• Title/Summary/Keyword: Protection challenges

Search Result 163, Processing Time 0.026 seconds

Protection Management for Guaranteed User-Driven Virtual Circuit Services in Dynamic Multi-domain Environments: Design Issues and Challenges

  • Lim, Huhnkuk
    • ETRI Journal
    • /
    • v.37 no.2
    • /
    • pp.369-379
    • /
    • 2015
  • Fault management of virtualized network environments using user-driven network provisioning systems (NPSs) is crucial for guaranteeing seamless virtual network services irrespective of physical infrastructure impairment. The network service interface (NSI) of the Open Grid Forum reflects the need for a common standard management API for the reservation and provisioning of user-driven virtual circuits (VCs) across global networks. NSI-based NPSs (that is, network service agents) can be used to compose user-driven VCs for mission-critical applications in a dynamic multi-domain. In this article, we first attempt to outline the design issues and challenges faced when attempting to provide mission-critical applications using dynamic VCs with a protection that is both user-driven and trustworthy in a dynamic multi-domain environment, to motivate work in this area of research. We also survey representative works that address inter-domain VC protection and qualitatively evaluate them and current NSI against the issues and challenges.

Establishment of Performance Based Design Standardization of Fire Protection Systems for High-Rise Buildings (초고층 건축물의 화재안전성능 표준화 구축)

  • Son, Bong sei
    • Journal of the Society of Disaster Information
    • /
    • v.5 no.1
    • /
    • pp.66-74
    • /
    • 2009
  • As building heights increase, so do these challenges in Korea. High-rise buildings present a variety of challenges to fire safety and protection. The fire protection technology in our country is still on a weak situation which is mainly due to the lack of concerns by the government, companies and citizen. This paper provides general guidance regarding fire-related property protection system for high-rise building performance based design. The importance of high-rise building in of the number of occupants, the value of property, and the a catastrophic loss would have on the community all warrant an increased level of protection and life safety. Because, We have to prepare a new spacial code and standard guidance for fire protection at the stage of the high-rise building design.

  • PDF

Fire & Life Safety Challenges in Sustainable Tall Building Design

  • Li, Fang;Reiss, Martin
    • International Journal of High-Rise Buildings
    • /
    • v.2 no.1
    • /
    • pp.31-38
    • /
    • 2013
  • The movement towards sustainable building design can result in unique fire protection challenges and concerns, especially with super tall buildings in relationship to traditional prescriptive code compliance. Different countries haves different code requirements as well as local best practices and may cause conflict with the design features when designing green buildings. These include, but not limited to green roofs, sprinkler water quality and testing, fire department access and areas of refuge with direct or indirect impact by the perspective code compliance. The solutions to these prescriptive code challenges and fire safety concerns can range from simple alternatives to more detailed engineering performance-based design analyses with good solid practice.

AC and DC Microgrids: A Review on Protection Issues and Approaches

  • Mirsaeidi, Sohrab;Dong, Xinzhou;Shi, Shenxing;Wang, Bin
    • Journal of Electrical Engineering and Technology
    • /
    • v.12 no.6
    • /
    • pp.2089-2098
    • /
    • 2017
  • Microgrid is a convenient, reliable, and eco-friendly approach for the integration of Distributed Generation (DG) sources into the utility power systems. To date, AC microgrids have been the most common architecture, but DC microgrids are gaining an increasing interest owing to the provision of numerous benefits in comparison with AC ones. These benefits encompass higher reliability, power quality and transmission capacity, non-complex control as well as direct connection to some DG sources, loads and Energy Storage Systems (ESSs). In this paper, main challenges and available approaches for the protection of AC and DC microgrids are discussed. After description, analysis and classification of the existing schemes, some research directions including coordination between AC and DC protective devices as well as development of combined control and protection schemes for the realization of future hybrid AC/DC microgrids are pointed out.

Digital Forensic: Challenges and Solution in the Protection of Corporate Crime

  • CHOI, Do-Hee
    • The Journal of Industrial Distribution & Business
    • /
    • v.12 no.6
    • /
    • pp.47-55
    • /
    • 2021
  • Purpose: Organizational crime is an offense committed by an individual or an official in a corporate entity for organizational gain. This study aims to explore the literature on challenges facing digital forensics and further discuss possible solutions to such challenges as far as the protection of corporate crime is concerned. Research design, data and methodology: Qualitative textual methodology matches the interpretative approach since it is a quality method meant to consider the inductivity of strategies. Also, a qualitative approach is vital because it is distinct from the techniques used in optimistic paradigms linked to science laws. Results: For achieving justice through the investigation of digital forensic, there is a need to eradicate corporate crimes. This study suggests several solutions to reduce corporate crime such as 'Solving a problem to Anti-forensic Techniques', 'Cloud computing technique', and 'Legal Framework' etc. Conclusion: As corporate crime increases in rate, the data collected by digital forensics increases. The challenge of analyzing chunks of data requires digital forensic experts, who need tools to analyze them. Research findings shows that a change of the operating system and digital evidence interpretation is becoming a challenge as the new computer application software is not compatible with older software's structure.

A Survey of Homomorphic Encryption for Outsourced Big Data Computation

  • Fun, Tan Soo;Samsudin, Azman
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.8
    • /
    • pp.3826-3851
    • /
    • 2016
  • With traditional data storage solutions becoming too expensive and cumbersome to support Big Data processing, enterprises are now starting to outsource their data requirements to third parties, such as cloud service providers. However, this outsourced initiative introduces a number of security and privacy concerns. In this paper, homomorphic encryption is suggested as a mechanism to protect the confidentiality and privacy of outsourced data, while at the same time allowing third parties to perform computation on encrypted data. This paper also discusses the challenges of Big Data processing protection and highlights its differences from traditional data protection. Existing works on homomorphic encryption are technically reviewed and compared in terms of their encryption scheme, homomorphism classification, algorithm design, noise management, and security assumption. Finally, this paper discusses the current implementation, challenges, and future direction towards a practical homomorphic encryption scheme for securing outsourced Big Data computation.

QNFT: A Post-Quantum Non-fungible Tokens for Secure Metaverse Environment

  • Abir El Azzaoui;JaeSoo Kim
    • Journal of Information Processing Systems
    • /
    • v.20 no.2
    • /
    • pp.273-283
    • /
    • 2024
  • The digital domain has witnessed unprecedented growth, reshaping the way we interact, work, and even perceive reality. The internet has evolved into a vast ecosystem of interconnected virtual worlds, giving birth to the concept of the Metaverse. The Metaverse, often envisioned as a collective virtual shared space, is created by the convergence of virtually enhanced physical reality and interactive digital spaces. Within this Metaverse space, the concept of ownership, identity, and authenticity takes on new dimensions, necessitating innovative solutions to safeguard individual rights. The digital transformation through Metaverse has also brought forth challenges, especially in copyright protection. As the lines between the virtual and physical blur, the traditional notions of ownership and rights are being tested. The Metaverse, with its multitude of user-generated content, poses unique challenges. The primary objective of this research is multifaceted. Firstly, there's a pressing need to understand the strategies employed by non-fungible token (NFT) marketplaces within the Metaverse to strengthen security and prevent copyright violations. As these platforms become centers for digital transactions, ensuring the authenticity and security of each trade becomes paramount. Secondly, the study aims to delve deep into the foundational technologies underpinning NFTs, from the workings of blockchain to the mechanics of smart contracts, to understand how they collectively ensure copyright protection. Thus, in this paper, we propose a quantum based NFT solution that can secure Metaverse and copyright contents in an advanced manner.

A Survey of System Architectures, Privacy Preservation, and Main Research Challenges on Location-Based Services

  • Tefera, Mulugeta K.;Yang, Xiaolong;Sun, Qifu Tyler
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.6
    • /
    • pp.3199-3218
    • /
    • 2019
  • Location-based services (LBSs) have become popular in recent years due to the ever-increasing usage of smart mobile devices and mobile applications through networks. Although LBS application provides great benefits to mobile users, it also raises a sever privacy concern of users due to the untrusted service providers. In the lack of privacy enhancing mechanisms, most applications of the LBS may discourage the user's acceptance of location services in general, and endanger the user's privacy in particular. Therefore, it is a great interest to discuss on the recent privacy-preserving mechanisms in LBSs. Many existing location-privacy protection-mechanisms (LPPMs) make great efforts to increase the attacker's uncertainty on the user's actual whereabouts by generating a multiple of fake-locations together with user's actual positions. In this survey, we present a study and analysis of existing LPPMs and the state-of-art privacy measures in service quality aware LBS applications. We first study the general architecture of privacy qualification system for LBSs by surveying the existing framework and outlining its main feature components. We then give an overview of the basic privacy requirements to be considered in the design and evaluation of LPPMs. Furthermore, we discuss the classification and countermeasure solutions of existing LPPMs for mitigating the current LBS privacy protection challenges. These classifications include anonymization, obfuscation, and an encryption-based technique, as well as the combination of them is called a hybrid mechanism. Finally, we discuss several open issues and research challenges based on the latest progresses for on-going LBS and location privacy research.

On China's Intellectual Property Rights Protection Online

  • Wang, Guo-An;Lim, Yong-Taek
    • International Commerce and Information Review
    • /
    • v.6 no.1
    • /
    • pp.237-247
    • /
    • 2004
  • Online people conduct all kinds of business activities, such as promoting the sales of products and services, reading newspapers, watching TV and movies, and sending business messages by e-mail, by e-voice and by e-fax. Computers with access to the Internet are defined by the United Nations as the fourth media characterized by instantaneousness, openness, limitlessness, boundlessness and globalization. With the development and popularization of the Internet and the advance of the information technology in China, Intellectual Property Rights (IPRs) violations online have frequently occurred in e-business activities. IPRs protection online has posed a great challenge not only for business managers and officials, but also for judges and lawyers because the rapid development of the Internet has created a legal vacuum governed by no laws in IPRs violation and protection online in China.. The paper at first classifies IPRs into several categories, then reveals China's serious problems and challenges of IPRs violations online and stresses the necessity of China's IPRs protection online. Finally it puts forward some suggestions concerning IPRs protection online.

  • PDF