• Title/Summary/Keyword: cloud server

Search Result 437, Processing Time 0.026 seconds

Key Management for Secure Internet of Things(IoT) Data in Cloud Computing (클라우드 컴퓨팅에서 안전한 사물인터넷 데이터를 위한 키 관리)

  • Sung, Soon-hwa
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.2
    • /
    • pp.353-360
    • /
    • 2017
  • The Internet of Things(IoT) security has more need than a technical problem as it needs series of regulations and faultless security system for common purposes. So, this study proposes an efficient key management in order that can be trusted IoT data in cloud computing. In contrast with a key distribution center of existing sensor networks, the proposed a federation key management of cloud proxy key server is not central point of administration and enables an active key recovery and update. The proposed key management is not a method of predetermined secret keys but sharing key information of a cloud proxy key server in autonomous cloud, which can reduce key generation and space complexity. In addition, In contrast with previous IoT key researches, a federation key of cloud proxy key server provides an extraction ability from meaningful information while moving data.

Music Search Algorithm for Automotive Infotainment System (자동차 환경의 인포테인먼트 시스템을 위한 음악 검색 알고리즘)

  • Kim, Hyoung-Gook;Kim, Jae-Man
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.12 no.1
    • /
    • pp.81-87
    • /
    • 2013
  • In this paper, we propose a music search algorithm for automotive infotainment system. The proposed method extracts fingerprints using the high peaks based on log-spectrum of the music signal, and the extracted music fingerprints store in cloud server applying a hash value. In the cloud server, the most similar music is retrieved by comparing the user's query music with the fingerprints stored in hash table of cloud server. To evaluate the performance of the proposed music search algorithm, we measure an accuracy of the retrieved results according to various length of the query music and measure a retrieval time according to the number of stored music database in hash table.

Design of Wireless Data Transmission and Web Logging System (무선 데이터 전송과 웹 로깅 시스템 설계)

  • Roh, Jae-sung
    • Journal of Advanced Navigation Technology
    • /
    • v.22 no.6
    • /
    • pp.636-641
    • /
    • 2018
  • In recent years, the Internet of things has grown rapidly and is being used in many fields. The function of an Internet device isto collect information in various environments and to provide useful information to users. Due to recent developments in technology, the kinds of Internet devices are increasing and the prices are getting cheaper. In addition, many open source platforms that are easy to use have been developed and are providing convenience to users. In this paper, wireless data transmission and cloud server system based on ESP-12E NodeMCU module was designed and sensor information collected from Internet devices was transmitted to cloud server through WiFi wireless communication. The collected sensor data was saved by creating channel and field in the cloud server and the data of each field was visualized as a graph.

Secure and Efficient Client-side Deduplication for Cloud Storage (안전하고 효율적인 클라이언트 사이드 중복 제거 기술)

  • Park, Kyungsu;Eom, Ji Eun;Park, Jeongsu;Lee, Dong Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.1
    • /
    • pp.83-94
    • /
    • 2015
  • Deduplication, which is a technique of eliminating redundant data by storing only a single copy of each data, provides clients and a cloud server with efficiency for managing stored data. Since the data is saved in untrusted public cloud server, however, both invasion of data privacy and data loss can be occurred. Over recent years, although many studies have been proposed secure deduplication schemes, there still remains both the security problems causing serious damages and inefficiency. In this paper, we propose secure and efficient client-side deduplication with Key-server based on Bellare et. al's scheme and challenge-response method. Furthermore, we point out potential risks of client-side deduplication and show that our scheme is secure against various attacks and provides high efficiency for uploading big size of data.

Implementation of Spectrum-Sensing for Cognitive Radio Using USRP with GNU Radio and a Cloud Server

  • Thien, Huynh Thanh;Tendeng, Rene;Vu-Van, Hiep;Koo, Insoo
    • Journal of information and communication convergence engineering
    • /
    • v.16 no.1
    • /
    • pp.23-30
    • /
    • 2018
  • In cognitive radio (CR), spectrum sensing is an essential function since secondary users (SUs) must determine whether the primary user (PU) is utilizing the channel or not, and furthermore, SUs opportunistically access the licensed channel when the PU is absent. In this paper, spectrum sensing is implemented by energy detection, and a software-defined radio testbed is built to evaluate sensing performance by energy detection in a real environment. In particular, the testbed was built based on the GNU's Not Unix (GNU) Radio software platform and Universal Software Radio Peripheral National Instruments 2900 devices. More specifically, a new block of energy detection is developed by using an out-of-tree module from GNU Radio. To successfully integrate CR into the cloud computing paradigm, we also implement cloud computing-based spectrum sensing by utilizing a cloud server with ThingSpeak, such that we can store, process, and share the sensing information more efficiently in a centralized way in the cloud server.

Mobile Payment Based on Transaction Certificate Using Cloud Self-Proxy Server

  • Sung, Soonhwa;Kong, Eunbae;Youn, Cheong
    • ETRI Journal
    • /
    • v.39 no.1
    • /
    • pp.135-144
    • /
    • 2017
  • Recently, mobile phones have been recognized as the most convenient type of mobile payment device. However, they have some security problems; therefore, mobile devices cannot be used for unauthorized transactions using anonymous data by unauthenticated users in a cloud environment. This paper suggests a mobile payment system that uses a certificate mode in which a user receives a paperless receipt of a product purchase in a cloud environment. To address mobile payment system security, we propose the transaction certificate mode (TCM), which supports mutual authentication and key management for transaction parties. TCM provides a software token, the transaction certificate token (TCT), which interacts with a cloud self-proxy server (CSPS). The CSPS shares key management with the TCT and provides simple data authentication without complex encryption. The proposed self-creating protocol supports TCM, which can interactively communicate with the transaction parties without accessing a user's personal information. Therefore, the system can support verification for anonymous data and transaction parties and provides user-based mobile payments with a paperless receipt.

Design and Implementation of Cloud Computing Monitoring System Based on Android (안드로이드 기반의 클라우드 컴퓨팅 모니터링 시스템 설계 및 구현)

  • Kim, Bong-Hyun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.7
    • /
    • pp.1627-1632
    • /
    • 2013
  • Cloud computing technology for the company's IT infrastructure, reduce the maintenance burden and the company's IT technology to achieve cost savings through innovation in the high field of economic expectations. In particular, cloud computing monitoring system based on the Android is maturing necessary operational solutions in the IT infrastructure environments. Therefore, in this paper, cloud computing environment in terms of user management and real-time server check the situation in case of abnormalities Android phones are sent through the reality of sulfur and this situation of the server administrator to remotely diagnose and treatment system and to development a viable technology is applied.

User Authentication Protocol through Distributed Process for Cloud Environment (클라우드 환경을 위한 분산 처리 사용자 인증 프로토콜)

  • Jeong, Yoon-Su;Lee, Sang-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.4
    • /
    • pp.841-849
    • /
    • 2012
  • Cloud computing that provides IT service and computer resource based on internet is now getting attention. However, the encrypted data can be exposed because it is saved in cloud server, even though it is saved as an encrypted data. In this paper, user certification protocol is proposed to prevent from illegally using of secret data by others while user who locates different physical position is providing secret data safely. The proposed protocol uses one way hash function and XOR calculation to get user's certification information which is in server when any user approaches to particular server remotely. Also it solves user security problem of cloud.

Efficient Server Virtualization using Grid Service Infrastructure

  • Baek, Sung-Jin;Park, Sun-Mi;Yang, Su-Hyun;Song, Eun-Ha;Jeong, Young-Sik
    • Journal of Information Processing Systems
    • /
    • v.6 no.4
    • /
    • pp.553-562
    • /
    • 2010
  • The core services in cloud computing environment are SaaS (Software as a Service), Paas (Platform as a Service) and IaaS (Infrastructure as a Service). Among these three core services server virtualization belongs to IaaS and is a service technology to reduce the server maintenance expenses. Normally, the primary purpose of sever virtualization is building and maintaining a new well functioning server rather than using several existing servers, and in improving the various system performances. Often times this presents an issue in that there might be a need to increase expenses in order to build a new server. This study intends to use grid service architecture for a form of server virtualization which utilizes the existing servers rather than introducing a new server. More specifically, the proposed system is to enhance system performance and to reduce the corresponding expenses, by adopting a scheduling algorithm among the distributed servers and the constituents for grid computing thereby supporting the server virtualization service. Furthermore, the proposed server virtualization system will minimize power management by adopting the sleep severs, the subsidized servers and the grid infrastructure. The power maintenance expenses for the sleep servers will be lowered by utilizing the ACPI (Advanced Configuration & Power Interface) standards with the purpose of overcoming the limits of server performance.

Client Technology on a Server for Mobile Cloud

  • Nguyen, Tien-Dung;Biao, Song;Wei, Tang;Lee, Jun-Hyung;Huh, Eui-Nam
    • Information and Communications Magazine
    • /
    • v.28 no.10
    • /
    • pp.3-10
    • /
    • 2011
  • The increasing ubiquity of wireless networks and decreasing cost of hardware is fueling a proliferation of mobile devices. These devices are enabling a new revolution in mobile technology, not only running locally on them, but running on cloud as a service as well. From web browsing, email, or video conferencing, presentations to movie and music entertainment or games, multimedia applications, mobile cloud enables providing such diverse applications. Many technologies have been designed to address the limited hardware and performance in thin client PC. However, with the assorted network and graphic condition, those proposed technologies is obligated to alter aim to adapt mobile cloud. In this paper, we provide a survey of client technology on a Server that can be sufficed the requirements of Mobile Cloud. We also analyze each technology and classify with its individual difficulties and challenges.