies. Web 2.0 services, which empower users and allow the inter-transforming interactions between users and information technologies, have been increasingly changing the way that people learn. By adapting these Web 2.0 technologies in learning environment, educational technology can facilitate learners' abilities to personalize learning environment. The main purpose of this study is to conceptualize comprehensively constructs for understanding the inter-transforming relationships between learner and learning environment and mutable learning environments' impact on the process through which learners learn and strive to shape their learning environment. As results, this study confirms conceptualization of four constructs by incorporating aspects of design that occur in e-learning environments with Web 2.0 technologies. First, learner-designer refers to active and intentional designer who is tailoring an e-learning environment in the changing context of use. Second, learner's secondary design refers to learner's design based on the primary designs by design experts. Third, transactional interaction refers to learner's inter-changeable, inter-transformative, co-evolutionary interaction with technological environment. Fourth, trans-active learning environment refers to mutable learning environment enacted by users.

Mitigating Threats and Security Metrics in Cloud Computing

  • Kar, Jayaprakash;Mishra, Manoj Ranjan
    • Journal of Information Processing Systems
    • /
    • v.12 no.2
    • /
    • pp.226-233
    • /
    • 2016
  • Cloud computing is a distributed computing model that has lot of drawbacks and faces difficulties. Many new innovative and emerging techniques take advantage of its features. In this paper, we explore the security threats to and Risk Assessments for cloud computing, attack mitigation frameworks, and the risk-based dynamic access control for cloud computing. Common security threats to cloud computing have been explored and these threats are addressed through acceptable measures via governance and effective risk management using a tailored Security Risk Approach. Most existing Threat and Risk Assessment (TRA) schemes for cloud services use a converse thinking approach to develop theoretical solutions for minimizing the risk of security breaches at a minimal cost. In our study, we propose an improved Attack-Defense Tree mechanism designated as iADTree, for solving the TRA problem in cloud computing environments.

Development of Active Data Mining Component for Web Database Applications (웹 데이터베이스 응용을 위한 액티브데이터마이닝 컴포넌트 개발)

  • Choi, Yong-Goo
    • Journal of Information Technology Applications and Management
    • /
    • v.15 no.2
    • /
    • pp.1-14
    • /
    • 2008
  • The distinguished prosperity of information technologies from great progress of e-business during the last decade has unavoidably made software development for active data mining to discovery hidden predictive information regarding business trends and behavior from vary large databases. Therefore this paper develops an active mining object(ADMO) component, which provides real-time predictive information from web databases. The ADMO component is to extended ADO(ActiveX Data Object) component to active data mining component based on COM(Component Object Model) for application program interface(API). ADMO component development made use of window script component(WSC) based on XML(eXtensible Markup Language). For the purpose of investigating the application environments and the practical schemes of the ADMO component, experiments for diverse practical applications were performed in this paper. As a result, ADMO component confirmed that it could effectively extract the analytic information of classification and aggregation from vary large databases for Web services.

  • PDF

Trust and Risk based Access Control and Access Control Constraints

  • Helil, Nurmamat;Kim, Mu-Cheol;Han, Sang-Yong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.5 no.11
    • /
    • pp.2254-2271
    • /
    • 2011
  • Access control in dynamic environments needs the ability to provide more access opportunities of information to users, while also ensuring protection information from malicious users. Trust and risk are essential factors and can be combined together in access control decision-making to meet the above requirement. In this paper, we propose the combination of the trust and risk in access control to balance information accessibility and protection. Access control decision is made on the basis of trustworthiness of users and risk value of permissions. We use potential relations between users and relations between permissions in access control. Our approach not only provides more access opportunities for trustworthy users in accessing permissions, but also enforces traditional access control constraints such as Chinese Wall policy and Separation of Duty (SoD) of Role-Based Access Control (RBAC) model in an effective way.

A Robust Mutual Authentication between User Devices and Relaying Server(FIDO Server) using Certificate Authority in FIDO Environments

  • Han, Seungjin
    • Journal of the Korea Society of Computer and Information
    • /
    • v.21 no.10
    • /
    • pp.63-68
    • /
    • 2016
  • Recently, Biometrics is being magnified than ID or password about user authentication. However, unlike a PIN, password, and personal information there is no way to modify the exposure if it is exposed and used illegally. As FIDO(Fast IDentity Online) than existing server storing method, It stores a user's biometric information to the user device. And the user device authentication using the user's biometric information, the user equipment has been used a method to notify only the authentication result to the server FIDO. However, FIDO has no mutual authentication between the user device and the FIDO server. We use a Certificate Authority in order to mutually authenticate the user and the FIDO server. Thereby, we propose a more reliable method and compared this paper with existed methods about security analysis.

A Realtime Parking lot Information System Using XML in Mobile Environments (모바일 환경에서의 XML을 이용한 실시간 주차정보시스템)

  • 김영돈;전현식;박현주
    • The Journal of Society for e-Business Studies
    • /
    • v.9 no.2
    • /
    • pp.123-143
    • /
    • 2004
  • Nowadays, insufficient parking lots give rise to a serious problem. Cars are increased in geometrical progression, but parking lots that takes in cars are relatively limited. Often we spend a lot of time to look for a parking lot because of limited parking lot. To solve this problem, we can use real time parking lot information system provided from mobile vehicles. In this paper, we will tell you how to deliver the parking lot information in real time by construction wireless network environment to be provided real time information and making XML data that is easy to share and to exchange data between applications.

  • PDF

Guiding Practical Text Classification Framework to Optimal State in Multiple Domains

  • Choi, Sung-Pil;Myaeng, Sung-Hyon;Cho, Hyun-Yang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.3 no.3
    • /
    • pp.285-307
    • /
    • 2009
  • This paper introduces DICE, a Domain-Independent text Classification Engine. DICE is robust, efficient, and domain-independent in terms of software and architecture. Each module of the system is clearly modularized and encapsulated for extensibility. The clear modular architecture allows for simple and continuous verification and facilitates changes in multiple cycles, even after its major development period is complete. Those who want to make use of DICE can easily implement their ideas on this test bed and optimize it for a particular domain by simply adjusting the configuration file. Unlike other publically available tool kits or development environments targeted at general purpose classification models, DICE specializes in text classification with a number of useful functions specific to it. This paper focuses on the ways to locate the optimal states of a practical text classification framework by using various adaptation methods provided by the system such as feature selection, lemmatization, and classification models.