• Title/Summary/Keyword: permissions

Search Result 91, Processing Time 0.021 seconds

A Secure Subscription-Push Service Scheme Based on Blockchain and Edge Computing for IoT

  • Deng, Yinjuan;Wang, Shangping;Zhang, Qian;Zhang, Duo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.2
    • /
    • pp.445-466
    • /
    • 2022
  • As everything linking to the internet, people can subscribe to various services from a service provider to facilitate their lives through the Internet of Things (IoT). An obligatory thing for the service provider is that they should push the service data safely and timely to multiple IoT terminal devices regularly after the IoT devices accomplishing the service subscription. In order to control the service message received by the legal devices as while as keep the confidentiality of the data, the public key encryption algorithm is utilized. While the existing public encryption algorithms for push service are too complicated for IoT devices, and almost of the current subscription schemes based on push mode are relying on centralized organization which may suffer from centralized entity corruption or single point of failure. To address these issues, we design a secure subscription-push service scheme based on blockchain and edge computing in this article, which is decentralized with secure architecture for the subscription and push of service. Furthermore, inspired by broadcast encryption and multicast encryption, a new encryption algorithm is designed to manage the permissions of IoT devices together with smart contract, and to protect the confidentiality of push messages, which is suitable for IoT devices. The edge computing nodes, in the new system architecture, maintain the blockchain to ensure the impartiality and traceability of service subscriptions and push messages, meanwhile undertake some calculations for IoT devices with limited computing power. The legalities of subscription services are guaranteed by verifying subscription tags on the smart contract. Lastly, the analysis indicates that the scheme is reliable, and the proposed encryption algorithm is safe and efficient.

A Study on the Introduction of Zoning in Biosphere Reserves: Focusing on the Laws Related Protected Areas

  • Lee, Young-Jin
    • Journal of People, Plants, and Environment
    • /
    • v.24 no.1
    • /
    • pp.95-105
    • /
    • 2021
  • Background and objective: A biosphere reserve is a complex concept that combines the preservation of biodiversity and the sustainable development with the region, outstanding ecosystems with worth conserving in worldwide. The purpose of this study is to suggest the way of zoning that can perform the functions of conservation, development, and logistics support of biosphere reserves. Methods: To meet the purpose of this study, the designation criteria, restrictions, and permissions of the protected area specified in the law for domestic protected areas were reviewed to classify the functions of a biosphere reserve. Results: Through this classification, 10 domestic protected areas with high ecological protection value, such as the natural beauty of the ecosystem, biodiversity, and habitats for wild animals and plants were derived as the core areas of the biosphere reserves. Also, a total of 21 protected zones that can function as a buffer to protect the core of the natural ecosystem from indiscriminate development such as resource protection, recovery, pollution prevention, and improvement were derived as appropriate sites for a buffer. In the review process, issues such as different behavioral restrictions and ranges of permission due to the application of different laws were identified, if two or more protected areas exist within one of the protected areas, there is a protected area that does not meet the criteria for designating use zone, or where behavior restrictions do not meet the zoning criteria of biosphere reserve, under the laws of domestic protected areas. Conclusion: Although this study was not able to carefully review most of the laws on domestic protected areas that are linked to other laws, it was able to categorize appropriate domestic protected areas that can act as the core and buffer zones of biosphere reserves.

Research on the Zero Trust Trend Analysis and Enterprise Security Enhancement (제로트러스트 동향 분석 및 기업 보안 강화 연구)

  • Min Gyu Kim;Chanyoung Kang;Sokjoon Lee
    • Smart Media Journal
    • /
    • v.12 no.5
    • /
    • pp.46-57
    • /
    • 2023
  • As the COVID-19 pandemic and the development of IT technology have led to the gradual popularization of remote and telecommuting, cloud computing technology is advancing, and cyber attack techniques are becoming more sophisticated and advanced. In response to these trends, companies are increasingly moving away from traditional perimeter-based security and adopting Zero Trust to strengthen their security. Zero Trust, based on the core principle of doubting and not trusting everything, identifies all traffic and grants access permissions through a strict authentication process to enhance security. In this paper, we analyze the background of Zero Trust adoption and the adoption policies and trends of countries that are proactively promoting its implementation. Additionally, we propose necessary efforts from governments and organizations to strengthen corporate security and considerations for companies when applying Zero Trust.

Privacy-Preserving Cloud Data Security: Integrating the Novel Opacus Encryption and Blockchain Key Management

  • S. Poorani;R. Anitha
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.11
    • /
    • pp.3182-3203
    • /
    • 2023
  • With the growing adoption of cloud-based technologies, maintaining the privacy and security of cloud data has become a pressing issue. Privacy-preserving encryption schemes are a promising approach for achieving cloud data security, but they require careful design and implementation to be effective. The integrated approach to cloud data security that we suggest in this work uses CogniGate: the orchestrated permissions protocol, index trees, blockchain key management, and unique Opacus encryption. Opacus encryption is a novel homomorphic encryption scheme that enables computation on encrypted data, making it a powerful tool for cloud data security. CogniGate Protocol enables more flexibility and control over access to cloud data by allowing for fine-grained limitations on access depending on user parameters. Index trees provide an efficient data structure for storing and retrieving encrypted data, while blockchain key management ensures the secure and decentralized storage of encryption keys. Performance evaluation focuses on key aspects, including computation cost for the data owner, computation cost for data sharers, the average time cost of index construction, query consumption for data providers, and time cost in key generation. The results highlight that the integrated approach safeguards cloud data while preserving privacy, maintaining usability, and demonstrating high performance. In addition, we explore the role of differential privacy in our integrated approach, showing how it can be used to further enhance privacy protection without compromising performance. We also discuss the key management challenges associated with our approach and propose a novel blockchain-based key management system that leverages smart contracts and consensus mechanisms to ensure the secure and decentralized storage of encryption keys.

A Categorization Method based on RCBAC for Enhanced Contents and Social Networking Service for User (사용자를 위한 향상된 콘텐츠 및 소셜 네트워킹 서비스 제공을 위한 RCBAC 기반 분류 방법)

  • Cho, Eun-Ae;Moon, Chang-Joo;Park, Dae-Ha
    • Journal of Digital Contents Society
    • /
    • v.13 no.1
    • /
    • pp.101-110
    • /
    • 2012
  • Recently, social network sites are very popular with the enhancement of mobile device function and distribution. This gives rise to the registrations of the people on the social network sites and the usage of services on the social sites is also getting active. However, social network sites' venders do not provide services enough compared to the demand of users' to share contents from diverse roots by users effectively. In addition, the personal information can be revealed improperly in processes sharing policies and it is obvious that it raises a privacy invasion problem when users access the contents created from diverse devices according to the relationship by policies. However, the existing methods for the integration management of social network are weak to solve this problem. Thus, we propose a model to preserve user privacy, categorize contents efficiently, and give the access control permissions at the same time. In this paper, we encrypt policies and the trusted third party classifies the encrypted policies when the social network sites share the generated contents by users. In addition, the proposed model uses the RCBAC model to manage the contents generated by various devices and measures the similarity between relationships after encrypting when the user policies are shared. So, this paper can contribute to preserve user policies and contents from malicious attackers.

Design and Safety Analysis of a Role-Based Access Control Framework for Mobile Agents in Home Network Environments (홈 네트워크 환경에서 이동 에이전트의 역할에 기반한 접근제어 프레임워크 설계 및 안전성 평가)

  • Jung, Young-Woo;Ko, Kwang-Sun;Kim, Gu-Su;Eom, Young-Ik
    • The KIPS Transactions:PartC
    • /
    • v.14C no.6
    • /
    • pp.537-544
    • /
    • 2007
  • A home network is a residential local area network in which digital home appliances are connected with each other. Applying the mobile agent technology to the home network is expected to provide a new computing model. In particular, mobility and asynchronous ability of mobile agent can be used to reduce network traffic generated for managing home appliances. However, in order to apply the mobile agent concept to the home network, access control for mobile agents is necessary. In the existing home network system, there is one special server, sometimes called home server This server generally has mapping tables to be updated periodically, which describes access control lists between users' authorities and corresponding devices. In this paper, we propose a role-based access control framework with mobile agents in home networks. This framework, called Secure KAgent framework, is designed and implemented based on KAgent system. It has two main characteristics: to control access permissions based on Role-Based Access Control(RBAC) scheme and to safety assign roles to mobile agents by role tickets.

Knowledge and Perceptions of Cancer and Cancer Prevention among Malaysian Traditional Healers: a Qualitative Study

  • Al-Naggar, Redhwan A.;Bobryshev, Yuri V.;Abdulghani, Mahfoudh Al-Musali Mohammed;Rammohan, Subramanian;Al-Jashamy, Karim
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.13 no.8
    • /
    • pp.3841-3850
    • /
    • 2012
  • Objective: The objective of this study was to explore the knowledge and perceptions of Malaysian tradition healers towards cancer and cancer prevention. Methodology: A total of 25 participants agreed to participate in this qualitative study during the period from $20^{th}$ July 2011 until $24^{th}$ of September 2011. The proposal of this study was approved by the Ethics Committee of Management and Science University (MSU). Once the participant agreed to be interviewed, date, time and place of the interviews were determined. Consent form was obtained from participants before the interview began. Participants were briefed about the study and its purpose, and after asking their permissions, their replies were recorded. The data was organized into themes and analyzed manually. Results: Twenty-five Malaysian traditional healers participated in this qualitative study. The age of participants ranged between 26 to 78 years old. The majority were in the age group of 31-60 years old, male, Chinese, degree holders with a monthly income ranging from 1,000-5,000 Ringgit Malaysia (RM) and were married (56%, 80%, 48%, 52%, 68%, 84% respectively). The majority defined cancer as having high cholesterol or abscess accumulation. A few of them defined cancer as a type of cell growth. The majority mentioned that food and unhealthy lifestyles are the primary causes of cancer. Surprisingly some of them mentioned that cancer is caused by interference by ghosts. Regarding the diagnosis of cancer, the majority mentioned that they refer their patients to modern physicians' medical report when it comes to diagnosing or treating patients with cancer. The most common cancers that many patients came to seek treatment were breast cancers, followed by colon cancers, liver and lung cancers. Conclusions: Despite good knowledgeabout the causes of cancer among traditional healers, misconceptions still exist. Insufficient knowledge about the definition of cancer was noted among the traditional healers. This urges immediate action by the Ministry of Health of Malaysia to set up a strict regulation and regular monitoring of the traditional healers nationally. Traditional and Complementary Medicine may be integrated into the healthcare system and need to have sustained cooperation for the benefit of patients since about 80% of patients use traditional medicines.

Management Practices on Functional Meats and Meat Products in European Countries and the Oceania Area (유럽 및 오세아니아의 기능성 축산물과 식육제품에 대한 운영현황 및 관리방안)

  • Choi, Ji-Hun;Choi, Yun-Sang;Kim, Hack-Youn;Kim, Hyun-Wook;Kim, Jin-Man;Kim, Cheon-Jei
    • Food Science of Animal Resources
    • /
    • v.30 no.5
    • /
    • pp.703-716
    • /
    • 2010
  • It has recently been considered urgent to establish an accurate definition and scope of functional foods in the livestock industry in Korea. The tertiary function of food is gradually emphasized with various changes in conditions such as international competitive power enhancement of the whole world, including Korea. Therefore, the purpose of this study was carried out to gather basic information toward the establishment of standardization, management plans, and a system adapted to the Korean state through researching management systems of functional meat and meat products in the European Union (EU) and the Oceania Area (OA). A brief summary of this study is as follows. In the EU and OA, special management systems and laws about functional livestock and products were once nonexistent; only 'nutrition claims' and 'health claims' operated in the nutritional consolidation side of foods. Also, it was once thought that functional index materials and permissions established in the application of functional products sufficed, because management standards for enriched food were not established. Therefore, standardization of functional live stock products needs to be considered based on the case of developed countries in the EU and OA. It also seems that the above functional indicative substances can be applied, based on normal standards of indicative substances of functional products and the normal standards of indicators of functional substances added to livestock products presented in this study.

A Study on the Creation and Activation Program of Cultural Rural Village - Focused on the Case in Dae -San Village, Kimje-si, Chonbuk Province - (농촌문화마을 조성 및 활성화 방안연구(1) - 김제시 대산마을(현황분석 및 기본구상)을 중심으로 -)

  • Choi, Man-Bong
    • Journal of Korean Society of Rural Planning
    • /
    • v.6 no.1 s.11
    • /
    • pp.19-28
    • /
    • 2000
  • Now in order to overcome the weakest points of the rural areas of the city of Kimje and, transform them into rural cultural villages which have local governing systems suitable to new localization age and activate this plan, we selected Daesan Village as a model village which had shown a lot of potentials in the basic research and studied it dividing it into the former part and the latter part. We studied Daesan village in the former part focusing on state analysis and basic ideas and in the latter part focusing on master plan and detail planning. We can summarize the conclusion like the followings. 1. Daesan Village located 8 kilometer away from the downtown Kimje and the city of Iksan respectably has comparatively good environment of good sunny place as an open field whose surrounding configuration of the ground consists of farming lands and low hills in front and rear. It has 38 farming households in all. 2. Human environment(인문환경); the village road whose width is about 4 meters is forming a flow system forking off into three. There is a route bus which operates three times a day even into the inside of the village. The main sources of revenue are vegetables in facilities, fruits and floriculture. Their average revenue is about 10.5 million won. 3. Here in DaeSan Village a legend dealing with Teasan literally meaning a big mountain consist of th village's tradition and you can see the tombs of a very faithful son and Anwi an army general in the age of the Japanese Invasion of Korea of 1592 to 1598 inside the village. 4. 85 out of the eitire population 141 whose age are over 20 showed very positive attitudes in a questionnaire about, making the village a cultural one and its development. 5. The basic of planned ideas is to increase the revenue of the farming household by making the village a professional farming one which has a state-of the-art production facility and agricultural technique. It is to make the village the one where people can enjoy the sense of the rural life and the farmer can enjoy their lives through consumptive and consistant leisure and resting activities. 6. We are planning to make entrance space, life space, rest and sport space, and cultural space considering the characteristics of the village and the demand of the resident. We are also planning to make tile entire city of Kimje an information transmitting base in short and long term perspectives. 7. DaeSan Village was planned as a place where tradition and the future exist together. On the basis of this concept we planned future programs for Daesan Village and in the latter part of the study master plans and detail plans will be continued.the regional agricultural condition. The development permissions were only during the period of restricted to use ($1979.12{\sim}1993.11$). We propose that the authority of development permission should be given to the local autonomy government, because the local government has the knowledge of its individual agricultural conditions.

  • PDF

Collaborative Authoring System using 3D Spatio-Temporal Space (삼차원 시.공간을 이용하는 프레젠테이션 공동저작 시스템)

  • 이도형;성미영
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.9 no.6
    • /
    • pp.623-634
    • /
    • 2003
  • In this paper, we propose a collaborative multimedia authoring system. Our authoring system represents a multimedia presentation in a 3D coordinate system. One axis represents the traditional timeline information (T-zone), and the other two axes represent spatial coordinates (XY-zone). Our system represents a visual media objects as a 3D parallelepipeds and audio media objects as cylinders. This interface allows for simultaneous authoring and manipulation of both the temporal and the spatial aspects of a presentation. Using our system, users can design multimedia presentations collaboratively in the unified spatio-temporal space while freely traversing the spatial domain and the temporal domain without changing the context of authoring. In addition, we suggest an efficient mechanism of concurrency control for shared objects generated by our collaborative writing system. The mechanism is mainly based on the user awareness, the multiple versions, and the access permission of shared objects. Our concurrency control mechanism is designed to keep data consistency by minimizing the collision due to the delay or the failure of network communication and to allow maximum responsiveness for users using optimistic concurrency control. Also, the mechanism maximize the responsiveness by refining the locking granularity and applying different concurrency control mechanisms to each.