• Title/Summary/Keyword: Public-private network

Search Result 325, Processing Time 0.032 seconds

Design of High-Speed VPN for Large HD Video Contents Transfer (대용량 HD 영상콘텐츠 고속전송 VPN(Virtual Private Network)의 설계)

  • Park, Hyoungy-Ill;Shin, Yong-Tae
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.12 no.4
    • /
    • pp.111-118
    • /
    • 2012
  • When broadcasters want immediately a variety of VOD files in a distributed server of them data centers and away contents provider, CPs of different platform to exchange high-quality HD, 3DTV video and other video files over the IP networks of high-performance that can be transferred quickly and must be configured quickly. This paper, by using an optional encryption method to complement a QoS and security of public network, suggests high speed and secure content transmission protocol such as VPN(Virtual Private Network) for large video files and big data. As configured high performance VPN, end to end devices use the best of available resources over public network by parallel transfer protocol and the secure content delivery network.

A study on Establishing Disaster Response Base Station through Overseas Case Review (해외사례를 통한 재난대응 거점기지 구축 연구)

  • Oak, Young-Suk;Park, Miri;Chon, Jae-Joon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.11
    • /
    • pp.668-675
    • /
    • 2017
  • In Korea, natural disasters such as earthquakes and floods continue to occur, but it is difficult to respond and provide relief effectively and promptly. Due to the Circulation Position and administrative characteristics, soft and physical systems for basic disasters, such as private cooperation and disaster response bases, have not yet been built organically. This is mainly due to the job rotation of the responsible persons and bureaucratic problems limiting cooperation between the public and private sectors. Japan is responding to disasters through a mutual cooperation network between the public and private sectors (NGOs), but in Korea the public sector still manages disasters entirely by itself. However, in modern society, the ability of the public sector to effectively manage disasters is limited due to the large number of natural disasters and their wide-ranging consequences. This situation makes it difficult to respond quickly and effectively to the various crises that arise. In this paper, we review the disaster response bases in the cases of Japan and the United States, and propose the establishment of a disaster response base system that supports disaster countermeasures together with a cooperative network incorporating the private and business sectors.

Apply Blockchain to Overcome Wi-Fi Vulnerabilities

  • Kim, Seong-Kyu (Steve)
    • Journal of Multimedia Information System
    • /
    • v.6 no.3
    • /
    • pp.139-146
    • /
    • 2019
  • This paper, wireless internet such as Wi-Fi has a vulnerability to security. Blockchain also means a 'Ledger' in which transaction information that occurs on a public or private network is encrypted and shared among the network participants. Blockchain maintains information integrity by making it impossible for a particular node to tamper with information arbitrarily, a feature that would result in changes in the overall blockchain hash value if any one transaction information that constitutes a block was changed. The complete sharing of information through a peer-to-peer network will also cripple hacking attempts from outside, targeting specialized nodes, and prepare for the "single point of failure" risk of the entire system being shut down. Due to the value of these Blockchain, various types of Blockchain are emerging, and related technology development efforts are also actively underway. Various business models such as public block chains such as Bitcoin, as well as private block chains that allow only certain authorized nodes to participate, or consortium block chains operated by a select few licensed groups, are being utilized. In terms of technological evolution, Blockchain also shows the potential to grow beyond cryptocurrency into an online platform that allows all kinds of transactions with the advent of 'Smart Contract'. By using Blockchain technology, the company makes suggestions to overcome the vulnerability of wireless Internet.

Network Security Practices through Anonymity

  • Smitha, G R;Suprith C Shekar;Ujwal Mirji
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.4
    • /
    • pp.155-162
    • /
    • 2024
  • Anonymity online has been an ever so fundamental topic among journalists, experts, cybersecurity professionals, corporate whistleblowers. Highest degree of anonymity online can be obtained by mimicking a normal everyday user of the internet. Without raising any flags of suspicion and perfectly merging with the masses of public users. Online Security is a very diverse topic, with new exploits, malwares, ransomwares, zero-day attacks, breaches occurring every day, staying updated with the latest security measures against them is quite expensive and resource intensive. Network security through anonymity focuses on being unidentifiable by disguising or blending into the public to become invisible to the targeted attacks. By following strict digital discipline, we can avoid all the malicious attacks as a whole. In this paper we have demonstrated a proof of concept and feasibility of securing yourself on a network by being anonymous.

Machine Learning based Prediction of The Value of Buildings

  • Lee, Woosik;Kim, Namgi;Choi, Yoon-Ho;Kim, Yong Soo;Lee, Byoung-Dai
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.8
    • /
    • pp.3966-3991
    • /
    • 2018
  • Due to the lack of visualization services and organic combinations between public and private buildings data, the usability of the basic map has remained low. To address this issue, this paper reports on a solution that organically combines public and private data while providing visualization services to general users. For this purpose, factors that can affect building prices first were examined in order to define the related data attributes. To extract the relevant data attributes, this paper presents a method of acquiring public information data and real estate-related information, as provided by private real estate portal sites. The paper also proposes a pretreatment process required for intelligent machine learning. This report goes on to suggest an intelligent machine learning algorithm that predicts buildings' value pricing and future value by using big data regarding buildings' spatial information, as acquired from a database containing building value attributes. The algorithm's availability was tested by establishing a prototype targeting pilot areas, including Suwon, Anyang, and Gunpo in South Korea. Finally, a prototype visualization solution was developed in order to allow general users to effectively use buildings' value ranking and value pricing, as predicted by intelligent machine learning.

Cloud computing Issues and Security measure (클라우드 컴퓨팅 보안 대책 연구)

  • Lee, Sang Ho
    • Journal of Convergence Society for SMB
    • /
    • v.5 no.1
    • /
    • pp.31-35
    • /
    • 2015
  • Cloud computing is internet-based computing technology. This is a form for exchanging service focused on the Internet. Because Cost is saved and use is easy there's a tendency that many companies are using. Cloud is in the form of a public cloud and private cloud and hybrid cloud. The service model is SaaS, PaaS, IaaS. Cloud computing use is simple but it has a security vulnerability. In particular, there is a vulnerability in virtualization and centralized information. In order to overcome this new security technology is to be developed. In particular, network security technology and authentication technology should be developed. Another way to overcome security responsibilities must be clearly and policies should be unified.

  • PDF

A Study on Efficient Multicast Management Scheme in MPLS VPN (MPLS VPN에서 효율적인 Multicast 지원 방법에 관한 연구)

  • NamGung, Yeong;Lee, Jong-Hyup;Song, Joo-Seok
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2003.05b
    • /
    • pp.1309-1312
    • /
    • 2003
  • VPN(Virtual Private Network)은 공중망(Public Network)을 통해서 사설망(Private Network) 서비스를 제공해준다. VPN의 발달과 더불어 여러 서비스를 제공하기 위해서는 VPN의 멀티캐스트 지원이 필수적이라 할 수 있다. 하지만 VPN에서 멀티캐스트를 제공하기 위해서는 많은 제약사항들이 존재한다. 본 논문에서는 이러한 제약사항을 고려하여 PE(Provider Edge)노드만으로 Tree를 구성하고 BGP-E를 통하여 멀티캐스트 정보를 공유하는 BGP-E기반 MPLS VPN의 멀티캐스트 방법을 제안한다.

  • PDF

Methodological Implications of Employing Social Bigdata Analysis for Policy-Making : A Case of Social Media Buzz on the Startup Business (빅데이터를 활용한 정책분석의 방법론적 함의 : 기회형 창업 관련 소셜 빅데이터 분석 사례를 중심으로)

  • Lee, Young-Joo;Kim, Dhohoon
    • Journal of Information Technology Services
    • /
    • v.15 no.1
    • /
    • pp.97-111
    • /
    • 2016
  • In the creative economy paradigm, motivation of the opportunity based startup is a continuous concern to policy-makers. Recently, bigdata anlalytics challenge traditional methods by providing efficient ways to identify social trend and hidden issues in the public sector. In this study the authors introduce a case study using social bigdata analytics for conducting policy analysis. A semantic network analysis was employed using textual data from social media including online news, blog, and private bulletin board which create buzz on the startup business. Results indicates that each media has been forming different discourses regarding government's policy on the startup business. Furthermore, semantic network structures from private bulletin board reveal unexpected social burden that hiders opening a startup, which has not been found in the traditional survey nor experts interview. Based on these results, the authors found the feasibility of using social bigdata analysis for policy-making. Methodological and practical implications are discussed.

Development of Virtual Private Network VPN Construction Model to Protect Enterprise Infrastructure (기업인프라보호를 위한 가상 사설망 VPN 구축 모델 개발)

  • Kim, Su-Jin;Lee, Seung-Ho;Hwang, Do-Hun;Kang, Seong-Hyo;Jeon, Hyun-Ho
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2017.11a
    • /
    • pp.250-253
    • /
    • 2017
  • 최근 급증하는 보안 침해 사고와 함께 보다 다양해지고 있는 해킹 기법들에 대한 대응책 마련이 논의되고 있다. 기업의 내부 인프라 자산 보호를 위해 조치를 취할 수 있는 기본적인 1차 대응책으로 네트워크 계층에서의 방어에 대한 중요성이 대두되고 있다. 본 논문에서는 일반 공중망(Public Network)과 분리된 가상의 사설망(VPN: Virtual Private Network)을 구현함으로써 기존의 VPN 모델보다 보안성이 뛰어나며 저렴한 비용으로 외부에서의 접근 및 스누핑(Snooping) 공격과 같은 보안위협에 대비할 수 있는 VPN 모델을 구축하여 실제 현업 망에서의 적용 가능성을 도출하고자 한다.

Governance of A Public Platform Project in the Context of Digital Transformation Focusing on the 'Special Delivery' (공공플랫폼 구축사업의 거버넌스: 경기도 배달플랫폼 '배달특급'의 사례를 중심으로)

  • Seo, Jeongone
    • Journal of Information Technology Services
    • /
    • v.21 no.5
    • /
    • pp.15-28
    • /
    • 2022
  • Recently, government agencies are actively adopting the platform model as a means of public policy. However, existing studies on the public platform are minimal and have focused on user experiences or the possibility of public usage of the platform model. Now the research concerning building governance structure and utilizing network effects of the platform after adopting the platform model in the public sector is keenly required. This study intended to ignite academic dialogue on the governance of public platforms in the context of digital transformation. This study focused on a case of the 'Special delivery,' a public delivery app established by Gyeonggi-do. In order to analyze the characteristics of the public platform and its governance structure, data were collected from press releases, policy reports, and news articles. Data was analyzed using the frame of Hagui's platform design factors and Ansell & Gash's collaborative governance model. The results of the public platform analyses showed 1) incompleteness in the value trade-off accounting, which was designed for platform business based on general cost-benefit analysis, and 2) a closed governance structure that limits direct participation of diverse user groups(i.e., service provider, customer) in order to enhance providers' utility by preventing customers' excessive online activities. The results of this study provided theoretical and policy implications regarding designing the strategy for accounting for value trade-offs and functioning governance structure for public platforms.