• Title/Summary/Keyword: Network Storage

Search Result 1,085, Processing Time 0.028 seconds

ACCESS CONTROL MODEL FOR DATA STORED ON CLOUD COMPUTING

  • Mateen, Ahmed;Zhu, Qingsheng;Afsar, Salman;Rehan, Akmal;Mumtaz, Imran;Ahmad, Wasi
    • International Journal of Advanced Culture Technology
    • /
    • v.7 no.4
    • /
    • pp.208-221
    • /
    • 2019
  • The inference for this research was concentrated on client's data protection in cloud computing i.e. data storages protection problems and how to limit unauthenticated access to info by developing access control model then accessible preparations were introduce after that an access control model was recommend. Cloud computing might refer as technology base on internet, having share, adaptable authority that might be utilized as organization by clients. Compositely cloud computing is software's and hardware's are conveying by internet as a service. It is a remarkable technology get well known because of minimal efforts, adaptability and versatility according to client's necessity. Regardless its prevalence large administration, propositions are reluctant to proceed onward cloud computing because of protection problems, particularly client's info protection. Management have communicated worries overs info protection as their classified and delicate info should be put away by specialist management at any areas all around. Several access models were accessible, yet those models do not satisfy the protection obligations as per services producers and cloud is always under assaults of hackers and data integrity, accessibility and protection were traded off. This research presented a model keep in aspect the requirement of services producers that upgrading the info protection in items of integrity, accessibility and security. The developed model helped the reluctant clients to effectively choosing to move on cloud while considerate the uncertainty related with cloud computing.

Performance Evaluation by Frame Discard Methods in Adaptive Bandwidth Allocation Technique for Transmission Plan of Game Moving Picture (게임 동영상 전송을 위한 적응형 대역폭 방법에서 프레임 폐기 방법에 의한 성능 평가)

  • Lee, Myoun-Jae;Kim, Tae-Eun
    • Journal of Digital Contents Society
    • /
    • v.9 no.3
    • /
    • pp.433-439
    • /
    • 2008
  • A moving picture in online game is one of major ways to advertise online games, which gives a lot of help in playing game. In this case, a moving picture is compressed to variable bit rate for efficient storage use and network resource efficiency. Adaptable bandwidth allocation technique builds a transmission plan of a game moving picture. And, then some frames are discarded when transmission rate by the transmission plan is larger than available transmission rate, until transmission rate satisfies available transmission rate. Thus, performance evaluation factors in adaptable bandwidth allocation technique may be dependent on discarding order of a frame which transmission rate is much influenced. In this paper, in order to show the performance, a CBA algorithm, an MCBA algorithm, an MVBA algorithm, [6] and [7] algorithm were applied to a transmission plan in the adaptable band width allocation technique using various frame discard methods and performance evaluation factors were compared in among smoothing algorithms.

  • PDF

IoT Authentication System Using Blockchain and TOTP

  • Kim, Ho-Gyun;Jung, Soon-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.2
    • /
    • pp.113-122
    • /
    • 2020
  • In this paper, we propose the terminal authentication system using blockchain and TOTP(Time-based One-time Password Algorithm) to sustain a continuous authentication between user device and service device. And we experiment this system by using door-lock as a terminal of IoT(Internet of Things). In the future, we can apply this result to several devices of IoT for convenience and security. Although IoT devices frequently used everyday require convenience and security at the same time, it is difficult for IoT devices having features of the low-capacity and light-weight to apply the existing authentication technology requiring a high amount of computation. Blockchain technology having security and integrity have been used as a storage platform, but its authentication cannot be performed when the terminal cannot access any network. We show the method to solve this problem using Blockchain and TOPT.

Research Trend and Analysis of Altitude and Endurance for Fuel Cell Unmanned Aerial Vehicles (연료전지 무인항공기의 고도와 체공시간에 대한 특성 분석 및 최신 연구동향)

  • Cho, Seonghyun;Kim, Minjin;Son, Youngjun;Yang, Taehyun
    • Journal of Hydrogen and New Energy
    • /
    • v.25 no.4
    • /
    • pp.393-404
    • /
    • 2014
  • Unmanned aerial vehicles (UAVs) have been applied to not only military missions like surveillance and reconnaissance but also commercial missions like meteorological observation, aerial photograph, communication relay, internet network build and disaster observation. Fuel cells make UAVs eco-friendly by using hydrogen. Proton exchange membrane fuel cells (PEMFCs) show low operation temperature, high efficiency, low noise and high energy density and those characterisitcs are well fitted with UAVs. Thus Fuel cell based UAVs have been actively developed in the world. Recently, fuel cell UAVs have started to develope for high altitude UAVs because target altitude of UAVs is expanded upto stratosphere altitude. Long endurance of UAVs is essential to improve effects of the missions. Improvement of UAV endurance time could be fulfilled by developing a hydrogen fuel storage system with high energy density and reducing the weight of UAVs. In this paper, research trend and analysis of fuel cell UAVs are introduced in terms of their altitude and endurance time and then the prospect of fuel cell UAVs are shown.

Femto-Caching File Placement Technique for Overlapped Helper Coverage Without User Location Information (사용자 위치정보를 사용하지 않는 헬퍼 간 중첩 커버리지 영역을 위한 펨토-캐싱 파일 분배 기술)

  • Shim, Jae-Nam;Min, Byoung-Yoon;Kim, Dong Ku
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39A no.11
    • /
    • pp.682-689
    • /
    • 2014
  • Due to explosive growth of mobile data traffic, many kind of techniques based on small cell is proposed as solution for phenomenon. However, those techniques essentially demands increase of backhaul capacity and causes performance degradation if not satisfied. Based on that, the approach applying the storage capacity in place of backhaul capacity, which is known as femto-caching, is proposed to reduce data downloading delay of users in system. In this paper, we expanded previous research by proposing file placement strategy with distribution of user position, which is more practical scenario. Simulation results verify that our proposed scheme has better performance gains mainly because when coverage of helpers are overlapped, users get more opportunity to connect various helpers which enables users to download a variety kind of files from helpers, not base station.

Optical Behavior and Electrical Properties of Functional Dendrimer Thin Films (기능성 덴드리머 박막의 광학적 거동 및 전기적 특성)

  • 박재철;정상범;권영수
    • The Transactions of the Korean Institute of Electrical Engineers C
    • /
    • v.52 no.5
    • /
    • pp.201-205
    • /
    • 2003
  • We synthesized dendrimers containing light switchable units, azobenzene group. And the dendrimer containing 48 pyridinepropanol functional end group, which could form a complex structure with metal ions was synthesized. To apply to the molecular level devices or data storage system using Langmuir-Blodgett(LB) film, we firstly investigated the monolayer behavior using the surface pressure-area($\pi$-A) isotherms at air-water interface. And then the surface pressure shift of monolayer by light irradiation was also measured to the dendrimer with azobezene group. As a result, the monolayer of dendrimer with azobenzene group showed the reversible photo-switching behavior by the isomerization of azobenzene group in their periphery. The samples for electrical measurement were fabricated to two types which were pure dendrimer with pyridinepropanol group and its complexes with $Pt^4+$ ions by LB method. We have studied the electrical properties of the ultra thin dendrimer LB films investigated by the current-voltage(I-V) characteristics of Metal/Dendrimer LB films/Metal(MIM) structure. And we have investigated different results in the surface activity at the air-water interface as well as the electrical properties for the monolayers of pure dendrimer with pyridinevopanol group and its complex with $Pt^4+$ ions. In conclusion, it is demonstrated that the metal ion around dendrimer with pyri야nepropanol group can contribute to make formation of network structure among dendrimers and it result from the change of electrical properties. This results suggest that the dendrimers with azobenzene group and pvridinedropanol group can be applied to high efficient nano-device of molecular level.

An Iterative Algorithm for the Bottom Up Computation of the Data Cube using MapReduce (맵리듀스를 이용한 데이터 큐브의 상향식 계산을 위한 반복적 알고리즘)

  • Lee, Suan;Jo, Sunhwa;Kim, Jinho
    • Journal of Information Technology and Architecture
    • /
    • v.9 no.4
    • /
    • pp.455-464
    • /
    • 2012
  • Due to the recent data explosion, methods which can meet the requirement of large data analysis has been studying. This paper proposes MRIterativeBUC algorithm which enables efficient computation of large data cube by distributed parallel processing with MapReduce framework. MRIterativeBUC algorithm is developed for efficient iterative operation of the BUC method with MapReduce, and overcomes the limitations about the storage size and processing ability caused by large data cube computation. It employs the idea from the iceberg cube which computes only the interesting aspect of analysts and the distributed parallel process of cube computation by partitioning and sorting. Thus, it reduces data emission so that it can reduce network overload, processing amount on each node, and eventually the cube computation cost. The bottom-up cube computation and iterative algorithm using MapReduce, proposed in this paper, can be expanded in various way, and will make full use of many applications.

The Application of Geography Markup Language(GML) to the Maritime Information

  • Oh, Se-Woong;Park, Jong-Min;Suh, Sang-Hyun
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • v.1
    • /
    • pp.519-524
    • /
    • 2006
  • This paper describes an application of information presentation based geographic map for maritime information, including navigation information. The work is motivated by the need to prepare maritime information representation and distribution for future generation Web network technology. This works consist of map generation using GML and application to maritime information. GML 3.0 became an adopted specification of the Open Geospatial Consortium(OGC) in January 2003, and is rapidly emerging as the world standard for the encoding, transport and storage of all forms of geographic information. This paper looks at the application of GML to one of the more challenging areas of maritime information. Specific features of GML of interest to maritime information provider are discussed and then illustrated through a series of maritime information case studies. The first phase of the work consists of the construction of GML application schema for using as a base map of maritime information. Maritime information is acquired from multiple sources, including standards documents, database schemas, lexicons, collections of symbol definition. The sources of GML ontological knowledge and the contribution of each source to the overall ontology are described in this paper. In the second phase, the prepared GML is used to create a prototype of the mixed maritime information as a base map - for tagging documents within the maritime domain. An overview of this prototype is included. One application area for these information elements described here is the integrated retrieval of maritime information from diverse sources, ranging from Web sites to nautical chart databases and text documents.

  • PDF

Cooperation-Aware VANET Clouds: Providing Secure Cloud Services to Vehicular Ad Hoc Networks

  • Hussain, Rasheed;Oh, Heekuck
    • Journal of Information Processing Systems
    • /
    • v.10 no.1
    • /
    • pp.103-118
    • /
    • 2014
  • Over the last couple of years, traditional VANET (Vehicular Ad Hoc NETwork) evolved into VANET-based clouds. From the VANET standpoint, applications became richer by virtue of the boom in automotive telematics and infotainment technologies. Nevertheless, the research community and industries are concerned about the under-utilization of rich computation, communication, and storage resources in middle and high-end vehicles. This phenomenon became the driving force for the birth of VANET-based clouds. In this paper, we envision a novel application layer of VANET-based clouds based on the cooperation of the moving cars on the road, called CaaS (Cooperation as a Service). CaaS is divided into TIaaS (Traffic Information as a Service), WaaS (Warning as a Service), and IfaaS (Infotainment as a Service). Note, however, that this work focuses only on TIaaS and WaaS. TIaaS provides vehicular nodes, more precisely subscribers, with the fine-grained traffic information constructed by CDM (Cloud Decision Module) as a result of the cooperation of the vehicles on the roads in the form of mobility vectors. On the other hand, WaaS provides subscribers with potential warning messages in case of hazard situations on the road. Communication between the cloud infrastructure and the vehicles is done through GTs (Gateway Terminals), whereas GTs are physically realized through RSUs (Road-Side Units) and vehicles with 4G Internet access. These GTs forward the coarse-grained cooperation from vehicles to cloud and fine-grained traffic information and warnings from cloud to vehicles (subscribers) in a secure, privacy-aware fashion. In our proposed scheme, privacy is conditionally preserved wherein the location and the identity of the cooperators are preserved by leveraging the modified location-based encryption and, in case of any dispute, the node is subject to revocation. To the best of our knowledge, our proposed scheme is the first effort to offshore the extended traffic view construction function and warning messages dissemination function to the cloud.

CERES: A Log-based, Interactive Web Analytics System for Backbone Networks (CERES: 백본망 로그 기반 대화형 웹 분석 시스템)

  • Suh, Ilhyun;Chung, Yon Dohn
    • KIISE Transactions on Computing Practices
    • /
    • v.21 no.10
    • /
    • pp.651-657
    • /
    • 2015
  • The amount of web traffic has increased as a result of the rapid growth of the use of web-based applications. In order to obtain valuable information from web logs, we need to develop systems that can support interactive, flexible, and efficient ways to analyze and handle large amounts of data. In this paper, we present CERES, a log-based, interactive web analytics system for backbone networks. Since CERES focuses on analyzing web log records generated from backbone networks, it is possible to perform a web analysis from the perspective of a network. CERES is designed for deployment in a server cluster using the Hadoop Distributed File System (HDFS) as the underlying storage. We transform and store web log records from backbone networks into relations and then allow users to use a SQL-like language to analyze web log records in a flexible and interactive manner. In particular, we use the data cube technique to enable the efficient statistical analysis of web log. The system provides users a web-based, multi-modal user interface.