• Title/Summary/Keyword: order preserving

Search Result 360, Processing Time 0.046 seconds

Update Semantic Preserving Object-Oriented View (갱신 의미 보존 객체-지향 뷰)

  • 나영국
    • The KIPS Transactions:PartD
    • /
    • v.8D no.1
    • /
    • pp.32-43
    • /
    • 2001
  • Due to the limitation of data modeling power and the view update ambiguity, relational view is limitedly used for engineering applications. On the contrary, object-oriented database view would playa vital role in defining custom interface for engineering applications because the above two limitations of the relational view are overcome by the object-oriented view. Above all, engineering application data interface should fully support updates. More specifically, updates against the data interface needs to be unambiguously defined and its semantic behavior should be equal to base schema updates'. For this purpose, we define the notion of update semantic preserving which means that view updates displays the same semantics as base schema. Besides, in order to show the feasibility of this characteristics, specific and concrete algorithms for update preserving updates are presented for a CAD specialized object-oriented database view - MultiView. This paper finds that in order that virtual classes coudld form a schema with 'isa' relationships rather than just a group of classes, the update semantics on the virtual classes should be defined such that the implied meaning of 'isa' relationships between classes are not to be violated. Besides, as its sufficiency conditions, we derived the update semantics and schema constituable conditions of the virtual classes that make view schemas look like base schemas. To my best knowledge, this is the first research that presents the sufficiency conditions by which we could defined object-oriented views as integrated schemas rather than as separate classes.

  • PDF

Traceable Dynamic Public Auditing with Identity Privacy Preserving for Cloud Storage

  • Zhang, Yinghui;Zhang, Tiantian;Guo, Rui;Xu, Shengmin;Zheng, Dong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.11
    • /
    • pp.5653-5672
    • /
    • 2019
  • In cloud computing era, an increasing number of resource-constrained users outsource their data to cloud servers. Due to the untrustworthiness of cloud servers, it is important to ensure the integrity of outsourced data. However, most of existing solutions still have challenging issues needing to be addressed, such as the identity privacy protection of users, the traceability of users, the supporting of dynamic user operations, and the publicity of auditing. In order to tackle these issues simultaneously, in this paper, we propose a traceable dynamic public auditing scheme with identity privacy preserving for cloud storage. In the proposed scheme, a single user, including a group manager, is unable to know the signer's identity. Furthermore, our scheme realizes traceability based on a secret sharing mechanism and supports dynamic user operations. Based on the security and efficiency analysis, it is shown that our scheme is secure and efficient.

Secure and Privacy Preserving Protocol for Traffic Violation Reporting in Vehicular Cloud Environment

  • Nkenyereye, Lewis;Rhee, Kyung-Hyune
    • Journal of Korea Multimedia Society
    • /
    • v.19 no.7
    • /
    • pp.1159-1165
    • /
    • 2016
  • Traffic violations such as moving while the traffic lights are red have come from a simple omission to a premeditated act. The traffic control center cannot timely monitor all the cameras installed on the roads to trace and pursue those traffic violators. Modern vehicles are equipped and controlled by several sensors in order to support monitoring and reporting those kind of behaviors which some time end up in severe causalities. However, such applications within the vehicle environment need to provide security guaranties. In this paper, we address the limitation of previous work and present a secure and privacy preserving protocol for traffic violation reporting system in vehicular cloud environment which enables the vehicles to report the traffic violators, thus the roadside clouds collect those information which can be used as evidence to pursue the traffic violators. Particularly, we provide the unlinkability security property within the proposed protocol which also offers lightweight computational overhead compared to previous protocol. We consider the concept of conditional privacy preserving authentication without pairing operations to provide security and privacy for the reporting vehicles.

An Analysis of Privacy and Accuracy for Privacy-Preserving Techniques by Matrix-based Randomization (행렬 기반 랜덤화를 적용한 프라이버시 보호 기술의 안전성 및 정확성 분석)

  • Kang, Ju-Sung;An, A-Ron;Hong, Do-Won
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.4
    • /
    • pp.53-68
    • /
    • 2008
  • We study on the practical privacy-preserving techniques by matrix-based randomization approach. We clearly examine the relationship between the two parameters associated with the measure of privacy breach and the condition number of matrix in order to achieve the optimal transition matrix. We propose a simple formula for efficiently calculating the inverse of transition matrix which are needed in the re-construction process of random substitution algorithm, and deduce some useful connections among standard error and another parameters by obtaining condition numbers according to norms of matrix and the expectation and variance of the transformed data. Moreover we give some experimental results about our theoretical expressions by implementing random substitution algorithm.

A Comparative Study on Sewabilities of Core-spun and the Other Spun Sewing Threads (봉제용 심방사와 일반 방적봉사와의 가봉성 비교연구)

  • Kim Jin Eui;Char Ok Sean
    • Journal of the Korean Society of Clothing and Textiles
    • /
    • v.9 no.2
    • /
    • pp.1-11
    • /
    • 1985
  • The purpose of this study was to research the effect of sewing threads on sewability. The materials used in this study were cotton threads, p/c spun thread, polyester spun thread and core-spun thread, which were the same in count, but different in fibers. In order to approach the purpose of this study, the change of sew-ability was measured according to the number of laundering. The results from this measure were as follows; 1. The order of seam strength according to the sewing threads was polyester spun threads, p/c spun thread, core-spun thread, and cotton thread in proportion to the loop strength of the sewing threads. The preserving rate of strength after laundering was the highest in core spun thread. 2. The order of seam elongation according to the sewing threads was polyester spun thread, p/c spun thread, core-spun thread and cotton thread in proportion to the elongation of the sewing threads. The preserving rate of elongation after laundering was the highest in core spun thread. 3. The order of seam puckering according to the sewing threads' was core-spun thread, p/c spun thread, polyester spun thread and cotton thread. The order of changing rate after laundering was the same as the former order. 4. The order of the needle temperature according to the sewing threads was polyester spun thread, core-spun thread, p/c spun thread and cotton thread.

  • PDF

A Lightweight and Privacy-Preserving Answer Collection Scheme for Mobile Crowdsourcing

  • Dai, Yingling;Weng, Jian;Yang, Anjia;Yu, Shui;Deng, Robert H.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.8
    • /
    • pp.2827-2848
    • /
    • 2021
  • Mobile Crowdsourcing (MCS) has become an emerging paradigm evolved from crowdsourcing by employing advanced features of mobile devices such as smartphones to perform more complicated, especially spatial tasks. One of the key procedures in MCS is to collect answers from mobile users (workers), which may face several security issues. First, authentication is required to ensure that answers are from authorized workers. In addition, MCS tasks are usually location-dependent, so the collected answers could disclose workers' location privacy, which may discourage workers to participate in the tasks. Finally, the overhead occurred by authentication and privacy protection should be minimized since mobile devices are resource-constrained. Considering all the above concerns, in this paper, we propose a lightweight and privacy-preserving answer collection scheme for MCS. In the proposed scheme, we achieve anonymous authentication based on traceable ring signature, which provides authentication, anonymity, as well as traceability by enabling malicious workers tracing. In order to balance user location privacy and data availability, we propose a new concept named current location privacy, which means the location of the worker cannot be disclosed to anyone until a specified time. Since the leakage of current location will seriously threaten workers' personal safety, causing such as absence or presence disclosure attacks, it is necessary to pay attention to the current location privacy of workers in MCS. We encrypt the collected answers based on timed-release encryption, ensuring the secure transmission and high availability of data, as well as preserving the current location privacy of workers. Finally, we analyze the security and performance of the proposed scheme. The experimental results show that the computation costs of a worker depend on the number of ring signature members, which indicates the flexibility for a worker to choose an appropriate size of the group under considerations of privacy and efficiency.

Effective Single Image Haze Removal using Edge-Preserving Transmission Estimation and Guided Image Filtering (에지 보존 전달량 추정 및 Guided Image Filtering을 이용한 효과적인 단일 영상 안개 제거)

  • Kim, Jong-Ho
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.16 no.6
    • /
    • pp.1303-1310
    • /
    • 2021
  • We propose an edge-preserving transmission estimation by comparing the patch-based dark channel and the pixel-based dark channel near the edge, in order to improve the quality of outdoor images deteriorated by conditions such as fog and smog. Moreover, we propose a refinement that applies the Guided Image Filtering (GIF), a kind of edge-preserving smoothing filtering methods, to edges using Laplacian operation for natural restoration of image objects and backgrounds, so that we can dehaze a single image and improve the visibility effectively. Experimental results carried out on various outdoor hazy images that show the proposed method has less computational complexity than the conventional methods, while reducing distortion such as halo effect, and showing excellent dehazing performance. In It can be confirmed that the proposed method can be applied to various fields including devices requiring real-time performance.

Ransomware Prevention and Steganography Security Enhancement Technology Using Format Preserving Encryption (형태보존암호화를 이용한 랜섬웨어 방지 및 스테가노그래피 보안강화기술)

  • Lim, Ji-hwan;Na, Gwan-Woo;Woo, Jae-Min;Seo, Hwa-joeng
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.5
    • /
    • pp.805-811
    • /
    • 2018
  • Recently, Format-Preserving-Encryption (FEA) was suggested by the National Security Research institute (NSR) as an encryption method while maintaining the format without a distortion to the intended information to be encrypted. In this paper, we propose a scheme to solve conventional cyber security problems by using FEA scheme. First, we present the method to encrypt signatures and extensions with FEA in order to effectively defend against Ransomeware attacks. This technique can mitigate the exposure to the Ransomeware by encrypting the minimum information. Second, in order to reduce the secret information for Steganography, we introduce a new way to minimize the secret information with FEA. Finally, we compare the operation speed by encryption with FEA and Lightweight Encryption Algorithm (LEA), furthermore when we optimize FEA we want to compare with the performance improvement accompanying with it.

ON THE HOLONOMIZATION OF SEMIHOLONOMIC JETS

  • MIKULSKI, WLODZIMIERZ M.
    • Bulletin of the Korean Mathematical Society
    • /
    • v.52 no.4
    • /
    • pp.1365-1373
    • /
    • 2015
  • We find all ${\mathcal{F}}{\mathcal{M}}_m$-natural operators A transforming torsion free classical linear connections ${\nabla}$ on m-manifolds M into base preserving fibred maps $A({\nabla}):{\bar{J}}^rY{\rightarrow}J^rY$ for ${\mathcal{F}}{\mathcal{M}}_m$-objects Y with bases M, where ${\bar{J}}^r$, $J^r$ are the semiholonomic and holonomic jet functors of order r on the category ${\mathcal{F}}{\mathcal{M}}_m$ of fibred manifolds with m-dimensional bases and their fibred maps with embeddings as base maps.