• Title/Summary/Keyword: User Attribute

Search Result 365, Processing Time 0.027 seconds

Design of Security Service Model in Dynamic Cloud Environment (동적 클라우드 환경에 적합한 보안 서비스 모델 설계)

  • Jeong, Yoon-Su
    • Journal of Convergence Society for SMB
    • /
    • v.2 no.2
    • /
    • pp.35-41
    • /
    • 2012
  • The rapid development of cloud computing and mobile internet service changes to an mobile cloud service environment that can serve and pay computing source that users want anywhere and anytime. But when user misses mobile device, the respond to any threat like user's personal information exposal is insufficient. This paper proposes cloud service access control model to provide secure service for mobile cloud users to other level users. The proposed role-based model performs access authority when performs user certification to adapt various access security policy. Also, the proposed model uses user's attribute information and processes before user certification therefore it lowers communication overhead and service delay. As a result, packet certification delay time is increased 3.7% and throughput of certification server is increased 10.5%.

  • PDF

A Study on Personas Models for Car Navigation Developing (자동차 내비게이션 개발을 위한 페르소나 모델 연구)

  • Oh, See-Hyung;Kim, Jung-Hee;Choi, Hak-Hyun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.8
    • /
    • pp.163-171
    • /
    • 2010
  • This research has studied developing the persona model based on alan cooper's user oriented design which is newly in the limelight in the field of product design process. As developing the persona model, In-depth interview and FGI(focus group interview) has been conducted for extracting car navigation user group's motivation and using attribute. Based on research, three different car navigation user group were divided-low using & understanding the function group, medium using & well understanding the function group, heavy using & well understanding the function group. This research yielded the foundation for setting the persona model and this persona gives the key factor for producing the user oriented user Interface design after all.

Context-awareness User Analysis based on Clustering Algorithm (클러스터링 알고리즘기반의 상황인식 사용자 분석)

  • Lee, Kang-whan
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.7
    • /
    • pp.942-948
    • /
    • 2020
  • In this paper, we propose a clustered algorithm that possible more efficient user distinction within clustering using context-aware attribute information. In typically, the data provided to classify interrelationships within cluster information in the process of clustering data will be as a degrade factor if new or newly processing information is treated as contaminated information in comparative information. In this paper, we have developed a clustering algorithm that can extract user's recognition information to solve this problem in using K-means algorithm. The proposed algorithm analyzes the user's clustering attributed parameters from user clusters using accumulated information and clustering according to their attributes. The results of the simulation with the proposed algorithm showed that the user management system was more adaptable in terms of classifying and maintaining multiple users in clusters.

Subnet Generation Scheme based on Deep Learing for Healthcare Information Gathering (헬스케어 정보 수집을 위한 딥 러닝 기반의 서브넷 구축 기법)

  • Jeong, Yoon-Su
    • Journal of Digital Convergence
    • /
    • v.15 no.3
    • /
    • pp.221-228
    • /
    • 2017
  • With the recent development of IoT technology, medical services using IoT technology are increasing in many medical institutions providing health care services. However, as the number of IoT sensors attached to the user body increases, the healthcare information transmitted to the server becomes complicated, thereby increasing the time required for analyzing the user's healthcare information in the server. In this paper, we propose a deep learning based health care information management method to collect and process healthcare information in a server for a large amount of healthcare information delivered through a user - attached IoT device. The proposed scheme constructs a subnet according to the attribute value by assigning an attribute value to the healthcare information transmitted to the server, and extracts the association information between the subnets as a seed and groups them into a hierarchical structure. The server extracts optimized information that can improve the observation speed and accuracy of user's treatment and prescription by using deep running of grouped healthcare information. As a result of the performance evaluation, the proposed method shows that the processing speed of the medical service operated in the healthcare service model is improved by 14.1% on average and the server overhead is 6.7% lower than the conventional technique. The accuracy of healthcare information extraction was 10.1% higher than the conventional method.

Design of a Real Estate Knowledge Information System Based on Semantic Search (시맨틱 검색 기반의 부동산 지식 정보시스템 설계)

  • Cho, Jae-Hyung;Kang, Moo-Hong
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.16 no.2
    • /
    • pp.111-124
    • /
    • 2011
  • The apartment' share of the housing has steadily increased and property assets have been valued in importance as the one of asset value. Information retrieval system using internet is particularly active in the real estate market. However, user satisfaction on real estate information system is not very high, and there is a lack of research on real estate retrieval to increasing efficiency until now. This study presents a new knowledge information system developed to consider region-related factor and individual-related factor in the real estate market. In addition it enables a real estate knowledge system to search various preferential requirements for buyers such as school district, living convenience, easy maintenance as well as price. We made a survey of the search condition preference of experts on 30 real estate agents and then analyzed the result using AHP methodology. Furthermore, this research is to build apartment ontology using semantic web technologies to standardize various terminologies of apartment information and to show how it can be used to help buyers find apartments of the interest. After designing architecture of a real estate knowledge information system, this system is applied to the Busan real estate market to estimate the solutions of retrieval through Multi-Attribute Decision Making(MADM). Based on the results of the analysis, we endowed the buyer and expert's selected factors with weights in the system. Evaluation results indicate that this new system is to raise not only the value satisfaction of user, but also make it possible to effectively search and analyze the real estate through entropy analysis of MADM. This new system is to raise not only the value satisfaction of buyer's real estate, but also make it possible to effectively search and analyze the related real estate, consequently saving the searching cost of the buyers.

Social Search Scheme Considering Recent Preferences of Social Media Users (소셜 미디어 사용자의 최근 관심사를 고려한 소셜 검색 기법)

  • Song, JinWoo;Jeon, Hyeonwook;Kim, Minsoo;Kim, Gihoon;Noh, Yeonwoo;Lim, Jongtae;Bok, Kyoungsoo;Yoo, Jaesoo
    • The Journal of the Korea Contents Association
    • /
    • v.17 no.2
    • /
    • pp.113-124
    • /
    • 2017
  • The existing social search has a problem that search results are not suitable for a user since it does not take into account the recency of the user profile and the interests of similar users. Therefore, studies on a social search considering a temporal attribute and the interests of other users are required. In this paper, we propose a social search scheme that takes into account the recent interests of a user by time and the interests of the most similar users. The proposed scheme analyzes the activity information of a social media user in order to take into account the recent interests of the user. And then the proposed scheme improves the satisfaction and accuracy of search results by combining the interests of similar users with the analyzed information and performing ranking, It is shown through performance evaluation that the proposed scheme outperforms the existing scheme.

Session Management and Control Architecture for N-Screen Services (N-스크린 서비스를 위한 세션 제어 및 관리 구조)

  • Kim, Jae-Woo;Ullah, Farman;Sarwar, Ghulam;Lee, Hyun-Woo;Lee, Sung-Chang
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.13 no.2
    • /
    • pp.15-23
    • /
    • 2013
  • In this paper, we propose a session management and control architecture for N-Screen services, which enable users to change devices and transfer contents among user's devices during service by session transfer and split. In N-Screen services, users may have multiple devices with different attribute such as screen resolution, CPU capability and access network interfaces. Also, since users may change devices during service, or one user may use multiple stream, N-Screen services need to enable the user to share and transfer contents across N-Screen devices. We introduce the management and control servers to provide session split over user multiple devices and session continuity while changing device. Furthermore, the proposed architecture provides the device capabilities aware session continuity. In addition, the proposed scheme minimizes the session transfer delay and content server processing load. We present results that show the effectiveness and usefulness of proposed architecture.

Data Storage and Security Model for Mobile Healthcare Service based on IoT (IoT 기반의 모바일 헬스케어 서비스를 위한 데이터 저장 및 보호 모델)

  • Jeong, Yoon-Su
    • Journal of Digital Convergence
    • /
    • v.15 no.3
    • /
    • pp.187-193
    • /
    • 2017
  • Objects Internet-based healthcare services provide healthcare and healthcare services, including measurement of user's vital signs, diagnosis and prevention of diseases, through a variety of object internet devices. However, there is a problem that new security vulnerability can occur when inter-working with the security weakness of each element technology because the internet service based on the object Internet provides a service by integrating various element technologies. In this paper, we propose a user privacy protection model that can securely process user's healthcare information from a third party when delivering healthcare information of users using wearable equipment based on IoT in a mobile environment to a server. The proposed model provides attribute values for each healthcare sensor information so that the user can safely handle, store, and store the healthcare information, thereby managing the privacy of the user in a hierarchical manner. As a result of the performance evaluation, the throughput of IoT device is improved by 10.5% on average and the server overhead is 9.9% lower than that of the existing model.

CP-ABE Access Control that Block Access of Withdrawn Users in Dynamic Cloud

  • Hwang, Yong-Woon;Lee, Im-Yeong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.10
    • /
    • pp.4136-4156
    • /
    • 2020
  • Recently, data can be safely shared or stored using the infrastructure of cloud computing in various fields. However, issues such as data security and privacy affect cloud environments. Thus, a variety of security technologies are required, one of them is security technology using CP-ABE. Research into the CP-ABE scheme is currently ongoing, but the existing CP-ABE schemes can pose security threats and are inefficient. In terms of security, the CP-ABE approach should be secure against user collusion attacks and masquerade attacks. In addition, in a dynamic cloud environment where users are frequently added or removed, they must eliminate user access when they leave, and so users will not be able to access the cloud after removal. A user who has left should not be able to access the cloud with the existing attributes, secret key that had been granted. In addition, the existing CP-ABE scheme increases the size of the ciphertext according to the number of attributes specified by the data owner. This leads to inefficient use of cloud storage space and increases the amount of operations carried out by the user, which becomes excessive when the number of attributes is large. In this paper, CP-ABE access control is proposed to block access of withdrawn users in dynamic cloud environments. This proposed scheme focuses on the revocation of the attributes of the withdrawn users and the output of a ciphertext of a constant-size, and improves the efficiency of the user decryption operation through outsourcing.

Developing and Applying a New Methodology for Value-Centered HCI: Focusing on User Experience Structure of Mobile Data Service (가치 중심적 HCI를 위한 새로운 방법론의 개발 및 적용: 모바일 데이터 서비스의 사용자 경험 구조를 중심으로)

  • Lee, In-Seong;Choi, Bo-Reum;Kim, Jin-Woo;Lee, Ki-Ho;Jung, Seung-Ki
    • Journal of the HCI Society of Korea
    • /
    • v.2 no.1
    • /
    • pp.13-24
    • /
    • 2007
  • For many years, human-computer interaction (HCI) practitioners have focused on usability in order to enhance the user experience, and companies have seen it as an area where they can gain advantages over their competitors. However, a focus on usability limits the potential of HCI research because it restricts the concept of user experience to just an implemented functionality of the information technology (IT). Therefore, it is necessary to expand the boundary of user experience research into a holistic dimension. We suggest that one of the most powerful ways to broadly understand user experience with an IT is to investigate the attributes of an IT and users' perceived values and to construct a user experience structure, a hierarchical structure between the attributes of an IT and users' perceived values. This study thus undertakes two research tasks: to develop a specific methodology, which is the visual probing, for constructing a user experience structure with the attributes of an IT and users' perceived values, and then to build a user experience structure practically by conducting a case study to a specific IT: mobile data service.

  • PDF