• Title/Summary/Keyword: Preserving environment

Search Result 263, Processing Time 0.029 seconds

A Privacy-preserving Image Retrieval Scheme in Edge Computing Environment

  • Yiran, Zhang;Huizheng, Geng;Yanyan, Xu;Li, Su;Fei, Liu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.2
    • /
    • pp.450-470
    • /
    • 2023
  • Traditional cloud computing faces some challenges such as huge energy consumption, network delay and single point of failure. Edge computing is a typical distributed processing platform which includes multiple edge servers closer to the users, thus is more robust and can provide real-time computing services. Although outsourcing data to edge servers can bring great convenience, it also brings serious security threats. In order to provide image retrieval while ensuring users' data privacy, a privacy preserving image retrieval scheme in edge environment is proposed. Considering the distributed characteristics of edge computing environment and the requirement for lightweight computing, we present a privacy-preserving image retrieval scheme in edge computing environment, which two or more "honest but curious" servers retrieve the image quickly and accurately without divulging the image content. Compared with other traditional schemes, the scheme consumes less computing resources and has higher computing efficiency, which is more suitable for resource-constrained edge computing environment. Experimental results show the algorithm has high security, retrieval accuracy and efficiency.

Study on Application of the Preserving Valuation Index for Environmental Management of a Stack Room (서고환경관리를 위한 보존성 평가지수 활용에 관한 연구)

  • Yoon, Dai-Hyun;Shin, Hyun-Chang
    • The Korean Journal of Archival Studies
    • /
    • no.31
    • /
    • pp.139-161
    • /
    • 2012
  • Donald K. Sebera model can quantitatively compare the preserving environment by calculating the preserving valuation index with changing only the temperature and humidity. In this study, Donald K. Sebera model was used in order to compare and evaluate the preserving valuation index on the best condition and the worst condition in the temperature and humidity range of public records management act. As the results, the preserving valuation index in the best conditions was larger 2.47 times than the worst conditions within the preserving environment permitted in public records management act. Also, the influence of the humidity on the preserving valuation index of a paper archives as decreasing the activation energy for the hydrolysis reaction was larger rather than temperature. Thus the preserving valuation index can easily evaluate the suitability of the temperature and humidity conditions for preserving a archives. Therefore it can be used as useful tool for preservation of archives on change of the temperature and humidity.

Design of EEG Signal Security Scheme based on Privacy-Preserving BCI for a Cloud Environment (클라우드 환경을 위한 Privacy-Preserving BCI 기반의 뇌파신호 보안기법 설계)

  • Cho, Kwon;Lee, Donghyeok;Park, Namje
    • Journal of KIISE
    • /
    • v.45 no.1
    • /
    • pp.45-52
    • /
    • 2018
  • With the advent of BCI technology in recent years, various BCI products have been released. BCI technology enables brain information to be transmitted directly to a computer, and it will bring a lot of convenience to life. However, there is a problem with information protection. In particular, EEG data can raise issues about personal privacy. Collecting and analyzing big data on EEG reports raises serious concerns about personal information exposure. In this paper, we propose a secure privacy-preserving BCI model in a big data environment. The proposed model could prevent personal identification and protect EEG data in the cloud environment.

Natural Environment Protection and Restoration of Historic Landscaping Works For Preserving The Ancient City of Gyeongju

  • Hong, Kwang-Pyo;Lim, Hyo-Sun
    • Journal of the Korean Institute of Landscape Architecture
    • /
    • v.38 no.5_2
    • /
    • pp.206-213
    • /
    • 2010
  • This paper looks into how to preserve Gyeongju's natural environment and to restore its historic landscaping works, one of the greate factor that compose ancient city as a way of wisely preserving Gyeongju, one of the oldest cities of Korea. Gyeongju, a city based in its natural environment, is formated inside of a basin of mountains and streams. Mountains and streams are the major two factors when on thinks of preserving the ancient city of Gyeongju. Four mountains surrounding the city play a direct role in marking coordinates of major city landmarks, while streams influence the structure and formation of the city in a great deal. More precisely, mountains should be able to be seen from the center of the city and streams should be restored in a way that they can serve as scenic identities of their time. Efforts should also be put into restoring such elements as ancient gardens, royal forests and water ways. The research team believes that such efforts themselves will be a great methods in reclaiming historic values and significance of places of Gyeongju. Restoring an ancient city is not limited merely restoring a city in an artificial concept, it reaches to preserving natural environment as a backdrop of the city and traces of landscaping works. When it comes to restoring an ancient city, one must understand that preserving natural environment and historic landscaping works are as valuable as restoring city structure or constructional elements. We believe that defining subjects of ancient city restoration must be more precise, clear and detail down the road.

Shilling Attacks Against Memory-Based Privacy-Preserving Recommendation Algorithms

  • Gunes, Ihsan;Bilge, Alper;Polat, Huseyin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.5
    • /
    • pp.1272-1290
    • /
    • 2013
  • Privacy-preserving collaborative filtering schemes are becoming increasingly popular because they handle the information overload problem without jeopardizing privacy. However, they may be susceptible to shilling or profile injection attacks, similar to traditional recommender systems without privacy measures. Although researchers have proposed various privacy-preserving recommendation frameworks, it has not been shown that such schemes are resistant to profile injection attacks. In this study, we investigate two memory-based privacy-preserving collaborative filtering algorithms and analyze their robustness against several shilling attack strategies. We first design and apply formerly proposed shilling attack techniques to privately collected databases. We analyze their effectiveness in manipulating predicted recommendations by experimenting on real data-based benchmark data sets. We show that it is still possible to manipulate the predictions significantly on databases consisting of masked preferences even though a few of the attack strategies are not effective in a privacy-preserving environment.

Blockchain Based Data-Preserving AI Learning Environment Model for Cyber Security System (AI 사이버보안 체계를 위한 블록체인 기반의 Data-Preserving AI 학습환경 모델)

  • Kim, Inkyung;Park, Namje
    • The Journal of Korean Institute of Information Technology
    • /
    • v.17 no.12
    • /
    • pp.125-134
    • /
    • 2019
  • As the limitations of the passive recognition domain, which is not guaranteed transparency of the operation process, AI technology has a vulnerability that depends on the data. Human error is inherent because raw data for artificial intelligence learning must be processed and inspected manually to secure data quality for the advancement of AI learning. In this study, we examine the necessity of learning data management before machine learning by analyzing inaccurate cases of AI learning data and cyber security attack method through the approach from cyber security perspective. In order to verify the learning data integrity, this paper presents the direction of data-preserving artificial intelligence system, a blockchain-based learning data environment model. The proposed method is expected to prevent the threats such as cyber attack and data corruption in providing and using data in the open network for data processing and raw data collection.

Privacy-Preserving IoT Data Collection in Fog-Cloud Computing Environment

  • Lim, Jong-Hyun;Kim, Jong Wook
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.9
    • /
    • pp.43-49
    • /
    • 2019
  • Today, with the development of the internet of things, wearable devices related to personal health care have become widespread. Various global information and communication technology companies are developing various wearable health devices, which can collect personal health information such as heart rate, steps, and calories, using sensors built into the device. However, since individual health data includes sensitive information, the collection of irrelevant health data can lead to personal privacy issue. Therefore, there is a growing need to develop technology for collecting sensitive health data from wearable health devices, while preserving privacy. In recent years, local differential privacy (LDP), which enables sensitive data collection while preserving privacy, has attracted much attention. In this paper, we develop a technology for collecting vast amount of health data from a smartwatch device, which is one of popular wearable health devices, using local difference privacy. Experiment results with real data show that the proposed method is able to effectively collect sensitive health data from smartwatch users, while preserving privacy.

Secure and Privacy Preserving Protocol for Traffic Violation Reporting in Vehicular Cloud Environment

  • Nkenyereye, Lewis;Rhee, Kyung-Hyune
    • Journal of Korea Multimedia Society
    • /
    • v.19 no.7
    • /
    • pp.1159-1165
    • /
    • 2016
  • Traffic violations such as moving while the traffic lights are red have come from a simple omission to a premeditated act. The traffic control center cannot timely monitor all the cameras installed on the roads to trace and pursue those traffic violators. Modern vehicles are equipped and controlled by several sensors in order to support monitoring and reporting those kind of behaviors which some time end up in severe causalities. However, such applications within the vehicle environment need to provide security guaranties. In this paper, we address the limitation of previous work and present a secure and privacy preserving protocol for traffic violation reporting system in vehicular cloud environment which enables the vehicles to report the traffic violators, thus the roadside clouds collect those information which can be used as evidence to pursue the traffic violators. Particularly, we provide the unlinkability security property within the proposed protocol which also offers lightweight computational overhead compared to previous protocol. We consider the concept of conditional privacy preserving authentication without pairing operations to provide security and privacy for the reporting vehicles.

PRECISION AGRICULTURE RESEARCH AT KYOTO UNIVERSITY -- Concept and objectives of the research

  • Umeda, M.
    • Proceedings of the Korean Society for Agricultural Machinery Conference
    • /
    • 2000.11b
    • /
    • pp.262-269
    • /
    • 2000
  • One of the way of the preserving environment is the circulation of materials. Japan's cereal food self-sufficiency rate is less than 30%. Japan imports more than 30 million tons of food every year. Japanese are afraid of international food trade giving damages to environment. Advanced farm mechanization integrated with precision farming is an answer to solve these problems. Crop scientists, soil scientists and agricultural engineers at Kyoto University cooperate together in studying precision agriculture for paddy rice since 1996. Automatic follow-up combine and autonomous vehicle have been developed. Remotely sensing by using machine vision has been studied to measure nitrogen contents. Field map i.e. soil, growth and yield, in paddy field of 0.5 ha has been made. In this report the concept and objectives of advanced farm mechanization and precision agriculture research at Kyoto University are introduced.

  • PDF

A Real-time Motion Adaptation Method using Spatial Relationships between a Virtual Character and Its Surrounding Environment

  • Jo, Dongsik;Choi, Myung Geol
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.4
    • /
    • pp.45-50
    • /
    • 2019
  • Recently, character motion have been used extensively in the entertainment business, and researchers have investigated algorithms of reproducing, editing, and simulating mimic human movements. Also, many recent researches have suggested how a character interacts with its surrounding environment in terms of motion. Specially, spatial relationships of the environment have been introduced for adapting and preserving character motion. In this paper, we propose a motion adaptation technique preserving a spatial property between a virtual character and the configuration of its surrounding space. Additionally, we report on experimental results of smoothly adapted motions in various environmental structures with original motions such as walk, jump, and tumbling.