• 제목/요약/키워드: Internet access

Search Result 2,629, Processing Time 0.027 seconds

PRIAM: Privacy Preserving Identity and Access Management Scheme in Cloud

  • Xiong, Jinbo;Yao, Zhiqiang;Ma, Jianfeng;Liu, Ximeng;Li, Qi;Ma, Jun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.1
    • /
    • pp.282-304
    • /
    • 2014
  • Each cloud service has numerous owners and tenants, so it is necessary to construct a privacy preserving identity management and access control mechanism for cloud computing. On one hand, cloud service providers (CSP) depend on tenant's identity information to enforce appropriate access control so that cloud resources are only accessed by the authorized tenants who are willing to pay. On the other hand, tenants wish to protect their personalized service access patterns, identity privacy information and accessing newfangled cloud services by on-demand ways within the scope of their permissions. There are many identity authentication and access control schemes to address these challenges to some degree, however, there are still some limitations. In this paper, we propose a new comprehensive approach, called Privacy pReserving Identity and Access Management scheme, referred to as PRIAM, which is able to satisfy all the desirable security requirements in cloud computing. The main contributions of the proposed PRIAM scheme are threefold. First, it leverages blind signature and hash chain to protect tenant's identity privacy and implement secure mutual authentication. Second, it employs the service-level agreements to provide flexible and on-demand access control for both tenants and cloud services. Third, it makes use of the BAN logic to formally verify the correctness of the proposed protocols. As a result, our proposed PRIAM scheme is suitable to cloud computing thanks to its simplicity, correctness, low overhead, and efficiency.

Cloud Security Scheme Based on Blockchain and Zero Trust (블록체인과 제로 트러스트 기반 클라우드 보안 기법)

  • In-Hye Na;Hyeok Kang;Keun-Ho Lee
    • Journal of Internet of Things and Convergence
    • /
    • v.9 no.2
    • /
    • pp.55-60
    • /
    • 2023
  • Recently, demand for cloud computing has increased and remote access due to home work and external work has increased. In addition, a new security paradigm is required in the current situation where the need to be vigilant against not only external attacker access but also internal access such as internal employee access to work increases and various attack techniques are sophisticated. As a result, the network security model applying Zero-Trust, which has the core principle of doubting everything and not trusting it, began to attract attention in the security industry. Zero Trust Security monitors all networks, requires authentication in order to be granted access, and increases security by granting minimum access rights to access requesters. In this paper, we explain zero trust and zero trust architecture, and propose a new cloud security system for strengthening access control that overcomes the limitations of existing security systems using zero trust and blockchain and can be used by various companies.

Efficient Access Management Scheme for Machine Type Communications in LTE-A Networks (LTE-A 네트워크 환경에서 MTC를 위한 효율적인 접근관리 기법)

  • Moon, Jihun;Lim, Yujin
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.7 no.1
    • /
    • pp.287-295
    • /
    • 2017
  • Recently, MTC (Machine Type Communication) is known as an important part to support IoT (Internet of Things) applications. MTC provides network connectivities between MTC devices without human intervention. In MTC, a large number of devices try to access over communication resource with a short period of time. Due to the limited communication resource, resource contention becomes severe and it brings about access failures of devices. To solve the problem, it needs to regulate device accesses. In this paper, we present an efficient access management scheme. We measure the number of devices which try to access in a certain time period and predict the change of the number of devices in the next time period. Using the predicted change, we control the number of devices which try to access. To verify our scheme, we conduct experiments in terms of success probability, failure probability, collision probability and access delay.

A Study of Internet Filtering for Public Information Resources (공공정보자원에서의 인터넷 필터링에 관한 연구)

  • Kim, You-Seung
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.41 no.2
    • /
    • pp.111-133
    • /
    • 2007
  • Illegal and harmful information on the Internet have been a great concern not only for regulatory authorities, but also all the public institutes, such as public libraries and schools, that provide Internet access service. In particular, for public libraries which play an important role in organizing, opening and providing information resources in the information society, providing Internet access service are indispensible. Therefore, any changes of Internet content regulatory system may have direct effects on services of public libraries. Due to unique characteristics of the Internet, content refutation on the Internet has made a best use of various regulatory methods, ranging from governmental regulation to self-refutation and technical regulatory methods. However, nation by nation. technical regulatory methods on the Internet have been developed in quite different ways. Applying them on public library has been strongly criticised for violating freedom of expression and rights of access to information. This article begins with a theoretical discussion about free speech rights and refutation on Internet. Then it examines filtering software which is one of the most popular technical regulatory methods based on both technical and socio-humanities' prospects and analyses several governments' regulatory approaches to Internet filtering. As a conclusion, issues concerning Internet filtering at public institutes are critically apprised.

An Audio-Visual Teaching Aid (AVTA) with Scrolling Display and Speech to Text over the Internet

  • Davood Khalili;Chung, Wan-Young
    • Proceedings of the IEEK Conference
    • /
    • 2003.07c
    • /
    • pp.2649-2652
    • /
    • 2003
  • In this Paper, an Audio-Visual Teaching aid (AVTA) for use in a classroom and with Internet is presented. A system, which was designed and tested, consists of a wireless Microphone system, Text to Speech conversion Software, Noise filtering circuit and a Computer. An IBM compatible PC with sound card and Network Interface card and a Web browser and a voice and text messenger service were used to provide slightly delayed text and also voice over the internet for remote teaming, while providing scrolling text from a real time lecture in a classroom. The motivation for design of this system, was to aid Korean students who may have difficulty in listening comprehension while have, fairly good reading ability of text. This application of this system is twofold. On one hand it will help the students in a class to view and listen to a lecture, and on the other hand, it will serve as a vehicle for remote access (audio and text) for a classroom lecture. The project provides a simple and low cost solution to remote learning and also allows a student to have access to classroom in emergency situations when the student, can not attend a class. In addition, such system allows the student in capturing a teacher's lecture in audio and text form, without the need to be present in class or having to take many notes. This system will therefore help students in many ways.

  • PDF

Networked Creativity on the Censored Web 2.0: Chinese Users' Twitter-based Activities on the Issue of Internet Censorship

  • Xu, Weiai Wayne;Feng, Miao
    • Journal of Contemporary Eastern Asia
    • /
    • v.14 no.1
    • /
    • pp.23-43
    • /
    • 2015
  • In most of the world, the current trend in information technology is for open data movement that promotes transparency and equal access. An opposite trend is observed in China, which has the world's largest Internet population. The country has implemented sophisticated cyber-infrastructure and practices under the name of The Golden Shield Project (commonly referred to as the Great Firewall) to limit access to popular international web services and to filter traffic containing 'undesirable' political content. Increasingly, tech-savvy Chinese bypass this firewall and use Twitter to share knowledge on censorship circumvention and encryption to collectively troubleshoot firewall evasion methods, and even mobilize actions that border on activism. Using a mixed mythological approach, the current study addresses such networked knowledge sharing among citizens in a restricted web ecosystem. On the theoretical front, this study uses webometric approaches to understand change agents and positive deviant in the diffusion of censorship circumvention technology. On policy-level, the study provides insights for Internet regulators and digital rights groups to help best utilize communication networks of positive deviants to counter Internet control.

Methods of WAP Gateway Capacity Dimensioning and Traffic Forecasting (WAP 게이트웨이 용량 산출과 트래픽 예측 기법)

  • Park, Chul-Geun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.4B
    • /
    • pp.576-583
    • /
    • 2010
  • Wireless Internet is the network which provides wireless access in order to serve the Internet connections and data communication through the mobile handsets. To get efficient wireless access to the Internet, we need the WAP (Wireless Application Protocol) gateway that performs protocol translation and contents conversion between two different networks. We need the capacity dimensioning of the WAP gateway system in order to provide the wireless Internet service stably and cost-effectively. We also need the traffic engineering methods including traffic modelling and forecasting for the economical facility investment. The existing method of WAP gateway capacity dimensioning was intuitive and qualitative. But in this paper, we deal with the capacity dimensioning analytically and quantitatively on the basis of WAP traffic description parameters and traffic forecasting method.

A system Dynamics Approach to find the Dynamic interactions and Policy Causal Loops of the Internet utilization (정책인과지도 도출을 위한 인터넷 활용의 동태성 분석: 이용자로서의 정부, 기업, 가정을 중심으로)

  • 하원규;최남희;김도훈;문태훈;김동환;홍민기
    • Korean System Dynamics Review
    • /
    • v.1 no.2
    • /
    • pp.149-174
    • /
    • 2000
  • In recent years, how to promore the Utilization of Internet is a main issue of national information policy. In this study, we focused our approach to find promoting sttategies for Internet utilization on three sector's users, governments, enterprises, and households. Promoting the Internet utilization of these three sector's users is a very difficult problem, because their information levels are different and information gap among them can be regarded as bottleneck. And since the interactions between user's demands and diverse information seccor's factors are very complex, policy leverages can not find easily. By the system dynamics methodology, this paper examines the interrelationships between three user's demand mechanism and information policy sector. Information policy sector consist of four sectors, infrastruccure policy seccor, application-contents sector, governance sector, and access and price policy sector (free access policy, literacy policy, telecommunication price policy, etc.). To find and investigate policy leverage that will help understanding dynamic behavior of users in using Internet we build a causal loop diagrams and SD models by using survey data obtained from three sectors'specialized users, 488 persons.

  • PDF

An Analysis of Satisfaction factors on the Use of Housewives′ Internet Shopping (주부들의 인터넷 쇼핑 활용 및 만족에 관한 연구)

  • 김미량
    • Journal of Families and Better Life
    • /
    • v.21 no.3
    • /
    • pp.123-131
    • /
    • 2003
  • The potential of information and communication technologies has already had a profound impact on many ways of our living and society. To catch up with this trend, Korean government has demonstrated the vision for informatization called‘Cyber Korea 21'/'e-Korea’project and has fully supported the education for informatization which is one of the key factors to reduce the digital divide. But, In spite of developing a variety of training programs with different target groups and policy objectives, a digital divide remains in some cases even while Internet access and computer ownership are rising rapidly for almost all groups. For example, the noticeable divides still exists between men and women. To accelerate the process of women informatization, which we believe to be major contributors for the high quality of life for women, we need to promote full-time housewives to become aggressive information users and producers. Internet shopping, for example, might be a good starting point for motivating women to become active information users. In this paper, we present a model for explaining the factors affecting the degree of satisfaction of housewives from internet shopping. Based on data collected from a questionnaire survey from housewives in Seoul, we conclude that the perceived usefulness, ease of use and the playfulness significantly affect the level of satisfaction, but the playfulness does not directly affect the intention to revisit and purchase. In addition, we found out that the perceived usefulness is affected by efficiency, attitude and easy to access. We also provide other interesting statistical results and implications.

Load Balancing Metric for a Mobile Router with Heterogeneous Network Interfaces (이기종 네트워크 인터페이스를 갖는 이동 라우터의 부하 균등 메트릭)

  • Na, TaeHeum;Park, PyungKoo;Ryu, HoYong;Park, Jaehyung;Hwang, Buhyun
    • Journal of Digital Contents Society
    • /
    • v.18 no.5
    • /
    • pp.983-987
    • /
    • 2017
  • Multi-homing mobile router separates network for user connection and network for internet access using various interfaces for internet access. This paper proposes a load balancing metric in order that multi-network mobile router distributes its traffic to one of several heterogeneous network interfaces. To evaluate the performance of the load balancing metric, experiments on traffic balancing is performed on real commercial networks were used in Korea and Hong Kong.