• Title/Summary/Keyword: data access

Search Result 5,354, Processing Time 0.036 seconds

Fuzzy Keyword Search Method over Ciphertexts supporting Access Control

  • Mei, Zhuolin;Wu, Bin;Tian, Shengli;Ruan, Yonghui;Cui, Zongmin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.11
    • /
    • pp.5671-5693
    • /
    • 2017
  • With the rapid development of cloud computing, more and more data owners are motivated to outsource their data to cloud for various benefits. Due to serious privacy concerns, sensitive data should be encrypted before being outsourced to the cloud. However, this results that effective data utilization becomes a very challenging task, such as keyword search over ciphertexts. Although many searchable encryption methods have been proposed, they only support exact keyword search. Thus, misspelled keywords in the query will result in wrong or no matching. Very recently, a few methods extends the search capability to fuzzy keyword search. Some of them may result in inaccurate search results. The other methods need very large indexes which inevitably lead to low search efficiency. Additionally, the above fuzzy keyword search methods do not support access control. In our paper, we propose a searchable encryption method which achieves fuzzy search and access control through algorithm design and Ciphertext-Policy Attribute-based Encryption (CP-ABE). In our method, the index is small and the search results are accurate. We present word pattern which can be used to balance the search efficiency and privacy. Finally, we conduct extensive experiments and analyze the security of the proposed method.

Performance Assessment of an Access Point for Human Data and Machine Data

  • Lee, Hoon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.6
    • /
    • pp.1081-1090
    • /
    • 2015
  • This work proposes a theoretic framework for the performance assessment of an access point in the IP network that accommodates MD (Machine Data) and HD (Human Data). First, we investigate typical resource allocation methods in LTE for MD and HD. After that we carry out a Max-Min analysis about the surplus and deficiency of network resource seen from MD and HD. Finally, we evaluate the performance via numerical experiment.

Object-Based Operating System (OBJECT에 의한 운영체제의 구성에 대한 연구)

  • 이창수
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.8 no.1
    • /
    • pp.23-29
    • /
    • 1983
  • This paper describes object-based operating system to suppeor relability and abstract data type. For reliability, all objects should be accessed through access rights in capability, and the protection domain is provided for all program modules such that efficient domain switching can be achieved. For abstract data type, type manager is provided.

  • PDF

A Study on Data Hub for enhancing data access efficiency (Data Access 효율 증대를 위한 Data Hub 에 관한 연구)

  • Park, Eun-Young;Kim, Ung-Mo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2007.11a
    • /
    • pp.274-277
    • /
    • 2007
  • 기업의 원활한 활동에 필수적인 요소는 살아 있는 정보의 공급이며, 기업 데이터 베이스는 데이터의 보관/흐름/활용 입장에서의 정보 인프라를 기반으로 하고 있다. 최근 기업 Knowledge Base 구축은 정보의 품질이 좌우하나 기업 정보의 양은 비대해져 데이터의 일관성이 결여되고 DB 의 성능은 점점 저하되고 있다. 본 고에서는 데이터 Hub 의 적용을 통해 얻을 수 있는 DB 성능 향상에 대해 정성적/정량적 관점으로 논의한다.

A Study of Efficient Access Method based upon the Spatial Locality of Multi-Dimensional Data

  • Yoon, Seong-young;Joo, In-hak;Choy, Yoon-chul
    • Proceedings of the Korea Database Society Conference
    • /
    • 1997.10a
    • /
    • pp.472-482
    • /
    • 1997
  • Multi-dimensional data play a crucial role in various fields, as like computer graphics, geographical information system, and multimedia applications. Indexing method fur multi-dimensional data Is a very Important factor in overall system performance. What is proposed in this paper is a new dynamic access method for spatial objects called HL-CIF(Hierarchically Layered Caltech Intermediate Form) tree which requires small amount of storage space and facilitates efficient query processing. HL-CIF tree is a combination of hierarchical management of spatial objects and CIF tree in which spatial objects and sub-regions are associated with representative points. HL-CIF tree adopts "centroid" of spatial objects as the representative point. By reflecting objects′sizes and positions in its structure, HL-CIF tree guarantees the high spatial locality of objects grouped in a sub-region rendering query processing more efficient.

  • PDF

Technology of MRAM (Magneto-resistive Random Access Memory) Using MTJ(Magnetic Tunnel Junction) Cell

  • Park, Wanjun;Song, I-Hun;Park, Sangjin;Kim, Teawan
    • JSTS:Journal of Semiconductor Technology and Science
    • /
    • v.2 no.3
    • /
    • pp.197-204
    • /
    • 2002
  • DRAM, SRAM, and FLASH memory are three major memory devices currently used in most electronic applications. But, they have very distinct attributes, therefore, each memory could be used only for limited applications. MRAM (Magneto-resistive Random Access Memory) is a promising candidate for a universal memory that meets all application needs with non-volatile, fast operational speed, and low power consumption. The simplest architecture of MRAM cell is a series of MTJ (Magnetic Tunnel Junction) as a data storage part and MOS transistor as a data selection part. To be a commercially competitive memory device, scalability is an important factor as well. This paper is testing the actual electrical parameters and the scaling factors to limit MRAM technology in the semiconductor based memory device by an actual integration of MRAM core cell. Electrical tuning of MOS/MTJ, and control of resistance are important factors for data sensing, and control of magnetic switching for data writing.

Design and Implemetation of an Object-Relational Geographic Information System based on a commercial ORDB (상용 ORDB를 하부구조로 갖는 객체관계형 지리정보 시스템의 설계 및 구현)

  • 윤지희
    • Spatial Information Research
    • /
    • v.5 no.1
    • /
    • pp.77-88
    • /
    • 1997
  • This paper presents the design and implementaion of an object-relational geographic information system. This system has been developed on top of a commercial object-relational database management system. It provides flexible spatial data model, spatial query language, visual user interface, and efficient spatial access methods(D0T) in which traditional primary-key access methods can be applied. We report on our design choices and describe the current status of Implementation. The conceptual model of the system is based on SDTS, and is mapped to the intemal obiect-oriented data model. Kevwords : object-oriented data model, GIS, spatial data model, spatial access method.

  • PDF

Efficient Utilization of Burst Data Transfers of DMA (직접 메모리 접근 장치에서 버스트 데이터 전송 기능의 효과적인 활용)

  • Lee, Jongwon;Cho, Doosan;Paek, Yunheung
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.8 no.5
    • /
    • pp.255-264
    • /
    • 2013
  • Resolving of memory access latency is one of the most important problems in modern embedded system design. Recently, tons of studies are presented to reduce and hide the access latency. Burst/page data transfer modes are representative hardware techniques for achieving such purpose. The burst data transfer capability offers an average access time reduction of more than 65 percent for an eight-word sequential transfer. However, solution of utilizing such burst data transfer to improve memory performance has not been accomplished at commercial level. Therefore, this paper presents a new technique that provides the maximum utilization of burst transfer for memory accesses with local variables in code by reorganizing variables placement.

Distributed Data Platform Collaboration Agent Design Using EMRA

  • Park, Ho-Kyun;Moon, Seok-Jae
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.14 no.2
    • /
    • pp.40-46
    • /
    • 2022
  • Recently, as the need for data access by integrating information in a distributed cloud environment increases in enterprise-wide enterprises, interoperability for collaboration between existing legacy systems is emphasized. In order to interconnect independent legacy systems, it is necessary to overcome platform heterogeneity and semantic heterogeneity. To solve this problem, middleware was built using EMRA (Extended MetaData Registry Access) based on ISO/IEC 11179. However, the designed middleware cannot guarantee the efficiency of information utilization because it does not have an adjustment function for each node's resource status and work status. Therefore, it is necessary to manage and adjust the legacy system. In this paper, we coordinate the correct data access between the information requesting agent and the information providing agent, and integrate it by designing a cooperative agent responsible for information monitoring and task distribution of each legacy system and resource management of local nodes. to make efficient use of the available information.

A Study on Creation of Secure Storage Area and Access Control to Protect Data from Unspecified Threats (불특정 위협으로부터 데이터를 보호하기 위한 보안 저장 영역의 생성 및 접근 제어에 관한 연구)

  • Kim, Seungyong;Hwang, Incheol;Kim, Dongsik
    • Journal of the Society of Disaster Information
    • /
    • v.17 no.4
    • /
    • pp.897-903
    • /
    • 2021
  • Purpose: Recently, ransomware damage that encrypts victim's data through hacking and demands money in exchange for releasing it is increasing domestically and internationally. Accordingly, research and development on various response technologies and solutions are in progress. Method: A secure storage area and a general storage area were created in the same virtual environment, and the sample data was saved by registering the access process. In order to check whether the stored sample data is infringed, the ransomware sample was executed and the hash function of the sample data was checked to see if it was infringed. The access control performance checked whether the sample data was accessed through the same name and storage location as the registered access process. Result: As a result of the experiment, the sample data in the secure storage area maintained data integrity from ransomware and unauthorized processes. Conclusion: Through this study, the creation of a secure storage area and the whitelist-based access control method are evaluated as suitable as a method to protect important data, and it is possible to provide a more secure computing environment through future technology scalability and convergence with existing solutions.