• Title/Summary/Keyword: Proxy Service

Search Result 257, Processing Time 0.03 seconds

Development of a Call Center System using CTI : A Proxy Driving System (CTI를 이용한 콜센터 시스템 개발 : 대리운전 시스템)

  • Park, Sang-Sung;Jung, Won-Gyo;Shin, Young-Guen;Jang, Dong-Sik
    • IE interfaces
    • /
    • v.20 no.3
    • /
    • pp.309-314
    • /
    • 2007
  • By an explosive increase of proxy driving, customers require the quick and correct services of call center. But because most call centers have an unsystematic management system, grievance of customers is continually increasing. To solve these problem, we constructed a call center system of proxy driving that is based on CTI (Computer Telephony Integration) in this paper. The proposed system is constructed using CID (Caller Identify Display) terminal, SMS (Short Message Service) and call center management program etc. Customer service level could be improved through efficient customer management by using the proposed system. Also it could be convenient and easy to implement customer management, order management, staff management, SMS and settlement of accounts.

Stateful Virtual Proxy for SIP Message Flooding Attack Detection

  • Yun, Ha-Na;Hong, Sung-Chan;Lee, Hyung-Woo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.3 no.3
    • /
    • pp.251-265
    • /
    • 2009
  • VoIP service is the transmission of voice data using SIP protocol on an IP-based network. The SIP protocol has many advantages, such as providing IP-based voice communication and multimedia service with low communication cost. Therefore, the SIP protocol disseminated quickly. However, SIP protocol exposes new forms of vulnerabilities to malicious attacks, such as message flooding attack. It also incurs threats from many existing vulnerabilities as occurs for IP-based protocol. In this paper, we propose a new virtual proxy to cooperate with the existing Proxy Server to provide state monitoring and detect SIP message flooding attack with IP/MAC authentication. Based on a proposed virtual proxy, the proposed system enhances SIP attack detection performance with minimal latency of SIP packet transmission.

The Design of an Efficient Proxy-Based Framework for Mobile Cloud Computing

  • Zhang, Zhijun;Lim, HyoTaek;Lee, Hoon Jae
    • Journal of information and communication convergence engineering
    • /
    • v.13 no.1
    • /
    • pp.15-20
    • /
    • 2015
  • The limited battery power in the mobile environment, lack of sufficient wireless bandwidth, limited resources of mobile terminals, and frequent breakdowns of the wireless network have become major hurdles in the development of mobile cloud computing (MCC). In order to solve the abovementioned problems, This paper propose a proxy-based MCC framework by adding a proxy server between mobile devices and cloud services to optimize the access to cloud services by mobile devices on the network transmission, application support, and service mode levels. Finally, we verify the effectiveness of the developed framework through an experimental analysis. This framework can ensure that mobile users have efficient access to cloud services.

Generalized Proxy-Assisted Periodic Broadcasting (G-ProB) for Heterogeneous Clients in Video-on-Demand Service

  • Febiansyah, Hidayat;Kwon, Jin-Baek
    • Journal of Information Processing Systems
    • /
    • v.6 no.4
    • /
    • pp.575-596
    • /
    • 2010
  • Video-on-Demand services are increasing rapidly nowadays. The load on servers can be very high, even exceeding their capacity. For popular contents, we can use a Periodic Broadcast (PB) strategy using multicast to serve all clients. Recent development of PB uses multiple channels broadcasting for segments of movies in certain patterns, so that users only need to wait for a small segment to start the service. However, users need higher download capacity to download multiple segments at a time. In order to compensate for this, a proxy server can help to reduce download bandwidth requirements by holding some segments for a certain time. This research will focus on more recent PB schemes that couldn't be covered by previous Proxy-Assisted Periodic Broadcast strategies.

Modeling and Implementation of A Dynamic Reconfiguration Framework (동적 형상조정 프레임워크의 모델링 및 구현)

  • 윤태웅;민덕기
    • Journal of the Korea Society for Simulation
    • /
    • v.12 no.3
    • /
    • pp.83-94
    • /
    • 2003
  • For 24 hours-7 days service on distributed systems, a great deal of efforts are investigated on high availability for seamless operation. In this paper, we propose a dynamic reconfiguration framework of distributed systems, called "hot-swapping" framework. This framework allows us to upgrade and exchange a number of modules of a distributed system without stopping running service as well as the system itself. In order to hide the state of service operation, the framework employes the "proxy" design pattern. Our framework provides two types of proxies: a static proxy and a dynamic proxy, Static proxies can achieve fast execution time, but they need to be changed whenever any minor change exists in the related swappable module. Meanwhile, dynamic proxies takes longer execution time, but do not need to be changed under minor changes of swappable modules. We compare performances of static and dynamic proxies and also apply the framework to a real situation with security management modules. management modules.

  • PDF

Design of Privilege Delegation Mechanism using Proxy Certificate (위임 인증서를 이용한 권한 위임 메커니즘 설계)

  • Jin, Seung-Hun;Cho, Sang-Rae;Kim, Tae-Sung;Ryou, Jae-Cheol
    • The KIPS Transactions:PartC
    • /
    • v.10C no.6
    • /
    • pp.739-746
    • /
    • 2003
  • In real life, we frequently use th proxy signatrue by delegating one's own privileges. It is necessary to distribute the data related to privilege delegation securely in order to use such a proxy signature in the Internet. However, inorder to use the secure proxy signature, we need to have some mechanism to prevent a proxy signer from misuse of privileges by applying proxy certificate and a privilege delegation mechanism to manage information with related to privilege delegarion. In addition, we have implemented the prototype to demonstrate the possible proxy signature service using proxy certificate.

The Fast and Secure Authentication Mechanism for Proxy Mobile IPv6 (고속의 안전한 Proxy Mobile IPv6 인증 메커니즘)

  • Park, Chang-Seop;Kang, Hyun-Sun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.1
    • /
    • pp.11-24
    • /
    • 2012
  • Without a proper protection mechanism for the signaling messages to be used for the mobility support in the Proxy Mobile IPv6 (PMIPv6), it is also vulnerable to several security attacks such as redirect attack, MITM (Man-In-The-Middle) attack, replay attack and DoS (Denial of Service) attack as in Mobile IPv6. In this paper, we point out some problems of previous authentication mechanisms associated with PMIPv6, and also propose a new fast and secure authentication mechanism applicable to PMIPv6. In addition, it is also shown that the proposed one is more efficient and secure than the previous ones.

An Efficient Proxy-Signcryption Scheme for Mobile Communications (이동통신 환경에 적합한 효율적인 Proxy-Signcryption 방식)

  • 김동우;박지환
    • Journal of Korea Multimedia Society
    • /
    • v.6 no.3
    • /
    • pp.518-526
    • /
    • 2003
  • According to the development of mobile communications, the future mobile communication systems are expected to provide high quality multimedia service to users. Therefore, many technical factors we needed in these systems. Especially the confidentiality and the security would be obtained through the introduction of the security for mobile communications. In this paper, we propose an efficient Proxy-Signcryption scheme, which can be performed digital signature and encryption by using the proxy agent who has more computational power under mobile communications environment. The proposed scheme provides non-repudiation and prevents creating illegal signature by the origin and proxy agent in a phase of proxy signature processing. This scheme also keeps the confidentiality and the security in mobile communication by means of confirming the signature by right receiver.

  • PDF

Secure and Efficient Privacy-Preserving Identity-Based Batch Public Auditing with Proxy Processing

  • Zhao, Jining;Xu, Chunxiang;Chen, Kefei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.2
    • /
    • pp.1043-1063
    • /
    • 2019
  • With delegating proxy to process data before outsourcing, data owners in restricted access could enjoy flexible and powerful cloud storage service for productivity, but still confront with data integrity breach. Identity-based data auditing as a critical technology, could address this security concern efficiently and eliminate complicated owners' public key certificates management issue. Recently, Yu et al. proposed an Identity-Based Public Auditing for Dynamic Outsourced Data with Proxy Processing (https://doi.org/10.3837/tiis.2017.10.019). It aims to offer identity-based, privacy-preserving and batch auditing for multiple owners' data on different clouds, while allowing proxy processing. In this article, we first demonstrate this scheme is insecure in the sense that malicious cloud could pass integrity auditing without original data. Additionally, clouds and owners are able to recover proxy's private key and thus impersonate it to forge tags for any data. Secondly, we propose an improved scheme with provable security in the random oracle model, to achieve desirable secure identity based privacy-preserving batch public auditing with proxy processing. Thirdly, based on theoretical analysis and performance simulation, our scheme shows better efficiency over existing identity-based auditing scheme with proxy processing on single owner and single cloud effort, which will benefit secure big data storage if extrapolating in real application.

Design and Implementation of DRM Proxy for DRM Cloud Service (DRM 클라우드 서비스를 위한 DRM Proxy 설계 및 구현)

  • Lee, Hyejoo;Heo, Changsoo;Seo, Changho;Shin, Sang Uk
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.2 no.12
    • /
    • pp.553-560
    • /
    • 2013
  • The development of cloud computing technology and smart devices have increasingly been expanding the influence in various fields. Although DRM(Digital Rights Management) is a very important technology for secure content services, interoperability among DRM technologies must be addressed in order to provide the service without the constraints of time and place on various smart devices. In this paper, we study DRM Cloud which provides DRM functions as a service in cloud computing environment, and address interoperability problem by providing different DRM technologies as a cloud service. That is, when a user wants to play contents with the different DRM technologies on a smart device, the usage of the content is controlled by providing the corresponding DRM module and function as SaaS from DRM cloud. To do this, we define the functions and structure of DRM Proxy which performs smooth service call and provision between DRM cloud user and DRM cloud, and finally we describe the experimental implementation result.