• Title/Summary/Keyword: information storage

Search Result 4,372, Processing Time 0.033 seconds

Secure and Efficient Storage of Video Data in a CCTV Environment

  • Kim, Won-Bin;Lee, Im-Yeong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.6
    • /
    • pp.3238-3257
    • /
    • 2019
  • Closed-circuit television (CCTV) technology continuously captures and stores video streams. Users are typically required by policy to store all the captured video for a certain period. Accordingly, increasing the number of CCTV operation cycles and photographing positions expands the amount of data to be stored. However, expanding the available storage space for video data incurs increased costs. In recent years, this problem has been addressed with cloud storage solutions, which enable multiple users and devices to access and store data simultaneously. However, because of the large amount of data to be stored, a vast storage space is required. Consequently, cloud storage administrators need a way to store data more efficiently. To save storage space, deduplication technology has been proposed to prevent duplicate storage of the same data. However, because cloud storage is hosted on remote servers, data encryption technology must be applied to address data exposure issues. Although deduplication techniques for encrypted data have been studied, there have been various security vulnerabilities. We attempted to solve this problem by addressing various issues such as poison attacks, property forgery, and ownership management while removing the redundant data and handling the data more securely.

Refractive media flatness measurement by phase shifting digital holography (위상천이 디지털 홀로그래피를 이용한 평판의 표면 평면도 측정)

  • Jeon, Sung-Bin;Kim, Do-Hyung;Cho, Jang-Hyun;Park, No-Cheol;Yang, Hyun-Seok;Park, Kyoung-Su;Park, Young-Pil
    • Transactions of the Society of Information Storage Systems
    • /
    • v.8 no.2
    • /
    • pp.44-49
    • /
    • 2012
  • We measured the surface flatness of both sides for refractive media using the transmitted digital holography method. To enhance the accuracy of the result, phase-shifting system was used. With two different phase modulation of reference beam, the phase profile of object can be easily obtained. Thus, we proposed the surface measurement method which can measure large area fast, compared with conventional methods. To guarantee the reliability of obtained result, we compared with Zygo measurement system. With the proposed method, the surface flatness of $3.45{\mu}m$ resolution could be obtained.

The Method for Data Acquisition on a Live NAS System (활성 상태의 NAS 시스템 상에서 내부 데이터 수집 기법 연구)

  • Seo, Hyeong-Min;Kim, Dohyun;Lee, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.3
    • /
    • pp.585-594
    • /
    • 2015
  • As the storage market has been expanded due to growing data size, the research on various kinds of storages such as cloud, USB, and external HDD(Hard Disk Drive) has been conducted in digital forensic aspects. NAS(Network-Attached Storage) can store the data over one TB(Tera Byte) and it is well used for private storage as well as for enterprise, but there is almost no research on NAS. This paper selects three NAS products that has the highest market share in domestic and foreign market, and suggests the process and method for data acquisition in live NAS System.

Archival Data Stability Evaluation and Aspect of BD-R TL Media (BD-R TL 매체의 장기 안정성 평가 및 보존 특성 향상에 관한 고찰)

  • Park, Sun-Joo;Kim, Do-Hyun;Lee, Kwan-Yong;Lee, Jae-Yong;Kim, Young Il;Bahng, Keuk-Young;Kim, Young-Joo
    • Transactions of the Society of Information Storage Systems
    • /
    • v.11 no.2
    • /
    • pp.31-35
    • /
    • 2015
  • The Blu-ray Disc Recordable-Triple Layer (BD-R TL) media is considered as one of strong candidates for archival application among optical media formats, due to its large capacity. However, the long-term stability and degradation aspect have not been fully understood yet for BD-R TL media. Thus, the BD-R TL media were recorded at full tracks and analyzed by the random-symbol error rate (R-SER) measurement at different recording layers and recording positions after the accelerated aging test to understand its long-term stability. Finally, the general degradation aspect of BD-R TL media was discussed to improve the long-term stability.

Performance and Stability Enhancement of Organic Solar Cells by Surface Treatment Processes of Transparent Electrodes (표면 전처리 공정에 따른 투명전극 계면 특성 변화와 유기 태양전지 성능 및 안정성 향상)

  • Lee, Kwan-Yong;Kim, Do-Hyun;Park, Sun-Joo;Kim, Young-Joo
    • Transactions of the Society of Information Storage Systems
    • /
    • v.9 no.2
    • /
    • pp.42-47
    • /
    • 2013
  • In this study, we have experimentally analyzed how the surface properties of transparent electrode layer influence the photovoltaic performance of bulk heterojunction organic solar cell by the contact angle measurement and X-ray photoelectron spectroscopy(XPS) observation. As a result, the power conversion efficiency of test devices improved from 0.64% to 1.83% and 2.15% by UV-ozone exposure and $O_2$ plasma treatment, respectively. Thus, we conclude that the surface activation process is very important for better performance and stability in addition to the cleaning process of carbonate residue on the surface.

A Study on Data Security of Web Local Storage (웹 로컬스토리지 데이터 보안을 위한 연구)

  • Kim, Ji-soo;Moon, Jong-sub
    • Journal of Internet Computing and Services
    • /
    • v.17 no.3
    • /
    • pp.55-66
    • /
    • 2016
  • A local storage of HTML5 is a Web Storage, which is stored permanently on a local computer in the form of files. The contents of the storage can be easily accessed and modified because it is stored as plaintext. Moreover, because the internet browser classifies the local storages of each domain using file names, the malicious attacker can abuse victim's local storage files by changing file names. In the paper, we propose a scheme to maintain the integrity and the confidentiality of the local storage's source domain and source device. The key idea is that the client encrypts the data stored in the local storage with cipher key, which is managed by the web server. On the step of requesting the cipher key, the web server authenticates whether the client is legal source of local storage or not. Finally, we showed that our method can detect an abnormal access to the local storage through experiments according to the proposed method.

A Research on Virtual Disk Reconstruction Method on Windows Storage Space (윈도우 저장소 공간 시스템 상의 가상 디스크 재구성 방법 연구)

  • Kim, Junho;Choi, Hoyong;Lee, Sangjin
    • Journal of Digital Forensics
    • /
    • v.12 no.3
    • /
    • pp.27-38
    • /
    • 2018
  • Recently, as the amount of digital data rapidly increases, a large storage space is required. RAID is a system that can manage large capacity storage space. Storage space provided by Windows is a type of software RAID. Storage space has been supported since Windows 8, Windows Server 2012, and no analysis has been done on the functionality. To analyze system using storage space, analysis of storage space function and reconstruction method of virtual disk should be studied. In this paper, we briefly describe the layout of existing RAID, explain the layout and metadata of storage space of software RAID, present reconstruction method of virtual disk by disk layout, and verify the result through experiments.

Light-weight Preservation of Access Pattern Privacy in Un-trusted Storage

  • Yang, Ka;Zhang, Jinsheng;Zhang, Wensheng;Qiao, Daji
    • IEIE Transactions on Smart Processing and Computing
    • /
    • v.2 no.5
    • /
    • pp.282-296
    • /
    • 2013
  • With the emergence of cloud computing, more and more sensitive user data are outsourced to remote storage servers. The privacy of users' access pattern to the data should be protected to prevent un-trusted storage servers from inferring users' private information or launching stealthy attacks. Meanwhile, the privacy protection schemes should be efficient as cloud users often use thin client devices to access the data. In this paper, we propose a lightweight scheme to protect the privacy of data access pattern. Comparing with existing state-of-the-art solutions, our scheme incurs less communication and computational overhead, requires significantly less storage space at the user side, while consuming similar storage space at the server. Rigorous proofs and extensive evaluations have been conducted to show that the proposed scheme can hide the data access pattern effectively in the long run after a reasonable number of accesses have been made.

  • PDF

Design and simulation of high performance computer architecture using holographic data storage system for database and multimedia workloads

  • Na, Jong-Whoa;Ryu, Dae-Hyun;Kim, Jung-Tae
    • Journal of information and communication convergence engineering
    • /
    • v.1 no.4
    • /
    • pp.169-173
    • /
    • 2003
  • The performance of modern mainframe computers keeps increasing due to the advances in the semiconductor technology. However, the quest for the faster computer has never been satisfied. To overcome the discrepancy in the supply and demand, we studied a high performance computer architecture utilizing a three-dimensional Holographic Data Storage Systems (HDSS) as a secondary storage system. The HDSS can achieve a high storage density by utilizing the third dimension. Furthermore, the HDSS can exploit the parallelism by processing the two-dimensional data in a single step. To compare the performance of the HDSS with the conventional hard disk based storage system, we modeled the HDSS using the DiskSim simulation engine and performed the simulation study. Results showed that the HDSS can improve the access time by 1.7 times.