• 제목/요약/키워드: Performance attribute

검색결과 446건 처리시간 0.023초

퍼지 다중특성 관계 그래프를 이용한 내용기반 영상검색 (Content-based Image Retrieval Using Fuzzy Multiple Attribute Relational Graph)

  • 정성환
    • 정보처리학회논문지B
    • /
    • 제8B권5호
    • /
    • pp.533-538
    • /
    • 2001
  • 본 연구에선는 FAGA(Fuzzy Attribute Relational Graph) 노드의 단일특성을 실제 영상을 응용하여 다중특성으로 확장하고, 노드의 레이블뿐만 아니라, 칼라 질감 그리고 공간관계를 고려한 다중특성 관계 그래프를 이용한 새로운 영상검색을 제안하였다. 1,240 개의 영상으로 구성된 합성영상 데이터베이스와 NETRA 및 Corel Drew 의 1,026개의 영상으로 구성된 자연영상 데이터베이스를 사용하여 실험한 결과, 다중특성을 고려한 접근방법이 단일 특성만 고려하는 방법에 비하여, 합성영상의 경우 Recall에서 6~30% 성능 증가를 보였고, 자연연상의 경우에도 Displacement 척도들과 유사 검색 영상의 수에서 검색 성능이 우수함을 실험을 통하여 확인하였다.

  • PDF

Provably secure attribute based signcryption with delegated computation and efficient key updating

  • Hong, Hanshu;Xia, Yunhao;Sun, Zhixin;Liu, Ximeng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제11권5호
    • /
    • pp.2646-2659
    • /
    • 2017
  • Equipped with the advantages of flexible access control and fine-grained authentication, attribute based signcryption is diffusely designed for security preservation in many scenarios. However, realizing efficient key evolution and reducing the calculation costs are two challenges which should be given full consideration in attribute based cryptosystem. In this paper, we present a key-policy attribute based signcryption scheme (KP-ABSC) with delegated computation and efficient key updating. In our scheme, an access structure is embedded into user's private key, while ciphertexts corresponds a target attribute set. Only the two are matched can a user decrypt and verify the ciphertexts. When the access privileges have to be altered or key exposure happens, the system will evolve into the next time slice to preserve the forward security. What's more, data receivers can delegate most of the de-signcryption task to data server, which can reduce the calculation on client's side. By performance analysis, our scheme is shown to be secure and more efficient, which makes it a promising method for data protection in data outsourcing systems.

Sharing and Privacy in PHRs: Efficient Policy Hiding and Update Attribute-based Encryption

  • Liu, Zhenhua;Ji, Jiaqi;Yin, Fangfang;Wang, Baocang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제15권1호
    • /
    • pp.323-342
    • /
    • 2021
  • Personal health records (PHRs) is an electronic medical system that enables patients to acquire, manage and share their health data. Nevertheless, data confidentiality and user privacy in PHRs have not been handled completely. As a fine-grained access control over health data, ciphertext-policy attribute-based encryption (CP-ABE) has an ability to guarantee data confidentiality. However, existing CP-ABE solutions for PHRs are facing some new challenges in access control, such as policy privacy disclosure and dynamic policy update. In terms of addressing these problems, we propose a privacy protection and dynamic share system (PPADS) based on CP-ABE for PHRs, which supports full policy hiding and flexible access control. In the system, attribute information of access policy is fully hidden by attribute bloom filter. Moreover, data user produces a transforming key for the PHRs Cloud to change access policy dynamically. Furthermore, relied on security analysis, PPADS is selectively secure under standard model. Finally, the performance comparisons and simulation results demonstrate that PPADS is suitable for PHRs.

Bilinear Group에서 속성 은닉을 가지는 안전한 내적 암호화 방식 (Secure Inner Product Encryption Scheme with Attribute Hiding in Bilinear Groups)

  • 리프키 사디킨;박영호
    • 전자공학회논문지
    • /
    • 제51권1호
    • /
    • pp.57-70
    • /
    • 2014
  • 내적 암호화 방식은 비밀키와 암호문 사이에 파인 그레인 관계를 제공하는 암호학적 프리미티브이다. 본 논문은 완전한 속성 은닉 보호를 수행하는 새로운 IPE 방식을 제안한다. 제안한 IPE 방식은 합성 위수의 bilinear groups에 기반한다. 본 논문에서는 이중 암호화 시스템 체계를 사용하여 제안한 IPE의 완전한 속성 은닉 보호를 증명한다. 성능 분석에서 기존의 IPE 방식들과 제안한 IPE 방식의 연산량과 메모리 할당량을 비교한다.

Verifiable Outsourced Ciphertext-Policy Attribute-Based Encryption for Mobile Cloud Computing

  • Zhao, Zhiyuan;Wang, Jianhua
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제11권6호
    • /
    • pp.3254-3272
    • /
    • 2017
  • With the development of wireless access technologies and the popularity of mobile intelligent terminals, cloud computing is expected to expand to mobile environments. Attribute-based encryption, widely applied in cloud computing, incurs massive computational cost during the encryption and decryption phases. The computational cost grows with the complexity of the access policy. This disadvantage becomes more serious for mobile devices because they have limited resources. To address this problem, we present an efficient verifiable outsourced scheme based on the bilinear group of prime order. The scheme is called the verifiable outsourced computation ciphertext-policy attribute-based encryption scheme (VOC-CP-ABE), and it provides a way to outsource intensive computing tasks during encryption and decryption phases to CSP without revealing the private information and leaves only marginal computation to the user. At the same time, the outsourced computation can be verified by two hash functions. Then, the formal security proofs of its (selective) CPA security and verifiability are provided. Finally, we discuss the performance of the proposed scheme with comparisons to several related works.

유전알고리듬을 이용한 속성의 중복 허용 파일 수직분할 방법 (An Attribute Replicating Vertical File Partition Method by Genetic Algorithm)

  • 김재련;유종찬
    • 정보기술과데이타베이스저널
    • /
    • 제6권2호
    • /
    • pp.71-86
    • /
    • 1999
  • The performance of relational database is measured by the number of disk accesses necessary to transfer data from disk to main memory. The paper proposes to vertically partition relations into fragments and to allow attribute replication to reduce the number of disk accesses. To reduce the computational time, heuristic search method using genetic algorithm is used. Genetic algorithm used employs a rank-based-sharing fitness function and elitism. Desirable parameters of genetic algorithm are obtained through experiments and used to find the solutions. Solutions of attribute replication and attribute non-replication problems are compared. Optimal solutions obtained by branch and bound method and by heuristic solutions(genetic algorithm) are also discussed. The solution method proposed is able to solve large-sized problems within acceptable time limit and shows solutions near the optimal value.

  • PDF

Secure Attribute-Based Access Control with a Ciphertext-Policy Attribute-Based Encryption Scheme

  • Sadikin, Rifki;Park, Young Ho;Park, Kil Houm
    • 한국산업정보학회논문지
    • /
    • 제19권1호
    • /
    • pp.1-12
    • /
    • 2014
  • An access control system is needed to ensure only authorized users can access a sensitive resource. We propose a secure access control based on a fully secure and fine grained ciphertext-policy attribute-based encryption scheme. The access control for a sensitive resource is ensured by encrypting it with encryption algorithm from the CP-ABE scheme parameterized by an access control policy. Furthermore, the proposed access control supports non-monotone type access control policy. The ciphertext only can be recovered by users whose attributes satisfy the access control policy. We also implement and measure the performance of our proposed access control. The results of experiments show that our proposed secure access control is feasible.

Ensemble of Classifiers Constructed on Class-Oriented Attribute Reduction

  • Li, Min;Deng, Shaobo;Wang, Lei
    • Journal of Information Processing Systems
    • /
    • 제16권2호
    • /
    • pp.360-376
    • /
    • 2020
  • Many heuristic attribute reduction algorithms have been proposed to find a single reduct that functions as the entire set of original attributes without loss of classification capability; however, the proposed reducts are not always perfect for these multiclass datasets. In this study, based on a probabilistic rough set model, we propose the class-oriented attribute reduction (COAR) algorithm, which separately finds a reduct for each target class. Thus, there is a strong dependence between a reduct and its target class. Consequently, we propose a type of ensemble constructed on a group of classifiers based on class-oriented reducts with a customized weighted majority voting strategy. We evaluated the performance of our proposed algorithm based on five real multiclass datasets. Experimental results confirm the superiority of the proposed method in terms of four general evaluation metrics.

The Effects of Goal Orientation Consciousness versus Unconsciousness on Consumers' Choice Tendency

  • CHOI, Nak-Hwan;CHEN, Fei
    • 산경연구논집
    • /
    • 제11권1호
    • /
    • pp.7-17
    • /
    • 2020
  • Purpose: This study aimed at exploring the product choice tendency differences between the consciousness and unconsciousness of goal orientation when product attributes is perceived to be compatible with the goal orientation. Research design, data and methodology: Empirical study used a 2 (goal conscious vs. unconscious) × 3 (hedonic vs. performance vs. reliability attribute) between-subjects design and one control group. To verify hypotheses, χ2-test was conducted to 320 questionnaire data answered by undergraduate students of Jiangxi Normal University in China. Results: First, consumers under unconscious condition showed a higher product choice consistency based on compatibility between hedonic (performance) attribute of the product and their hedonic (performance) promotion goal-orientation than those under the conscious condition. Second, product choice effects of compatibility between reliability attribute of the product and prevention goal orientation were not significantly different between consumers' consciousness and unconsciousness of their prevention goal orientation. Conclusions: Marketers of 'under dog' should try to develop and deliver the product attributes different from the attributes of 'top dog.' And the 'top dog' marketers should help their customers to avoid the conflicts by developing the environment of inducing their goal orientation unconsciously. Brand marketers should always pay attention to the reliability attributes concerned with the prevention goal orientation.

한국 창작뮤지컬 관람동기의 중요도 연구 (A Study on IPA of Spectator Motivation in the Korean Creative Musical)

  • 구은자;이광호;김혜원
    • 한국산학기술학회논문지
    • /
    • 제14권4호
    • /
    • pp.1595-1603
    • /
    • 2013
  • 본 논문은 한국창작 뮤지컬의 활성화를 위해 한국 창작 뮤지컬의 관람동기에 관한 중요도 연구이다. 중요도 분석(IPA, Importance Performance Analysis)는 다 속성 모델의 각 속성의 상대적인 중요도와 성취도를 동시에 비교 분석하는 평가기법이다. 이 분석은 고객들이 중시하는 요소와 이들 요소에 대한 고객의 만족도를 매트릭스 상의 좌표로 표시하여 식별하는 방법으로 고객만족은 특성 속성에 대한 고객의 기대수준과 그러한 속성에 대한 실행도에 의해 결정된다. 이 분석법을 통해 본 연구는 한국 창작뮤지컬 관람동기 속성의 중요도와 만족도를 알아보았다.