• Title/Summary/Keyword: Middle Server

Search Result 71, Processing Time 0.026 seconds

Development and Field Test of a Smart-home Gas Safety Management System (스마트 홈 가스안전관리 시스템 개발 및 현장시험)

  • Park, Gyou-Tae;Kim, Eun-Jung;Kim, In-Chan;Kim, Hie-Sik
    • Journal of the Korean Institute of Gas
    • /
    • v.16 no.6
    • /
    • pp.128-135
    • /
    • 2012
  • In this paper, we proposed a system and a scenario to raise efficiency of gas safety management by developing wireless ZigBee communication modules, smart-home gas safety appliances and the system suitable for gas safety. Our designed system consists of a micom gas meter, an automatic extinguisher, sensors, and a wall-pad. A micom-gas-meter monitors gas flow, gas pressure, and earthquake. An automatic fire extinguisher checks combustible gas leaks and temperature of $100^{\circ}C$(cut off) and $130^{\circ}C$(fire). Sensors measure smoke and CO gas. In our novel system, a micom-gas meter cut off inner valve with warnings, an automatic fire extinguisher cut off middle valve and spray extinguishing materials, and sensors generate signals when detecting smoke and CO and then take a next action. Gas safety appliances and sensors automatically takes measures, and transmit those information to a wall-pad. The wall-pad again transmits real time information to server. Users can check and manage gas safety situations by connecting BcN server through web or mobile application. We hereby devised scenarios for gas safety and risk management based on the smart, and demonstrated their efficiency through test applied to filed.

A Design of User Authentication Protocol using Biometric in Mobile-cloud Environments (모바일 클라우드 환경에서 생체인식을 이용한 사용자 인증 프로토콜 설계)

  • Kim, Hyung-Uk;Kim, Bumryong;Jun, Moon-Seog
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.1
    • /
    • pp.32-39
    • /
    • 2017
  • Recently, usage of mobile cloud services has been increasing. In particular, beyond the constraints of a single cloud computing service, studies on the multi-cloud have been actively pursued. A user must authenticate multiple cloud service providers to use additional cloud services in a multi-cloud. In previous studies, an authentication method using single sign-on (SSO) was not available in all cloud services. Cloud services will not be available when the SSO server is not available due to malicious attacks, because all authentication is done via the SSO server. Additionally, using a broker, there is a vulnerability that can expose authentication information for the service provider to a user who did not sign up. In this paper, we propose a secure user authentication protocol using biometric authentication that does not expose user information when using additional cloud services. The proposed protocol can use a single biometric authentication for multi-cloud services without storing authentication information in each cloud service. In terms of key stability (to ensure stability through the key agreement process and the key area), by disabling various attack methods, such as man-in-the-middle attacks and replay attacks, we provide secure mobile cloud services.

Design and Performance Evaluation of the Secure Transmission Module for Three-dimensional Medical Image System based on Web PACS (3차원 의료영상시스템을 위한 웹 PACS 기반 보안전송모듈의 설계 및 성능평가)

  • Kim, Jungchae;Yoo, Sun Kook
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.3
    • /
    • pp.179-186
    • /
    • 2013
  • PACS is a medical system for digital medical images, and PACS expand to web-based service using public network, DICOM files should be protected from the man-in-the-middle attack because they have personal medical record. To solve the problem, we designed flexible secure transmission system using IPSec and adopted to a web-based three-dimensional medical image system. And next, we performed the performance evaluation changing integrity and encryption algorithm using DICOM volume dataset. At that time, combinations of the algorithm was 'DES-MD5', 'DES-SHA1', '3DES-MD5', and '3DES-SHA1, and the experiment was performed on our test-bed. In experimental result, the overall performance was affected by encryption algorithms than integrity algorithms, DES was approximately 50% of throughput degradation and 3DES was about to 65% of throughput degradation. Also when DICOM volume dataset was transmitted using secure transmission system, the network performance degradation had shown because of increased packet overhead. As a result, server and network performance degradation occurs for secure transmission system by ensuring the secure exchange of messages. Thus, if the secure transmission system adopted to the medical images that should be protected, it could solve server performance gradation and compose secure web PACS.

An elastic distributed parallel Hadoop system for bigdata platform and distributed inference engines (동적 분산병렬 하둡시스템 및 분산추론기에 응용한 서버가상화 빅데이터 플랫폼)

  • Song, Dong Ho;Shin, Ji Ae;In, Yean Jin;Lee, Wan Gon;Lee, Kang Se
    • Journal of the Korean Data and Information Science Society
    • /
    • v.26 no.5
    • /
    • pp.1129-1139
    • /
    • 2015
  • Inference process generates additional triples from knowledge represented in RDF triples of semantic web technology. Tens of million of triples as an initial big data and the additionally inferred triples become a knowledge base for applications such as QA(question&answer) system. The inference engine requires more computing resources to process the triples generated while inferencing. The additional computing resources supplied by underlying resource pool in cloud computing can shorten the execution time. This paper addresses an algorithm to allocate the number of computing nodes "elastically" at runtime on Hadoop, depending on the size of knowledge data fed. The model proposed in this paper is composed of the layered architecture: the top layer for applications, the middle layer for distributed parallel inference engine to process the triples, and lower layer for elastic Hadoop and server visualization. System algorithms and test data are analyzed and discussed in this paper. The model hast the benefit that rich legacy Hadoop applications can be run faster on this system without any modification.

User privacy protection model through enhancing the administrator role in the cloud environment (클라우드 환경에서 관리자 역할을 강화한 사용자 프라이버시 보호 모델)

  • Jeong, Yoon-Su;Yon, Yong-Ho
    • Journal of Convergence for Information Technology
    • /
    • v.8 no.3
    • /
    • pp.79-84
    • /
    • 2018
  • Cloud services are readily available through a variety of media, attracting a lot of attention from users. However, there are various security damages that abuse the privacy of users who use cloud services, so there is not enough technology to prevent them. In this paper, we propose a protection model to safeguard user's privacy in a cloud environment so as not to illegally exploit user's privacy. The proposed model randomly manages the user's signature to strengthen the role of the middle manager and the cloud server. In the proposed model, the user's privacy information is provided illegally by the cloud server to the user through the security function and the user signature. Also, the signature of the user can be safely used by bundling the random number of the multiplication group and the one-way hash function into the hash chain to protect the user's privacy. As a result of the performance evaluation, the proposed model achieved an average improvement of data processing time of 24.5% compared to the existing model and the efficiency of the proposed model was improved by 13.7% than the existing model because the user's privacy information was group managed.

A Study on the Development Fluid Mechanics Principles by WBI Learning Program (유체역학의 원리 학습을 위한 WBI 프로그램 개발 연구)

  • Son, Young-Bae;Park, Dea-Woo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.10
    • /
    • pp.2324-2330
    • /
    • 2010
  • In middle and high school to learn the principles of fluid mechanics to Experiments in space and time constraints and difficulties for the study of the principles of fluid mechanics to the problem is superficial. In this paper, Pascal's principles, Archimedes' Principle, Bernoulli's Theorem, etc. learning about the fluid mechanics and implemented in Web Browser, In connection with flash and HTML, web simulation is to implement. Web Based Instruction program that implemented a comparative analysis became an effect of 15% to industrial total high school students in satisfaction, Interest, Achievement. The fluid mechanics education through engineering design and web design through the actual web server is implemented on the Internet over broadband. Department of Education, this study the fluid mechanics and the Internet will contribute to the development of distance education.

Password-Based Mutual Authentication Protocol Against Phishing Attacks (피싱 공격에 대응하기 위한 패스워드 기반의 상호 인증 프로토콜)

  • Kim, Iksu;Choi, Jongmyung
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.7 no.2
    • /
    • pp.41-48
    • /
    • 2018
  • Until now, various studies on anti-phishing have been conducted. The most typical anti-phishing method is a method of collecting URL information of a phishing site in advance and then detecting phishing by comparing the URL of the visited site with the previously stored information. However, this blacklist-based anti-phishing method can not detect new phishing sites. For this reason, various anti-phishing authentication protocols have been proposed. but these protocols require a public key and a private key. In this paper, we propose a password-based mutual authentication protocol that is safe for phishing attacks. In the proposed protocol, the mutual authentication between the client and the server is performed through the authentication message including the password information. The proposed protocol is safe to eavesdropping attack because the authentication message uses the hash value of the password, not the original password, And it is safe to replay attack because different messages are used every time of authentication. In addition, since mutual authentication is performed, it is safe for man-in-the-middle attack. Finally, the proposed protocol does not require a key issuance process for authentication.

Development and application of algorithm judging system : analysis of effects on programming learning (알고리즘 자동평가 시스템의 개발 및 적용 : 프로그래밍 학습 효과 분석)

  • Chang, Won-Young;Kim, Seong-Sik
    • The Journal of Korean Association of Computer Education
    • /
    • v.17 no.4
    • /
    • pp.45-57
    • /
    • 2014
  • Many studies on algorithm judging system which verifies the correctness and the time efficiency of your program have been underway recently, most of which are on an online judging system focused on programming contests. However this study is mainly about development and application of the judging system based on client-server. Especially, we designed to promote metacognition and motivation which are emphasized in CRESST model, and implemented the total system that consists of the problem, data set, validation program, and user service environments. We applied our system to elementary, middle, and high school students, and We noticed a significant difference of average score between the experimental and control group in posttest and concluded that the teaching method using our system gave the bigger positive effects on programming learning.

  • PDF

A Semantic Web Service for Tourism Information over the Mobile Web (시맨틱 웹에 기초한 모바일 관광정보 서비스)

  • Lee, Yang-Won
    • Journal of the Korean Geographical Society
    • /
    • v.42 no.5
    • /
    • pp.788-807
    • /
    • 2007
  • To better publish geographical information on the Web, it is important to capture how Web technologies are changing. For a recent decade, Semantic Web has been developed by incorporating ontologies into the current Web, with an aim to make computers understand rather than simply display. Ontology, an explicit specification of a conceptualization, and the Semantic Web grounded on the ontology, have the potential for effective sharing and appropriate retrieval of geographical information. This paper describes a Semantic Web Service over the mobile Web that can offer pertinent tourism information according to user contexts. To do this, a tourism ontology was formalized in the PARA(Place-Attraction-Resource-Activity) ontology model by organizing tourist places, tourist attractions, tourism resources, and activities. Locational relationships between tourist places were also included in the PARA ontology model to take into account the movements of tourists on a railway network. The XML(Extensible Markup Language) Web Service in the middle tier manages the client-side request for information retrieval and the corresponding server-side response from the data provider. The PARA ontology was integrated into the XML Web Service for the concept-based discovery of tourism information. The applicability of the proposed system was tested through a simulation experiment for Tokyo tourism.

Study on Elliptic Curve Diffie-Hellman based Verification Token Authentication Implementation (타원곡선 디피헬만 기반 검증 토큰인증방식 구현 연구)

  • Choi, Cheong H.
    • Journal of Internet Computing and Services
    • /
    • v.19 no.5
    • /
    • pp.55-66
    • /
    • 2018
  • Since existing server-based authentications use vulnerable password-based authentication, illegal leak of personal data occurs frequently. Since this can cause illegal ID compromise, alternative authentications have been studied. Recently token-based authentications like OAuth 2.0 or JWT have been used in web sites, however, they have a weakness that if a hacker steals JWT token in the middle, they can obtain plain authentication data from the token, So we suggest a new authentication method using the verification token of authentic code to encrypt authentication data with effective time. The verification is to compare an authentication code from decryption of the verification-token with its own code. Its crypto-method is based on do XOR with ECDH session key, which is so fast and efficient without overhead of key agreement. Our method is outstanding in preventing the personal data leakage.