• Title/Summary/Keyword: Mobile computing

Search Result 1,912, Processing Time 0.025 seconds

An Open Source Mobile Cloud Service: Geo-spatial Image Filtering Tools Using R (오픈소스 모바일 클라우드 서비스: R 기반 공간영상정보 필터링 사례)

  • Kang, Sanggoo;Lee, Kiwon
    • Spatial Information Research
    • /
    • v.22 no.5
    • /
    • pp.1-8
    • /
    • 2014
  • Globally, mobile, cloud computing or big data are the recent marketable key terms. These trend technologies or paradigm in the ICT (Information Communication Technology) fields exert large influence on the most application fields including geo-spatial applications. Among them, cloud computing, though the early stage in Korea now, plays a important role as a platform for other trend technologies uses. Especially, mobile cloud, an integrated platform with mobile device and cloud computing can be considered as a good solution to overcome well known limitations of mobile applications and to provide more information processing functionalities to mobile users. This work is a case study to design and implement the mobile application system for geo-spatial image filtering processing operated on mobile cloud platform built using OpenStack and various open sources. Filtering processing is carried out using R environment, recently being recognized as one of big data analysis technologies. This approach is expected to be an element linking geo-spatial information for new service model development and the geo-spatial analysis service development using R.

A Study on Secure Key Backup/Recovery Scheme for Device based on Mobile Trusted Module (Mobile Trusted Module 기반 단말에서의 안전한 키 백업 및 복구 방안에 대한 연구)

  • Kang, Dong-Wan;Jun, Sung-Ik;Lee, Im-Yeoung
    • The KIPS Transactions:PartC
    • /
    • v.16C no.3
    • /
    • pp.335-346
    • /
    • 2009
  • Mobile environments are evolving the main communication environment as a develops of communication technology. In mobile environments, sensitive information can be compromised on-line, so demand for security has increased. Also, mobile devices that provide various services are in danger from malware and illegal devices, phishing and sniffing etc, and the privacy. Therefore, MTM(Mobile Trusted Module) is developed and promoted by TCG(Trusted Computing Group), which is an industry standard body to enhance the security level in the mobile computing environment. MTM protects user privacy and platform integrity, because it is embedded in the platform, and it is physically secure. However, a security approach is required when secret data is migrated elsewhere, because MTM provides strong security functions. In this paper, we analyze the TCG standard and migration method for cryptographic key, then we propose a secure migration scheme for cryptographic key using key Backup/Recovery method.

Intelligent Resource Management Schemes for Systems, Services, and Applications of Cloud Computing Based on Artificial Intelligence

  • Lim, JongBeom;Lee, DaeWon;Chung, Kwang-Sik;Yu, HeonChang
    • Journal of Information Processing Systems
    • /
    • v.15 no.5
    • /
    • pp.1192-1200
    • /
    • 2019
  • Recently, artificial intelligence techniques have been widely used in the computer science field, such as the Internet of Things, big data, cloud computing, and mobile computing. In particular, resource management is of utmost importance for maintaining the quality of services, service-level agreements, and the availability of the system. In this paper, we review and analyze various ways to meet the requirements of cloud resource management based on artificial intelligence. We divide cloud resource management techniques based on artificial intelligence into three categories: fog computing systems, edge-cloud systems, and intelligent cloud computing systems. The aim of the paper is to propose an intelligent resource management scheme that manages mobile resources by monitoring devices' statuses and predicting their future stability based on one of the artificial intelligence techniques. We explore how our proposed resource management scheme can be extended to various cloud-based systems.

Mobile Resource Reliability-based Job Scheduling for Mobile Grid

  • Jang, Sung-Ho;Lee, Jong-Sik
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.5 no.1
    • /
    • pp.83-104
    • /
    • 2011
  • Mobile grid is a combination of grid computing and mobile computing to build grid systems in a wireless mobile environment. The development of network technology is assisting in realizing mobile grid. Mobile grid based on established grid infrastructures needs effective resource management and reliable job scheduling because mobile grid utilizes not only static grid resources but also dynamic grid resources with mobility. However, mobile devices are considered as unavailable resources in traditional grids. Mobile resources should be integrated into existing grid sites. Therefore, this paper presents a mobile grid middleware interconnecting existing grid infrastructures with mobile resources and a mobile service agent installed on the mobile resources. This paper also proposes a mobile resource reliability-based job scheduling model in order to overcome the unreliability of wireless mobile devices and guarantee stable and reliable job processing. In the proposed job scheduling model, the mobile service agent calculates the mobile resource reliability of each resource by using diverse reliability metrics and predicts it. The mobile grid middleware allocated jobs to mobile resources by predicted mobile resource reliability. We implemented a simulation model that simplifies various functions of the proposed job scheduling model by using the DEVS (Discrete Event System Specification) which is the formalism for modeling and analyzing a general system. We also conducted diverse experiments for performance evaluation. Experimental results demonstrate that the proposed model can assist in improving the performance of mobile grid in comparison with existing job scheduling models.

Efficient Mobile Node Authentication Scheme Based on the Trusted Local Third Party in Mobile Computing Environments (이동 컴퓨팅 환경에서의 로컬 신뢰 센터 기반 효율적 이동 노드 인증 기법)

  • 노환주;이기현
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.25 no.4A
    • /
    • pp.528-538
    • /
    • 2000
  • Mobile computing system requires both precise identification and secure authentication scheme on remote mobile entities, which is based on the distributed mobile node. In this paper, existing discrete logarithm based $Schnorr^{[7]}$ like entity authentication schemes are improved by the analysis of performance and security on the hi-directional interactive proofs. And $EIGamal^{[14]}$ like efficient authentication schemes are also proposed. Then, these are enhanced with oblivious transfer based mono directional authentication schemes based on trusted third party for applying to the mobile agent based computing systems. Therefore, proposed schemes provide compatible performance and safety on mobile entity authentication processes.

  • PDF

Apply a Static Shared Key to Authorizing LBU of HMIPv6 (Static Shared Key를 적용한 HMIPv6 LBU 인증)

  • Kim, Bo-Mi;Kim, Tae-Eun;Ju, So-Jin;Jun, Moon-Seog
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2006.10c
    • /
    • pp.483-487
    • /
    • 2006
  • 단말의 이동성을 지원하는 Mobile IP에서 MN이 홈 네트워크에서 먼 곳으로 이동하는 경우, 매번 BU 시그널링을 하게 되면 Registration latency가 길어져, 이로 인해 불필요한 네트워크 트래픽을 유발한다. 따라서 계층을 두어 지역적인 이동성을 관리하는 MAP을 도입한 HMIPv6가 제안되었다. HMIPv6는 지역적인 LCoA와 외부에 노출되는 RCoA를 가진다. Mobile IP 환경에서의 BU메시지 취약성은 보안이슈가 되어왔으며, HMIPv6은 두 개의 CoA를 가지므로 보안위협은 배가된다. 본 논문에서는 Static Shared Key를 사용하여 HMIPv6의 LCoA BU 시그널링 관련 메시지의 인증을 제안함으로써 Mobile WG에서 제기된 BU 시그널링의 보안 취약성을 개선하였다.

  • PDF

Development of the Efficient Compressed Data Management System for Embedded DBMS (모바일 DBMS를 위한 효율적인 압축 데이터 관리 시스템의 개발)

  • Shin, Young-Jae;Hwang, Jin-Ho;Kim, Hak-Soo;Lee, Seung-Mi;Son, Jin-Hyun
    • The KIPS Transactions:PartD
    • /
    • v.15D no.5
    • /
    • pp.589-598
    • /
    • 2008
  • Recently, Mobile Computing Devices are used generally. And Information which is processed by Mobile computing devices is increasing. Because information is digitalizing. So Mobile computing Devices demand an Embedded DBMS for efficient management of information. Moreover Mobile computing Devices demand an efficient storage management in NAND-type flash memory because the NAND-type flash memory is using generally in Mobile computing devices and the NAND-type flash memory is more expensive than the magnetic disks. So that in this paper, we present an efficient Compressed Data Management System for the embedded DBMS that is used in flash memory. This proposed system improve the space utilization and extend a lifetime of a flash memory because it decreases the size of data.

Construction of Mobile Collaboration Environment for Ubiquitous Computing and its Application (유비쿼터스 컴퓨팅을 위한 모바일 협업 환경 구축 및 응용)

  • Jeong, Chang-Won;Shin, Chang-Sun;Joo, Su-Chong
    • Journal of Internet Computing and Services
    • /
    • v.9 no.3
    • /
    • pp.25-41
    • /
    • 2008
  • In this paper, we describes a Compact Distributed Object Group Framework(CDOGF) for mobile collaboration service in ubiquitous computing. CDOGF support network connections of sensors and devices, management of mobile computing devices, and grouping of objects for mobile collaboration service according to the logical area. For this, we defined methods for detail functions and interface. And, we classified into four interactions of that sensors and a application, the CDOGF and a application, between the components of the CDOGF, the CDOGF on a mobile device and the DOGF on a server. We also defined mobile collaboration environment by analyzing existing technologies. In this environment we used the TMO scheme for interaction and the TMOSM for distributed middleware. Finally, we implemented u-hospital application that applied this environment. This application collects environment and health information by PDAs in wards. Also, It provides the information service for patient management task.

  • PDF

Optimistic Concurrency Control Using Time-stamp Ordering in Mobile Databases (이동 데이터베이스 시스템에서 타임스탬프를 이용한 낙관적 동시성 제어 기법)

  • Kim Dae-Ho;Jeong Byeong-Soo;Lee Young-Koo
    • Journal of Internet Computing and Services
    • /
    • v.7 no.4
    • /
    • pp.79-90
    • /
    • 2006
  • Data broadcasting is an efficient method for disseminating data, and is widely accepted in the database applications of mobile computing environments because of its asymmetric communication bandwidth between a server and mobile clients. This requires new types of concurrency control mechanism to support mobile transactions executed in the mobile clients, which have low-bandwidths toward the server. In this paper, we propose an OCC/DTA (Optimistic Concurrency Control with Dynamic Time-stamp Adjustment) protocol that can be efficiently adapted to mobile computing environments. The protocol reduces communication overhead by using client-side validation procedure and enhances transaction throughput by adjusting serialization order without violating transaction semantics. We show that the proposed protocol satisfies data consistency requirements, and simulate that this protocol can improve the performance of mobile transactions in data broadcasting environments.

  • PDF

Design of Cryptographic Hardware Architecture for Mobile Computing

  • Kim, Moo-Seop;Kim, Young-Sae;Cho, Hyun-Sook
    • Journal of Information Processing Systems
    • /
    • v.5 no.4
    • /
    • pp.187-196
    • /
    • 2009
  • This paper presents compact cryptographic hardware architecture suitable for the Mobile Trusted Module (MTM) that requires low-area and low-power characteristics. The built-in cryptographic engine in the MTM is one of the most important circuit blocks and contributes to the performance of the whole platform because it is used as the key primitive supporting digital signature, platform integrity and command authentication. Unlike personal computers, mobile platforms have very stringent limitations with respect to available power, physical circuit area, and cost. Therefore special architecture and design methods for a compact cryptographic hardware module are required. The proposed cryptographic hardware has a chip area of 38K gates for RSA and 12.4K gates for unified SHA-1 and SHA-256 respectively on a 0.25um CMOS process. The current consumption of the proposed cryptographic hardware consumes at most 3.96mA for RSA and 2.16mA for SHA computations under the 25MHz.