• Title/Summary/Keyword: access server

Search Result 963, Processing Time 0.024 seconds

Web-Based Distributed Visualization System for Large Scale Geographic Data (대용량 지형 데이터를 위한 웹 기반 분산 가시화 시스템)

  • Hwang, Gyu-Hyun;Yun, Seong-Min;Park, Sang-Hun
    • Journal of Korea Multimedia Society
    • /
    • v.14 no.6
    • /
    • pp.835-848
    • /
    • 2011
  • In this paper, we propose a client server based distributed/parallel system to effectively visualize huge geographic data. The system consists of a web-based client GUI program and a distributed/parallel server program which runs on multiple PC clusters. To make the client program run on mobile devices as well as PCs, the graphical user interface has been designed by using JOGL, the java-based OpenGL graphics library, and sending the information about current available memory space and maximum display resolution the server can minimize the amount of tasks. PC clusters used to play the role of the server access requested geographic data from distributed disks, and properly re-sample them, then send the results back to the client. To minimize the latency happened in repeatedly access the distributed stored geography data, cache data structures have been maintained in both every nodes of the server and the client.

The Smart Contract based Conference Key Distribution Scheme (스마트계약 기반 회의용 키 분배 기법)

  • Yun, Sunghyun
    • Journal of Internet of Things and Convergence
    • /
    • v.6 no.4
    • /
    • pp.1-6
    • /
    • 2020
  • Recently, epidemic of covid-19 causes rapid increase in demand for untact video conferences. In existing server-client based video conference systems such as Zoom, Google Meet, etc., the server generates the conference key and controls the access rights of meeting members and their contents with it. In this case, the server can fabricate or repudiate the meeting. So, the privacy of the meeting members is not guaranteed. It's necessary to make the conference key distribution scheme where all participants can verify the trustfulness without help of the server. The smart contract is the program stored to the blockchain. Its contents cannot be altered due to the property of the blockchain, and everybody can verify the execution results of it. In this study, we propose the smart contract based conference key distribution scheme. The proposed scheme is consisted of smart contract deployment, conference key generation and verification stages. The smart contract replaces the role of existing trustful server and the meeting members can generate the conference key according to the protocols implemented on it. The proposed scheme can be applied to the video conference systems and only the meeting members can access the conference key.

An Extended Multi-Server-Based User Authentication and Key Agreement Scheme with User Anonymity

  • Li, Chun-Ta;Lee, Cheng-Chi;Weng, Chi-Yao;Fan, Chun-I
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.1
    • /
    • pp.119-131
    • /
    • 2013
  • With the explosive growth of computer networks, many remote service providing servers and multi-server network architecture are provided and it is extremely inconvenient for users to remember numerous different identities and passwords. Therefore, it is important to provide a mechanism for a remote user to use single identity and password to access multi-server network architecture without repetitive registration and various multi-server authentication schemes have been proposed in recent years. Recently, Tsaur et al. proposed an efficient and secure smart card based user authentication and key agreement scheme for multi-server environments. They claimed that their scheme satisfies all of the requirements needed for achieving secure password authentication in multi-server environments and gives the formal proof on the execution of the proposed authenticated key agreement scheme. However, we find that Tsaur et al.'s scheme is still vulnerable to impersonation attack and many logged-in users' attack. We propose an extended scheme that not only removes the aforementioned weaknesses on their scheme but also achieves user anonymity for hiding login user's real identity. Compared with other previous related schemes, our proposed scheme keeps the efficiency and security and is more suitable for the practical applications.

Addressing Concurrency Design for HealthCare Web Service Gateway in Remote Healthcare Monitoring System

  • Nkenyereye, Lionel;Jang, Jong-Wook
    • International journal of advanced smart convergence
    • /
    • v.5 no.3
    • /
    • pp.32-39
    • /
    • 2016
  • With the help of a small wearable device, patients reside in an isolated village need constant monitoring which may increase access to care and decrease healthcare delivery cost. As the number of patients' requests increases in simultaneously manner, the web service gateway located in the village hall encounters limitations for performing them successfully and concurrently. The gateway based RESTful technology responsible for handling patients' requests attests an internet latency in case a large number of them submit toward the gateway increases. In this paper, we propose the design tasks of the web service gateway for handling concurrency events. In the procedure of designing tasks, concurrency is best understood by employing multiple levels of abstraction. The way that is eminently to accomplish concurrency is to build an object-oriented environment with support for messages passing between concurrent objects. We also investigate the performance of event-driven architecture for building web service gateway using node.js. The experiments results show that server-side JavaScript with Node.js and MongoDB as database is 40% faster than Apache Sling. With Node.js developers can build a high-performance, asynchronous, event-driven healthcare hub server to handle an increasing number of concurrent connections for Remote Healthcare Monitoring System in an isolated village with no access to local medical care.

Implementation of Low-Power Ubiquitous Health System based on Real-Time Embedded Linux using ZigBee wireless communication (ZigBee를 이용한 실시간 임베디드 리눅스 기반의 저전력형 U-Health 시스템 구현)

  • Kwon, Jong-Won;Ayurzana, Odgerel;Park, Yong-Man;Koo, Sang-Jun;Kim, Hie-Sik
    • Proceedings of the KIEE Conference
    • /
    • 2007.04a
    • /
    • pp.436-438
    • /
    • 2007
  • As the sensors and communication technology get advance, the remote health diagnosis for patients and senior persons at home are possible now without visiting doctors in hospitals. A low-power ubiquitous health check device was developed adapting Real-Time Embedded Linux is developed. This ubiquitous device is consisted of three sensors. The wrist type health checking terminal acquires periodically the health data by using a blood pressure sensor, a pulse sensor and a body temperature sensor. It transmits the health data to the access point located at the home center through the ZigBee wireless communication modem. This health data collector or access point device sends the data again to the main server operated in a hospital or health care organization. The health server control continuously the input data and sends an alarm signal to the assigned. doctor and responsible persons using cellular SMS when any dangerous events occur. This wrist type health check device has an embedded linux OS using Intel PAX255 MPU. The developed U-Health system is applicable for checking patients health in remote at home. And their family or related persons in remote site can check the patients health status at any time. They can be assured by receiving SMS record and alarm of emergency case which is transmitted from the health server.

  • PDF

The Windows Push Server System with Smart Device Identifying Fingerprints over IEEE 802.15.4 Protocol (IEEE 802.15.4 통신을 활용한 지문인식 스마트 기기 연동 푸쉬서버 시스템)

  • Choi, Sung-Ja;Kang, Byeong-Gwon
    • Journal of Digital Convergence
    • /
    • v.10 no.11
    • /
    • pp.419-425
    • /
    • 2012
  • In these days, the trends of home networking system is implementation of easily configured system with home security of emergency alarm and visitor verification services. In this paper, we implemented push server system based on Arduino of open source physical computation platform to verify visitors for the homes without home networking services. In the suggested system, visitor verification is performed in and out of home, and home access security of the system could be constructed with low-cost price by use of windows push server system and smart devices with alarm operation in corresponding to not allowed access trying.

A Study on the Construction of Status Display Equipment for Soft-RAID System of Linux Server using Hardware (하드웨어에 의한 리눅스 서버 소프트-RAID 시스템의 상태표시 장치 구성에 관한 연구)

  • Na, Won-Shik;Lee, Hyun-Chang
    • Journal of Software Assessment and Valuation
    • /
    • v.15 no.2
    • /
    • pp.95-100
    • /
    • 2019
  • In this paper, we propose a simple hardware reporting method for errors in soft-RAID systems of Linux OS. Compared with other reporting methods, the proposed method displays error status intuitively without any additional access process such as log-in process or home-page access. In particular, the server actively displays the error status, so the administrator can take immediate action. In order to confirm the effectiveness of the proposed method, the experimental circuit was constructed and the experimental results showed that the error was actively displayed when an error occurred in the storage device. As such, a soft-RAID system can perform almost the same function as a hardware RAID system, thereby ensuring server data reliability at low cost.

Light-weight Preservation of Access Pattern Privacy in Un-trusted Storage

  • Yang, Ka;Zhang, Jinsheng;Zhang, Wensheng;Qiao, Daji
    • IEIE Transactions on Smart Processing and Computing
    • /
    • v.2 no.5
    • /
    • pp.282-296
    • /
    • 2013
  • With the emergence of cloud computing, more and more sensitive user data are outsourced to remote storage servers. The privacy of users' access pattern to the data should be protected to prevent un-trusted storage servers from inferring users' private information or launching stealthy attacks. Meanwhile, the privacy protection schemes should be efficient as cloud users often use thin client devices to access the data. In this paper, we propose a lightweight scheme to protect the privacy of data access pattern. Comparing with existing state-of-the-art solutions, our scheme incurs less communication and computational overhead, requires significantly less storage space at the user side, while consuming similar storage space at the server. Rigorous proofs and extensive evaluations have been conducted to show that the proposed scheme can hide the data access pattern effectively in the long run after a reasonable number of accesses have been made.

  • PDF

Multi-access Monitoring System for Biological Signal Collection (생체신호수집을 위한 다중접속 모니터링 시스템)

  • Kim, Tae-Woong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.1
    • /
    • pp.145-148
    • /
    • 2020
  • Wearable computing is growing rapidly as research on body area communication network using wireless sensor network technology is actively conducted. In particular, there is an increasing interest in smart clothing measuring unrestrained and insensitive bio signals, and research is being actively conducted. However, research on smart clothing is mainly based on 1: 1 wireless communication. In this paper, we propose a multi-access monitoring system that can measure bio-signals by multiple users wearing smart clothing. The proposed system consists of wireless access device, multiple access control server and monitoring system. It also provides a service that allows multiple users to monitor and measure bio signals at the same time.

Symmetric Key-Based Remote User Authentication Scheme With Forward Secrecy (순방향 안전성을 제공하는 대칭키 기반의 원격 사용자 인증 방식)

  • Lee, SungYup;Park, KiSung;Park, YoHan;Park, YoungHo
    • Journal of Korea Multimedia Society
    • /
    • v.19 no.3
    • /
    • pp.585-594
    • /
    • 2016
  • Recently because of development of remote network technology, users are able to access the network freely without constraints of time and space. As users are getting more frequent to access the remote server in a computing environment, they are increasingly being exposed to various risk factors such as forward secrecy and server impersonation attack. Therefore, researches for remote user authentication scheme have been studying actively. This paper overcomes the weaknesses of many authentication schemes proposed recently. This paper suggests an improved authentication scheme that protects user's anonymity with preserving variable more safe and also provides forward secrecy.