• Title/Summary/Keyword: Personal Cloud

Search Result 192, Processing Time 0.021 seconds

User Privacy Security Scheme using Double Replication Key in the Cloud Environment (클라우드 환경에서 이중 복제 키를 사용한 사용자 프라이버시 보호 기법)

  • Jeong, Yoon-Su
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.4
    • /
    • pp.9-14
    • /
    • 2018
  • Recently, as the internet speed is getting faster, in the cloud environment, the service receiving device is changing from a general PC to a compact device such as a mobile phone or a tablet PC. Since handheld devices such as mobile phones or tablet PCs are often used in wireless rather than wired, there are many problems that personal information may be exposed maliciously from a third party. In this paper, we propose a user privacy protection scheme through a duplicate duplicate key generation process which can safely protect user 's privacy from third party among cloud services being served through various wireless media. The proposed scheme is used to synchronize the duplicated key between the server and the intermediary device, and aims at shortening the time of the authentication process protecting the user 's privacy. In this case, the proposed scheme uses Interleave() function and random number to synchronize the server and the intermediary device, so it can safely prevent the malicious attack of the third party.

Context-aware Framework for Personalized Service (개인화 서비스 지원을 위한 상황인식 프레임워크)

  • Chang, Hyo-Kyung;Kang, Yong-Ho;Jang, Chang-Bok;Choi, Eui-In
    • Journal of Digital Convergence
    • /
    • v.10 no.1
    • /
    • pp.301-307
    • /
    • 2012
  • The development of mobile devices and the spread of wireless network help share and exchange information and resources more easily. The bond them to Cloud Computing technology help pay attention to "Mobile Cloud" service, so there have been being a lot of studies on "Mobile Cloud" service. Especially, the important of 'Personalization Service' which is customized for each user's preference and context has been increasing. In order to provide appropriate personalization services, it enables to recognize user's current state, analyze the user's profile like user's tendency and preference, and draw the service answering the user's request. Most existing frameworks, however, are not very suitable for mobile devices because they were proposed on the web-based. And other context information except location information among user's context information are not much considered. Therefore, this paper proposed the context-aware framework, which provides more suitable services by using user's context and profile.

Integrated Verification of Hadoop Cluster Prototypes and Analysis Software for SMB (중소기업을 위한 하둡 클러스터의 프로토타입과 분석 소프트웨어의 통합된 검증)

  • Cha, Byung-Rae;Kim, Nam-Ho;Lee, Seong-Ho;Ji, Yoo-Kang;Kim, Jong-Won
    • Journal of Advanced Navigation Technology
    • /
    • v.18 no.2
    • /
    • pp.191-199
    • /
    • 2014
  • Recently, researches to facilitate utilization by small and medium business (SMB) of cloud computing and big data paradigm, which is the booming adoption of IT area, has been on the increase. As one of these efforts, in this paper, we design and implement the prototype to tentatively build up Hadoop cluster under private cloud infrastructure environments. Prototype implementation are made on each hardware type such as single board, PC, and server and performance is measured. Also, we present the integrated verification results for the data analysis performance of the analysis software system running on top of realized prototypes by employing ASA (American Standard Association) Dataset. For this, we implement the analysis software system using several open sources such as R, Python, D3, and java and perform a test.

A Prediction-based Dynamic Component Offloading Framework for Mobile Cloud Computing (모바일 클라우드 컴퓨팅을 위한 예측 기반 동적 컴포넌트 오프로딩 프레임워크)

  • Piao, Zhen Zhe;Kim, Soo Dong
    • Journal of KIISE
    • /
    • v.45 no.2
    • /
    • pp.141-149
    • /
    • 2018
  • Nowadays, mobile computing has become a common computing paradigm that provides convenience to people's daily life. More and more useful mobile applications' appearance makes it possible for a user to manage personal schedule, enjoy entertainment, and do many useful activities. However, there are some inherent defects in a mobile device that battery constraints and bandwidth limitations. These drawbacks get a user into troubles when to run computationally intensive applications. As a remedy scheme, component offloading makes room for handling mentioned issues via migrating computationally intensive component to the cloud server. In this paper, we will present the predictive offloading method for efficient mobile cloud computing. At last, we will present experiment result for validating applicability and practicability of our proposal.

A Design and Implementation of N-Screen Emulator Based on Cloud (클라우드 기반의 N-Screen 에뮬레이터 설계 및 구현)

  • Lee, Won Joo;Lee, Jung-Pyo;Yoon, Yong Ik
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.3
    • /
    • pp.11-18
    • /
    • 2013
  • In this paper, we propose a new design scheme of N-Screen emulator based on Cloud and then implement the emulator, in order to solve the critical point of N-Screen emulator based on Cloud. This method, without the emulator in the server, will be able to confirm the features of the emulator with a browser using Web Service. This means that the identical service is possible without regard to personal computer or mobile environment. Also, in order to emulating each different web browser engine of the various devices separately, we revise and manage the WebKit engine to be suitable to the characteristics of each device. In the previous design method, the number of emulators which can be shown in a monitor is restricted to 2 or 3. However, we show that the proposed design method can improve the performance of server to the extent that this method could operate more than 100 emulators per each server.

Intelligent Video Surveillance Incubating Security Mechanism in Open Cloud Environments (개방형 클라우드 환경의 지능형 영상감시 인큐베이팅 보안 메커니즘 구조)

  • Kim, Jinsu;Park, Namje
    • The Journal of Korean Institute of Information Technology
    • /
    • v.17 no.5
    • /
    • pp.105-116
    • /
    • 2019
  • Most of the public and private buildings in Korea are installing CCTV for crime prevention and follow-up action, insider security, facility safety, and fire prevention, and the number of installations is increasing each year. In the questionnaire conducted on the increasing CCTV, many reactions were positive in terms of the prevention of crime that could occur due to the installation, rather than negative views such as privacy violation caused by CCTV shooting. However, CCTV poses a lot of privacy risks, and when the image data is collected using the cloud, the personal information of the subject can be leaked. InseCam relayed the CCTV surveillance video of each country in real time, including the front camera of the notebook computer, which caused a big issue. In this paper, we introduce a system to prevent leakage of private information and enhance the security of the cloud system by processing the privacy technique on image information about a subject photographed through CCTV.

A Study on the Role and Security Enhancement of the Expert Data Processing Agency: Focusing on a Comparison of Data Brokers in Vermont (데이터처리전문기관의 역할 및 보안 강화방안 연구: 버몬트주 데이터브로커 비교를 중심으로)

  • Soo Han Kim;Hun Yeong Kwon
    • Journal of Information Technology Services
    • /
    • v.22 no.3
    • /
    • pp.29-47
    • /
    • 2023
  • With the recent advancement of information and communication technologies such as artificial intelligence, big data, cloud computing, and 5G, data is being produced and digitized in unprecedented amounts. As a result, data has emerged as a critical resource for the future economy, and overseas countries have been revising laws for data protection and utilization. In Korea, the 'Data 3 Act' was revised in 2020 to introduce institutional measures that classify personal information, pseudonymized information, and anonymous information for research, statistics, and preservation of public records. Among them, it is expected to increase the added value of data by combining pseudonymized personal information, and to this end, "the Expert Data Combination Agency" and "the Expert Data Agency" (hereinafter referred to as the Expert Data Processing Agency) system were introduced. In comparison to these domestic systems, we would like to analyze similar overseas systems, and it was recently confirmed that the Vermont government in the United States enacted the first "Data Broker Act" in the United States as a measure to protect personal information held by data brokers. In this study, we aim to compare and analyze the roles and functions of the "Expert Data Processing Agency" and "Data Broker," and to identify differences in designated standards, security measures, etc., in order to present ways to contribute to the activation of the data economy and enhance information protection.

Design of a Mirror for Fragrance Recommendation based on Personal Emotion Analysis (개인의 감성 분석 기반 향 추천 미러 설계)

  • Hyeonji Kim;Yoosoo Oh
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.28 no.4
    • /
    • pp.11-19
    • /
    • 2023
  • The paper proposes a smart mirror system that recommends fragrances based on user emotion analysis. This paper combines natural language processing techniques such as embedding techniques (CounterVectorizer and TF-IDF) and machine learning classification models (DecisionTree, SVM, RandomForest, SGD Classifier) to build a model and compares the results. After the comparison, the paper constructs a personal emotion-based fragrance recommendation mirror model based on the SVM and word embedding pipeline-based emotion classifier model with the highest performance. The proposed system implements a personalized fragrance recommendation mirror based on emotion analysis, providing web services using the Flask web framework. This paper uses the Google Speech Cloud API to recognize users' voices and use speech-to-text (STT) to convert voice-transcribed text data. The proposed system provides users with information about weather, humidity, location, quotes, time, and schedule management.

Cloud security authentication platform design to prevent user authority theft and abnormal operation during remote control of smart home Internet of Things (IoT) devices (스마트 홈 사물인터넷 기기(IoT)의 원격제어 시 사용자 권한 탈취 및 이상조작 방지를 위한 클라우드 보안인증 플랫폼 설계)

  • Yoo Young Hwan
    • Convergence Security Journal
    • /
    • v.22 no.4
    • /
    • pp.99-107
    • /
    • 2022
  • The use of smart home appliances and Internet of Things (IoT) devices is growing, enabling new interactions and automation in the home. This technology relies heavily on mobile services which leaves it vulnerable to the increasing threat of hacking, identity theft, information leakage, serious infringement of personal privacy, abnormal access, and erroneous operation. Confirming or proving such security breaches have occurred is also currently insufficient. Furthermore, due to the restricted nature of IoT devices, such as their specifications and operating environments, it is difficult to provide the same level of internet security as personal computers. Therefore, to increase the security on smart home IoT devices, attention is needed on (1) preventing hacking and user authority theft; (2) disabling abnormal manipulation; and (3) strengthening audit records for device operation. In response to this, we present a plan to build a cloud security authentication platform which features security authentication management functionality between mobile terminals and IoT devices.

A Study on Increasing Security Following Mutual Interaction and Integration of Dualized Security Category between Information Security and Personal Information Protection (정보보안과 개인정보보호 간의 이원화 보안범주의 상호연계 및 통합에 따른 보안성 증대에 대한 연구)

  • Seo, Woo-Seok
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.13 no.3
    • /
    • pp.601-608
    • /
    • 2018
  • While the legislation on the protection of personal information in public institutions was enacted and amended, the guidelines and laws on information security were focused, contracted and realized with focus on specific institutions. Mutual laws and guidelines have been applied and realized for the dual purpose of securing both the asset of macroscopic information and the asset of personally identification information, which are mutually different media information. However, in a bid to present the definition and direction of the fourth industrial revolution in 2017, a variety of products and solutions for security designed to ensure the best safety line of the 21st century, and the third technology with the comprehensive coverage for all these fields, a number of solutions and technologies, including IOT(: Internet of Things), ICT Internet of Things(: ICT), ICT Cloud, and AI (: Artificial Intelligence) are pouring into the security market as if plastic doll toys were manufactured in massive scale into the market. With the rising need for guaranteeing the interrelation for securities with dualistic physical, administrative, logical and psychological differences, that is, information security and personal information security that are classified into two main categories and for the enhanced security for integrated management and technical application, the study aims to acquire the optimal security by analyzing the interrelationship between the two cases and applying it to the study results.