• Title/Summary/Keyword: Proxy data

Search Result 389, Processing Time 0.027 seconds

Efficient and Secure Certificateless Proxy Re-Encryption

  • Liu, Ya;Wang, Hongbing;Wang, Chunlu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.4
    • /
    • pp.2254-2275
    • /
    • 2017
  • In this paper, we present an IND-CCA2 secure certificateless proxy re-encryption scheme in the random oracle model. A certificateless public key cryptography simplifies the certificate management in a traditional public key infrastructure and the built-in key escrow feature in an identity-based public key cryptography. Our scheme shares the merits of certificateless public key encryption cryptosystems and proxy re-encryption cryptosystems. Our certificateless proxy re-encryption scheme has several practical and useful properties - namely, multi-use, unidirectionality, non-interactivity, non-transitivity and so on. The security of our scheme bases on the standard bilinear Diffie-Hellman and the decisional Bilinear Diffie-Hellman assumptions.

A Selective Video Data Deletion Algorithm to Free Up Storage Space in Video Proxy Server (비디오 프록시 서버에서의 저장 공간 확보를 위한 선택적 동영상 데이터 삭제 알고리즘)

  • Lee, Jun-Pyo;Park, Sung-Han
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.46 no.4
    • /
    • pp.121-126
    • /
    • 2009
  • Video poxy server which is located near clients can store the frequently requested video data in storage space in order to minimize initial latency and network traffic significantly. However, due to the limited storage space in video proxy server, an appropriate deletion algorithm is needed to remove the old video data which is not serviced for a long time. Thus, we propose an efficient video data deletion algorithm for video proxy server. The proposed deletion algorithm removes the video which has the lowest request possibility based on the user access patterns. In our algorithm, we arrange the videos which are stored in video proxy server according to the requested time sequence and then, select the video which has the oldest requested time. The selected video is partially removed in order to free up storage space in video poky server. The simulation results show that the proposed algorithm performs better than other algorithms in terms of the block hit rate and the number of block deletion.

An Proxy Trajectory Based Storage in Sensor Networks (센서네트워크에서의 프록시 트라젝토리 기반 데이터 저장 기법)

  • Lim, Hwa-Jung;Lee, Heon-Guil
    • The KIPS Transactions:PartC
    • /
    • v.15C no.6
    • /
    • pp.513-522
    • /
    • 2008
  • Efficient data dissemination is one of the important subjects for sensor networks. High accessibility of the sensed data can be kept by deploying the data centric storage approach in which data is stored over the nodes in the sensor network itself rather than external storages or systems. The advantage of this approach is its direct accessibility in a real-time without the severe burden on delay and power dissipation on the data path to the external storages or systems. However, if the queries from many users are concentrated to the few nodes with data, then the response time could be increased and it could lead to the reduction of network life time by rapid energy dissipation caused by concentrated network load. In this paper, we propose a adaptive data centric storage scheme based on proxy trajectory (APT) mechanism. We highlight the data centric storage mechanism by taking account of supporting large number of users, and make it feasible to provide high-performance accessibility when a non-uniform traffic pattern is offered. Storing data around the localized users by considering spatial data-access locality, the proxy trajectory of APT provides fast response for the users. The trajectory, furthermore, may help the mobile users to roams freely within the area they dwell.

태양활동의 역사적 기록과 Proxy Data

  • Lee, Eun-Hui
    • The Bulletin of The Korean Astronomical Society
    • /
    • v.37 no.1
    • /
    • pp.94.2-94.2
    • /
    • 2012
  • 흑점과 오로라의 역사적 기록은 단편적이고 관측 빈도에 의존하는 문제도 있지만 과거 태양활동의 실제 모습을 보여주는 중요한 자료이다. 또한 지구 대기에 유입된 cosmic ray에 의해 만들어지는 14C이나 10Be 그리고 18O와 같은 동위원소들이 나무 테나 polar ice 그리고 바다의 퇴적물 등에 축적되어 나타나는 Proxy data와 함께 과거 태양의 활동뿐만 아니라 지구의 자기장이나 기후 변화 등을 연구하는데 중요한 지표로 사용된다. 최근 태양의 활동과 지구 기후 변화의 관계에 대해 특별히 많은 관심이 집중되고 있으며 많은 연구가 진행되고 있다. 이 연구는 우리 역사서에 실린 흑점과 오로라의 역사적 기록 및 태양의 proxy data를 함께 비교하여 지난 1000년간 태양활동에서 나타난 특징들, 즉 흑점의 출현과 오로라 발생사이의 밀접한 관계 및 태양활동의 장단기 주기변화 그리고 Maunder Minimum과 같은 최대 극소기 때 보이는 기후 변화와 태양활동의 특징 등에 대해 논의해 보고자 한다.

  • PDF

Proxy-based Caching Optimization for Mobile Ad Hoc Streaming Services (모바일 애드 혹 스트리밍 서비스를 위한 프록시 기반 캐싱 최적화)

  • Lee, Chong-Deuk
    • Journal of Digital Convergence
    • /
    • v.10 no.4
    • /
    • pp.207-215
    • /
    • 2012
  • This paper proposes a proxy-based caching optimization scheme for improving the streaming media services in wireless mobile ad hoc networks. The proposed scheme utilizes the proxy for data packet transmission between media server and nodes in WLANs, and the proxy locates near the wireless access pointer. For caching optimization, this paper proposes NFCO (non-full cache optimization) and CFO (cache full optimization) scheme. When performs the streaming in the proxy, the NFCO and CFO is to optimize the caching performance. This paper compared the performance for optimization between the proposed scheme and the server-based scheme and rate-distortion scheme. Simulation results show that the proposed scheme has better performance than the existing server-only scheme and rate distortion scheme.

Analysis of Climate Characteristics Observed over the Korean Peninsula for the Estimation of Climate Change Vulnerability Index (기후변화 취약성 지수 산출을 위한 한반도 관측 기후 특성 분석)

  • Nam, Ki-Pyo;Kang, Jeong-Eon;Kim, Cheol-Hee
    • Journal of Environmental Impact Assessment
    • /
    • v.20 no.6
    • /
    • pp.891-905
    • /
    • 2011
  • Climate vulnerability index is usually defined as a function of the climate exposure, sensitivity, and adaptive capacity, which requires adequate selection of proxy variables of each variable. We selected and used 9 proxy variables related to climate exposure in the literature, and diagnosed the adequacy of them for application in Korean peninsula. The selected proxy variables are: four variables from temperature, three from precipitation, one from wind speed, and one from relative humidity. We collected climate data over both previous year (1981~2010) and future climate scenario (A1B scenario of IPCC SERES) for 2020, 2050, and 2100. We introduced the spatial and temporal diagnostic statistical parameters, and evaluated both spatial and time variabilities in the relative scale. Of 9 proxy variables, effective humidity indicated the most sensitive to climate change temporally with the biggest spatial variability, implying a good proxy variable in diagnostics of climate change vulnerability in Korea. The second most sensitive variable is the frequency of strong wind speed with a decreasing trend, suggesting that it should be used carefully or may not be of broad utility as a proxy variable in Korea. The A1B scenario of future climate in 2020, 2050 and 2100 matches well with the extension of linear trend of observed variables during 1981~2010, indicating that, except for strong wind speed, the selected proxy variables can be effectively used in calculating the vulnerability index for both past and future climate over Korea. Other local variabilities for the past and future climate in association with climate exposure variables are also discussed here.

Key Efficiency Evaluation of Blockchain Based Cloud Proxy Server (블록체인 기반 클라우드 프락시 서버의 키 효율성 연구)

  • Soon-hwa Sung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.2
    • /
    • pp.289-299
    • /
    • 2024
  • Blockchains are not efficient for real-time processing because the growing number of transactions and users delays many computations and network communications. This study proposes a cloud proxy server, so that legitimate users can use blockchain as well as reduce network latency. To proceed with a blockchain transaction, the blockchain copy server verifies all transaction-related data, but the cloud proxy server verifies legitimate users with a simple zero-knowledge proof algorithm, enabling efficient blockchain real-time processing. The cloud proxy server can support blockchain anonymity, security, and scalability that can verify legitimate users with the proposed zero-knowledge proof by receiving the registered key pair of the blockchain user. In the proposed research analysis, blockchain-based cloud proxy server reduces network latency compared to previous studies and key processing on cloud proxy servers reduces the cost of key computation compared to previous studies.

Class-based Proxy Server for Mobile Computers (이동 컴퓨터를 위한 클래스 기반 프락시 서버)

  • Lee, Jong-Kuk;Kim, Myung-Chul;Lee, Kyung-Hee
    • Journal of KIISE:Information Networking
    • /
    • v.28 no.4
    • /
    • pp.463-476
    • /
    • 2001
  • To support the mobility, mobile computers are generally equipped with lower capability than desktop PCs or workstations in terms of the size of a display, the processing power of CPU and so on. This may give a rise to limitation in mobile computers of supporting multimedia services such as World Wide Web which users would otherwise fully enjoy in desktop PCs. Approaches to reducing the limitations are distillating original multimedia data or converting them to text. Conventional proxy servers for mobile computer simply send distillated image files with the fixed size regardless of the display size of a target mobile computer. Since the cached data is kept separately for each user, they cannot be shared among users with the same display configuration and thus the proxy server could be overloaded. In this paper, we first classify various mobile computers based on their display capability in terms of display sizes and colors. We propose an enhanced proxy server called Class-based proxy that provides a mobile computer with distillated image files in proportion to its class display capacity. The proposed proxy server allows a mobile computer user to have a homepage view similar to that in PC or Workstation. Mobile computers with the same class share the cached image files, which are distillated appropriately for that class. This helps the proxy server to get higher cache hit ratio with improved efficiency and scalability.

  • PDF

Secure Multicast using Proxy Re-Encryption in an IoT Environment

  • Kim, SuHyun;Hwang, YongWoon;Seo, JungTaek
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.2
    • /
    • pp.946-959
    • /
    • 2018
  • Recently interest in Internet of Things(IoT) has attracted significant attention at national level. IoT can create new services as a technology to exchange data through connections among a huge number of objects around the user. Data communication between objects provides not only information collected in the surrounding environment but also various personalized information. IoT services which provide these various types of data are exposed to numerous security vulnerabilities. If data is maliciously collected and used by an attacker in an IoT environment that deals with various data, security threats are greater than those in existing network environments. Therefore, security of all data exchanged in the IoT environment is essential. However, lightweight terminal devices used in the IoT environment are not suitable for applying the existing encryption algorithm. In addition, IoT networks consisting of many sensors require group communication. Therefore, this paper proposes a secure multicast scheme using the proxy re-encryption method based on Vehicular ad-hoc networks(VANET) environment. The proposed method is suitable for a large-scale dynamic IoT network environment using unreliable servers.

Efficient and Secure Identity-Based Public Auditing for Dynamic Outsourced Data with Proxy

  • Yu, Haiyang;Cai, Yongquan;Kong, Shanshan;Ning, Zhenhu;Xue, Fei;Zhong, Han
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.10
    • /
    • pp.5039-5061
    • /
    • 2017
  • Cloud storage becomes a new trend that more and more users move their data to cloud storage servers (CSSs). To ensure the security of cloud storage, many cloud auditing schemes are proposed to check the integrity of users' cloud data. However, most of them are based on public key infrastructure, which leads to complex certificates management and verification. Besides, most existing auditing schemes are inefficient when user uploads a large amount of data or a third party auditor (TPA) performs auditing for multiple users' data on different CSSs. To overcome these problems, in this paper, we propose an efficient and secure auditing scheme based on identity-based cryptography. To relieve user's computation burden, we introduce a proxy, which is delegated to generate and upload homomorphic verifiable tags for user. We extend our auditing scheme to support auditing for dynamic data operations. We further extend it to support batch auditing in multiple users and multiple CSSs setting, which is practical and efficient in large scale cloud storage system. Extensive security analysis shows that our scheme is provably secure in random oracle model. Performance analysis demonstrates that our scheme is highly efficient, especially reducing the computation cost of proxy and TPA.