• Title/Summary/Keyword: Security Devices

Search Result 1,621, Processing Time 0.026 seconds

An ID-based Broadcast Encryption Scheme for Cloud-network Integration in Smart Grid

  • Niu, Shufen;Fang, Lizhi;Song, Mi;Yu, Fei;Han, Song
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.9
    • /
    • pp.3365-3383
    • /
    • 2021
  • The rapid growth of data has successfully promoted the development of modern information and communication technologies, which are used to process data generated by public urban departments and citizens in modern cities. In specific application areas where the ciphertext of messages generated by different users' needs to be transmitted, the concept of broadcast encryption is important. It can not only improve the transmission efficiency but also reduce the cost. However, the existing schemes cannot entirely ensure the privacy of receivers and dynamically adjust the user authorization. To mitigate these deficiencies, we propose an efficient, secure identity-based broadcast encryption scheme that achieves direct revocation and receiver anonymity, along with the analysis of smart grid solutions. Moreover, we constructed a security model to ensure wireless data transmission under cloud computing and internet of things integrated devices. The achieved results reveal that the proposed scheme is semantically secure in the random oracle model. The performance of the proposed scheme is evaluated through theoretical analysis and numerical experiments.

User-Customized News Service by use of Social Network Analysis on Artificial Intelligence & Bigdata

  • KANG, Jangmook;LEE, Sangwon
    • International journal of advanced smart convergence
    • /
    • v.10 no.3
    • /
    • pp.131-142
    • /
    • 2021
  • Recently, there has been an active service that provides customized news to news subscribers. In this study, we intend to design a customized news service system through Deep Learning-based Social Network Service (SNS) activity analysis, applying real news and avoiding fake news. In other words, the core of this study is the study of delivery methods and delivery devices to provide customized news services based on analysis of users, SNS activities. First of all, this research method consists of a total of five steps. In the first stage, social network service site access records are received from user terminals, and in the second stage, SNS sites are searched based on SNS site access records received to obtain user profile information and user SNS activity information. In step 3, the user's propensity is analyzed based on user profile information and SNS activity information, and in step 4, user-tailored news is selected through news search based on user propensity analysis results. Finally, in step 5, custom news is sent to the user terminal. This study will be of great help to news service providers to increase the number of news subscribers.

Design of Cloud Service Platform for eGovernment

  • LEE, Choong Hyong
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.13 no.1
    • /
    • pp.201-209
    • /
    • 2021
  • The term, eGovernmen or e-Government, uses technology communications devices such as computers and the Internet to provide public services to citizens and others. The eGovernment or e-government provides citizens with new opportunities to access the government directly and conveniently, while the government provides citizens with directservices. Also, in these days, cloud computing is a feature that enables users to use computer system resources, especially data storage (cloud storage) and on-demand computing power, without having to manage themselves. The term is commonly used to describe data centers that are available to many users over the Internet. Today, the dominant Big Cloud is distributed across multiple central servers. You can designate it as an Edge server if it is relatively close to the user. However, despite the prevalence of e-government and cloud computing, each of these concepts has evolved. Research attempts to combine these two concepts were not being made properly. For this reason, in this work, we aim to produce independent and objective analysis results by separating progress steps for the analysis of e-government cloud service platforms. This work will be done through an analysis of the development process and architectural composition of the e-government development standard framework and the cloud platform PaaS-TA. In addition, this study is expected to derive implications from an analysis perspective on the direction and service composition of the e-government cloud service platform currently being pursued.

Intelligent Piracy Site Detection Technique with High Accuracy

  • Kim, Eui-Jin;Kwak, Jin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.1
    • /
    • pp.285-301
    • /
    • 2021
  • Recently, with the diversification of media services and the development of smart devices, users have more opportunities to use digital content, such as movies, dramas, and music; consequently, the size of the copyright market expands simultaneously. However, there are piracy sites that generate revenue by illegal use of copyrighted works. This has led to losses for copyright holders, and the scale of copyrighted works infringed due to the ever-increasing number of piracy sites has increased. To prevent this, government agencies respond to copyright infringement by monitoring piracy sites using online monitoring and countermeasure strategies for infringement. However, the detection and blocking process consumes a significant amount of time when compared to the rate of generating new piracy sites. Hence, online monitoring is less effective. Additionally, given that piracy sites are sophisticated and refined in the same way as legitimate sites, it is necessary to accurately distinguish and block a site that is involved in copyright infringement. Therefore, in this study, we analyze features of piracy sites and based on this analysis, we propose an intelligent detection technique for piracy sites that automatically classifies and detects whether a site is involved in infringement.

Safe clinical photography: best practice guidelines for risk management and mitigation

  • Chandawarkar, Rajiv;Nadkarni, Prakash
    • Archives of Plastic Surgery
    • /
    • v.48 no.3
    • /
    • pp.295-304
    • /
    • 2021
  • Clinical photography is an essential component of patient care in plastic surgery. The use of unsecured smartphone cameras, digital cameras, social media, instant messaging, and commercially available cloud-based storage devices threatens patients' data safety. This paper Identifies potential risks of clinical photography and heightens awareness of safe clinical photography. Specifically, we evaluated existing risk-mitigation strategies globally, comparing them to industry standards in similar settings, and formulated a framework for developing a risk-mitigation plan for avoiding data breaches by identifying the safest methods of picture taking, transfer to storage, retrieval, and use, both within and outside the organization. Since threats evolve constantly, the framework must evolve too. Based on a literature search of both PubMed and the web (via Google) with key phrases and child terms (for PubMed), the risks and consequences of data breaches in individual processes in clinical photography are identified. Current clinical-photography practices are described. Lastly, we evaluate current risk mitigation strategies for clinical photography by examining guidelines from professional organizations, governmental agencies, and non-healthcare industries. Combining lessons learned from the steps above into a comprehensive framework that could contribute to national/international guidelines on safe clinical photography, we provide recommendations for best practice guidelines. It is imperative that best practice guidelines for the simple, safe, and secure capture, transfer, storage, and retrieval of clinical photographs be co-developed through cooperative efforts between providers, hospital administrators, clinical informaticians, IT governance structures, and national professional organizations. This would significantly safeguard patient data security and provide the privacy that patients deserve and expect.

Retail Distribution Strategies for Train Tickets: The Extended UTAUT Model

  • PARK, Yoon-Joo;AHN, Sung-Sook
    • Journal of Distribution Science
    • /
    • v.19 no.9
    • /
    • pp.5-17
    • /
    • 2021
  • Purpose: As mobile devices are commonly used and contact-free services are widespread due to the COVID-19 pandemic in the recent distribution environment, this study suggests retail strategies for consumers using high-speed railways. To this end, we analyzed how consumer perception on technologies necessary for use of mobile apps is related to the attitude that drives consumers to continue using the app services. Research design, data and methodology: Based on the extended unified theory of technology acceptance and use of technology model by Venkatesh, Morris, Davis and Davis (2003), we added variables proposed by existing theories that studied the technology acceptance model from multiple perspectives and empirically analyzed the relationship between user satisfaction and use intention with structural equation modeling. Results: As expected, factors necessary for the use of app services such as performance expectancy, social influence, price value, facilitating conditions, security, and aesthetics had positive effects on user satisfaction, whereas the effect of effort expectancy on user satisfaction was rejected. And user satisfaction was found to have a significant effect on intention to use. Conclusions: The results provide implications that strategic retail management of the above factors can motivate passengers to continuously use high-speed railways.

The Study on the Efficiency of Smart Learning in the COVID-19

  • Kim, Seong-Kyu;Lee, Mi-Jung;Jang, Eun-Sill;Lee, Young-Eun
    • Journal of Multimedia Information System
    • /
    • v.9 no.1
    • /
    • pp.51-60
    • /
    • 2022
  • This paper raised the need to examine how the online education environment triggered by COVID-19 and the smart learning environment can be established in consideration of the improvement of education and learning through learning analysis. Many studies are being conducted in Korea, and the Ministry of Education is continuously striving to build a smart school by promoting strategies for promoting smart education on the way to a talent powerhouse. Nevertheless, there is no unified definition of smart learning, and it can be seen as customized (individualized) learning using smart devices. However, most of the discussions on the construction of smart schools so far have limitations in that they are limited to physical spaces. Accordingly, the opinions of teachers and learners were not sufficiently reflected in the establishment of the facility. This study intends to study smart learning in various departments. In addition, the subjects students in charge of the co-researcher of this study were analyzed. The total number of subjects was 951, and 434 responded to this study survey. In addition, students were well accepting the online environment, and in the future, regardless of COVID-19, research will be presented to improve mutual communication between professors and students in smart learning.

How to Implement Successful Virtual Desktop Infrastructure (VDI) in the Manufacturing Sector

  • KIM, Tae-Hi
    • The Journal of Industrial Distribution & Business
    • /
    • v.13 no.10
    • /
    • pp.15-22
    • /
    • 2022
  • Purpose: In the manufacturing sector, VDI (Virtual Desktop Infrastructure) offers advantages to the organizations, such as allowing manufacturers access to the system from any location. The most important things are understanding what the user needs, avoiding under-provisioning, network preparation. This research is to provide useful practical l implementations of VDI in manufacturing industry based on numerous prior studies. Research design, data and methodology: This research has conducted the qualitative content analysis (QCA). When conducting this research, the present author assumed that it is crucial to create the procedures and processes that will be used to acquire the text data needed to structure or solve problems. Results: According to the prior literature analysis, there are five suggestions to implement successful VDI for manufacturing sector. The five solutions are (1) Creation of the machines, (2) Direct users to an available 'Virtual Machine', (3) 'Virtual Machine Power Management', (4) Performance monitoring, and (5) Review security. Conclusions: The research clearly details how VDI can be implemented on a manufacturer platform and how it can be connected to hundreds of users. The author can conclude that connecting hundreds of users can be done using the remote connection of devices and encourage manufacturers to work from different areas.

A Distributed Fog-based Access Control Architecture for IoT

  • Alnefaie, Seham;Cherif, Asma;Alshehri, Suhair
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.12
    • /
    • pp.4545-4566
    • /
    • 2021
  • The evolution of IoT technology is having a significant impact on people's lives. Almost all areas of people's lives are benefiting from increased productivity and simplification made possible by this trending technology. On the downside, however, the application of IoT technology is posing some security challenges, among them, unauthorized access to IoT devices. This paper presents an Attribute-based Access Control Fog architecture that aims to achieve effective distribution, increase availability and decrease latency. In the proposed architecture, the main functional points of the Attribute-based Access Control are distributed to provide policy decision and policy information mechanisms in fog nodes, locating these functions near end nodes. To evaluate the proposed architecture, an access control engine based on the Attribute-based Access Control was built using the Balana library and simulated using EdgeCloudSim to compare it to the traditional cloud-based architecture. The experiments show that the fog-based architecture provides robust results in terms of reducing latency in making access decisions.

A Safety Process Guideline of Medical Device System Based on STPA (STPA를 적용한 의료기기 시스템의 안전성 프로세스 가이드라인)

  • Choi, Bo-yoon;Lee, Byong-gul
    • Journal of Internet Computing and Services
    • /
    • v.22 no.6
    • /
    • pp.59-69
    • /
    • 2021
  • Malfunctions and failures linked to medical devices may result in significant damage for human being. Thus, in order to ensure that safety of medical device is achieved, it should be established and applied the international standard. It is required to integrate and customize activities at standards, owing to reference relationship between standards, especially, activities based safety analysis is too expensive. This paper proposes a integration process that integrate activities of development lifecycle and safety process. Additionally, we derived a guidance based on STPA for integration process. As a result, we can be performed systematically from early stage of the development and increased effectiveness of integration process by the guidance.