• Title/Summary/Keyword: Smart world security

Search Result 82, Processing Time 0.024 seconds

Design of Secure Information Center Using a Conventional Cryptography

  • Choi, Jun-Hyuk;Kim Tae-Gap;Go, Byung-Do;Ryou, Jae-Cheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.6 no.4
    • /
    • pp.53-66
    • /
    • 1996
  • World Wide Web is a total solution for multi-media data transmission on Internet. Because of its characteristics like ease of use, support for multi-media data and smart graphic user interface, WWW has extended to cover all kinds of applications. The Secure Information Center(SIC) is a data transmission system using conventional cryptography between client and server on WWW. It's main function is to support the encryption of sending data. For encryption of data IDEA(International Data Encryption Algorithm) is used and for authentication mechanism MD5 hash function is used. Since Secure Information Center is used by many users, conventional cryptosystem is efficient in managing their secure interactions. However, there are some restrictions on sharing of same key and data transmission between client and server, for example the risk of key exposure and the difficulty of key sharing mechanisms. To solve these problems, the Secure Information Center provides encryption mechanisms and key management policies.

Usability Principles for Augmented Reality Applications in Education

  • Al-Obaidi, Arwa;Prince, Master
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.1
    • /
    • pp.49-54
    • /
    • 2022
  • It is challenging to select appropriate technology in education to interact with students in today's digital world. Especially when the technologies used at home on smart devices like tablets and mobile phones are very advanced, on the other side, it may be more challenging to find sharing technology in the classroom. One of the ways is to use new technologies like Augmented Reality (AR). The current study aims to develop usability principles for the development and evaluation of education using AR technology applications. We develop usability principles for AR applications by analyzing existing research about heuristic evaluation methods, design principles for AR systems.

Impact and Challenges of IOT in Web Development

  • Dushyant H.Bodkhey;Kumudini Manwar
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.7
    • /
    • pp.55-58
    • /
    • 2024
  • IoT is a technology that unites the digital world by changing how people and machines interact with one another on the user interface. The Internet of Things has now entered the field of web development and increases user interaction with websites. And establish a clever and important position in the field of development. A web application is a piece of software that works via the Internet using web technology and web browsers to carry out particular tasks or functions. IoT is playing a bigger part in web development and designers are feeling more pressure to produce well-defined online outcomes.

Fusion of Blockchain-IoT network to improve supply chain traceability using Ethermint Smart chain: A Review

  • George, Geethu Mary;Jayashree, LS
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.11
    • /
    • pp.3694-3722
    • /
    • 2022
  • In today's globalized world, there is no transparency in exchanging data and information between producers and consumers. However, these tasks experience many challenges, such as administrative barriers, confidential data leakage, and extensive time delays. To overcome these challenges, we propose a decentralized, secured, and verified smart chain framework using Ethereum Smart Contract which employs Inter Planetary File Systems (IPFS) and MongoDB as storage systems to automate the process and exchange information into blocks using the Tendermint algorithm. The proposed work promotes complete traceability of the product, ensures data integrity and transparency in addition to providing security to their personal information using the Lelantos mode of shipping. The Tendermint algorithm helps to speed up the process of validating and authenticating the transaction quickly. More so in this time of pandemic, it is easier to meet the needs of customers through the Ethermint Smart Chain, which increases customer satisfaction, thus boosting their confidence. Moreover, Smart contracts help to exploit more international transaction services and provide an instant block time finality of around 5 sec using Ethermint. The paper concludes with a description of product storage and distribution adopting the Ethermint technique. The proposed system was executed based on the Ethereum-Tendermint Smart chain. Experiments were conducted on variable block sizes and the number of transactions. The experimental results indicate that the proposed system seems to perform better than existing blockchain-based systems. Two configuration files were used, the first one was to describe the storage part, including its topology. The second one was a modified file to include the test rounds that Caliper should execute, including the running time and the workload content. Our findings indicate this is a promising technology for food supply chain storage and distribution.

Design & Construction of Korean Type Smart Work Center on the basis of User-Oriented Smart Work System (사용자를 지향한 스마트워크 시스템 기반의 한국형 스마트워크 센터 설계 및 구축)

  • Koo, Gun-Seo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.1
    • /
    • pp.73-81
    • /
    • 2013
  • This research proposes design and construction of Korean type SWC based on user oriented smart work system. To achieve this proposal, the research suggested improvements of related law, changes to working environment, and strengthening information security for users, stronger Korean ICT based; the study investigated for an efficient and suitable Korean type SWC by analyzing Korean government plans and foreign developed countries' cases. The user-oriented smart work service platform suggested in this study aims to offer a solution to national crisis and establish infrastructure to knowledge-industry and creative-industry by collaborative smart work environment of 'Context Awareness' and 'Tangible User Interface'. As a result, smart work suggests methods to produce creative work by IT workers and efficient work environment for better standing in world competition. In conclusion, Korean SWC system is proved to be superior in satisfaction rate at 75.41%, 20.18% higher than average score shown in 5 categories in 5 countries from USA, Japan, and EU's which was 55.23%.

A Brokered Authentication Scheme Based on Smart-Card for Multi-Server Authentication (다중서버 인증을 위한 스마트카드 기반 중재 인증 기법 연구)

  • Kim, Myungsun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38B no.3
    • /
    • pp.190-198
    • /
    • 2013
  • Since the facilities for the remote users tend to be deployed in distributed manner, authentication schemes for multi-server communication settings, which provide various web services, are required for real-world applications. A typical way to authenticate a remote user relies on password authentication mostly. However, this method is vulnerable to attacks and inconvenient as the system requires users to maintain different identities and corresponding passwords. On the other hand, the user can make use of a single password for all servers, but she may be exposed to variants of malicious attacks. In this paper, we propose an efficient and secure authentication scheme based on a brokered authentication along with smart-cards in multi-server environment. Further we show that our scheme is secure against possible attacks and analyze its performance with respect to communication and computational cost.

A Brief Survey of the Uses of Non-Fungible Tokens

  • Zain Patras;Sidra Minhas
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.7
    • /
    • pp.59-62
    • /
    • 2024
  • Non-fungible tokens (NFTs) are interchangeable rights to digital assets such as art, in-game items, collectibles or music, etc. NFTs have the potential to be infinitely useful in many industries by increasing security and processing costs for transactions and providing a new platform for the gigeconomy to work through. Its markets have grown fast and significantly since early 2021. We investigate the uses of NFTs and research the facts and figures on the usage of NFTs supporting websites. Using daily data between 2019 to 2021. NFTs took the world by storm in 2021, bringing forth a digital art revolution while becoming one of the fastest-growing asset classes of the year. While the NFTs market has been growing at a rapid pace, many are still wary of entering it because of the theoretical insanity around its worth. NFTs have been out there for quite some time and this trend doesn't plan to go any further. NFTs services have many practical use cases and their potential will only grow over time. While celebrities dive into this marketplace to maintain their onlinepresence andincrease their Net worth.

Concept Design of Download Over-the-Air functions for IoF-Cloud based distributed IoT device (IoF-Cloud 기반 분산된 IoT 장비들을 위한 Download Over-the-Air 기능의 개념 설계)

  • Cha, ByungRae;Choi, MyeongSoo;Park, Sun;Kim, HyeongGyun;Kim, YongIl;Kim, JongWon
    • Smart Media Journal
    • /
    • v.5 no.4
    • /
    • pp.9-17
    • /
    • 2016
  • Over the next 20 years it will begin the exodus from the Internet and smart phones to the Internet of Things. The heart of IoT gives new utility and value with connectivity among things around people to the human. In future, Industrial environment will be intimately connect all among machines and machines or factories and factories in all processing, and by digitizing of all goods and production life-cycle, which is a combination of virtual world and real world, the digital factory will become reality eventually. The proposed IoT or IIoT based Download OTA (Over-the-Air) provides a flexible mechanism for downloading Media objects of any type and size from a network. Moreover, proposed IoT based DLOTA provides a part of security by lightweight encryption, OTP, and CapBAC technique.

A Study on Security Improvement in Hadoop Distributed File System Based on Kerberos (Kerberos 기반 하둡 분산 파일 시스템의 안전성 향상방안)

  • Park, So Hyeon;Jeong, Ik Rae
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.5
    • /
    • pp.803-813
    • /
    • 2013
  • As the developments of smart devices and social network services, the amount of data has been exploding. The world is facing Big data era. For these reasons, the Big data processing technology which is a new technology that can handle such data has attracted much attention. One of the most representative technologies is Hadoop. Hadoop Distributed File System(HDFS) designed to run on commercial Linux server is an open source framework and can store many terabytes of data. The initial version of Hadoop did not consider security because it only focused on efficient Big data processing. As the number of users rapidly increases, a lot of sensitive data including personal information were stored on HDFS. So Hadoop announced a new version that introduces Kerberos and token system in 2009. However, this system is vulnerable to the replay attack, impersonation attack and other attacks. In this paper, we analyze these vulnerabilities of HDFS security and propose a new protocol which complements these vulnerabilities and maintains the performance of Hadoop.

The Reliability Evaluation of User Account on Facebook (페이스북 사용자 계정의 신뢰도 평가에 대한 연구)

  • Park, Jeongeun;Park, Minsu;Kim, Seungjoo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.6
    • /
    • pp.1087-1101
    • /
    • 2013
  • Most people are connected to Social Network Services (SNS) through smart devices. Social Network Services are tools that transport information fast and easily. It does not care where he or she comes from. A lot of information circulates and is shared on Social Network Services. but Social Network Services faults are magnified and becoming a serious issue. For instance, malicious users generate multiple IDs easily on Facebook and he can use personal information of others on purpose, because most people tend to undoubtedly accept friend requests. In this paper, we have specified research scope to Facebook, which is one of most popular Social Network Services in the world. We propose a way of minimizing the number of malicious actions on Facebook from malignant users and malicious bots by setting criteria and applying reputation system.