• Title/Summary/Keyword: outsourcing

Search Result 721, Processing Time 0.025 seconds

Data Block based User Authentication for Outsourced Data (아웃소싱 데이터 보호를 위한 데이터 블록 기반의 상호 인증 프로토콜)

  • Hahn, Changhee;Kown, Hyunsoo;Kim, Daeyeong;Hur, Junbeom
    • Journal of KIISE
    • /
    • v.42 no.9
    • /
    • pp.1175-1184
    • /
    • 2015
  • Recently, there has been an explosive increase in the volume of multimedia data that is available as a result of the development of multimedia technologies. More and more data is becoming available on a variety of web sites, and it has become increasingly cost prohibitive to have a single data server store and process multimedia files locally. Therefore, many service providers have been likely to outsource data to cloud storage to reduce costs. Such behavior raises one serious concern: how can data users be authenticated in a secure and efficient way? The most widely used password-based authentication methods suffer from numerous disadvantages in terms of security. Multi-factor authentication protocols based on a variety of communication channels, such as SMS, biometric, or hardware tokens, may improve security but inevitably reduce usability. To this end, we present a data block-based authentication scheme that is secure and guarantees usability in such a manner where users do nothing more than enter a password. In addition, the proposed scheme can be effectively used to revoke user rights. To the best of our knowledge, our scheme is the first data block-based authentication scheme for outsourced data that is proven to be secure without degradation in usability. An experiment was conducted using the Amazon EC2 cloud service, and the results show that the proposed scheme guarantees a nearly constant time for user authentication.

Employment Protection Legislation Concerning Service Provision Change in Great Britain (노무용역 공급업체의 변동에 관련된 영국의 고용보호 법제)

  • Cho, Kyung-Bae
    • Journal of Legislation Research
    • /
    • no.44
    • /
    • pp.655-688
    • /
    • 2013
  • Most of all the transfer of undertakings in such a service provision business as labour-intensive operation creates uncertainty of employment, aggravates terms of employment and breaks a trade union. However there are no regulations in Korea to protect employees from these undesirable situations. On the other hand Great Britain has introduced the concept of a transfer of undertakings by service provision change in 2006. It was intended to remove or at least alleviate the uncertainties and difficulties created by the need under TUPE 1981 and EU Directive to establish a transfer of a stable economic identity which retained its identity in the hands of the alleged transferee. In contrast to the words used to define transfer in the 1981 Regulations 'service provision change' is a wholly new statutory concept and distinguished from the economic entity. The new provisions seems to be straightforwards and the circumstances in which service provision change is established are clearly set out in Regulations. In this context there is no need for a judicially prescribed multi-factorial approach, as advanced by European Court of Justice like Spijkers test. The new concept of service provision change apply even though there are some minor difference or differences between the nature of the tasks carried on after service provision change as compared with before it. A commonsense and pragmatic approach is required and It is enough only to ask whether the activities carried on by the alleged transferee are fundamentally or essentially the same as those carried out by the alleged transfer. TUPE 2006 of Great Britain far exceeding the scope of the Acquired Rights Directive is full of suggestions as a model of legislation to secure a stable employment itself and favorable and fair conditions of employment. More active efforts are needed for lawmaking to prohibit a dismissal and vary conditions of employment for the reason of the transfer of undertakings itself.

Trends in the change of household labor in the middle-aged (중년세대의 가사노동 변화 트렌드)

  • Lee, Hyun Ah
    • Journal of Family Resource Management and Policy Review
    • /
    • v.25 no.1
    • /
    • pp.47-61
    • /
    • 2021
  • The purpose of this study is to analyze the trend of changes in household labor among middle-aged generations who are facing dynamic changes in the middle of their life cycle. The research method is a literature study that examines and analyzes related data. Specifically, it aims to analyze the basic characteristics of middle-aged generations and trends in household labor, which are revealed through Time Use Survey, market trend reports, newspaper articles, and books. From the perspective of family resource management, housework is an unpaid activity performed by and for family members, and is an activity that can be replaced by purchasing goods or services from the market. This study focuses on the rapid growth of the home appliance market that replaces housework with the development of technology after industrialization, and how the change of technology affected the efficiency of housework. In addition, the composition and characteristics of middle-aged generations greatly changed according to changes in family structure, form, and family value. Examining the current state of housework and changing trends of middle-aged generations, which have different characteristics from previous generations, is significant in that it can predict future market trends and suggest implications for family policies that support the improvement of the quality of life of middle-aged generations.

Privacy-Preserving Parallel Range Query Processing Algorithm Based on Data Filtering in Cloud Computing (클라우드 컴퓨팅에서 프라이버시 보호를 지원하는 데이터 필터링 기반 병렬 영역 질의 처리 알고리즘)

  • Kim, Hyeong Jin;Chang, Jae-Woo
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.10 no.9
    • /
    • pp.243-250
    • /
    • 2021
  • Recently, with the development of cloud computing, interest in database outsourcing is increasing. However, when the database is outsourced, there is a problem in that the information of the data owner is exposed to internal and external attackers. Therefore, in this paper, we propose a parallel range query processing algorithm that supports privacy protection. The proposed algorithm uses the Paillier encryption system to support data protection, query protection, and access pattern protection. To reduce the operation cost of a checking protocol (SRO) for overlapping regions in the existing algorithm, the efficiency of the SRO protocol is improved through a garbled circuit. The proposed parallel range query processing algorithm is largely composed of two steps. It consists of a parallel kd-tree search step that searches the kd-tree in parallel and safely extracts the data of the leaf node including the query, and a parallel data search step through multiple threads for retrieving the data included in the query area. On the other hand, the proposed algorithm provides high query processing performance through parallelization of secure protocols and index search. We show that the performance of the proposed parallel range query processing algorithm increases in proportion to the number of threads and the proposed algorithm shows performance improvement by about 5 times compared with the existing algorithm.

Why are Cleaning Workers Precarious? - Subcontracted Female Cleaning Labour and Fictional Korean Social Protection (청소노동자는 왜 불안정(precarious)한가? -하청 여성 청소노동과 한국 사회안전망의 허구성)

  • Lee, Sophia Seung-yoon;Seo, Hyojin;Park, Koeun
    • Korean Journal of Labor Studies
    • /
    • v.24 no.2
    • /
    • pp.247-291
    • /
    • 2018
  • This study investigates the employment structure and the social safety net experience of the subcontracting cleaning workers in Korea, who have been main targets of the labor outsourcing despite the necessity and permanence of their labour. This study specifically focuses on the fact that these subcontracting cleaning workers are mostly female and in their old age, and analyzes how the combination of their age, gender, and employment structure leads to the (mis)match with the Korean social security system. Case study with in-dept interview method has been conducted to the old-aged female subcontracting cleaning workers in Korea. The result of this study is as follows. It was the income insecurity that led them to (re)enter the labour market, and the cleaning work was the almost the only wage work they could do considering their age and gender. Cleaning workers are mostly employed in the subcontracting company, and thus their labour contracts depend on the business contract period between the original and subcontracting company. Consequently, their employment relationship is mostly insecure unless they are guaranteed employment succession through the collective agreement of trade union. Moreover, it has been discovered that the employment insecurity due to the indirect employment relationship led to the poor labour conditions, low wage, and the exclusion from the social safety net.

A Study on Role of Production Company Executive Producer as Drama Producer (드라마 생산자로서의 제작사 기획 프로듀서 연구)

  • Kim, Mi-Sook
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.10
    • /
    • pp.286-308
    • /
    • 2021
  • For a long time, dramas that everyone has enjoyed at home have become the most popular cultural contents due to the development of digital technology and the influence of Hallyu.(Korean Wave) This study was conducted in-depth interviews and participatory observations on the background, role, identity, and labor experience of TV planning producers who appeared in the drama production process with the implementation of outsourcing production policy in 1991. The number of dramas produced increased sharply in the mid-2000s due to the Korean Wave. Against this backdrop, the planning producer has expanded their scope in the drama production process and emerged as a new drama producer. The planning producer plays a role in creating an environment in which writers and directors can be selected with the identity of "not a creator but a producer of dramas" and lead drama planning. OTT and watching TV on the Internet have made it possible to watch dramas without TV. As this phenomenon accelerates and becomes commonplace, fewer consumers adhere to the traditional way of watching dramas using TV, and consumers' emotional tastes become more demanding. In this environment, TV planning producers are leading the production of dramas, exerting as much influence as writers and directors. They are also building new power relationships among drama producers by securing planning and financial power.

A Criticism of Path Dependence in the Broadcasting Programming Regulation : Focusing on Regulation of Programming Quotas (방송편성규제의 경로의존성 비판과 개선방향 : 편성비율규제를 중심으로)

  • Hong, Won-Sik
    • Journal of Korea Entertainment Industry Association
    • /
    • v.14 no.6
    • /
    • pp.1-11
    • /
    • 2020
  • With the activation of OTT and VOD services, the viewing behavior is rapidly changing, but the programming regulation has not escaped the ratio regulation in the same way as in the past. Therefore, this paper aims to examine the policy validity of the current organization ratio regulation and to suggest improvement directions based on this. To this end, the policy objectives and background at the time of the introduction of the domestic organization ratio regulation were considered and compared with the current status of the broadcasting market. As a result, this study found that it is difficult to apply the logical framework of asymmetric regulation at the time of the formation ratio regulation into the current status of broadcasting market, the existing framework was established and hold in the mutual relationship of various stake holders formed based on the asymmetric regulation. It was pointed out that the typical pattern of path dependency repeating only fine adjustment of ratio was shown. Based on this, this study suggests that it needs to be divided into the regulation by the public interest and the regulation by the industrial purpose according to the purpose of regulation, and it is necessary to be limited to the direct regulation corresponding to the public interest of the viewer. Also this study proposes that it is necessary to separate the regulation from promotion policies as well as to resolute asymmetric regulation in broadcasting policies.

Efficient Privacy-Preserving Duplicate Elimination in Edge Computing Environment Based on Trusted Execution Environment (신뢰실행환경기반 엣지컴퓨팅 환경에서의 암호문에 대한 효율적 프라이버시 보존 데이터 중복제거)

  • Koo, Dongyoung
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.11 no.9
    • /
    • pp.305-316
    • /
    • 2022
  • With the flood of digital data owing to the Internet of Things and big data, cloud service providers that process and store vast amount of data from multiple users can apply duplicate data elimination technique for efficient data management. The user experience can be improved as the notion of edge computing paradigm is introduced as an extension of the cloud computing to improve problems such as network congestion to a central cloud server and reduced computational efficiency. However, the addition of a new edge device that is not entirely reliable in the edge computing may cause increase in the computational complexity for additional cryptographic operations to preserve data privacy in duplicate identification and elimination process. In this paper, we propose an efficiency-improved duplicate data elimination protocol while preserving data privacy with an optimized user-edge-cloud communication framework by utilizing a trusted execution environment. Direct sharing of secret information between the user and the central cloud server can minimize the computational complexity in edge devices and enables the use of efficient encryption algorithms at the side of cloud service providers. Users also improve the user experience by offloading data to edge devices, enabling duplicate elimination and independent activity. Through experiments, efficiency of the proposed scheme has been analyzed such as up to 78x improvements in computation during data outsourcing process compared to the previous study which does not exploit trusted execution environment in edge computing architecture.

A Study on the Factors Influencing a Company's Selection of Machine Learning: From the Perspective of Expanded Algorithm Selection Problem (기업의 머신러닝 선정에 영향을 미치는 요인 연구: 확장된 알고리즘 선택 문제의 관점으로)

  • Yi, Youngsoo;Kwon, Min Soo;Kwon, Ohbyung
    • The Journal of Society for e-Business Studies
    • /
    • v.27 no.2
    • /
    • pp.37-64
    • /
    • 2022
  • As the social acceptance of artificial intelligence increases, the number of cases of applying machine learning methods to companies is also increasing. Technical factors such as accuracy and interpretability have been the main criteria for selecting machine learning methods. However, the success of implementing machine learning also affects management factors such as IT departments, operation departments, leadership, and organizational culture. Unfortunately, there are few integrated studies that understand the success factors of machine learning selection in which technical and management factors are considered together. Therefore, the purpose of this paper is to propose and empirically analyze a technology-management integrated model that combines task-tech fit, IS Success Model theory, and John Rice's algorithm selection process model to understand machine learning selection within the company. As a result of a survey of 240 companies that implemented machine learning, it was found that the higher the algorithm quality and data quality, the higher the algorithm-problem fit was perceived. It was also verified that algorithm-problem fit had a significant impact on the organization's innovation and productivity. In addition, it was confirmed that outsourcing and management support had a positive impact on the quality of the machine learning system and organizational cultural factors such as data-driven management and motivation. Data-driven management and motivation were highly perceived in companies' performance.

Categorization of UX method based on UX expert's competence model (UX 전문가의 역량 모델에 기반한 수행역량유사도에 따른 UX 방법론 분류에 대한 연구)

  • Lee, Ahreum;Kang, Hyo Jin;Kwon, Gyu Hyun
    • Design Convergence Study
    • /
    • v.16 no.4
    • /
    • pp.1-16
    • /
    • 2017
  • As the local manufacturing industry has entered a phase of stagnation, service and product design based on user experience has been highlighted as an alternative for the innovation. However, SMEs(Small and Medium-sized Enterprises) are still struggling to overcome the current crisis. One of the reasons is that SMEs do not have enough contact points with the validated UX firms and experts. Thus, SMEs has a high barrier to invest in new opportunity area, user experience. In this study, we aim to figure out UX experts' competence to perform the UX method to solve the UX problems based on the KSA framework(Knowledge, Skill, Attitude). Based on the literature review and expert workshop, we grouped the UX method according to the similarity of the competence required to conduct the method. With cluster analysis, 5 different groups of UX method were defined based on the competence, Panoramic Analysis, Meticulous Observation and Analysis, Intuitive Interpretation, Agile Visualization, and Logical Inspection. The results would be applied to compose a portfolio of UX experts and to implement a mechanism that could recommend the professional experts to the company.