• Title/Summary/Keyword: Personal Cloud

Search Result 191, Processing Time 0.023 seconds

A Study on Structural Holes of Privacy Protection for Life Logging Service as analyzing/processing of Big-Data (빅데이터 분석/처리에 따른 생활밀착형 서비스의 프라이버시 보호 측면에서의 구조혈 연구)

  • Kang, Jang-Mook;Song, You-Jin
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.14 no.1
    • /
    • pp.189-193
    • /
    • 2014
  • SNS (Social Network Service) has evolved to life-friendly service with the combination of local services. Unlike exsiting mobile services, life-friendly service is expected to be personalized with gathering of local information, location information and social network service information. In the process of gathering various kinds of information, Big-data technology and Cloud technology is needed. The effective algorithem has researched for this already, however the privacy protection model hasn't researched enough in life-friendly service or big-data using circumstance. In this paper, the privacy issue is dealt with in terms of 'Structure hole', and the privacy issue comes from big-data technology of life-friendly service.

A Study on Construction of Crime Prevention System using Big Data in Korea (한국에서 빅데이터를 활용한 범죄예방시스템 구축을 위한 연구)

  • Kim, SungJun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.17 no.5
    • /
    • pp.217-221
    • /
    • 2017
  • Proactive prevention is important for crime. Past crimes have focused on coping after death and punishing them. But with Big Data technology, crime can be prevented spontaneously. Big data can predict the behavior of criminals or potential criminals. This article discusses how to build a big data system for crime prevention. Specifically, it deals with the way to combine unstructured data of big data with basic form data, and as a result, designs crime prevention system. Through this study, it is expected that the possibility of using big data for crime prevention is described through fingerprints, and it is expected to help crime prevention program and research in future.

DoorLock Control System (도어락 원격 제어를 이용한 빈 집 찾기 시스템)

  • Choi, dae geon;Park, Bum Soo;Park, Suhyun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.10a
    • /
    • pp.305-306
    • /
    • 2016
  • In other areas, if the job or university or travel to other areas the firsth problem is Accommodation. When you get home to get around, There is no place to stay. Also of travelers want to Personal Space more than Space group. To solve this problem In this paper,It provides a house through a door lock that do not use the remote control system. The system provides a room that is available to users and can be controlled by setting the password to a remote door lock. In addition, by using the NFC provided a convenience so that the user can use forgotten the password. Information and reviews of the house were available to help you manage the cloud system.

  • PDF

Privacy-Preservation Using Group Signature for Incentive Mechanisms in Mobile Crowd Sensing

  • Kim, Mihui;Park, Younghee;Dighe, Pankaj Balasaheb
    • Journal of Information Processing Systems
    • /
    • v.15 no.5
    • /
    • pp.1036-1054
    • /
    • 2019
  • Recently, concomitant with a surge in numbers of Internet of Things (IoT) devices with various sensors, mobile crowdsensing (MCS) has provided a new business model for IoT. For example, a person can share road traffic pictures taken with their smartphone via a cloud computing system and the MCS data can provide benefits to other consumers. In this service model, to encourage people to actively engage in sensing activities and to voluntarily share their sensing data, providing appropriate incentives is very important. However, the sensing data from personal devices can be sensitive to privacy, and thus the privacy issue can suppress data sharing. Therefore, the development of an appropriate privacy protection system is essential for successful MCS. In this study, we address this problem due to the conflicting objectives of privacy preservation and incentive payment. We propose a privacy-preserving mechanism that protects identity and location privacy of sensing users through an on-demand incentive payment and group signatures methods. Subsequently, we apply the proposed mechanism to one example of MCS-an intelligent parking system-and demonstrate the feasibility and efficiency of our mechanism through emulation.

Cost-Aware Scheduling of Computation-Intensive Tasks on Multi-Core Server

  • Ding, Youwei;Liu, Liang;Hu, Kongfa;Dai, Caiyan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.11
    • /
    • pp.5465-5480
    • /
    • 2018
  • Energy-efficient task scheduling on multi-core server is a fundamental issue in green cloud computing. Multi-core processors are widely used in mobile devices, personal computers, and servers. Existing energy efficient task scheduling methods chiefly focus on reducing the energy consumption of the processor itself, and assume that the cores of the processor are controlled independently. However, the cores of some processors in the market are divided into several voltage islands, in each of which the cores must operate on the same status, and the cost of the server includes not only energy cost of the processor but also the energy of other components of the server and the cost of user waiting time. In this paper, we propose a cost-aware scheduling algorithm ICAS for computation intensive tasks on multi-core server. Tasks are first allocated to cores, and optimal frequency of each core is computed, and the frequency of each voltage island is finally determined. The experiments' results show the cost of ICAS is much lower than the existing method.

Precision nutrition: approach for understanding intra-individual biological variation (정밀영양: 개인 간 대사 다양성을 이해하기 위한 접근)

  • Kim, Yangha
    • Journal of Nutrition and Health
    • /
    • v.55 no.1
    • /
    • pp.1-9
    • /
    • 2022
  • In the past few decades, great progress has been made on understanding the interaction between nutrition and health status. But despite this wealth of knowledge, health problems related to nutrition continue to increase. This leads us to postulate that the continuing trend may result from a lack of consideration for intra-individual biological variation on dietary responses. Precision nutrition utilizes personal information such as age, gender, lifestyle, diet intake, environmental exposure, genetic variants, microbiome, and epigenetics to provide better dietary advices and interventions. Recent technological advances in the artificial intelligence, big data analytics, cloud computing, and machine learning, have made it possible to process data on a scale and in ways that were previously impossible. A big data platform is built by collecting numerous parameters such as meal features, medical metadata, lifestyle variation, genome diversity and microbiome composition. Sophisticated techniques based on machine learning algorithm can be used to integrate and interpret multiple factors and provide dietary guidance at a personalized or stratified level. The development of a suitable machine learning algorithm would make it possible to suggest a personalized diet or functional food based on analysis of intra-individual metabolic variation. This novel precision nutrition might become one of the most exciting and promising approaches of improving health conditions, especially in the context of non-communicable disease prevention.

Utilizing Block chain in the Internet of Things for an Effective Security Sharing Scheme

  • Sathish C;Yesubai Rubavathi, C
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.6
    • /
    • pp.1600-1619
    • /
    • 2023
  • Organizations and other institutions have recently started using cloud service providers to store and share information in light of the Internet of Things (IoT). The major issues with this storage are preventing unauthorized access and data theft from outside parties. The Block chain based Security Sharing scheme with Data Access Control (BSSDAC) was implemented to improve access control and secure data transaction operations. The goal of this research is to strengthen Data Access Control (DAC) and security in IoT applications. To improve the security of personal data, cypher text-Policy Attribute-Based Encryption (CP-ABE) can be developed. The Aquila Optimization Algorithm (AOA) generates keys in the CP-ABE. DAC based on a block chain can be created to maintain the owner's security. The block chain based CP-ABE was developed to maintain secures data storage to sharing. With block chain technology, the data owner is enhancing data security and access management. Finally, a block chain-based solution can be used to secure data and restrict who has access to it. Performance of the suggested method is evaluated after it has been implemented in MATLAB. To compare the proposed method with current practices, Rivest-Shamir-Adleman (RSA) and Elliptic Curve Cryptography (ECC) are both used.

Metaverse Technology and Security Threats and Countermeasures (메타버스 기술과 보안 위협 및 대응방안)

  • Woo, SungHee;Lee, HyoJeong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.10a
    • /
    • pp.328-330
    • /
    • 2022
  • Currently, the Metaverse is introduced in various fields, and a virtual convergence economy that uses NFTs for content or item transactions is expected to develop into a 'metaverse environment'. The 'metaverse environment' will lead the changes in our society in the future and it will be fused with AI, big data, cloud, IoT, block chain, and next-generation network technology. However, personal information, device information, and behavior information provided by Metaverse users to use the service are subject to major attacks. Therefore, in order to provide a safe environment for users to use and to expand the business base of related companies, building a public-private cooperation system and developing a security guide are the leading tasks. Therefore, in this study, we compare and analyze metaverse features and technologies, and examine possible security threats and countermeasures.

  • PDF

A Study on Workbench-based Dynamic Service De-sign and Construction of Computational Science Engineering Platform (계산과학공학 플랫폼의 워크벤치 기반 동적 서비스 설계 및 구축에 관한 연구)

  • Kwon, Yejin;Jeon, Inho;Ma, Jin;Lee, Sik;Cho, Kum Won;Seo, Jerry
    • Journal of Internet Computing and Services
    • /
    • v.19 no.3
    • /
    • pp.57-66
    • /
    • 2018
  • EDISON ( EDucation-research Integration through Simulation On the Net) is a web simulation service based on cloud compu-ting. EDISON provides that web service and provide analysis result to users through pre-built infrastructure and various calcu-lation nodes computational science engineering problems that are difficult or impossible to analysis as user's personal resources to users. As a result, a simulation execution environment is provided in a web portal environment so that EDISON can be ac-cessed regardless of a user's device or operating system to perform computational science engineering analysis simulation. The purpose of this research is to design and construct a workbench based real - time dynamic service to provide an integrat-ed user interface to the EDSION system, which is a computational science engineering simulation and analysis platform, which is currently provided to users. We also devised a workbench-based user simulation service environment configuration. That has a user interface that is similar to the computational science engineering simulation software environment used locally. It can configure a dynamic web environment such as various analyzers, preprocessors, and simulation software. In order to provide these web services, the service required by the user is configured in portlet units, and as a result, the simulation service using the workbench is constructed.

Implementation of a DB-Based Virtual File System for Lightweight IoT Clouds (경량 사물 인터넷 클라우드를 위한 DB 기반 가상 파일 시스템 구현)

  • Lee, Hyung-Bong;Kwon, Ki-Hyeon
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.3 no.10
    • /
    • pp.311-322
    • /
    • 2014
  • IoT(Internet of Things) is a concept of connected internet pursuing direct access to devices or sensors in fused environment of personal, industrial and public area. In IoT environment, it is possible to access realtime data, and the data format and topology of devices are diverse. Also, there are bidirectional communications between users and devices to control actuators in IoT. In this point, IoT is different from the conventional internet in which data are produced by human desktops and gathered in server systems by way of one-sided simple internet communications. For the cloud or portal service of IoT, there should be a file management framework supporting systematic naming service and unified data access interface encompassing the variety of IoT things. This paper implements a DB-based virtual file system maintaining attributes of IoT things in a UNIX-styled file system view. Users who logged in the virtual shell are able to explore IoT things by navigating the virtual file system, and able to access IoT things directly via UNIX-styled file I O APIs. The implemented virtual file system is lightweight and flexible because it maintains only directory structure and descriptors for the distributed IoT things. The result of a test for the virtual shell primitives such as mkdir() or chdir() shows the smooth functionality of the virtual file system, Also, the exploring performance of the file system is better than that of Window file system in case of adopting a simple directory cache mechanism.