• Title/Summary/Keyword: Personal Cloud

Search Result 191, Processing Time 0.024 seconds

Knowledge Creation Structure of Big Data Research Domain (빅데이터 연구영역의 지식창출 구조)

  • Namn, Su-Hyeon
    • Journal of Digital Convergence
    • /
    • v.13 no.9
    • /
    • pp.129-136
    • /
    • 2015
  • We investigate the underlying structure of big data research domain, which is diversified and complicated using bottom-up approach. For that purpose, we derive a set of articles by searching "big data" through the Korea Citation Index System provided by National Research Foundation of Korea. With some preprocessing on the author-provided keywords, we analyze bibliometric data such as author-provided keywords, publication year, author, and journal characteristics. From the analysis, we both identify major sub-domains of big data research area and discover the hidden issues which made big data complex. Major keywords identified include SOCIAL NETWORK ANALYSIS, HADOOP, MAPREDUCE, PERSONAL INFORMATION POLICY/PROTECTION/PRIVATE INFORMATION, CLOUD COMPUTING, VISUALIZATION, and DATA MINING. We finally suggest missing research themes to make big data a sustainable management innovation and convergence medium.

Efficient Security Method Using Mobile Virtualization Technology And Trustzone of ARM (모바일 가상화 기술과 ARM의 Trustzone을 사용한 효율적인 보안 방법)

  • Choi, Hwi-Min;Jang, Chang-Bok;Kim, Joo-Man
    • Journal of Digital Convergence
    • /
    • v.12 no.10
    • /
    • pp.299-308
    • /
    • 2014
  • Today, a number of users using smartphone is very rapidly increasing by development of smartphone performance and providing various services. Also, they are using it for enjoying various services(cloud service, game, banking service, mobile office, etc.). today's mobile security solution is simply to detect malicious code or stay on the level of mobile device management. In particular, the services which use sensitive information, such as certificate, corporation document, personal credit card number, need the technology which are prevented from hacking and leaking it. Recently, interest of these mobile security problems are increasing, as the damage cases been occurred. To solve the problem, there is various security research such as mobile virtualization, ARM trustzone, GlobalPlatform for mobile device. Therefore, in this paper, I suggested efficient method that uses the mobile virtualization techniques of certification, security policy and access control, password/key management, safe storage, etc. and Trustzone of ARM for preventing information leakage and hacking.

Personal Information Detection and Blurring Cloud Services Based on Machine Learning (머신러닝에 기반을 둔 사진 속 개인정보 검출 및 블러링 클라우드 서비스)

  • Kim, Min-jeong;Lee, Soo-young;Lee, Jiyoung;Ham, Na-youn
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2019.05a
    • /
    • pp.152-155
    • /
    • 2019
  • 클라우드가 대중화되어 많은 모바일 유저들이 자동 백업 기능을 사용하면서 민감한 개인정보가 포함된 사진들이 무분별하게 클라우드에 업로드 되고 있다. 개인정보를 포함한 클라우드가 악의적으로 해킹 될 시, 사진에 포함된 지문, 자동차 번호판, 카드 번호 등이 유출됨에 따라 대량의 개인정보가 유출될 가능성이 크다. 이에 따라 적절한 기준에 맞게 사진 속 개인 정보 유출을 막을 수 있는 기술의 필요성이 대두되고 있다. 현재의 클라우드 시스템의 문제를 해결하고자 본 연구는 모바일 기기에서 클라우드 서버로 사진을 백업하는 과정에서 영역 검출과 블러링의 과정을 제안하고 있다. 클라우드 업로드 과정에서 사진 속의 개인 정보를 검출한 뒤 이를 블러링하여 클라우드에 저장함으로써 악의적인 접근이 행해지더라도 개인정보의 유출을 방지할 수 있다. 머신러닝과 computer vision library등을 이용하여 이미지 내에 민감한 정보를 포함하고 있는 영역을 학습된 모델을 통해 검출한 뒤, OpenCV를 이용하여 블러링처리를 진행한다 사진 속에 포함될 수 있는 생체정보인 지문은 손 영역을 검출한 뒤, 해당 영역을 블러링을 하여 업로드하고 카드번호나 자동차 번호판이 포함된 사진은 영역을 블러링한 뒤, 암호화하여 업로드 된다. 후에 필요에 따라 본인인증을 거친 후 일정기간 열람을 허용하지만 사용되지 않을 경우 삭제되도록 한다. 개인정보 유출로 인한 피해가 꾸준히 증가하고 있는 지금, 사진 속의 개인 정보를 보호하는 기술은 안전한 통신과 더불어 클라우드의 사용을 더 편리하게 할 수 있을 것으로 기대된다.

An Analysis of Security Problem against Wireless Network in Smartphone (스마트폰 상에서 무선 네트워크 보안 문제점 분석)

  • Kim, Ki-Hawn;Lee, Young Sil;Lee, HoonJae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.383-386
    • /
    • 2014
  • Due to the development of communication technology, a conventional major business through PC, laptop or Tablet PC can be performed via a smartphone and it is increasing the user's convenience. At this point, the user prefers to connect to the Internet using the wireless network because it occurs an additional charge according to the amount of data to be transmitted when using a data communication through 3G or 4G. However, when using a wireless network, there is a possibility of several attacks such as easily steal or modulate the information from the outside or to gain access to personal information stored in the user's smartphone with man-in-the-middle attacks by using the fake AP. IIn this paper, we describe how you can detect the AP when you use LAN of the smartphone, were analyzed for this vulnerability, has not been approved. Furthermore, Also, we discuss ways which can enhance the security when user the access to the internet services (i.e., internet, public/private cloud service, etc.) via wireless network in smartphone.

  • PDF

An Analysis of Impact on the Quality of Life for Chronic Patients based Big Data (빅데이터 기반 만성질환자의 삶의 질에 미치는 영향분석)

  • Kim, Min-kyoung;Cho, Young-bok
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.11
    • /
    • pp.1351-1356
    • /
    • 2019
  • The purpose of this study is to investigate the effect of personal factors and community factors on the quality of life based on the presence of chronic patients based on the Big Data Platform. As a method of study, second data of 2017 community health survey and Statistics Korea by City·Gun·Gu public office were used and a multi-level analysis was conducted after separating EQ-5D index, individual factor and community factor. As a result, men, age, education level, monthly household income, having economic activity, the number of sports infrastructure were positively associated with the quality of life, and subjective health not good, extremely perceived stress were negatively associated with the quality of life. Research will continue to provide a platform independent of hardware that can utilize the cloud and open source for medical big data analysis in the future.

Analysis of the Utilization of Mobile Applications by Generation Z using Topic Modeling :Focusing on Users' Essay Data (토픽모델링을 활용한 Z세대의 애플리케이션 효용성에 대한 분석: 이용자의 에세이 데이터를 중심으로)

  • Park, Ju-Yeon;Jeong, Do-Heon
    • Journal of Industrial Convergence
    • /
    • v.20 no.1
    • /
    • pp.43-51
    • /
    • 2022
  • The purpose of this study is to provide basic information necessary for the establishment of mobile service marketing strategies, educational service development, and engineering education for Generation Z by analyzing the utilitization of various applications by Gen Z. To this end, 177 essays on mobile service usage experience were collected, major topics were analyzed using topic modeling, and these were visualized through word cloud analysis. As a result of the study, the main topics were related to 'transportation' such as movement and public transportation, 'personal management' such as schedule management, financial management, food management, 'transaction' such as checkout, meeting, purchase, 'leisure' such as eating out, travel, study, culture. Additionally, words such as time, thought, people, life, bus, information, confirmation, payment, KakaoTalk, and so on were found to have a high of frequency of use. Also, there was found to be a difference between topics by college. This study is meaningful in that it collected essays, which are unstructured data, and analyzed them through topic modeling.

User-Centric Disaster Recovery System Based on Proxy Re-Encryption Using Blockchain and Distributed Storage (블록체인과 분산 스토리지를 활용한 프록시 재암호화 기반의 사용자 중심 재해 복구 시스템)

  • Park, Junhoo;Kim, Geunyoung;Kim, Junseok;Ryou, Jaecheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.6
    • /
    • pp.1157-1169
    • /
    • 2021
  • The disaster recovery refers to policies and procedures to ensure continuity of services and minimize loss of resources and finances in case of emergency situations such as natural disasters. In particular, the disaster recovery method by the cloud service provider has advantages such as management flexibility, high availability, and cost effectiveness. However, this method has a dependency on a service provider and has a structural limitation in which a user cannot be involved in personal data. In this paper, we propose a protocol using proxy re-encryption for data confidentiality by removing dependency on service providers by backing up user data using blockchain and distributed storage. The proposed method is implemented in Ethereum and IPFS environments, and presents the performance and cost required for backup and recovery operations.

Optimization of Pose Estimation Model based on Genetic Algorithms for Anomaly Detection in Unmanned Stores (무인점포 이상행동 인식을 위한 유전 알고리즘 기반 자세 추정 모델 최적화)

  • Sang-Hyeop Lee;Jang-Sik Park
    • Journal of the Korean Society of Industry Convergence
    • /
    • v.26 no.1
    • /
    • pp.113-119
    • /
    • 2023
  • In this paper, we propose an optimization of a pose estimation deep learning model for recognition of abnormal behavior in unmanned stores using radio frequencies. The radio frequency use millimeter wave in the 30 GHz to 300 GHz band. Due to the short wavelength and strong straightness, it is a frequency with less grayness and less interference due to radio absorption on the object. A millimeter wave radar is used to solve the problem of personal information infringement that may occur in conventional CCTV image-based pose estimation. Deep learning-based pose estimation models generally use convolution neural networks. The convolution neural network is a combination of convolution layers and pooling layers of different types, and there are many cases of convolution filter size, number, and convolution operations, and more cases of combining components. Therefore, it is difficult to find the structure and components of the optimal posture estimation model for input data. Compared with conventional millimeter wave-based posture estimation studies, it is possible to explore the structure and components of the optimal posture estimation model for input data using genetic algorithms, and the performance of optimizing the proposed posture estimation model is excellent. Data are collected for actual unmanned stores, and point cloud data and three-dimensional keypoint information of Kinect Azure are collected using millimeter wave radar for collapse and property damage occurring in unmanned stores. As a result of the experiment, it was confirmed that the error was moored compared to the conventional posture estimation model.

A Study on the Email Management of Undergraduate Students (대학생의 이메일 관리 행태 연구)

  • Jiyoon Han;Hye-Eun Lee
    • Journal of the Korean Society for information Management
    • /
    • v.40 no.1
    • /
    • pp.149-173
    • /
    • 2023
  • This study examines email records management patterns of undergraduate students and their perceptions of university email policy. The research collected data from 317 undergraduate students using a survey based on the five essential elements of email records management: common elements, email creation, email management, email preservation, and perception. Also, an in-depth interview was conducted with 6 undergraduate students, according to the method of university email service: Google, Microsoft, and in-house webmail. As a result, undergraduate students used email as an address book, cloud storage, file storage, and collaboration tool, and they had difficulties in systematically managing the email records according to the records lifecycle. Also, there was a tendency to prefer using an external email platform that can use additional functions to in-house webmail that has limitations in mobile service and preservation of attachments. Thus, this study suggests ways to help undergraduate students manage their email records, including maintaining graduates' email accounts, providing sufficient email storage, and providing email records management training and guidelines for undergraduate students.

Awareness and attitudes regarding oral care intervention program based on community care for older adults at home : focusing on the grounded theory (커뮤니티케어 기반의 방문구강건강관리 중재 수혜자의 프로그램 운영 관련 인식 및 태도: 근거이론적 접근)

  • Myeong-Hwa Park;Ji-Won Park;Seul-Ah Lee;Jong-Hwa Jang
    • Journal of Korean society of Dental Hygiene
    • /
    • v.23 no.5
    • /
    • pp.351-360
    • /
    • 2023
  • Objectives: This study is based on a visiting oral health care intervention program in the community care. This qualitative study was conducted through in-depth interviews to identify awareness and attitudes regarding intervention program among older adults. Methods: The research team visited the homes of the target older adults and conducted in-depth interviews for approximately an hour using a semi-structured questionnaire. The collected voice recordings were transcribed using Clova Note, and AI program by Naver. Using the 'Word Cloud Generator 3.7' program, words of high importance and interest from interview answers were extracted, visualized, and analyzed. Results: Participating older adults acknowledged that their quality of life related to oral health could be improved by increasing the level of oral health awareness and oral health knowledge through the intervention program. In addition, the older adults indicated that their oral hygiene management ability improved compared to before the intervention through expert oral hygiene management and oral health education. Further, as the level of oral health knowledge increased, so too did satisfaction with the intervention program increase. Conclusions: The intervention program for visiting oral health care showed a positive effect on the awareness and attitude of older adults. Thus, it is suggested that education for continuous competency enhancement of dental hygienists and multidisciplinary education for the improvement of general health and quality of life of older adults should be promoted.