• Title/Summary/Keyword: cloud-storage

Search Result 434, Processing Time 0.059 seconds

Malware Behavior Analysis based on Mobile Virtualization (모바일 가상화기반의 악성코드 행위분석)

  • Kim, Jang-Il;Lee, Hee-Seok;Jung, Yong-Gyu
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.2
    • /
    • pp.1-7
    • /
    • 2015
  • As recent smartphone is used around the world, all of the subscribers of the mobile communication is up to 47.7% about 24 million people. Smartphone has a vulnerability to security, and security-related incidents are increased in damage with the smartphone. However, precautions have been made, rather than analysis of the infection of most of the damage occurs after the damaged except for the case of the expert by way of conventional post-countermeasure. In this paper, we implement a mobile-based malware analysis systems apply a virtualization technology. It is designed to analyze the behavior through it. Virtualization is a technique that provides a logical resources to the guest by abstracting the physical characteristics of computing resources. The virtualization technology can improve the efficiency of resources by integrating with cloud computing services to servers, networks, storage, and computing resources to provide a flexible. In addition, we propose a system that can be prepared in advance to buy a security from a user perspective.

The Big Data Analysis and Medical Quality Management for Wellness (웰니스를 위한 빅데이터 분석과 의료 질 관리)

  • Cho, Young-Bok;Woo, Sung-Hee;Lee, Sang-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.19 no.12
    • /
    • pp.101-109
    • /
    • 2014
  • Medical technology development and increase the income level of a "Long and healthy Life=Wellness," with the growing interest in actively promoting and maintaining health and wellness has become enlarged. In addition, the demand for personalized health care services is growing and extensive medical moves of big data, disease prevention, too. In this paper, the main interest in the market, highlighting wellness in order to support big data-driven healthcare quality through patient-centered medical services purposes. Patients with drug dependence treatment is not to diet but to improve disease prevention and treatment based on analysis of big data. Analysing your Tweets-daily information and wellness disease prevention and treatment, based on the purpose of the dictionary. Efficient big data analysis for node while increasing processing time experiment. Test result case of total access time efficient 26% of one node to three nodes and case of data storage is 63%, case of data aggregate is 18% efficient of one node to three nodes.

Performance Optimization in GlusterFS on SSDs (SSD 환경 아래에서 GlusterFS 성능 최적화)

  • Kim, Deoksang;Eom, Hyeonsang;Yeom, Heonyoung
    • KIISE Transactions on Computing Practices
    • /
    • v.22 no.2
    • /
    • pp.95-100
    • /
    • 2016
  • In the current era of big data and cloud computing, the amount of data utilized is increasing, and various systems to process this big data rapidly are being developed. A distributed file system is often used to store the data, and glusterFS is one of popular distributed file systems. As computer technology has advanced, NAND flash SSDs (Solid State Drives), which are high performance storage devices, have become cheaper. For this reason, datacenter operators attempt to use SSDs in their systems. They also try to install glusterFS on SSDs. However, since the glusterFS is designed to use HDDs (Hard Disk Drives), when SSDs are used instead of HDDs, the performance is degraded due to structural problems. The problems include the use of I/O-cache, Read-ahead, and Write-behind Translators. By removing these features that do not fit SSDs which are advantageous for random I/O, we have achieved performance improvements, by up to 255% in the case of 4KB random reads, and by up to 50% in the case of 64KB random reads.

Economic Evaluation Analysis of Effect of Train Freight Car Safety Transport Integrated Quality Management System Based on Internet of Things(IoT) (IoT기반 철도 화차 안전운송 통합 품질관리시스템에 관한 경제성 평가지표 분석)

  • Won, Jong-Un;Yoon, Chiho;Park, Sang-Chan
    • Journal of Korean Society for Quality Management
    • /
    • v.44 no.4
    • /
    • pp.869-881
    • /
    • 2016
  • Purpose: The objective of this study is to verify the economic validation of quality management integrated train freight car by analyzing economic evaluation indicators such as benefit and cost, net present value, and inter rate of return. Methods: First, we itemize benefit and cost field by reviewing literatures; Benefit consists of 1)Safety, 2)Operation, and 3)Maintenance; Cost consists of 1)Set-up fee, 2)Wireless internet fee, and 3)Cloud storage using fee. Second, based on these estimated values, we conduct an economic evaluation analysis. Among them, benefit and cost, net present value, and internal rate of return are selected. Results: As a result, all estimated values are highly over criterion of economic validity($$B/C{\geq}_-1$$, $$NPV{\geq}_-0$$, $$IRR{\geq}_-R$$); 1)benefit over cost ratio is 28.22, 2)Net present value is 8,121.66million KRW, and 3)Internal rate of return value is 2272%. Conclusion: The findings of this study will help making a decision when train industry adopts IoT technology for improving the effectiveness.

Next-generation Sequencing for Environmental Biology - Full-fledged Environmental Genomics around the Corner (차세대 유전체 기술과 환경생물학 - 환경유전체학 시대를 맞이하여)

  • Song, Ju Yeon;Kim, Byung Kwon;Kwon, Soon-Kyeong;Kwak, Min-Jung;Kim, Jihyun F.
    • Korean Journal of Environmental Biology
    • /
    • v.30 no.2
    • /
    • pp.77-89
    • /
    • 2012
  • With the advent of the genomics era powered by DNA sequencing technologies, life science is being transformed significantly and biological research and development have been accelerated. Environmental biology concerns the relationships among living organisms and their natural environment, which constitute the global biogeochemical cycle. As sustainability of the ecosystems depends on biodiversity, examining the structure and dynamics of the biotic constituents and fully grasping their genetic and metabolic capabilities are pivotal. The high-speed high-throughput next-generation sequencing can be applied to barcoding organisms either thriving or endangered and to decoding the whole genome information. Furthermore, diversity and the full gene complement of a microbial community can be elucidated and monitored through metagenomic approaches. With regard to human welfare, microbiomes of various human habitats such as gut, skin, mouth, stomach, and vagina, have been and are being scrutinized. To keep pace with the rapid increase of the sequencing capacity, various bioinformatic algorithms and software tools that even utilize supercomputers and cloud computing are being developed for processing and storage of massive data sets. Environmental genomics will be the major force in understanding the structure and function of ecosystems in nature as well as preserving, remediating, and bioprospecting them.

A K-Nearest Neighbour Query Processing Algorithm for Encrypted Spatial Data in Road Network (도로 네트워크 환경에서 암호화된 공간데이터를 위한 K-최근접점 질의 처리 알고리즘)

  • Jang, Mi-Young;Chang, Jae-Woo
    • Spatial Information Research
    • /
    • v.20 no.3
    • /
    • pp.67-81
    • /
    • 2012
  • Due to the recent advancement of cloud computing, the research on database outsourcing has been actively done. Moreover, the number of users who utilize Location-based Services(LBS) has been increasing with the development in w ireless communication technology and mobile devices. Therefore, LBS providers attempt to outsource their spatial database to service provider, in order to reduce costs for data storage and management. However, because unauthorized access to sensitive data is possible in spatial database outsourcing, it is necessary to study on the preservation of a user's privacy. Thus, we, in this paper, propose a spatial data encryption scheme to produce outsourced database from an original database. We also propose a k-Nearest Neighbor(k-NN) query processing algorithm that efficiently performs k-NN by using the outsourced database. Finally, we show from performance analysis that our algorithm outperforms the existing one.

Efficient Security Method Using Mobile Virtualization Technology And Trustzone of ARM (모바일 가상화 기술과 ARM의 Trustzone을 사용한 효율적인 보안 방법)

  • Choi, Hwi-Min;Jang, Chang-Bok;Kim, Joo-Man
    • Journal of Digital Convergence
    • /
    • v.12 no.10
    • /
    • pp.299-308
    • /
    • 2014
  • Today, a number of users using smartphone is very rapidly increasing by development of smartphone performance and providing various services. Also, they are using it for enjoying various services(cloud service, game, banking service, mobile office, etc.). today's mobile security solution is simply to detect malicious code or stay on the level of mobile device management. In particular, the services which use sensitive information, such as certificate, corporation document, personal credit card number, need the technology which are prevented from hacking and leaking it. Recently, interest of these mobile security problems are increasing, as the damage cases been occurred. To solve the problem, there is various security research such as mobile virtualization, ARM trustzone, GlobalPlatform for mobile device. Therefore, in this paper, I suggested efficient method that uses the mobile virtualization techniques of certification, security policy and access control, password/key management, safe storage, etc. and Trustzone of ARM for preventing information leakage and hacking.

A System of Authentication and Security threat solution for N-screen services (N-스크린을 위한 인증 및 보안 위협 해결 시스템)

  • Hwang, Deuk-Young;Moon, Jeong-Kyung;Kim, Jin-Mook
    • Journal of Digital Convergence
    • /
    • v.11 no.11
    • /
    • pp.775-781
    • /
    • 2013
  • N-screen is a Service that can be provide for One Service Multi Device. If the network is changed or if the device is changed after authentication the device fits seamlessly send footage. Security threats that occur here have a problem with user authentication. In this paper proposes available in a multi-device the authentication system. Homomorphic Encryption Algorithm of authentication scheme used. Among the authentication mechanism that already exists is a simple and lightweight authentication mechanism. In addition, N-screen service that uses multiple devices is simple authentication process of the device. Review the results of proposed authentication protocol, encryption algorithm to process a small storage capacity and is easy to work in low processor. And was suitable for use with multiple devices.

A Study on Update of Road Network Using Graph Data Structure (그래프 구조를 이용한 도로 네트워크 갱신 방안)

  • Kang, Woo-bin;Park, Soo-hong;Lee, Won-gi
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.20 no.1
    • /
    • pp.193-202
    • /
    • 2021
  • The update of a high-precision map was carried out by modifying the geometric information using ortho-images or point-cloud data as the source data and then reconstructing the relationship between the spatial objects. These series of processes take considerable time to process the geometric information, making it difficult to apply real-time route planning to a vehicle quickly. Therefore, this study proposed a method to update the road network for route planning using a graph data structure and storage type of graph data structure considering the characteristics of the road network. The proposed method was also reviewed to assess the feasibility of real-time route information transmission by applying it to actual road data.

Development of Smart driving monitoring device for Personal Mobility through Confusion Matrix verification

  • Han, Ju-Wan;Park, Seong-Hyun;Sim, Chae-Hyeon;Whang, Ju-Won
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.2
    • /
    • pp.61-69
    • /
    • 2022
  • As the delivery industry grew around the restaurant industry along with the COVID-19 situation, the number of delivery workers increased significantly. Along with that, new forms of delivery using personal mobility (PM) also emerged and two-wheeled or PM-related accidents are steadily increasing. This study manufactures a PM's driving analysis device to establish a safe delivery monitoring environment. This system was constructed to process data collected from the driving analysis device and through a cloud server, which would recognize and record special situations (acceleration/deceleration, speed bump) that could occur during the PM's driving situation. As a result, the angular speed, acceleration, and geomagnetic values collected from the IMU in the device were able to determine whether to drive, drive on the sidewalk, and drive on the speed bump. This technology was able to achieve approximately 1600 times more driving information storage efficiency than conventional image-based recording devices.