• Title/Summary/Keyword: Information communication

Search Result 43,001, Processing Time 0.063 seconds

Data Block based User Authentication for Outsourced Data (아웃소싱 데이터 보호를 위한 데이터 블록 기반의 상호 인증 프로토콜)

  • Hahn, Changhee;Kown, Hyunsoo;Kim, Daeyeong;Hur, Junbeom
    • Journal of KIISE
    • /
    • v.42 no.9
    • /
    • pp.1175-1184
    • /
    • 2015
  • Recently, there has been an explosive increase in the volume of multimedia data that is available as a result of the development of multimedia technologies. More and more data is becoming available on a variety of web sites, and it has become increasingly cost prohibitive to have a single data server store and process multimedia files locally. Therefore, many service providers have been likely to outsource data to cloud storage to reduce costs. Such behavior raises one serious concern: how can data users be authenticated in a secure and efficient way? The most widely used password-based authentication methods suffer from numerous disadvantages in terms of security. Multi-factor authentication protocols based on a variety of communication channels, such as SMS, biometric, or hardware tokens, may improve security but inevitably reduce usability. To this end, we present a data block-based authentication scheme that is secure and guarantees usability in such a manner where users do nothing more than enter a password. In addition, the proposed scheme can be effectively used to revoke user rights. To the best of our knowledge, our scheme is the first data block-based authentication scheme for outsourced data that is proven to be secure without degradation in usability. An experiment was conducted using the Amazon EC2 cloud service, and the results show that the proposed scheme guarantees a nearly constant time for user authentication.

Comparison and Analysis of Anomaly Detection Methods for Detecting Data Exfiltration (데이터 유출 탐지를 위한 이상 행위 탐지 방법의 비교 및 분석)

  • Lim, Wongi;Kwon, Koohyung;Kim, Jung-Jae;Lee, Jong-Eon;Cha, Si-Ho
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.9
    • /
    • pp.440-446
    • /
    • 2016
  • Military secrets or confidential data of any organization are extremely important assets. They must be discluded from outside. To do this, methods for detecting anomalous attacks and intrusions inside the network have been proposed. However, most anomaly-detection methods only cover aspects of intrusion from outside and do not deal with internal leakage of data, inflicting greater damage than intrusions and attacks from outside. In addition, applying conventional anomaly-detection methods to data exfiltration creates many problems, because the methods do not consider a number of variables or the internal network environment. In this paper, we describe issues considered in data exfiltration detection for anomaly detection (DEDfAD) to improve the accuracy of the methods, classify the methods as profile-based detection or machine learning-based detection, and analyze their advantages and disadvantages. We also suggest future research challenges through comparative analysis of the issues with classification of the detection methods.

Web-based Self-directed Learning System for Multi-contents Service (멀티 콘텐츠 서비스를 위한 웹 기반 자기주도적 학습 시스템)

  • Kim, Ji-Seon;Park, Jin-Ah
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.16 no.1
    • /
    • pp.115-119
    • /
    • 2010
  • As the subjects of education has been changed from the instructors to learners, a web-based self-directed learning which can accelerate the initiative of learners and can be free from the restriction of time and space has been received attention. In this paper, the web-based self-directed learning system was designed. For the design, to make the learners build their own lecture plan, the service was designed to provide three kinds of lectures of video clip, slide lecture, and e-text lecture that were focused on various lecture contents. In addition, a learner and an assistant was man to man matched to enable the on-line mentoring for mutual communication between learners and assistants. Implementation was carried out by three sets of module - Manager, Learner and Assistant - that were applied to the real educational activities. The survey on satisfaction for the education, efficiency of ability improvement, and educational intelligibility for the attendants on the education showed more than 67.2% of satisfaction in satisfaction for the education. Furthermore, more than 86.9% of attendants replied that their ability were improved after the education of this system. The educational system realized in this paper shows effectiveness for the self-directed learning.

An Energy-Efficient Concurrency Control Method for Mobile Transactions with Skewed Data Access Patterns in Wireless Broadcast Environments (무선 브로드캐스트 환경에서 편향된 엑세스 패턴을 가진 모바일 트랜잭션을 위한 효과적인 동시성 제어 기법)

  • Jung, Sung-Won;Park, Sung-Geun;Choi, Keun-Ha
    • Journal of KIISE:Databases
    • /
    • v.33 no.1
    • /
    • pp.69-85
    • /
    • 2006
  • Broadcast has been often used to disseminate the frequently requested data efficiently to a large volume of mobile clients over a single or multiple channels. Conventional concurrency control protocols for mobile transactions are not suitable for the wireless broadcast environments due to the limited bandwidth of the up-link communication channel. In wireless broadcast environments, the server often broadcast different data items with different frequency to incorporate the data access patterns of mobile transactions. The previously proposed concurrency control protocols for mobile transactions in wireless broadcast environments are focused on the mobile transactions with uniform data access patterns. However, these protocols perform poorly when the data access pattern of update mobile transaction are not uniform but skewed. The update mobile transactions with skewed data access patterns will be frequently aborted and restarted due 4o the update conflict of the same data items with a high access frequency. In this paper, we propose an energy-efficient concurrence control protocol for mobile transactions with skewed data access as well as uniform data access patterns. Our protocol use a random back-off technique to avoid the frequent abort and restart of update mobile transactions. We present in-depth experimental analysis of our method by comparing it with existing concurrency control protocols. Our performance analysis show that it significantly decrease the average response time, the amount of upstream and downstream bandwidth usage over existing protocols.

Resource Weighted Load Distribution Policy for Effective Transcoding Load Distribution (효과적인 트랜스코딩 부하 분산을 위한 자원 가중치 부하분산 정책)

  • Seo, Dong-Mahn;Lee, Joa-Hyoung;Choi, Myun-Uk;Kim, Yoon;Jung, In-Bum
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.11 no.5
    • /
    • pp.401-415
    • /
    • 2005
  • Owing to the improved wireless communication technologies, it is possible to provide streaming service of multimedia with PDAs and mobile phones in addition to desktop PCs. Since mobile client devices have low computing power and low network bandwidth due to wireless network, the transcoding technology to adapt media for mobile client devices considering their characteristics is necessary. Transcoding servers transcode the source media to the target media within corresponding grades and provide QoS in real-time. In particular, an effective load balancing policy for transcoding servers is inevitable to support QoS for large scale mobile users. In this paper, the resource weighted load distribution policy is proposed for a fair load balance and a more scalable performance in cluster-based transcoding servers. Our proposed policy is based on the resource weighted table and number of maximum supported users, which are pre-computed for each pre-defined grade. We implement the proposed policy on cluster-based transcoding servers and evaluate its fair load distribution and scalable performance with the number of transcoding servers.

A Study on Temperature Analysis for Smart Electrical Power Devices (스마트 전력 기기의 온도 분석에 관한 연구)

  • Vasanth, Ragu;Lee, Myeongbae;Kim, Younghyun;Park, Myunghye;Lee, Seungbae;Park, Jwangwoo;Cho, Yongyun;Shin, Changsun
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.6 no.8
    • /
    • pp.353-358
    • /
    • 2017
  • An electrical power utility, like an electrical power pole, includes various kinds of sensors for smart services. Temperature data is considered one of the important factors that can influence the smart operations of this utility. This study suggests a method for temperature data analysis for deciding the status of the smart electrical power utilities by using Kalman Filter and Ensemble Model. The suggested approach separates the temperature data according to the different positions of the temperature sensors of a utility, then uses Kalman Filter and Ensemble Model to analyse the characteristics of the temperature variation. With detailed processes, method explains the variation between an external temperature factor like weather temperature data and the sensed temperature data, and then, analysis the temperature data from each position of electrical power utilities. In this process, the suggested method uses Kalman Filter to remove error data and the ensemble model to find out mean value of every hour of electrical data. The result and discussion of temperature analysis were described clearly with the analysed results of electrical data. Finally, we were able to check the working condition of the power devices and the range of the temperature data foe each devices, which may help to indicate any causalities with respect to the devices in the utility pole.

A Study on the Effects of Selection Attributes for Agricultural Products on Using Local Food Store (농산물 구매선택 속성이 로컬푸드 직매장 이용에 미치는 영향 연구)

  • Chung, Joon-Ho;Hwang, Sung-Hyuk
    • Journal of Distribution Science
    • /
    • v.14 no.4
    • /
    • pp.117-125
    • /
    • 2016
  • Purpose - As consumers' needs for purchasing fresh and safe food have been bigger in Korea, their interest in local food is also growing recently. So, the number of local food stores has been increased from 3 in 2012 to 103 in 2015. Local food stores should operate a business responding consumers' needs in order that local food stores are not to be a one-time fad. Therefore, the purpose of this study is to analyze the characteristics of consumers who use a local food store and provide helpful implications to design a strategy for sustainable growth of local food store. Research design, data, and methodology - In this study, Probit model was used for empirical analysis in order to examine the effect of purchase choice attributes of agricultural products, consumer's satisfaction, and their demographic factors upon the intention to use a local food store. After estimating coefficients of the probit model, marginal effects were calculated as a standard normal, and cumulative distribution is differentiated with respect to explanatory variables. To collect the data, questionnaire survey was carried out with the consumers using the local food store (Youngjin Nonghyup near to Jeonju city located in Jeollabuk-do). Result - The data analysis found that the more consumers are satisfied with local food store, the higher intention they have to use the local food store. In addition, it was known that the factors related to quality of agricultural products and shopping convenience among the purchase choice attributes have a considerable impact on the purchase intention of a local food store. In demographic factors, income was turned out to be an important factor affecting purchase intention of local food. Such a result supports the hypothesis that high income consumers are likely to purchase local food, which is based on the inference that consumers who have a high income tend to pursue wellbeing life. Futhermore, information delivery, through a reputable media source among general factors, was known to play an important role in forming an intention to purchase local food. According to the analysis of marginal effects, probability of purchase intention of a local food store is increased by 11.4%, if a monthly average income of a household is above 4.5 million Won(Korean currency). If purchasing satisfaction with local food stores is high, the probability of purchase intention would be increased by 24.1%. Likewise, such a probability goes up by 8.7%, 5.8%, respectively as an increasing one unit of quality of agricultural products and shopping convenience of local food stores, respectively. Conclusion - For attaining sustainable growth in a local food store, it is considered necessarily to establish a proper store operation system to meet consumers' needs, especially for quality and shopping convenience of local food. Moreover, as it was found that appropriate communication through media source has a positive effect on the intention to use local food store, PR activity seems to be necessary to expand the consumers' demands for local foods.

Technical Trend on the Recycling Technologies for Stripping Process Waste Solution by the Patent and Paper Analysis (특허(特許)와 논문(論文)으로 본 스트리핑 공정폐액(工程廢液) 재활용(再活用) 기술(技術) 동향(動向))

  • Lee, Ho-Kyung;Lee, In-Gyoo;Park, Myung-Jun;Koo, Kee-Kahb;Cho, Young-Ju;Cho, Bong-Gyoo
    • Resources Recycling
    • /
    • v.22 no.4
    • /
    • pp.81-90
    • /
    • 2013
  • Since the 1990s, the rapid development of information and communication industry, the demand for semiconductor and LCD continues to increase. Therefore in the formation of fine circuit patterns, which are the cores of sensitizer and the most expensive thinner and stripper liquor used to remove photoresist and its dilution, the amount in demand are dramatically increasing, emerging need for recycling of waste thinner and stripper liquor. Recently, recycling technologies of stripping process waste solution has been widely studied by economic aspects and environmental aspects, in terms of efficiency of the stripping process. In this study, analyzed paper and patent for recycling technologies of waste solution from stripping process. The range of search was limited in the open patents of USA (US), European Union (EP), Japan (JP), Korea (KR) and SCI journals from 1981 to 2010. Patents and journals were collected using key-words searching and filtered by filtering criteria. The trends of the patents and journals was analyzed by the years, countries, companies, and technologies.

Energy-efficient Set-associative Cache Using Bi-mode Way-selector (에너지 효율이 높은 이중웨이선택형 연관사상캐시)

  • Lee, Sungjae;Kang, Jinku;Lee, Juho;Youn, Jiyong;Lee, Inhwan
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.1 no.1
    • /
    • pp.1-10
    • /
    • 2012
  • The way-lookup cache and the way-tracking cache are considered to be the most energy-efficient when used for level 1 and level 2 caches, respectively. This paper proposes an energy-efficient set-associative cache using the bi-mode way-selector that combines the way selecting techniques of the way-tracking cache and the way-lookup cache. The simulation results using an Alpha 21264-based system show that the bi-mode way-selecting L1 instruction cache consumes 27.57% of the energy consumed by the conventional set-associative cache and that it is as energy-efficient as the way-lookup cache when used for L1 instruction cache. The bi-mode way-selecting L1 data cache consumes 28.42% of the energy consumed by the conventional set-associative cache, which means that it is more energy-efficient than the way-lookup cache by 15.54% when used for L1 data cache. The bi-mode way-selecting L2 cache consumes 15.41% of the energy consumed by the conventional set-associative cache, which means that it is more energy-efficient than the way-tracking cache by 16.16% when used for unified L2 cache. These results show that the proposed cache can provide the best level of energy-efficiency regardless of the cache level.

Development of Safe Korean Programming Language Using Static Analysis (정적 분석을 이용한 안전한 한글 프로그래밍 언어의 개발)

  • Kang, Dohun;Kim, Yeoneo;Woo, Gyun
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.5 no.4
    • /
    • pp.79-86
    • /
    • 2016
  • About 75% of software security incidents are caused by software vulnerability. In addition, the after-market repairing cost of the software is higher by more than 30 times than that in the design stage. In this background, the secure coding has been proposed as one of the ways to solve this kind of maintenance problems. Various institutions have addressed the weakness patterns of the standard software. A new Korean programming language Saesark has been proposed to resolve the security weakness on the language level. However, the previous study on Saesark can not resolve the security weakness caused by the API. This paper proposes a way to resolve the security weakness due to the API. It adopts a static analyzer inspecting dangerous methods. It classifies the dangerous methods of the API into two groups: the methods of using tainted data and those accepting in-flowing tainted data. It analyses the security weakness in four steps: searching for the dangerous methods, configuring a call graph, navigating a path between the method for in-flowing tainted data and that uses tainted data on the call graph, and reporting the security weakness detected. To measure the effectiveness of this method, two experiments have been performed on the new version of Saesark adopting the static analysis. The first experiment is the comparison of it with the previous version of Saesark according to the Java Secure Coding Guide. The second experiment is the comparison of the improved Saesark with FindBugs, a Java program vulnerability analysis tool. According to the result, the improved Saesark is 15% more safe than the previous version of Saesark and the F-measure of it 68%, which shows the improvement of 9% point compared to 59%, that of FindBugs.