• Title/Summary/Keyword: attribute

Search Result 3,313, Processing Time 0.023 seconds

A Survey of State-of-the-Art Multi-Authority Attribute Based Encryption Schemes in Cloud Environment

  • Reetu, Gupta;Priyesh, Kanungo;Nirmal, Dagdee
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.1
    • /
    • pp.145-164
    • /
    • 2023
  • Cloud computing offers a platform that is both adaptable and scalable, making it ideal for outsourcing data for sharing. Various organizations outsource their data on cloud storage servers for availing management and sharing services. When the organizations outsource the data, they lose direct control on the data. This raises the privacy and security concerns. Cryptographic encryption methods can secure the data from the intruders as well as cloud service providers. Data owners may also specify access control policies such that only the users, who satisfy the policies, can access the data. Attribute based access control techniques are more suitable for the cloud environment as they cover large number of users coming from various domains. Multi-authority attribute-based encryption (MA-ABE) technique is one of the propitious attribute based access control technique, which allows data owner to enforce access policies on encrypted data. The main aim of this paper is to comprehensively survey various state-of-the-art MA-ABE schemes to explore different features such as attribute and key management techniques, access policy structure and its expressiveness, revocation of access rights, policy updating techniques, privacy preservation techniques, fast decryption and computation outsourcing, proxy re-encryption etc. Moreover, the paper presents feature-wise comparison of all the pertinent schemes in the field. Finally, some research challenges and directions are summarized that need to be addressed in near future.

An Analysis on the Preference of Early Childhood Teachers in Horticultural Activities Based on Conjoint Analysis

  • Jeong, Yeojin;Kim, Mijin;Chang, Taegwon;Yun, Sukyoung
    • Journal of People, Plants, and Environment
    • /
    • v.23 no.5
    • /
    • pp.495-506
    • /
    • 2020
  • Background and objective: This study conducted a conjoint analysis on early childhood teachers to find out their preferences in horticultural activities that are used as a means of education in early childhood education. Methods: For the conjoint analysis, five attributes of horticultural activities were selected. Attribute 1 was method of horticultural activities, divided into two levels: exclusive and integrated horticultural activities. Attribute 2 was object of horticultural activities, divided into three levels: fruit crops, vegetable crops, and floricultural crops. Attribute 3 was activity type, divided into three levels: big and small group, free choice, and outdoor play. Attribute 4 was place for horticultural activities, and divided into two levels: indoors and outdoors. Attribute 5 was time for horticultural activities, divided into two levels: 30 minutes and 30-60 minutes. The orthogonal design was used to extract 20 profiles, after which we conducted a survey on 320 early childhood teachers and analyzed the valid responses from 257 teachers. Results: The preference of early childhood teachers showed highest importance in object (29.1%), followed by activity type (23.2%), activity method (17.4%), time (16.1%), and place (14.2%) (Pearson's R = .591, p = .008). By level of each attribute, the importance was high in exclusive horticultural activities for activity method, big and small group for activity type, vegetable and floricultural crops for object, indoors for place, and 30 minutes for time. Conclusion: The horticultural program preferred by early childhood teachers is comprised of big and small group activities using vegetable and floricultural crops, carried out indoors for 30 minutes as an exclusive class.

Study on Relationship between Elderly Group Lifestyle and Selection Attributes in the Health Functional Foods (실버층 라이프스타일에 따른 건강기능식품 선택속성에 관한 연구)

  • Lee, Myung Sook;Kim, Sook Eung
    • Korean Journal of Clinical Pharmacy
    • /
    • v.25 no.4
    • /
    • pp.286-295
    • /
    • 2015
  • Objective: This experiment is to study how elderly group and their various lifestyles interact with health functional foods, according to their selection behavior. Different lifestyles will be observed closely, as well as how different health conditions and consumer involvements will affect critical decision making in selecting health functional foods. Method: Theories and discoveries from original advanced research were compared parallel to the new study. Results: First, cluster analysis and exploratory analysis were performed amongst different elder lifestyles. Lifestyle exploratory analysis was used for healthy, unique, leisure, and economical-style elders. Cluster analysis was used for material trend oriented, health oriented, complacent oriented-style elders. Health Functional Foods' selection trait Exploratory Factor Analysis showed that product's originality (function, uniqueness, specialty, compatibility, distributor, expiration date), quality (amount, daily dose, visual representation, accessibility, portability, natural ingredients), and popularity (product container, brand image, taste and smell, advertised product, domestic or import, well-known function) were the three main causes. Secondly, the amount of benefits for the elderly group health lifestyle were affected by 'Interest in health', 'Notability of the health functional food', and 'Functionality approved mark'. Specifically, the importance of, 'Interest in health', 'Notability of health functional food', and 'Functionality approved mark' were noticeably high within health oriented elders. Lastly, after examining the data from elder lifestyle's relationship with health functional food selection trait, all three different results showed equal importance. If you closely examine material trend oriented elderly group, selection trait showed distinctively high regards in 'Fundamental Attribute', 'Typical Attribute', and 'Cognitive Attribute'. Health oriented elders showed their distinctively high regards in 'Natural Attribute', and less consideration in 'Typical Attribute' and 'Cognitive Attribute'. Complacent oriented-style elderly group showed less focus on 'Fundamental Attribute', and even less in 'Typical Attribute', and 'Cognitive Attribute'. Health oriented elderly group concluded with above data from the fact that they showed most importance and involvement in health beneficial products that are scientifically proven. Material trend oriented elderly group showed balanced traits in their concluded data, showing that they prefer function, safety, as well as the brand image and their reputation. Also, they consider the products' outer elements, such as design and product name, in order to sense inner functions. Conclusion: So, Silver Business corporations must develop products to fulfill the market demands, and strategize marketing plans to better target the correct audience.

A Study of Thinking Style and Consumption Behavior in Comsumer's Decision Making (소비자의 구매의사결정에 있어 제품별 사고유형과 소비행동에 대한 연구)

  • Choi, Nak-Hwan;Ahn, Ri-Na;Na, Kwang-Jin
    • Science of Emotion and Sensibility
    • /
    • v.14 no.2
    • /
    • pp.279-292
    • /
    • 2011
  • This research explores the differences of two consumption behaviors from the thinking style they elicit. Specifically, we predict that more utilitarian attributes(vs. hedonic attributes) may be used when evaluating utilitarian products whereas more hedonic attributes(vs. utilitarian attributes) may be used when evaluating hedonic products. In addition, this research considered two different thinking styles: rational thinking style and experiential thinking style, and try to find out whether different product attribute information could elicit different thinking style and whether the thinking style has any effect on product evaluation. The data reported in this research demonstrates the following results. Firstly, people use different criteria when judging different types of product. That is, when judging utilitarian product, they are more likely to use utilitarian attribute as evaluation criteria, on the contrary they inclined to use hedonic attribute as evaluation criteria when choosing hedonic product. Secondly, different types of attribute informations could elicit different thinking style. Utilitarian attribute informations elicit rational thinking style whereas hedonic attribute informations elicit experiential thinking style. Finally, if people engage in rational thinking elicited in processing utilitarian attribute informations, the evaluation of utilitarian product is enhanced. But even though people engage in experiential thinking in processing hedonic attribute informations, the evaluation of hedonic product is not improved.

  • PDF

Technology Development Strategy for Spatial Information Linkage of Public Data Portal Attribute Data (공공데이터포털 속성데이터의 공간정보 연계를 위한 기술개발 전략)

  • Min, Kyung-Ju;Lee, Sung-Hun;Yu, Seon-Cheol;Ahn, Jong-Wook
    • Journal of Cadastre & Land InformatiX
    • /
    • v.53 no.2
    • /
    • pp.107-122
    • /
    • 2023
  • The demand for spatial information in the era of the 4th Industrial Revolution is expanding Additionally, interest in attribute data related to geography or location is increasing. In the field of spatial information, spatial information policies and services tailored to the public can be provided through linkage and integration with new attribute data, and these data are resources for this purpose. In order to meet this expanding and diverse demand for spatial information utilization, it is necessary to develop technologies for linking and utilizing various attribute information such as public data. In this study, we aim to present a technology development strategy for linking and integrating attribute data and spatial information through a review of theories related to data linkage and integration, the current status of data on public data portals, and existing prior research. As a result, it was suggested that the data identifier of the attribute data to be linked should be used to develop linkage technology between spatial information and attribute data, and an attribute data linkage process that can be used when designing a prototype for technology development was presented.

Study on the Seismic Random Noise Attenuation for the Seismic Attribute Analysis (탄성파 속성 분석을 위한 탄성파 자료 무작위 잡음 제거 연구)

  • Jongpil Won;Jungkyun Shin;Jiho Ha;Hyunggu Jun
    • Economic and Environmental Geology
    • /
    • v.57 no.1
    • /
    • pp.51-71
    • /
    • 2024
  • Seismic exploration is one of the widely used geophysical exploration methods with various applications such as resource development, geotechnical investigation, and subsurface monitoring. It is essential for interpreting the geological characteristics of subsurface by providing accurate images of stratum structures. Typically, geological features are interpreted by visually analyzing seismic sections. However, recently, quantitative analysis of seismic data has been extensively researched to accurately extract and interpret target geological features. Seismic attribute analysis can provide quantitative information for geological interpretation based on seismic data. Therefore, it is widely used in various fields, including the analysis of oil and gas reservoirs, investigation of fault and fracture, and assessment of shallow gas distributions. However, seismic attribute analysis is sensitive to noise within the seismic data, thus additional noise attenuation is required to enhance the accuracy of the seismic attribute analysis. In this study, four kinds of seismic noise attenuation methods are applied and compared to mitigate random noise of poststack seismic data and enhance the attribute analysis results. FX deconvolution, DSMF, Noise2Noise, and DnCNN are applied to the Youngil Bay high-resolution seismic data to remove seismic random noise. Energy, sweetness, and similarity attributes are calculated from noise-removed seismic data. Subsequently, the characteristics of each noise attenuation method, noise removal results, and seismic attribute analysis results are qualitatively and quantitatively analyzed. Based on the advantages and disadvantages of each noise attenuation method and the characteristics of each seismic attribute analysis, we propose a suitable noise attenuation method to improve the result of seismic attribute analysis.

Multi-Attribute Data Fusion for Energy Equilibrium Routing in Wireless Sensor Networks

  • Lin, Kai;Wang, Lei;Li, Keqiu;Shu, Lei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.4 no.1
    • /
    • pp.5-24
    • /
    • 2010
  • Data fusion is an attractive technology because it allows various trade-offs related to performance metrics, e.g., energy, latency, accuracy, fault-tolerance and security in wireless sensor networks (WSNs). Under a complicated environment, each sensor node must be equipped with more than one type of sensor module to monitor multi-targets, so that the complexity for the fusion process is increased due to the existence of various physical attributes. In this paper, we first investigate the process and performance of multi-attribute fusion in data gathering of WSNs, and then propose a self-adaptive threshold method to balance the different change rates of each attributive data. Furthermore, we present a method to measure the energy-conservation efficiency of multi-attribute fusion. Based on our proposed methods, we design a novel energy equilibrium routing method for WSNs, viz., multi-attribute fusion tree (MAFT). Simulation results demonstrate that MAFT achieves very good performance in terms of the network lifetime.

Enabling Fine-grained Access Control with Efficient Attribute Revocation and Policy Updating in Smart Grid

  • Li, Hongwei;Liu, Dongxiao;Alharbi, Khalid;Zhang, Shenmin;Lin, Xiaodong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.4
    • /
    • pp.1404-1423
    • /
    • 2015
  • In smart grid, electricity consumption data may be handed over to a third party for various purposes. While government regulations and industry compliance prevent utility companies from improper or illegal sharing of their customers' electricity consumption data, there are some scenarios where it can be very useful. For example, it allows the consumers' data to be shared among various energy resources so the energy resources are able to analyze the data and adjust their operation to the actual power demand. However, it is crucial to protect sensitive electricity consumption data during the sharing process. In this paper, we propose a fine-grained access control scheme (FAC) with efficient attribute revocation and policy updating in smart grid. Specifically, by introducing the concept of Third-party Auditor (TPA), the proposed FAC achieves efficient attribute revocation. Also, we design an efficient policy updating algorithm by outsourcing the computational task to a cloud server. Moreover, we give security analysis and conduct experiments to demonstrate that the FAC is both secure and efficient compared with existing ABE-based approaches.

Improving Security and Privacy-Preserving in Multi-Authorities Ciphertext-Policy Attribute-Based Encryption

  • Hu, Shengzhou;Li, Jiguo;Zhang, Yichen
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.10
    • /
    • pp.5100-5119
    • /
    • 2018
  • Most of existing privacy-preserving multi-authorities attribute-based encryption schemes (PP-MA-ABE) only considers the privacy of the user identity (ID). However, in many occasions information leakage is caused by the disclosing of his/her some sensitive attributes. In this paper, we propose a collusion-resisting ciphertext-policy PP-MA-ABE (CRPP-MACP-ABE) scheme with hiding both user's ID and attributes in the cloud storage system. We present a method to depict anonymous users and introduce a managerial role denoted by IDM for the management of user's anonymous identity certificate ($AID_{Cred}$). The scheme uses $AID_{Cred}$ to realize privacy-preserving of the user, namely, by verifying which attribute authorities (AAs) obtain the blinded public attribute keys, pseudonyms involved in the $AID_{Cred}$ and then distributes corresponding private keys for the user. We use different pseudonyms of the user to resist the collusion attack launched by viciousAAs. In addition, we utilize IDM to cooperate with multiple authorities in producing consistent private key for the user to avoid the collusion attack launched by vicious users. The proposed CRPP-MACP-ABE scheme is proved secure. Some computation and communication costs in our scheme are finished in preparation phase (i.e. user registration). Compared with the existing schemes, our scheme is more efficient.