• Title/Summary/Keyword: internet service provider

Search Result 361, Processing Time 0.026 seconds

A Blockchain-based User Authentication Model Using MetaMask (메타마스크와 연동한 블록체인 기반 사용자 인증모델)

  • Choi, Nakhoon;Kim, Heeyoul
    • Journal of Internet Computing and Services
    • /
    • v.20 no.6
    • /
    • pp.119-127
    • /
    • 2019
  • This paper proposes a new authentication model to solve the problem of personal information takeover and personal information theft by service providers using centralized servers for user authentication and management of personal information. The centralization issue is resolved by providing user authentication and information storage space through a decentralize platform, blockchain, and ensuring confidentiality of information through user-specific symmetric key encryption. The proposed model was implemented using the public-blockchain Ethereum and the web-based wallet extension MetaMask, and users access the Ethereum main network through the MetaMask on their browser and store their encrypted personal information in the Smart Contract. In the future, users will provide their personal information to the service provider through their Ethereum Account for the use of the new service, which will provide user authentication and personal information without subscription or a new authentication process. Service providers can reduce the costs of storing personal information and separate authentication methods, and prevent problems caused by personal information leakage.

Effectiveness of the Internet Real-Name Verification Law: Evidence from Self-censorship and Intention to Detour the Regulation (인터넷실명제와 우회로의 선택: 인터넷 공론장 참여자들의 자기검열과 우회로 선택의향을 중심으로)

  • Han, Hye-Kyung;Kim, Eu-Jong
    • Korean journal of communication and information
    • /
    • v.55
    • /
    • pp.50-73
    • /
    • 2011
  • This paper investigates the effectiveness of Real-Name System on Internet, which has been applied to some Internet service provider bulletin boards in Korea. The goal of the Real-Name system on the Internet is controlling expression of slanderous or abusive language. The effectiveness of the regulation is dependent on the people's perceptions and attitude toward to the legislation. This empirical study examines the antecedents that affect the perceptions and attitude toward the regulation. Further, we investigate the relationships among variables such as internet public sphere participation, attitude to the regulations, and intention to choose detours. Results of regression analysis show that the younger and the more progressive individuals are, the more they oppose the implementation of the law. Also, it was found that people who have more political interest and participate more actively in public sphere via internet, tend to oppose the law. Structural equation models reveal that participation in online public sphere drives negative attitudes about the regulation. In addition, people with negative perceptions about the law tend to choose the detours such as 'cyber asylum' and 'service asylum'.

  • PDF

Community Model for Smart TV over the Top Services

  • Pandey, Suman;Won, Young Joon;Choi, Mi-Jung;Gil, Joon-Min
    • Journal of Information Processing Systems
    • /
    • v.12 no.4
    • /
    • pp.577-590
    • /
    • 2016
  • We studied the current state-of-the-art of Smart TV, the challenges and the drawbacks. Mainly we discussed the lack of end-to-end solution. We then illustrated the differences between Smart TV and IPTV from network service provider point of view. Unlike IPTV, viewer of Smart TV's over-the-top (OTT) services could be global, such as foreign nationals in a country or viewers having special viewing preferences. Those viewers are sparsely distributed. The existing TV service deployment models over Internet are not suitable for such viewers as they are based on content popularity, hence we propose a community based service deployment methodology with proactive content caching on rendezvous points (RPs). In our proposal, RPs are intermediate nodes responsible for caching routing and decision making. The viewer's community formation is based on geographical locations and similarity of their interests. The idea of using context information to do proactive caching is itself not new, but we combined this with "in network caching" mechanism of content centric network (CCN) architecture. We gauge the performance improvement achieved by a community model. The result shows that when the total numbers of requests are same; our model can have significantly better performance, especially for sparsely distributed communities.

STB Virtualization based Enhanced IPTV User Authentication System (셋톱박스 가상화를 통한 향상된 IPTV 사용자 인증 시스템)

  • Go, Woong;Kwak, Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.4
    • /
    • pp.137-147
    • /
    • 2011
  • Because of the convergence between Internet and broadcast communication, users are able to use multimedia contents anytime. In addition, with the change of existing one-way service to two-way service, the provider can offer efficient and useful broadcast communication. However, As multimedia contents is provided by STB, it can validate only end-node STB. Thus, this method is limiting possibilities of individual service. Also, providers' STB are different, so problem of compatibility is emerging as an issue. Therefore, in this paper we proposed STB virtualization based enhanced IPTV user authentication system to improve individual authentication and compatibility of services.

A Model for Self-Authentication Based on Decentralized Identifier (탈중앙화 신원증명에 기반한 본인 인증 모델)

  • Kim, Ho-Yoon;Han, Kun-Hee;Shin, Seung-Soo
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.11
    • /
    • pp.66-74
    • /
    • 2021
  • With the development of the Internet, user authentication technology that proves me online is improving. Existing ID methods pose a threat of personal information leakage if the service provider manages personal information and security is weak, and the information subject is to the service provider. In this study, as online identification technology develops, we propose a DID-based self-authentication model to prevent the threat of leakage of personal information from a centralized format and strengthen sovereignty. The proposed model allows users to directly manage personal information and strengthen their sovereignty over information topics through VC issued by the issuing agency. As a research method, a self-authentication model that guarantees security and integrity is presented using a decentralized identifier method based on distributed ledger technology, and the security of the attack method is analyzed. Because it authenticates through DID Auth using public key encryption algorithms, it is safe from sniffing, man in the middle attack, and the proposed model can replace real identity card.

Efficient indoor positioning systems for indoor location-based service provider (실내 위치 기반 서비스 제공을 위한 효율적인 실내 위치 측위 시스템)

  • Yoon, Chang-Pyo;Hwang, Chi-Gon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.6
    • /
    • pp.1368-1373
    • /
    • 2015
  • Recently, There is increasing interest in the IoT(Internet of Thing) as intelligent information service that enables communication between people and things based on internet. In particular the demand for indoor location-based services with the development of smart devices is rapidly increasing. Using the RSSI signal that is provide to the BLE(Bluetooth Low Energy) for Indoor location information measurement calculates distance information between beacon and mobile terminal. However, simply using the RSSI signal to the distance measurement has a difficult to get the indoor location information due to the influence of the signal interference and the weather. In this paper, by performing an operation for obtaining a reliable distance information from the signal information of iBeacon we propose a system for providing reliable indoor location.

An Impact of Addressing Schemes on Routing Scalability

  • Ma, Huaiyuan;Helvik, Bjarne E.;Wittner, Otto J.
    • Journal of Communications and Networks
    • /
    • v.13 no.6
    • /
    • pp.602-611
    • /
    • 2011
  • The inter-domain routing scalability issue is a major challenge facing the Internet. Recent wide deployments of multihoming and traffic engineering urge for solutions to this issue. So far, tunnel-based proposals and compact routing schemes have been suggested. An implicit assumption in the routing community is that structured address labels are crucial for routing scalability. This paper first systematically examines the properties of identifiers and address labels and their functional differences. It develops a simple Internet routing model and shows that a binary relation T defined on the address label set A determines the cardinality of the compact label set L. Furthermore, it is shown that routing schemes based on flat address labels are not scalable. This implies that routing scalability and routing stability are inherently related and must be considered together when a routing scheme is evaluated. Furthermore, a metric is defined to measure the efficiency of the address label coding. Simulations show that given a 3000-autonomous system (AS) topology, the required length of address labels in compact routing schemes is only 9.12 bits while the required length is 10.64 bits for the Internet protocol (IP) upper bound case. Simulations also show that the ${\alpha}$ values of the compact routing and IP routing schemes are 0.80 and 0.95, respectively, for a 3000-AS topology. This indicates that a compact routing scheme with necessary routing stability is desirable. It is also seen that using provider allocated IP addresses in multihomed stub ASs does not significantly reduce the global routing size of an IP routing system.

A Study on Human Resource Scheduling Scheme for Multimedia Service Provisioning in Ubiquitous Environment (유비쿼터스 환경에서 멀티미디어 서비스 제공을 위한 인적 리소스 스케줄링 기법 연구)

  • Lee, Dong-Cheul;Hwang, Bok-Kyu;Park, Byung-Joo
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.9 no.3
    • /
    • pp.1-7
    • /
    • 2009
  • At a Internet service provider(ISP), field human resources visit many customers sites to provide multimedia services to customers in ubiquitous environment. Scheduling the resources is a hard problem because there are many tasks which have to be done by the resources and the number of the resources is not sufficient. To tackle this problem, ISPs had used team-based scheduling system. However, this aporoach was not sufficient to reduce the number of frequent changes of arrival time and could not increase operational efficiency. We also developed an optimal resource selection algorithm based on statistical information when an operator assigns a task to the resource. After we adopted this algorithm to the real world, the resources can do more tasks in a day.

  • PDF

A study on prospects of new digital contents service based on Web 2.0 (웹 2.0 환경의 새로운 디지털 콘텐츠 서비스 전망에 관한 연구)

  • Kim, Jae-Ha
    • Journal of Broadcast Engineering
    • /
    • v.12 no.5
    • /
    • pp.452-459
    • /
    • 2007
  • The Internet is encountering a new turning point owing to the raising Web 2.0. A user Just receives the information and service provided by a service provider in the existing web 2.0, but a user can create a new service for himself using an application program and data provided in web 2.0. The digital content market is producing a new service according to Web 2.0. The specific service among them is User Created Contents(UCC) and it is leading to the participation and interesting of user SecondLife also which is the type as Social Network Service(SNS) and VR, is placing as a new service type. This paper defines Web 2.0 environment and classifies as UCC, SNS and Virtual Reality(VR) and defines a variety services shown in new environment. It also analyzes shortcomings and then prospect a new type of service which will be shown in the future.

A Resource Reduction Scheme with Low Migration Frequency for Virtual Machines on a Cloud Cluster

  • Kim, Changhyeon;Lee, Wonjoo;Jeon, Changho
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.6
    • /
    • pp.1398-1417
    • /
    • 2013
  • A method is proposed to reduce excess resources from a virtual machine(VM) while avoiding subsequent migrations for a computer cluster that provides cloud service. The proposed scheme cuts down on the resources of a VM based on the probability that migration may occur after a reduction. First, it finds a VM that can be scaled down by analyzing the history of the resource usage. Then, the migration probability is calculated as a function of the VM resource usage trend and the trend error. Finally, the amount of resources needed to eliminate from an underutilized VM is determined such that the migration probability after the resource reduction is less than or equal to an acceptable migration probability. The acceptable migration probability, to be set by the cloud service provider, is a criterion to assign a weight to the resource reduction either to prevent VM migrations or to enhance VM utilization. The results of simulation show that the proposed scheme lowers migration frequency by 31.6~60.8% depending on the consistency of resource demand while losing VM utilization by 9.1~21.5% compared to other known approaches, such as the static and the prediction-based methods. It is also verified that the proposed scheme extends the elapsed time before the first occurrence of migration after resource reduction 1.1~2.3-fold. In addition, changes in migration frequency and VM utilization are analyzed with varying acceptable migration probabilities and the consistency of resource demand patterns. It is expected that the analysis results can help service providers choose a right value of the acceptable migration probability under various environments having different migration costs and operational costs.