• Title/Summary/Keyword: Information message

Search Result 3,325, Processing Time 0.026 seconds

Efficient Checkpoint Algorithm for Message-Passing Parallel Applications on Cloud Computing (클라우드컴퓨팅에서 메시지패싱방식 응용프로그램의 효율적인 체크포인트 알고리즘)

  • Le, Duc Tai;Dao, Manh Thuong Quan;Ahn, Min-Joon;Choo, Hyun-Seung
    • Annual Conference of KIPS
    • /
    • 2011.04a
    • /
    • pp.156-157
    • /
    • 2011
  • In this work, we study the checkpoint/restart problem for message-passing parallel applications running on cloud computing environment. This is a new direction which arises from the trend of enabling the applications to run on the cloud computing environment. The main objective is to propose an efficient checkpoint algorithm for message-passing parallel applications considering communications with external systems. We further implement the novel algorithm by modifying gSOAP and OpenMPI (the open source libraries) which support service calls and checkpoint message-passing parallel programs, especially. The simulation showed that additional costs to the executing and checkpointing application of the algorithm are negligible. Ultimately, the algorithm supports efficiently the checkpoint/restart service for message-passing parallel applications, that send requests to external services.

Securing the MQTT Protocol using the LEA Algorithm (LEA 알고리즘을 이용한 MQTT 프로토콜 보안)

  • Laksmono Agus Mahardika Ari;Iqbal Muhammad;Pratama Derry;Howon Kim
    • Annual Conference of KIPS
    • /
    • 2024.05a
    • /
    • pp.175-178
    • /
    • 2024
  • IoT is becoming more and more popular, along with the massive availability of cheap and easy-to-use IoT devices. One protocol that is often used in IoT devices is the Message Queuing Telemetry Transport (MQTT) protocol. By default, the MQTT protocol does not activate encrypted data security features. This MQTT default feature makes the transmitted and received message data vulnerable to attacks, such as eavesdropping. Therefore, this paper will design and implement encrypted data security using the lightweight cryptography algorithm. The focus of this paper will be on securing MQTT message data at the application layer. We propose a method for encrypting specific MQTT message fields while maintaining compatibility with the protocol's functionalities. The paper then analyzes the timing performance of the MQTT-LEA implementation on the Raspberry Pi 3+. Our findings demonstrate the feasibility of using LEA at the application layer to secure MQTT message communication on resource-constrained devices.

A Digital Multisignature Scheme Suitable for Transmission to Multi-destination by EDI Message (EDI 메시지 동보 전송에 적합한 디지탈 다중 서명 방법)

  • 윤성현;김태윤
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.19 no.6
    • /
    • pp.981-993
    • /
    • 1994
  • As the EDI message is the commercial electronic document having legal binding forces, it is necessary to use the method of digital signature for the message integrity and identification between trading partners. This research proposes a new digital multisignature scheme suitable for transmission to multi-destination of the EDI message. The proposed scheme is based on Fiat-Shamir signature scheme and can perform the message authentication suitable for the EDI message. It can verify the message forged by a hash function attack from intruder or intruder. It also can perform the digital signature using smaller hash value than that of Fiat-Shamir signature scheme. When the EDI message is transmitted to multi-destination, all designated receivers can perform the digital signature faster and safer.

  • PDF

The Impact of Influential's Betweenness Centrality on the WOM Effect under the Online Social Networking Service Environment (온라인 소셜 네트워크 서비스 환경에서 유력자의 매개 중심성이 구전 효과에 미치는 영향)

  • Park, Ji Hye;Suh, Bomil
    • Journal of Information Technology Applications and Management
    • /
    • v.20 no.2
    • /
    • pp.127-146
    • /
    • 2013
  • The online social networking services (SNS) have been growing as the means of communication. In this study, we investigated word-of-mouth (WOM) effect under the SNS environment and evaluated the impact of message sender's influence on the WOM effect. Especially, this study focused on the betweenness centrality calculated through the social network analysis (SNA) of SNS network information, and proposed it as the measure of WOM message sender's influence, SNA may provide more accurate and objective measures than subjective self-reporting survey method. Fifty-one Facebook users responded to each of their four Facebook friends, who had been selected based on their betweenness centrality, Statistical analyses were performed using the responses and the betweenness centralities of the Facebook friends. The results showed that the direction (positive vs, negative) of a WOM message in SNS had an impact on the attitude of the message receiver toward the product. Moreover, the betweenness centrality of the message sender as well as his/her opinion leadership had a moderating effect on the WOM effect. Opinion leadership is a measure that has been frequently used for indicating the influence of WOM message sender in the previous studies. Considering the result that the betweenness centrality of the message sender was Significantly correlated to his/her opinion leadership, the betweenness centrality can be used for indicating the influence of WOM message sender.

A Message Monitoring Framework for Tracing Messages on JBI-based Enterprise Service Bus (JBI 기반 ESB 환경에서 효과적인 메시지 추적을 위한 메시지모니터링 프레임워크)

  • Choi, Jae-Hyun;Park, Jae-Won;Lee, Nam-Yong
    • Journal of Information Technology Services
    • /
    • v.9 no.2
    • /
    • pp.179-192
    • /
    • 2010
  • In order to resolve the problems of traditional Enterprise Application Integration (EAI) for system integration and to establish flexible enterprise IT environments, Enterprise Service Bus(ESB) which have distributed architecture and support Service Oriented Architecture(SOA) has introduced. Particularly, JBI which developed by the Java Community Process is most widely used to implement ESB for advantages of Java technology. In ESB based on JBI, reliable message delivery is very important to ensure stability of services and systems because it is a message driven architecture. But, it is difficult to verify messages and trace messages when system fault or service error occurred because JBI specification is not enough to address them. In this paper we has proposed the Message Monitoring Framework for JBI-based ESBs which for using in monitoring messages efficiently. It provides foundations for gathering and tracing message-related information about component installation, message exchange, service deploy by using proxy-based change tracking and delegation mechanism for data processing. The proxy which used in our solutions collects data about message automatically when it changed, and the delegation mechanism provides users flexibility for data processing. Also, we describe the performance evaluation results of our solution which is acceptable. We expect to it enables users to ensure reliability and stability of the JBI-based ESB by systematic monitoring and managing messages being used to interact among components.

A New Sender-Side Public-Key Deniable Encryption Scheme with Fast Decryption

  • Barakat, Tamer Mohamed
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.9
    • /
    • pp.3231-3249
    • /
    • 2014
  • Deniable encryption, introduced in 1997 by Canetti, Dwork, Naor, and Ostrovsky, guarantees that the sender or the receiver of a secret message is able to "fake" the message encrypted in a specific ciphertext in the presence of a coercing adversary, without the adversary detecting that he was not given the real message. Sender - side deniable encryption scheme is considered to be one of the classification of deniable encryption technique which defined as resilient against coercing the sender. M. H. Ibrahim presented a sender - side deniable encryption scheme which based on public key and uncertainty of Jacobi Symbol [6]. This scheme has several problems; (1) it can't be able to derive the fake message $M_f$ that belongs to a valid message set, (2) it is not secure against Quadratic Residue Problem (QRP), and (3) the decryption process is very slow because it is based dramatically on square root computation until reach the message as a Quadratic Non Residue (QNR). The first problem is solved by J. Howlader and S. Basu's scheme [7]; they presented a sender side encryption scheme that allows the sender to present a fake message $M_f$ from a valid message set, but it still suffers from the last two mentioned problems. In this paper we present a new sender-side deniable public-key encryption scheme with fast decryption by which the sender is able to lie about the encrypted message to a coercer and hence escape coercion. While the receiver is able to decrypt for the true message, the sender has the ability to open a fake message of his choice to the coercer which, when verified, gives the same ciphertext as the true message. Compared with both Ibrahim's scheme and J. Howlader and S. Basu's scheme, our scheme enjoys nice two features which solved the mentioned problems: (1) It is semantically secure against Quadratic Residue Problem; (2) It is as fast, in the decryption process, as other schemes. Finally, applying the proposed deniable encryption, we originally give a coercion resistant internet voting model without physical assumptions.

Design and Implementation of IEEE Std 1609.2 Message Encoder/Decoder for Vehicular Communication Security (자동차 통신 보안을 위한 IEEE Std 1609.2 메시지 인코더/디코더의 설계 및 구현에 관한 연구)

  • Seo, Hye-In;Kim, Eun-Gi
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.3
    • /
    • pp.568-577
    • /
    • 2017
  • IEEE Std 1609.2 was defined for the support of communication security functions in the WAVE (Wireless Access in Vehicular Environments) system. IEEE Std 1609.2 defined the message structures of the security services and managements on the vehicular communication by using ASN.1 (Abstract Syntax Notation One). Also, this security message structures shall be encoded using the COER (Canonical Octet Encoding Rules). In this paper, we designed and implemented the IEEE Std 1609.2 message encoder/decoder handling the security messages defined in IEEE Std 1609.2. The designed encoder/decoder consists of three modules as follows : a module generating the message of C language data structures in accord with IEEE Std 1609.2 message structures, a message encoder module, a message decoder module. And the encoder/decoder was implemented on the Linux environment. Also we analyzed the performance by measuring the performance speed of the encoder/decoder implemented.

A study of Web Service Security System using the Secure Network Transfer Message (안전한 네트워크 전송 메시지를 이용한 웹 서비스 보안 시스템에 관한 연구)

  • Kim, Chang-Su;Jung, Hoe-Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.10a
    • /
    • pp.850-853
    • /
    • 2008
  • As th Internet grew rapidly, the Electronic Commerce that is based on Internet increased. The Electronic Commerce is unsubstantial in the mutual authentication between the parties and a commerce As a solution to this issue, a Web server uses a Client Message technology. The purpose of Client Message is to validate the user and the electronic commercial transaction. Further, it increases efficiency and offers several ability at various purposes. However, the Client Message is transferred and stored as an unencrypted text file, the information can be exposed easily to the network threats, end system threats, and Client Message harvesting threats. In this paper designed by used crypto algorithm a Secure Message as a solution to the issue have proposed above. Further, designed a security service per Network transmitting message to transfer client's user input information to a Web server safety.

  • PDF

A Session-based Instant Message System by Distributed Architecture (분산 구조에 의한 세션 기반 인스턴트 메시지 시스템)

  • Jang, Choonseo;Lee, Ki-Soo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.9
    • /
    • pp.2169-2175
    • /
    • 2014
  • In this paper we have proposed a new distributed architecture of session-based instant message system, in which multiple servers can distribute loads effectively to improve system extendability. The server of session-based instant message system should manage SIP sessions to transfer instant message with multimedia data to each users, and it should process large amount of presence informations from each users. Therefore load of the server should be distributed as the number of users increases. In our system, when server load increases according to large user numbers, the load are distributed by selecting a server with the lowest load value, or new server is created to allocate the message processing. Therefore the overall load of instant message system can be dynamically distributed. A new presence information data format with added elements for controlling server load has been designed for this purpose, and SIP messages exchanging procedure between servers and users has been also suggested. The performance of our proposed system has been analysed by simulation, and showed improvement of performance.

Credible Sales Messages in a Retail Context: Theory and Evidence

  • Hyun Chul MAENG
    • Journal of Distribution Science
    • /
    • v.22 no.9
    • /
    • pp.119-128
    • /
    • 2024
  • Purpose: his study examines the effect of message valence on consumer perceptions of sales messages and salesperson evaluations in retail contexts. In contrast to previous studies on the negativity effect, it examines the positivity effect, which implies that the effect of positive information may outweigh that of negative information in certain situations. In addition, the current research examines how the content of the sales message influences consumers' perceptions of salespeople. Research design and methodology: The study presents an analytical model in which a potentially altruistic salesperson transmits quality information as a form of cheap talk. Several predictions were derived from the model and then empirically tested in two experiments. Results: When the sales message is about relatively less expensive products, positive information can be more credible and diagnostic than negative information. In addition, positive sales messages about the less expensive products signal the salesperson's benevolence. Conclusion: This paper is one of the few studies to predict and empirically test the positivity effect. It also contributes to the literature on trust in salespeople by showing that message valence influences buyers' perceptions of salespeople.