• Title/Summary/Keyword: Personal Cloud

Search Result 191, Processing Time 0.029 seconds

Enhancing Privacy Protection in Steppy Applications through Pseudonymization

  • Nugroho, Heri Arum;Prihatmanto, Ary Setijadi;Rhee, Kyung Hyune
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2015.10a
    • /
    • pp.763-766
    • /
    • 2015
  • Smart Healthcare System as an Open Platform (Shesop) is an integrated healthcare system and have several features, one of them is Steppy Application. Steppy does count your step and display on Shesop website. In this system security issues are not properly addressed, while Personal Health Record (PHR) patient stored in the cloud platform could be at risk. In fact, the huge electronic information available online, people needs reliable and effective technique for privacy preserving. In order to improve the security of data which are displayed on the Shesop website, so that anyone who access could not tamper without permission. Recently Xu et al. showed a pseudonym scheme using smart card as a solution in e-health systems which uses discrete logarithm problem with cyclic group. In this paper, we adopt their scheme and use it application into smartphone using Near Field Communication (NFC) to construct security in Steppy apps.

Personal Information Analysis using Digital Forensics on Android based Cloud Storage Applications (안드로이드 기반의 클라우드 스토리지 앱에서 디지털 포렌식을 활용한 개인정보 분석)

  • Park, Chan-Jin
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2015.10a
    • /
    • pp.710-713
    • /
    • 2015
  • 21세기 모바일 디바이스의 급속한 확산과 클라우드 컴퓨팅의 발전은 개인정보의 흐름을 개인용 컴퓨터에서 모바일 디바이스로 이동시켰다. 이에 따라 포렌식에서도 모바일 디바이스의 디지털 데이터를 중요한 증거로 인식하고 이에 대한 연구가 활발하게 진행 중이다. 하지만 클라우드 환경에서는 일반적으로 클라우드라고 인식되는 외부에 데이터를 저장하기 때문에 사용자 측의 디바이스에서는 디지털 증거의 획득이 쉽지 않다. 본 논문에서는 일반 사용자에게 클라우드 서비스로 대표되는 N드라이브, 다음 클라우드와 같은 클라우드 스토리지 서비스를 안드로이드 환경에서 이용해 보고 디바이스 내부에 생성되는 정보 중 디지털 포렌식의 관점에서 활용 가능한 정보를 수집 및 분석해보려 한다.

A Access System for a Personal User in the Cloud Computing (클라우드 컴퓨팅에서의 개인사용자를 위한 접근제어 시스템)

  • Park, Jun-Young;Na, Sang-Ho;Tian, Yuan;Huh, Eui-Nam
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2012.04a
    • /
    • pp.243-246
    • /
    • 2012
  • 클라우드 컴퓨팅 서비스는 눈부신 발전으로 다양한 서비스가 제공되고 있으며 많은 개인 사용자들이 클라우드 서비스에 가입하여 서비스를 제공받고 있다. 하지만 개인 사용자를 대상으로 제공하는 클라우드 서비스는 사용자의 정보를 요구하고 있으며 제공된 사용자 개인정보가 어떻게 보고되는지 개인 사용자는 확인하기 힘들다. 따라서 사용자의 정보 공개를 최소화하는 시스템이 필요하며 사용자의 정보가 없어도 사용자에 맞춤 서비스를 제공할 수 있는 클라우드 컴퓨팅 접근제어 시스템을 제안하고자 한다.

Trends in Ultra Low Power Intelligent Edge Semiconductor Technology (초저전력 엣지 지능형반도체 기술 동향)

  • Oh, K.I.;Kim, S.E.;Bae, Y.H.;Park, S.M.;Lee, J.J.;Kang, S.W.
    • Electronics and Telecommunications Trends
    • /
    • v.33 no.6
    • /
    • pp.24-33
    • /
    • 2018
  • In the age of IoT, in which everything is connected to a network, there have been increases in the amount of data traffic, latency, and the risk of personal privacy breaches that conventional cloud computing technology cannot cope with. The idea of edge computing has emerged as a solution to these issues, and furthermore, the concept of ultra-low power edge intelligent semiconductors in which the IoT device itself performs intelligent decisions and processes data has been established. The key elements of this function are an intelligent semiconductor based on artificial intelligence, connectivity for the efficient connection of neurons and synapses, and a large-scale spiking neural network simulation framework for the performance prediction of a neural network. This paper covers the current trends in ultra-low power edge intelligent semiconductors including issues regarding their technology and application.

Big Data Key Challenges

  • Alotaibi, Sultan
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.4
    • /
    • pp.340-350
    • /
    • 2022
  • The big data term refers to the great volume of data and complicated data structure with difficulties in collecting, storing, processing, and analyzing these data. Big data analytics refers to the operation of disclosing hidden patterns through big data. This information and data set cloud to be useful and provide advanced services. However, analyzing and processing this information could cause revealing and disclosing some sensitive and personal information when the information is contained in applications that are correlated to users such as location-based services, but concerns are diminished if the applications are correlated to general information such as scientific results. In this work, a survey has been done over security and privacy challenges and approaches in big data. The challenges included here are in each of the following areas: privacy, access control, encryption, and authentication in big data. Likewise, the approaches presented here are privacy-preserving approaches in big data, access control approaches in big data, encryption approaches in big data, and authentication approaches in big data.

Concept of the Cloud Type Virtual Policy Based Network Management Scheme for the Whole Internet

  • Kazuya, Odagiri;Shogo, Shimizu;Naohiro, Ishii
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.1
    • /
    • pp.71-77
    • /
    • 2023
  • In the current Internet system, there are many problems using anonymity of the network communication such as personal information leaks and crimes using the Internet system. This is why TCP/IP protocol used in Internet system does not have the user identification information on the communication data, and it is difficult to supervise the user performing the above acts immediately. As a study for solving the above problem, there is the study of Policy Based Network Management (PBNM). This is the scheme for managing a whole Local Area Network (LAN) through communication control for every user. In this PBNM, two types of schemes exist. As one scheme, we have studied theoretically about the Destination Addressing Control System (DACS) Scheme with affinity with existing internet. By applying this DACS Scheme to Internet system management, we will realize the policy-based Internet system management. In this paper, to realize it, concept of the Internet PBNM Scheme is proposed as the final step.

Implementation of Metaverse Virtual World using Unity Game Engine (유니티 게임엔진을 활용한 메타버스 가상세계 구현)

  • Gang In Lee;Seok Ho Han;Yong-Hwan Lee
    • Journal of the Semiconductor & Display Technology
    • /
    • v.22 no.2
    • /
    • pp.120-127
    • /
    • 2023
  • Recently, metaverse has attracted great attention worldwide with the development of related technologies and the demand for on-tact systems. The ideal metaverse should constitute a virtual world more similar to the realistic society with physical interactions. However, there are many constraints when we construct a virtual world using the existing commercialized metaverse platform. In this paper, we design and implement a university campus-based metaverse which minimizes the constraints, and create a virtual environment maps very similar to the real-world using Unity engine, Photon cloud and Playfab SDK for multi-user accessible to virtual world as a personal avatar. Also, this work includes attractive interaction based on exchange between users. Lastly, we illustrate our implemented metaverse works on Android phone, and it works without difficulty in terms of performance.

  • PDF

Market Performance of Major Companies in Cybersecurity and Policy Trends in Information and Communication Technology Supply Chain (사이버 보안 분야 주요 기업의 시장 성과와 ICT 공급망 관련 정책 동향)

  • C.M. Ahn;Y. Yoo
    • Electronics and Telecommunications Trends
    • /
    • v.39 no.3
    • /
    • pp.48-57
    • /
    • 2024
  • Cyberthreats and crimes have become common in society and demand the adoption of robust security measures. Financial cybercrimes, personal information breaches, and spam messages are now prevalent, while companies and nations face an increasing number of cyberthreats and attacks such as distributed denial of service, ransomware, and malware. As the overall socioeconomic landscape undergoes digitalization powered by big data, cloud computing, and artificial intelligence technologies, the importance of cybersecurity is expected to steadily increase. Developed nations are actively implementing various policies to strengthen cybersecurity and providing government support for research and development activities to bolster their domestic cybersecurity industries. In particular, the South Korean government has designated cybersecurity as one of the 12 nationwide strategic technology sectors. We examine the current landscape of cybersecurity companies and the information and communication technology supply chain, providing insights into the domestic cybersecurity market and suggesting implications for South Korea.

Relative Importance Analysis of Management Level Diagnosis for Consignee's Personal Information Protection (수탁사 개인정보 관리 수준 점검 항목의 상대적 중요도 분석)

  • Im, DongSung;Lee, Sang-Joon
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.8 no.2
    • /
    • pp.1-11
    • /
    • 2018
  • Recently ICT, new technologies such as IoT, Cloud, and Artificial Intelligence are changing the information society explosively. But personal information leakage incidents of consignee's company are increasing more and more because of the expansion of consignment business and the latest threats such as Ransomware and APT. Therefore, in order to strengthen the security of consignee's company, this study derived the checklists through the analysis of the status such as the feature of consignment and the security standard management system and precedent research. It also analyzed laws related to consignment. Finally we found out the relative importance of checklists after it was applied to proposed AHP(Analytic Hierarchy Process) Model. Relative importance was ranked as establishment of an internal administration plan, privacy cryptography, life cycle, access authority management and so on. The purpose of this study is to reduce the risk of leakage of customer information and improve the level of personal information protection management of the consignee by deriving the check items required in handling personal information of consignee and demonstrating the model. If the inspection activities are performed considering the relative importance of the checklist items, the effectiveness of the input time and cost will be enhanced.

Design of data integration model between hospitals for healthcare information collection (헬스케어 정보 수집을 위한 병원간 데이터 통합 모델 설계)

  • Jeong, Yoon-Su;Han, Kun-Hee
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.6
    • /
    • pp.1-7
    • /
    • 2018
  • As IT technology develops recently, medical equipment used in hospitals is demanding high performance. However, since the user visits different hospitals depending on the user's situation, the medical information treated at the hospital is distributed among the hospitals. In this paper, we propose a model to efficiently integrate the health care information of the users stored in the hospital in order to collect the healthcare information of the users who visited the different hospitals. The proposed model synchronizes users' healthcare information collected from personal wearable devices to collect user - centered healthcare information. In addition, the proposed model performs integrity and validity check related to user's healthcare information in a database existing in a cloud environment in order to smoothly share data with the healthcare service center. In particular, the proposed model enables tree - based data processing to smoothly manage healthcare information collected from mobile platforms.