• Title/Summary/Keyword: User attribute information

Search Result 275, Processing Time 0.041 seconds

Access Control Policy of Data Considering Varying Context in Sensor Fusion Environment of Internet of Things (사물인터넷 센서퓨전 환경에서 동적인 상황을 고려한 데이터 접근제어 정책)

  • Song, You-jin;Seo, Aria;Lee, Jaekyu;Kim, Yei-chang
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.4 no.9
    • /
    • pp.409-418
    • /
    • 2015
  • In order to delivery of the correct information in IoT environment, it is important to deduce collected information according to a user's situation and to create a new information. In this paper, we propose a control access scheme of information through context-aware to protect sensitive information in IoT environment. It focuses on the access rights management to grant access in consideration of the user's situation, and constrains(access control policy) the access of the data stored in network of unauthorized users. To this end, after analysis of the existing research 'CP-ABE-based on context information access control scheme', then include dynamic conditions in the range of status information, finally we propose a access control policy reflecting the extended multi-dimensional context attribute. Proposed in this paper, access control policy considering the dynamic conditions is designed to suit for IoT sensor fusion environment. Therefore, comparing the existing studies, there are advantages it make a possible to ensure the variety and accuracy of data, and to extend the existing context properties.

Design and Implementation of the Reuse-Easiness Measurement System Using Fuzzy Logic

  • 이성주;최완규
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.6 no.4
    • /
    • pp.17-26
    • /
    • 1996
  • Software reuse is a method which increases the productivity of software, nevertheless software reuse is not employed well in real world. One of the important factors occured this proplem is insufficinet inforamtion in understanding and adapting the existing components. Understanding and adapting of components can be measured emplying user's experience and the attributes which the existing programs provide. Especially user's experience is very important attribute in understanding and adapting components, and it can't be measured by simple metrics. We propose in this paper, the reuse-easingess measurement system using fuzzy logic. This system can provide information regarding reusing components by reflecting user's experience from user's point of view, and can reduce the reuse effort signinificantly.

  • PDF

Design of Environmental Information Systems Architecture Based on the Internet : The Building of a Database for Environmental Factors and GIS (인터넷 환경에 기반한 환경정보시스템 아키텍쳐 설계 : 환경요인을 Database 구축과 이를 이용한 GIS 구축)

  • Suh, Eui-Ho;Lee, Dae-Ho;Yu, Sung-Ho
    • Asia pacific journal of information systems
    • /
    • v.8 no.2
    • /
    • pp.1-18
    • /
    • 1998
  • As the management and preservation of the environment become an important social issue, information required to support environmental task is required. So, there is an increasing demand for environmental information and appropriate systems to manage it. The vast volume of environmental data is distributed in different knowledge domains and systems. Environmental data objects have the complex structure containing environmental quality data and attribute data. Environmental information systems must be able to address these properties. This research has aimed at constructing well-defined schema design of environmental data, and making system architecture that environmental data kept by authorities should be made available to the public user. There are 3 major components in environmental information systems architecture ; User interface, Catalog libraries, Communication Provider. Web browsers provide consistent and intuitive user interfaces on Internet. The communication provider is a collection of diverse CGI functions. The main roles of the CGIs are to build interfaces between the Web, databases. Catalog libraries is libraries of various matadata including administration matadata. Administration matadata support the environmental administration and the managerial aspects of environmental data rather than explain a database itself or its properties.

  • PDF

A Study about the PMI for Definition and Management of User Attribute (사용자 속성의 정의 및 관리를 위한 PMI에 대한 연구)

  • 이건희;유정각;손태식;채송화;김동규
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2001.10a
    • /
    • pp.742-744
    • /
    • 2001
  • 인터넷의 서비스가 다양해 지면서 기존의 아이디와 패스워드를 이용한 사용자 신원 인증으로는 보안이 부족하게 되었다. 이에 대해서 인증서 기반으로 사용자 신원을 인증하는 강력한 보안 방법이 대두 되었다. 하지만 시스템에 따라서 각 사용자 별로 서로 다른 서비스를 이용해야 할 경우가 발생했다. 이 경우 각 사용자의 권한이나 임무 등의 사용자 속성을 관리할 필요가 생긴다. 기존의 PKI의 확장 영역을 사용하지 않고, 새롭게 사용자 속성을 위한 인증서를 사용하여 더욱 안전하고 안정적으로 정보보호 서비스를 제공한다.

  • PDF

Context-awareness User Analysis based on Clustering Algorithm (클러스터링 알고리즘기반의 상황인식 사용자 분석)

  • Lee, Kang-whan
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.7
    • /
    • pp.942-948
    • /
    • 2020
  • In this paper, we propose a clustered algorithm that possible more efficient user distinction within clustering using context-aware attribute information. In typically, the data provided to classify interrelationships within cluster information in the process of clustering data will be as a degrade factor if new or newly processing information is treated as contaminated information in comparative information. In this paper, we have developed a clustering algorithm that can extract user's recognition information to solve this problem in using K-means algorithm. The proposed algorithm analyzes the user's clustering attributed parameters from user clusters using accumulated information and clustering according to their attributes. The results of the simulation with the proposed algorithm showed that the user management system was more adaptable in terms of classifying and maintaining multiple users in clusters.

A key-insulated CP-ABE with key exposure accountability for secure data sharing in the cloud

  • Hong, Hanshu;Sun, Zhixin;Liu, Ximeng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.5
    • /
    • pp.2394-2406
    • /
    • 2016
  • ABE has become an effective tool for data protection in cloud computing. However, since users possessing the same attributes share the same private keys, there exist some malicious users exposing their private keys deliberately for illegal data sharing without being detected, which will threaten the security of the cloud system. Such issues remain in many current ABE schemes since the private keys are rarely associated with any user specific identifiers. In order to achieve user accountability as well as provide key exposure protection, in this paper, we propose a key-insulated ciphertext policy attribute based encryption with key exposure accountability (KI-CPABE-KEA). In our scheme, data receiver can decrypt the ciphertext if the attributes he owns match with the self-centric policy which is set by the data owner. Besides, a unique identifier is embedded into each user's private key. If a malicious user exposes his private key for illegal data sharing, his identity can be exactly pinpointed by system manager. The key-insulation mechanism guarantees forward and backward security when key exposure happens as well as provides efficient key updating for users in the cloud system. The higher efficiency with proved security make our KI-CPABE-KEA more appropriate for secure data sharing in cloud computing.

Subnet Generation Scheme based on Deep Learing for Healthcare Information Gathering (헬스케어 정보 수집을 위한 딥 러닝 기반의 서브넷 구축 기법)

  • Jeong, Yoon-Su
    • Journal of Digital Convergence
    • /
    • v.15 no.3
    • /
    • pp.221-228
    • /
    • 2017
  • With the recent development of IoT technology, medical services using IoT technology are increasing in many medical institutions providing health care services. However, as the number of IoT sensors attached to the user body increases, the healthcare information transmitted to the server becomes complicated, thereby increasing the time required for analyzing the user's healthcare information in the server. In this paper, we propose a deep learning based health care information management method to collect and process healthcare information in a server for a large amount of healthcare information delivered through a user - attached IoT device. The proposed scheme constructs a subnet according to the attribute value by assigning an attribute value to the healthcare information transmitted to the server, and extracts the association information between the subnets as a seed and groups them into a hierarchical structure. The server extracts optimized information that can improve the observation speed and accuracy of user's treatment and prescription by using deep running of grouped healthcare information. As a result of the performance evaluation, the proposed method shows that the processing speed of the medical service operated in the healthcare service model is improved by 14.1% on average and the server overhead is 6.7% lower than the conventional technique. The accuracy of healthcare information extraction was 10.1% higher than the conventional method.

Identifying Information Needs of Public Library Users Based on Circulation Data: Focusing on Public Libraries in Seoul (도서대출 데이터를 이용한 공공도서관 이용자 정보요구 분석: 서울시 공공도서관을 중심으로)

  • Shim, Jiyoung
    • Journal of the Korean Society for information Management
    • /
    • v.38 no.2
    • /
    • pp.173-199
    • /
    • 2021
  • In this study, in order to understand the characteristics of the users' information needs for each public library unit, the user needs were analyzed based on the various attribute information of the books loaned to 11 public libraries in 8 districts in Seoul. As a result, the prominent book use patterns of the libraries were revealed, specifically related to the target user groups, purpose/motivation, interests/preferences, book genre, and subject. In addition, there was a preference for authors, and a difference in the role of the preferred authors in each library was also revealed. The results of this study will help to provide guidelines for the development of differentiated collections and service programs based on user needs.

Development and Application of the Park Tree Management Information System (공원수목관리정보체계 구축 및 활용)

  • 이규석;김광식;황국웅;심경구
    • Journal of the Korean Institute of Landscape Architecture
    • /
    • v.21 no.3
    • /
    • pp.89-98
    • /
    • 1993
  • It is necessary for the park tree manager to have the current information about the status of trees, which can help him with right decisions. However, there are many problems in the existing management method such as huge amount of data, tedious work, and the difficult update work due to the lack of necessary data or the inappropriate data record and management method. The sole use of database management system(DBMS) cannot slove these problems because it cannot handle graphic data based on the locational information. So, it is imperative for the park manager to have locational data as well as attribute data of the park tree concerned. Therefore, the purpose of this study is to develop the personal computer-based, user friendly park tree management information system, which deals with attribute data(DBMS) and graphic data(using the CAD) together within the integrated environment. The park tree management information system developed in this study provides a complete operating environment for data input, update, query, delete, and retrieve. The major advantages of this system are as follows: 1) To search the location and distribution of trees. 2) To record, store, and manage data easily. 3) When the manager is changed, delivery of the park tree work is convenient. 4) The system can help the manager with the correct information for the efficient park tree management.

  • PDF

BDSS: Blockchain-based Data Sharing Scheme With Fine-grained Access Control And Permission Revocation In Medical Environment

  • Zhang, Lejun;Zou, Yanfei;Yousuf, Muhammad Hassam;Wang, Weizheng;Jin, Zilong;Su, Yansen;Kim, Seokhoon
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.5
    • /
    • pp.1634-1652
    • /
    • 2022
  • Due to the increasing need for data sharing in the age of big data, how to achieve data access control and implement user permission revocation in the blockchain environment becomes an urgent problem. To solve the above problems, we propose a novel blockchain-based data sharing scheme (BDSS) with fine-grained access control and permission revocation in this paper, which regards the medical environment as the application scenario. In this scheme, we separate the public part and private part of the electronic medical record (EMR). Then, we use symmetric searchable encryption (SSE) technology to encrypt these two parts separately, and use attribute-based encryption (ABE) technology to encrypt symmetric keys which used in SSE technology separately. This guarantees better fine-grained access control and makes patients to share data at ease. In addition, we design a mechanism for EMR permission grant and revocation so that hospital can verify attribute set to determine whether to grant and revoke access permission through blockchain, so it is no longer necessary for ciphertext re-encryption and key update. Finally, security analysis, security proof and performance evaluation demonstrate that the proposed scheme is safe and effective in practical applications.