• Title/Summary/Keyword: Security Issues

Search Result 1,613, Processing Time 0.026 seconds

Performance Evaluation and Analysis for Block I/O Access Pattern between KVM-based Virtual Machine and Real Machine in the Virtualized Environment (KVM 기반 가상화 환경에서의 가상 머신과 리얼 머신의 입출력 패턴 분석 및 성능 측정)

  • Kim, Hyeunjee;Kim, Youngwoo;Kim, Youngmin;Choi, Hoonha;No, Jaechun;Park, Sungsoon
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.53 no.1
    • /
    • pp.86-96
    • /
    • 2016
  • Recently, virtualization is becoming the critical issue in the cloud computing due to its advantages of resource utilization and consolidation. In order to efficiently use virtualization services, several issues should be taken into account, including data reliability, security, and performance. In particular, a high write bandwidth on the virtual machine must be guaranteed to provide fast responsiveness to users. In this study, we implemented a way of visualizing comparison results between the block write pattern of KVM-based virtual machine and that of the real machine. Our final objective is to propose an optimized virtualization environment that enables to accelerate the disk write bandwidth.

Implementation of High Performance Overlay Multicast Packet Forwarding Engine On NetFPGA (NetFPGA를 이용한 고성능 오버레이 멀티캐스트 패킷 전송 엔진 구현)

  • Jeon, Hyuk-Jin;Lee, Hyun-Seok;Jeong, Yong-Jin
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.49 no.6
    • /
    • pp.9-17
    • /
    • 2012
  • High-quality multimedia on the Internet has attracted attention because of its wide application area. IP multicast has been proposed as a solution to use efficient network resources in these services. However, IP multicast has not been commonly used due to a number of practical issues such as security and management. As an alternative, an overlay multicast routing which is performed in upper protocol layers on legacy networks without changing hardware has been presented. Yet, the maximum data transmission capacity of the overlay multicast is not sufficient for real time transmission of multimedia data. In this paper, we have implemented an overlay multicast engine on NetFPGA which allows us to perform packet replication and tunneling which need high-speed. In addition, we have implemented extra portions which need low-speed in software. From now on, we will progress research which increase the number of terminal spots which can be replicated by improvement and amplify throughputs by optimization.

A Study on the Fundamental Comparison of Simulation and Optimization Approaches for Water Resources Systems Planning and Management (수자원시스템의 효율적 운영을 위한 시뮬레이션과 최적화 기법의 원론적 비교 연구)

  • Kong, Jeong-Taek;Kim, Jaehee;Kim, Sheung-Kown
    • Journal of Korea Water Resources Association
    • /
    • v.46 no.4
    • /
    • pp.373-387
    • /
    • 2013
  • For the efficient operation and management of the water resources system, coordinated operation of weirs and reservoirs is required. A simulation based, and an optimization based approaches are available to deal with the operation and management problems. The simulation based approach does not guarantee an optimal solution, and the optimization based approach is not so flexible to consider, complex, nonlinear problems we will face when trying to allocate water to different uses, various demand sectors in a basin. Hence, it is important to develop a model that would compensate for the weak points in both models. We will compare and contrast intrinsic and extrinsic properties of two modeling approaches, addressing issues related to setting system operation and control rules that would lead us to more efficient use of water in the basin. As a result, we propose to use CoWMOM(Coordinated weirs and multi-reservoir operating model), a "simulation based" optimization model for a simple simulation of the past periods, and for the real-time simulation process considering uncertain inflow.

Biometric and Identity Reference Protection (개인식별정보와 바이오인식정보의 보호기법)

  • Shin, Yang-Nyuo;Kwan, Man-Jun;Lee, Yong-Jun;Park, Jin-Il;Chun, Myung-Geun
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.19 no.2
    • /
    • pp.160-167
    • /
    • 2009
  • This paper describes how to protect the personal information of a biometric reference provider wherein biometric reference and personally identifiable information are bounded in a biometric system. To overcome the shortcomings of the simple personal authentication method using a password, such as identify theft, a biometric system that utilizes physical and behavioral characteristics of each person is usually adopted. In the biometric system, the biometric information itself is personal information, and it can be used as an unique identifier that can identify a particular individual when combining with the other information. As a result, secure protection methods are required for generating, storing, and transmitting biometric information. Considering these issues, this paper proposes a method for ensuring confidentiality and integrity in storing and transferring personally identifiable information that is used in conjunction with biometric information, by extending the related X9.84 standard. This paper also outlines the usefulness of the proposition by defining a standard format represented by ASN.1, and implementing it.

A Comparison Study of Korean and Japanese Cloud Service Certification Systems (한국과 일본의 클라우드 서비스 인증제도 비교연구)

  • Seo, Kwang-Kyu
    • Journal of Digital Convergence
    • /
    • v.11 no.11
    • /
    • pp.53-58
    • /
    • 2013
  • Due to the wide spread of the perception of cloud computing, the usage of cloud computing is increasing globally. Cloud computing is able to converge the various industrial domains based on ICT and it is more and more popular because it has a lot of benefits such as cost savings etc. in global economic recession. However, if cloud computing service is to achieve its potential, it is necessary to clearly understand the critical issues such as service security, performance and availability and so on from the perspectives of the providers and the consumers of the cloud service. In addition, customers focus on how to get and use the safe and reliable cloud service. In order to meet these problems, Korea cloud service certification system and Japanese ASP-SaaS-Cloud certification system were performed in each country. This paper aims at comparing and analyzing between them and describing the difference. Eventually, we propose the improvement strategy of Korea cloud service certification system based on the comparison results between them.

A Scheme of Compensation System for Farmers' Accidents through the Example of Germany (독일의 사례를 통해 본 농업인재해 보장체계 구축 방안)

  • Min, Byeong-Wook;Kim, Hyo-Chel;Lee, Kyung-Suk
    • Journal of Agricultural Extension & Community Development
    • /
    • v.18 no.3
    • /
    • pp.351-384
    • /
    • 2011
  • The purpose of this study is to look at the case of the German compensation system for farmers' accidents and to build a basic scheme in our country's compensation system for farmers' accidents. When you view examples of Germany, the social insurance scheme for farmers accidents in korea should be design as an independent institution from the existing industrial accident insurance, and it comes to relationships with other social insurance system, preferably with complementary personalities. A general rule of the compensation system applies to all farmers in principle but the coverage limits part-time farmers. Financial burden consists of the mix of insurance premium and state aid. The type and level of benefits is similar to the current industrial accident insurance, which give priority to places on economic security for keeping farmworks, such as cost for using temporary farmers, rather than income loss. In terms of financial system, pay-as-you-go system would be better because of immediate payment with the introduction of the compensation system. The compensation system might be managed and administrated by the existing nationwide organization. Of course, for operating of system review and further research on the technical details such as premium issues and funding problems of government support, the exact classification of the target coverage, premiums based on estimated income for the farmers' estimation, the exact statistical data on the accumulation of agricultural disaster is needed.

A Study of Establishment of Softwaresystem Configuration for Improving Health Information Sharing (의료정보 공유기능 향상을 위한 소프트웨어시스템 기반구성 방법에 관한 연구)

  • Han, Soon-Hwa;Ju, Se-Jin
    • Journal of Digital Contents Society
    • /
    • v.15 no.1
    • /
    • pp.11-18
    • /
    • 2014
  • The strength of our country is based on high-speed networks to build a nationwide health information network to improve the quality of health care is needed. However, nature of the medical services in the hospital medical record form, so that all departments characterize each medical department, a common format that can be used for all disease is a very difficult challenge. This study is one of the ways to improve this priority issue on health information sharing medical information system(PACS/HIS) information linkage between the problem of information, compatibility and security issues derived. The problem is derived from the requirements of theorem 3 to 6 items. This is effective in order to improve sharing of medical information for the purpose of designing the software system. Sharing of medical information software system design are derived from stakeholders, requirements analysis, architecture design, software framework, configuration, architecture evaluation process. This study is based on the medical information standardization environmental diagnosis of a medical information system design. Software design philosophy is based on a new framework for deriving the function and mechanism made up.

Statuses of World Governments' Space Activities and Space Markets in 2011 (2011년 세계 각국의 우주분야 투자 및 우주산업 현황)

  • Choe, Nam-Mi
    • Current Industrial and Technological Trends in Aerospace
    • /
    • v.9 no.1
    • /
    • pp.3-14
    • /
    • 2011
  • The current space activities are soaring ever since the first human flight to outer space 50 years ago and the first satellite launch 54 years ago. 74 space launch vehicles were launched in 2010, up from average 66 yearly in 2000s, and 900 operational satellites are currently in orbit around Earth. Space has become a worthwhile investment for governments as space assets become vital to national social, economic, and technological development as well as contributing their national defense and security program. The world governments' investments on space programs have reached a historical peak of $71.5 billion in 2010. However, the growth of government funding for space has slowed down posting only a 2% growth rate since 2009 while 9 % compound annual growth rate experienced by world's space expenditures between 2004 and 2009. Korea invested $158 million in 2011, experienced strong decrease with a 16% compound annual growth rate since 2008. In this paper the current statuses of world governments' funding for space program and space market were presented and the current issues on the Korean space budget policy were reviewed.

  • PDF

A Study on the Factors Affecting the Intention to use public Institution staff's Cloud Computing Service (공공기관 조직구성원의 클라우드 컴퓨팅 서비스 이용의도에 영향을 미치는 요인에 관한 연구)

  • Choi, Hyukra;Kim, SeonMyung
    • Informatization Policy
    • /
    • v.21 no.2
    • /
    • pp.49-66
    • /
    • 2014
  • In the last few years, cloud computing has grown from being a promising business concept to one of the fast growing segments of the IT industry. However, as more and more information on individuals and companies are placed in the cloud, concerns on just how safe the computing environment is have gradually increased. In this study, it will be explored if key characteristics of cloud computing services would affect the behavioral intention to use public cloud computing services. A conceptual model is developed and seven research hypotheses are proposed for empirical testing. The proposed model is examined through structural equation analysis. The results show that perceived risk has statistically significant effect on the privacy concern of users and the privacy concern has a negative influence on the trust. Finally, the trust has a positive effect on the attitude and the attitude has statistically significant effect on use intention. Implications of these findings are discussed for both researchers and practitioners and future research issues are raised as well.

A Study on Emergency Medical Information Management Methods for Elderly Patients using QR code and Finger-print Recognition (QR 코드와 지문인식을 이용한 고령 환자의 응급 의료정보 관리 방법에 대한 연구)

  • Lee, Jung-hyun;Cho, Myeon-gyun
    • Journal of Convergence for Information Technology
    • /
    • v.7 no.6
    • /
    • pp.135-141
    • /
    • 2017
  • Recently, as elderly people suffering from chronic diseases have increased and disasters such as traffic accidents have increased, urgent rescue workers and doctors need to respond effectively to such emergencies. For elderly people, the difficulty in communicating their condition especially the health condition during disaster is one of the problems in which delay on immediate handling by rescue team can cause death. Providing a solution for this problem is one of the main issues in our research. In this paper, we use the QR code to communicate the minimum personal information and medical history needed for emergency medical treatment to emergency medical personnel, and to transmit the medical history and treatment data to the doctors of the hospital through QR code and fingerprint recognition, respectively. Especially, by using both QR code of smart phone and fingerprint of individual, we can protects personal information and strengthens privacy and security of medical information by allowing only authorized physicians to check medical records of the old patient.