• Title/Summary/Keyword: Trust-network

Search Result 512, Processing Time 0.024 seconds

Development of e-Commerce System Based on Social Network Service (SNS 기반 e커머스 시스템 개발)

  • Lee, Tong-Queue
    • Journal of Digital Convergence
    • /
    • v.16 no.1
    • /
    • pp.153-158
    • /
    • 2018
  • Fundamental problems of e-commerce are exaggerated advertising of products, lack of trust in products or suppliers, and false reviews. As a solution, I have merged the concept of trust service embedded in social network service(SNS) with commercial domain to develop a new type of service called "Reliable SNS Commerce Service". The contents developed in this paper are as follows: first, online community functions for users to provide services; second, commerce functions; and third, functions for linking SNS and commerce. Through the reliability information presented in this paper, the seller provides more reliable and objective purchase information to the buyer about the sales items, thereby contributing to the sales by increasing the probability of the actual purchase. The buyer can purchase the higher-quality products with confidence. The service providers can gain the reputation as a reliable site for purchasing members. In conclusion, this paper provides a positive effect to all the participants, which will contribute to the development of a new commerce market and activation of electronic commerce.

A Framework for Trustworthy Open Shared Authentication Protocol (신뢰적인 개방형 공유 인증 프로토콜 프레임워크)

  • Park, Seung-Chul
    • The KIPS Transactions:PartC
    • /
    • v.18C no.6
    • /
    • pp.389-396
    • /
    • 2011
  • Recently, researches on the shared authentication based on single sign-on have been actively performed so as to solve the problems of current service provider-centric and isolated Internet authentications, including low usability, high cost structure, and difficulty in privacy protection. In order for the shared authentication model, where the authentications of an authentication provider are shared by several Internet service providers, to be accepted in real Internet environment, trustworthiness among users, service providers, and authentication providers on the level of authentication assurance and the level of authentication information protection is necessarily required. This paper proposes a framework for trustworthy and privacy-protected shared authentication protocol based on the user-centric operation and open trust provider network. The proposed framework is differentiated from previous works in the points that it is able to provide interoperable shared authentication services on the basis of open trust infrastructure.

Determinants of Accessibility to Fintech Lending: A Case Study of Micro and Small Enterprises (MSEs) in Indonesia

  • SAPTIA, Yeni;NUGROHO, Agus Eko;SOEKARNI, Muhammad;ERMAWATI, Tuti;SYAMSULBAHRI, Darwin;ASTUTY, Ernany Dwi;SUARDI, Ikval;YULIANA, Retno Rizki Dini
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.8 no.10
    • /
    • pp.129-138
    • /
    • 2021
  • Several studies have revealed that information on borrower characteristics plays an important factor in approving their credit requests. Though the extent to which such characteritics are also applicable to the case of fintech lending remain uncertain. The aim of this study is, thus, to investigate the determinant factors that influence MSEs in obtaining credit through fintech lending. Here, we emphasize virtual trust in fintech lending encompasing the dimension of social network, economic attributes, and risk perception based on several indicators that are used as proxies. Primary data used in the study was gathered from an online survey to the respondents of MSEs in Java. The result of the study indicates that determinants of MSEs in obtaining credit from lender through fintech lending are statistically influenced by internet usage activities, borrowing history, loan utilization, annuity payment system, completeness of credit requirement documents and compatibility of loan size with the business need. These factors have a significant effect on credit approval because they can generate virtual trust of fintech lender to MSEs as potential borrowers. It concludes that the probability of obtaining fintech loans in accordance with their expectations are influenced by the dimensions of social network, economic attributes and risk perception.

De-Centralized Information Flow Control for Cloud Virtual Machines with Blowfish Encryption Algorithm

  • Gurav, Yogesh B.;Patil, Bankat M.
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12
    • /
    • pp.235-247
    • /
    • 2021
  • Today, the cloud computing has become a major demand of many organizations. The major reason behind this expansion is due to its cloud's sharing infrastructure with higher computing efficiency, lower cost and higher fle3xibility. But, still the security is being a hurdle that blocks the success of the cloud computing platform. Therefore, a novel Multi-tenant Decentralized Information Flow Control (MT-DIFC) model is introduced in this research work. The proposed system will encapsulate four types of entities: (1) The central authority (CA), (2) The encryption proxy (EP), (3) Cloud server CS and (4) Multi-tenant Cloud virtual machines. Our contribution resides within the encryption proxy (EP). Initially, the trust level of all the users within each of the cloud is computed using the proposed two-stage trust computational model, wherein the user is categorized bas primary and secondary users. The primary and secondary users vary based on the application and data owner's preference. Based on the computed trust level, the access privilege is provided to the cloud users. In EP, the cipher text information flow security strategy is implemented using the blowfish encryption model. For the data encryption as well as decryption, the key generation is the crucial as well as the challenging part. In this research work, a new optimal key generation is carried out within the blowfish encryption Algorithm. In the blowfish encryption Algorithm, both the data encryption as well as decryption is accomplishment using the newly proposed optimal key. The proposed optimal key has been selected using a new Self Improved Cat and Mouse Based Optimizer (SI-CMBO), which has been an advanced version of the standard Cat and Mouse Based Optimizer. The proposed model is validated in terms of encryption time, decryption time, KPA attacks as well.

A Study on Integrity Protection of Edge Computing Application Based on Container Technology (컨테이너 기술을 활용한 엣지 컴퓨팅 환경 어플리케이션 무결성 보호에 대한 연구)

  • Lee, Changhoon;Shin, Youngjoo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.6
    • /
    • pp.1205-1214
    • /
    • 2021
  • Edge Computing is used as a solution to the cost problem and transmission delay problem caused by network bandwidth consumption that occurs when IoT/CPS devices are integrated into the cloud by performing artificial intelligence (AI) in an environment close to the data source. Since edge computing runs on devices that provide high-performance computation and network connectivity located in the real world, it is necessary to consider application integrity so that it is not exploited by cyber terrorism that can cause human and material damage. In this paper, we propose a technique to protect the integrity of edge computing applications implemented in a script language that is vulnerable to tampering, such as Python, which is used for implementing artificial intelligence, as container images and then digitally signed. The proposed method is based on the integrity protection technology (Docker Contents Trust) provided by the open source container technology. The Docker Client was modified and used to utilize the whitelist for container signature information so that only containers allowed on edge computing devices can be operated.

A Study on How to Build a Zero Trust Security Model (제로 트러스트 보안모델 구축 방안에 대한 연구)

  • Jin Yong Lee;Byoung Hoon Choi;Namhyun Koh;Samhyun Chun
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.12 no.6
    • /
    • pp.189-196
    • /
    • 2023
  • Today, in the era of the 4th industrial revolution based on the paradigm of hyper-connectivity, super-intelligence, and superconvergence, the remote work environment is becoming central based on technologies such as mobile, cloud, and big data. This remote work environment has been accelerated by the demand for non-face-to-face due to COVID-19. Since the remote work environment can perform various tasks by accessing services and resources anytime and anywhere, it has increased work efficiency, but has caused a problem of incapacitating the traditional boundary-based network security model by making the internal and external boundaries ambiguous. In this paper, we propse a method to improve the limitations of the traditional boundary-oriented security strategy by building a security model centered on core components and their relationships based on the zero trust idea that all actions that occur in the network beyond the concept of the boundary are not trusted.

The Factors Influencing the Recognition of the Social Capital of the Korea Coast Guard (해양경찰조직의 사회자본 인식에 영향을 미치는 요인)

  • Jeong, Soon-Do;Choi, Eung-Ryul
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.21 no.1
    • /
    • pp.64-71
    • /
    • 2015
  • This study was carried out empirical analysis of the factors that affect the recognition of the social capital of the Korea Coast Guard. Through the literature review, leadership types and institutional environments were set as independent variables, and components of social capital were set as trust, participation and network. The result showed that higher institutional environments were effective to building trust and network. And both transformational and transactional leadership were effective to increasing participation. These results supports literature reviews, and this proved necessity of change in the leadership and institutional environment for building the social capital of the Korea Coast Guard effectively.

A Study on Improved Intrusion Detection Technique Using Distributed Monitoring in Mobile Ad Hoc Network (Mobile Ad Hoc Network에서 분산 모니터링을 이용한 향상된 침입탐지 기법 연구)

  • Yang, Hwanseok
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.14 no.1
    • /
    • pp.35-43
    • /
    • 2018
  • MANET composed of only wireless nodes is increasingly utilized in various fields. However, it is exposed to many security vulnerabilities because it doesn't have any infrastructure and transmits data by using multi-hop method. Therefore, MANET should be applied the intrusion detection technique that can detect efficiently malicious nodes and decrease impacts of various attacks. In this paper, we propose a distributed intrusion detection technique that can detect the various attacks while improving the efficiency of attack detection and reducing the false positive rate. The proposed technique uses the cluster structure to manage the information in the center and monitor the traffic of their neighbor nodes directly in all nodes. We use three parameters for attack detection. We also applied an efficient authentication technique using only key exchange without the help of CA in order to provide integrity when exchanging information between cluster heads. This makes it possible to free the forgery of information about trust information of the nodes and attack nodes. The superiority of the proposed technique can be confirmed through comparative experiments with existing intrusion detection techniques.

Relationship between Participation in the Elderly Job Project and Quality of Life: focused on the Social Capital Mediating Effect

  • Jang, Yumi
    • International Journal of Advanced Culture Technology
    • /
    • v.10 no.3
    • /
    • pp.11-17
    • /
    • 2022
  • This study investigates income support, labor opportunities, and social capital by the demographic characteristics of the elderly who participate in the elderly job project, and especially the relationship between social and quality of life. We want to provide empirical data on how the elderly vocational business ultimately affects the lives of the elderly through the intervention of social capital. The intervention effect of social capital is as follows. Satisfaction with the elderly job project has a great impact on the quality of life, trust, network, and social participation. In particular, trust in the quality of life of the elderly had a great influence on the quality of life and was indirectly effective. In addition, the intervention of social participation between social capital was known, and the elderly job project increased social participation to improve the quality of life of the elderly. Therefore, it can be evaluated that the elderly job project has an important positive effect on the quality of life of the elderly, and the social capital formed through the elderly job project plays a role in directly or indirectly improving the quality of life of the elderly.

Attention-based CNN-BiGRU for Bengali Music Emotion Classification

  • Subhasish Ghosh;Omar Faruk Riad
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.9
    • /
    • pp.47-54
    • /
    • 2023
  • For Bengali music emotion classification, deep learning models, particularly CNN and RNN are frequently used. But previous researches had the flaws of low accuracy and overfitting problem. In this research, attention-based Conv1D and BiGRU model is designed for music emotion classification and comparative experimentation shows that the proposed model is classifying emotions more accurate. We have proposed a Conv1D and Bi-GRU with the attention-based model for emotion classification of our Bengali music dataset. The model integrates attention-based. Wav preprocessing makes use of MFCCs. To reduce the dimensionality of the feature space, contextual features were extracted from two Conv1D layers. In order to solve the overfitting problems, dropouts are utilized. Two bidirectional GRUs networks are used to update previous and future emotion representation of the output from the Conv1D layers. Two BiGRU layers are conntected to an attention mechanism to give various MFCC feature vectors more attention. Moreover, the attention mechanism has increased the accuracy of the proposed classification model. The vector is finally classified into four emotion classes: Angry, Happy, Relax, Sad; using a dense, fully connected layer with softmax activation. The proposed Conv1D+BiGRU+Attention model is efficient at classifying emotions in the Bengali music dataset than baseline methods. For our Bengali music dataset, the performance of our proposed model is 95%.