• 제목/요약/키워드: mobile storage

검색결과 475건 처리시간 0.026초

iATA 기반의 RAID5 분산 스토리지 서버의 설계 및 구현 (Design and Implementation of iATA-based RAID5 Distributed Storage Servers)

  • 왕숙미;임효택
    • 한국정보통신학회논문지
    • /
    • 제14권2호
    • /
    • pp.305-311
    • /
    • 2010
  • iATA는 TCP/IP 네트워크상에서 ATA 명령어를 전달하기 위해 개발된 블록-레벨 프로토콜로서, 모바일 기기의 스토리지 한계를 극복하기 위한 대안으로 활용 될 수 있다. 본 논문은 RAID5 분산 스토리지 서버 개념을 iATA에 적용하여 스토리지 서버의 신뢰성과 속도를 개선하고자 한다. 분산 스토리지 서버중 하나의 서버가 다운된 경우에 나머지 서버 데이터의 XOR 함수를 적용하여 데이터 회복이 가능하며 이를 통해 데이터의 신뢰성을 높일 수 있다. 벤치마킹 실험과 시험을 통해 제안된 iATA 프로토콜은 제한된 스토리지를 가지고 있는 모바일 기기상에서 효율적이 고도 신뢰성 있는 가상 스토리지 프로토콜로서 사용될 수 있음을 보여주고 있다.

Design and Implementation of Key Frame Sharing Application in Android Using Chord Protocol

  • Kim, Kang Wook
    • 한국멀티미디어학회논문지
    • /
    • 제17권4호
    • /
    • pp.405-412
    • /
    • 2014
  • Due to the popularity of mobile phones, Peer-to-Peer (P2P) content sharing in mobile phones is highly desirable, especially in a mobile data connection. In addition, there has been an increasing demand for content sharing applications for P2P communication in Android-based smartphones as ubiquitous mobile devices. However, due to wireless network limits, unstable characteristic and restricted storage space, mobile users confront challenges in establishing connections and sharing video frames with other users. To solve this issue, we propose an architectural design and implementation of key frame sharing application that uses Chord, a distributed lookup protocol to establish a content sharing platform for mobile devices, combined with the Chord SDK based on Android. Our proposed system enables users easily to share key information on video data in real-time over a wireless network without manual processing of devices which join or leave the group and cost associated with the 3G/4G network.

Combined Service Subscription and Delivery Energy-Efficient Scheduling in Mobile Cloud Computing

  • Liu, Xing;Yuan, Chaowei;Peng, Enda;Yang, Zhen
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제9권5호
    • /
    • pp.1587-1605
    • /
    • 2015
  • Mobile cloud computing (MCC) combines mobile Internet and cloud computing to improve the performance of applications. In MCC, the data processing and storage for mobile devices (MDs) is provided on the remote cloud. However, MCC faces the problem of energy efficiency caused by randomly varying channels. In this paper, by introducing the Lyapunov optimization method, we propose a combined service subscription and delivery (CSSD) algorithm that can guide the users to subscribe to services reasonably. This algorithm can also determine whether to deliver the data and to whom data is sent in the current time unit based on the queue backlog and the channel state. Numerical results validate the correctness and effectiveness of our proposed CSSD algorithm.

A data corruption detection scheme based on ciphertexts in cloud environment

  • Guo, Sixu;He, Shen;Su, Li;Zhang, Xinyue;Geng, Huizheng;Sun, Yang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제15권9호
    • /
    • pp.3384-3400
    • /
    • 2021
  • With the advent of the data era, people pay much more attention to data corruption. Aiming at the problem that the majority of existing schemes do not support corruption detection of ciphertext data stored in cloud environment, this paper proposes a data corruption detection scheme based on ciphertexts in cloud environment (DCDC). The scheme is based on the anomaly detection method of Gaussian model. Combined with related statistics knowledge and cryptography knowledge, the encrypted detection index for data corruption and corruption detection threshold for each type of data are constructed in the scheme according to the data labels; moreover, the detection token for data corruption is generated for the data to be detected according to the data labels, and the corruption detection of ciphertext data in cloud storage is realized through corresponding tokens. Security analysis shows that the algorithms in the scheme are semantically secure. Efficiency analysis and simulation results reveal that the scheme shows low computational cost and good application prospect.

Enhancing the Cybersecurity Checklist for Mobile Applications in DTx based on MITRE ATT&CK for Ensuring Privacy

  • 윤지희;김경진
    • 인터넷정보학회논문지
    • /
    • 제24권4호
    • /
    • pp.15-24
    • /
    • 2023
  • Digital therapeutics (DTx) are utilized to replace or supplement drug therapy to treat patients. DTx are developed as a mobile application for portability and convenience. The government requires security verification to be performed on digital medical devices that manage sensitive information during the transmission and storage of patient data. Although safety verification is included in the approval process for DTx, the cybersecurity checklist used as a reference does not reflect the characteristics of mobile applications. This poses the risk of potentially overlooking vulnerabilities during security verification. This study aims to address this issue by comparing and analyzing existing items based on the mobile tactics, techniques, and procedures of MITRE ATT&CK, which manages globally known and occurring vulnerabilities through regular updates. We identify 16 items that require improvement and expand the checklist to 29 items to propose improvement measures. The findings of this study may contribute to the safe development and advancement of DTx for managing sensitive patient information.

메시지다이제스트 테이블 기반의 모바일 XML 문서 동기화 기법 (A Synchronization Technique of Mobile XML Documents using the Message Digest Tables)

  • 박성진
    • 한국IT서비스학회지
    • /
    • 제8권2호
    • /
    • pp.157-171
    • /
    • 2009
  • In mobile XML environments, the efficient synchronization technique is required to maintain the consistency of replicated XML data because the same data can be replicated between so many different XML documents. In this paper, we propose a message digest based synchronization technique to maintain the consistency of replicated data between client XML documents and a server XML database in mobile XML environments. The proposed an XML data synchronization technique(XSA) has the advantage of model generality aspect and storage space aspect by using the tuple-based message digest table to detect the data conflicts. The proposed technique can be applicable to the application requiring the consistency of replicated XML data without any restrictions in the heterogeneous(between hierarchical XML documents and relational XML databases) mobile environments.

원전 이동감시 및 방사선 측정용 원격조종 로봇 개발 (Development of a remote controlled mobile robot system for monitoring nuclear power plant)

  • 구관모;이범희;우희곤
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 제어로봇시스템학회 1996년도 한국자동제어학술회의논문집(국내학술편); 포항공과대학교, 포항; 24-26 Oct. 1996
    • /
    • pp.511-515
    • /
    • 1996
  • A remote controlled mobile robot system has been developed and tested to monitor the radiation area in the nuclear power plant. The mobile robot system operates according to car-driving-like commands and is capable of radiation measurement and visual inspection in unmanned situations under radiation. The robot system is equipped with a radiation sensor and two cameras with appropriate illumination set-ups. The camera with auto-focus function and 8-times zoom lens is mounted on the pan/tilt rotational base and the other is mounted on the front panel of the robot system. All commands regarding the motion of the mobile robot and various sensors are given through the monitoring system which is designed to provide an integrated man-machine interface.

  • PDF

Cryptanalysis of an Authenticated Key Agreement Protocol for Wireless Mobile Communications

  • He, Debiao
    • ETRI Journal
    • /
    • 제34권3호
    • /
    • pp.482-484
    • /
    • 2012
  • With the rapid progress of wireless mobile communications, the authenticated key agreement (AKA) protocol has attracted an increasing amount of attention. However, due to the limitations of bandwidth and storage of the mobile devices, most of the existing AKA protocols are not suitable for wireless mobile communications. Recently, Lo and others presented an efficient AKA protocol based on elliptic curve cryptography and included their protocol in 3GPP2 specifications. However, in this letter, we point out that Lo and others' protocol is vulnerable to an offline password guessing attack. To resist the attack, we also propose an efficient countermeasure.

모바일 장치를 위한 iSCSI 프로토콜 기반의 가상 USB 드라이브 설계 및 구현 (Design and Implementation of iSCSI Protocol Based Virtual USB Drive for Mobile Devices)

  • 최재현;남영진;김종완
    • 대한임베디드공학회논문지
    • /
    • 제5권4호
    • /
    • pp.175-184
    • /
    • 2010
  • This paper designs a virtual USB drive for mobile devices which gives an illusion of a traditional USB flash memory drive and provides capacity-free storage space over IP network. The virtual USB drive operating with a S3C2410 hardware platform and embedded linux consists of USB device driver, an iSCSI-enabled network stack, and a seamless USB/iSCSI tunneling module. For performance enhancement, it additionally provides a kernel-level seamless USB/iSCSI tunneling module and data sharing with symbol references among kernel modules. Experiments reveal that the kernel-level implementation can improve the I/O performance up to 8 percentage, as compared with the user-level implementation.

전력전자상거래(VSEM)를 위한 웹기반 미터링/과금 시스템의 보안성 분석 및 평가에 관한 연구 (A study on the security analysis and evaluation of the web based metering/billing system for the value storage electricity meter)

  • 강환일;송영기;강환수;조진형;장우석
    • 전력전자학회:학술대회논문집
    • /
    • 전력전자학회 2006년도 전력전자학술대회 논문집
    • /
    • pp.462-464
    • /
    • 2006
  • 본 연구는 제4세대 미터링(Metering) 기술을 이용한 전력전자상거래 즉 VSEM(Value Storage Electricity Meter)을 위한 웹기반 미터링 시스템의 보안성 분석 및 평가에 관한 연구이다. 특히 수요자 측면에서 스마트카드(지불결제)를 이용한 본인 확인(SIM카드), 키 값 확인, VSEM서버에서의 각 수요자와 공급자 데이터 사이의 무결성 확인(Integrity)과 부인 방지(Non-repudiation)를 위한 기존 시스템의 보안 문제를 분석하고 이를 해결할 수 있는 보안 모델을 제안한다.

  • PDF