• Title/Summary/Keyword: security architecture

Search Result 1,075, Processing Time 0.026 seconds

Real-Time Change Detection Architecture Based on SOM for Video Surveillance Systems (영상 감시시스템을 위한 SOM 기반 실시간 변화 감지 기법)

  • Kim, Jongwon;Cho, Jeongho
    • The Journal of Korean Institute of Information Technology
    • /
    • v.17 no.4
    • /
    • pp.109-117
    • /
    • 2019
  • In modern society, due to various accidents and crime threats committed to an unspecified number of people, individual security awareness is increasing throughout society and various surveillance techniques are being actively studied. Still, there is a decline in robustness due to many problems, requiring higher reliability monitoring techniques. Thus, this paper suggests a real-time change detection technique to complement the low robustness problem in various environments and dynamic/static change detection and to solve the cost efficiency problem. We used the Self-Organizing Map (SOM) applied as a data clustering technique to implement change detection, and we were able to confirm the superiority of noise robustness and abnormal detection judgment compared to the detection technique applied to the existing image surveillance system through simulation in the indoor office environment.

Verification Control Algorithm of Data Integrity Verification in Remote Data sharing

  • Xu, Guangwei;Li, Shan;Lai, Miaolin;Gan, Yanglan;Feng, Xiangyang;Huang, Qiubo;Li, Li;Li, Wei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.2
    • /
    • pp.565-586
    • /
    • 2022
  • Cloud storage's elastic expansibility not only provides flexible services for data owners to store their data remotely, but also reduces storage operation and management costs of their data sharing. The data outsourced remotely in the storage space of cloud service provider also brings data security concerns about data integrity. Data integrity verification has become an important technology for detecting the integrity of remote shared data. However, users without data access rights to verify the data integrity will cause unnecessary overhead to data owner and cloud service provider. Especially malicious users who constantly launch data integrity verification will greatly waste service resources. Since data owner is a consumer purchasing cloud services, he needs to bear both the cost of data storage and that of data verification. This paper proposes a verification control algorithm in data integrity verification for remotely outsourced data. It designs an attribute-based encryption verification control algorithm for multiple verifiers. Moreover, data owner and cloud service provider construct a common access structure together and generate a verification sentinel to verify the authority of verifiers according to the access structure. Finally, since cloud service provider cannot know the access structure and the sentry generation operation, it can only authenticate verifiers with satisfying access policy to verify the data integrity for the corresponding outsourced data. Theoretical analysis and experimental results show that the proposed algorithm achieves fine-grained access control to multiple verifiers for the data integrity verification.

Collaborative Modeling of Medical Image Segmentation Based on Blockchain Network

  • Yang Luo;Jing Peng;Hong Su;Tao Wu;Xi Wu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.3
    • /
    • pp.958-979
    • /
    • 2023
  • Due to laws, regulations, privacy, etc., between 70-90 percent of providers do not share medical data, forming a "data island". It is essential to collaborate across multiple institutions without sharing patient data. Most existing methods adopt distributed learning and centralized federal architecture to solve this problem, but there are problems of resource heterogeneity and data heterogeneity in the practical application process. This paper proposes a collaborative deep learning modelling method based on the blockchain network. The training process uses encryption parameters to replace the original remote source data transmission to protect privacy. Hyperledger Fabric blockchain is adopted to realize that the parties are not restricted by the third-party authoritative verification end. To a certain extent, the distrust and single point of failure caused by the centralized system are avoided. The aggregation algorithm uses the FedProx algorithm to solve the problem of device heterogeneity and data heterogeneity. The experiments show that the maximum improvement of segmentation accuracy in the collaborative training mode proposed in this paper is 11.179% compared to local training. In the sequential training mode, the average accuracy improvement is greater than 7%. In the parallel training mode, the average accuracy improvement is greater than 8%. The experimental results show that the model proposed in this paper can solve the current problem of centralized modelling of multicenter data. In particular, it provides ideas to solve privacy protection and break "data silos", and protects all data.

A Blockchain-enabled Multi-domain DDoS Collaborative Defense Mechanism

  • Huifen Feng;Ying Liu;Xincheng Yan;Na Zhou;Zhihong Jiang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.3
    • /
    • pp.916-937
    • /
    • 2023
  • Most of the existing Distributed Denial-of-Service mitigation schemes in Software-Defined Networking are only implemented in the network domain managed by a single controller. In fact, the zombies for attackers to launch large-scale DDoS attacks are actually not in the same network domain. Therefore, abnormal traffic of DDoS attack will affect multiple paths and network domains. A single defense method is difficult to deal with large-scale DDoS attacks. The cooperative defense of multiple domains becomes an important means to effectively solve cross-domain DDoS attacks. We propose an efficient multi-domain DDoS cooperative defense mechanism by integrating blockchain and SDN architecture. It includes attack traceability, inter-domain information sharing and attack mitigation. In order to reduce the length of the marking path and shorten the traceability time, we propose an AS-level packet traceability method called ASPM. We propose an information sharing method across multiple domains based on blockchain and smart contract. It effectively solves the impact of DDoS illegal traffic on multiple domains. According to the traceability results, we designed a DDoS attack mitigation method by replacing the ACL list with the IP address black/gray list. The experimental results show that our ASPM traceability method requires less data packets, high traceability precision and low overhead. And blockchain-based inter-domain sharing scheme has low cost, high scalability and high security. Attack mitigation measures can prevent illegal data flow in a timely and efficient manner.

Exploration of Factors that Improve Realism of Virtual Windows for Implementation of Virtual Environments (가상환경의 구현을 위한 가상창문의 현실감 향상 요소 탐색)

  • Kim, Jong Kouk
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.6
    • /
    • pp.1089-1095
    • /
    • 2023
  • Windows are essential and important architectural elements for the organization of architectural spaces, and they give character to the space and have a great impact on the reaction of users. Virtual windows are installed to activate architectural spaces such as underground spaces where windows cannot be installed, and to provide a sense of psychological security to users in hospital clinics, etc. In this study, we reviewed the literature and collected and analyzed the precedents of virtual windows to discuss the factors necessary to improve the realism of virtual windows. The factors that affect the realism of virtual windows are further grouped into five categories: 1. Use of reproduced images or videos for views, 2. Representation of temporality, 3. Responsiveness to changes in the observer's perspective, 4. Realistic reproduction of sunlight, and 5. Provision of non-visual sensory elements. Virtual windows are not just a replacement for traditional windows, but a way to realize a virtual environment using digital media, and it is necessary to expand the discussion to the realization of the virtual environment and the relationship with architectural elements.

Network Anomaly Traffic Detection Using WGAN-CNN-BiLSTM in Big Data Cloud-Edge Collaborative Computing Environment

  • Yue Wang
    • Journal of Information Processing Systems
    • /
    • v.20 no.3
    • /
    • pp.375-390
    • /
    • 2024
  • Edge computing architecture has effectively alleviated the computing pressure on cloud platforms, reduced network bandwidth consumption, and improved the quality of service for user experience; however, it has also introduced new security issues. Existing anomaly detection methods in big data scenarios with cloud-edge computing collaboration face several challenges, such as sample imbalance, difficulty in dealing with complex network traffic attacks, and difficulty in effectively training large-scale data or overly complex deep-learning network models. A lightweight deep-learning model was proposed to address these challenges. First, normalization on the user side was used to preprocess the traffic data. On the edge side, a trained Wasserstein generative adversarial network (WGAN) was used to supplement the data samples, which effectively alleviates the imbalance issue of a few types of samples while occupying a small amount of edge-computing resources. Finally, a trained lightweight deep learning network model is deployed on the edge side, and the preprocessed and expanded local data are used to fine-tune the trained model. This ensures that the data of each edge node are more consistent with the local characteristics, effectively improving the system's detection ability. In the designed lightweight deep learning network model, two sets of convolutional pooling layers of convolutional neural networks (CNN) were used to extract spatial features. The bidirectional long short-term memory network (BiLSTM) was used to collect time sequence features, and the weight of traffic features was adjusted through the attention mechanism, improving the model's ability to identify abnormal traffic features. The proposed model was experimentally demonstrated using the NSL-KDD, UNSW-NB15, and CIC-ISD2018 datasets. The accuracies of the proposed model on the three datasets were as high as 0.974, 0.925, and 0.953, respectively, showing superior accuracy to other comparative models. The proposed lightweight deep learning network model has good application prospects for anomaly traffic detection in cloud-edge collaborative computing architectures.

A Proposal for Korean armed forces preparing toward Future war: Examine the U.S. 'Mosaic Warfare' Concept (미래전을 대비한 한국군 발전방향 제언: 미국의 모자이크전 수행개념 고찰을 통하여)

  • Chang, Jin O;Jung, Jae-young
    • Maritime Security
    • /
    • v.1 no.1
    • /
    • pp.215-240
    • /
    • 2020
  • In 2017, the U.S. DARPA coined 'mosaic warfare' as a new way of warfighting. According to the Timothy Grayson, director of DARPA's Strategic Technologies Office, mosaic warfare is a "system of system" approach to warfghting designed around compatible "tiles" of capabilities, rather than uniquely shaped "puzzle pieces" that must be fitted into a specific slot in a battle plan in order for it to work. Prior to cover mosaic warfare theory and recent development, it deals analyze its background and several premises for better understanding. The U.S. DoD officials might acknowledge the current its forces vulnerability to the China's A2/AD assets. Furthermore, the U.S. seeks to complete military superiority even in other nation's territorial domains including sea and air. Given its rapid combat restoration capability and less manpower casualty, the U.S. would be able to ready to endure war of attrition that requires massive resources. The core concept of mosaic warfare is a "decision centric warfare". To embody this idea, it create adaptability for U.S. forces and complexity or uncertainty for the enemy through the rapid composition and recomposition of a more disag g reg ated U.S. military force using human command and machine control. This allows providing more options to friendly forces and collapse adversary's OODA loop eventually. Adaptable kill web, composable force packages, A.I., and context-centric C3 architecture are crucial elements to implement and carry out mosaic warfare. Recently, CSBA showed an compelling assessment of mosaic warfare simulation. In this wargame, there was a significant differences between traditional and mosaic teams. Mosaic team was able to mount more simultaneous actions, creating additional complexity to adversaries and overwhelming their decision-making with less friendly force's human casualty. It increase the speed of the U.S. force's decision-making, enabling commanders to better employ tempo. Consequently, this article finds out and suggests implications for Korea armed forces. First of all, it needs to examine and develop 'mosaic warfare' in terms of our security circumstance. In response to future warfare, reviewing overall force structure and architecture is required which is able to compose force element regardless domain. In regards to insufficient defense resources and budget, "choice" and "concentration" are also essential. It needs to have eyes on the neighboring countries' development of future war concept carefully.

  • PDF

The Characteristic of Laws on the Kind of Urban Green Spaces and the Legal Requirements for the Green Spaces of Urban Habitat in China (중국의 도시녹지 종류와 도시거주구 녹지의 설치 기준에 관한 법제도의 현황과 특성)

  • Shin, Ick-Soon
    • Journal of the Korean Institute of Landscape Architecture
    • /
    • v.41 no.3
    • /
    • pp.1-11
    • /
    • 2013
  • This study investigated Chinese Laws on the kind of urban green spaces and the legal requirements for the green spaces of urban habitat and analyzed the specificities of them intending to provide basic data to suggest bringing in or not the relevant Chinese Laws to Korea. This study can be summarized as follows: First, the concept of Chinese urban green spaces(g.s.) classified by 5 kinds(park g.s., production g.s., protection g.s., attachment g.s., the others g.s.) placed the park and green spaces in the same category unlike the Korean urban green spaces that only distinguishes between park and green spaces. The Chinese Urban Park is classified by 4 kinds(composite park, community park, special park, linear park) at the 'Standard for urban green spaces classification' which is below in rank of the legal system. Second, in case of calculation for green spaces ratio of urban green spaces in China, the green rooftop landscaping area should not be included as a green spaces area except the rooftop of a basement or semi basement building to which residents have easy access. The green spaces requirements and compulsory secure ratio by 3 habitat kinds(habitat, small habit, minimum habitat) of when to act as a residential plan is regulated. Third, the green spaces system is obligated to establish at habitat green spaces plan and is specified to conserve and improve existing trees and green spaces. The green spaces ratio on reconstruction for old habitat is relaxed to be lower than for new habitat and a gradient of green spaces is peculiarly clarified. The details and requirements for establishment and the minimum area intending for each classes of the central green spaces(habitat park, children park, minimum habitat's green spaces) are regulated. Especially at a garden style of minimum habitat's green spaces, intervals between the south and north houses and a compulsory security for green spaces area classifying into two groups(closing type green spaces and open type green spaces) by a middle-rise or high-rise building are clarified. System of calculation for green spaces area is presented at a special regulation. Fourth, a general index(area/person) of public green spaces within habitat to achieve by 3 habitat kinds is determined, in this case, the index on reconstruction for a deterioration zone can be relaxed to be lower to the extent of a specified quantity. A location and scale, minimum width and minimum area per place of public green spaces are regulated. A space plot principle including adjacent to a road, greening area ratio against total area, security of open space and the shadow line boundary of sunshine are also regulated to intend for public green spaces. Fifth, the minimum horizontal distance between the underground cables and the surrounding greening trees are regulated as the considerable items for green spaces when setting up the underground cables. The principle to establish green spaces within public service facilities is regulated according to the kind of service contents. It shall be examined in order to import or not the special regulations that only exist in Chinese Laws but not in Korean Laws. The result of this study will contribute to gain the domestic landscape architect's' sympathy of the research related to Chinese urban green spaces laws requiring immediate attention and will be a good chance to advance into the internationalization of Korean Landscape Architectural Laws.

Strategy and Basic Planning for Creating an Urban Agricultural Park -Focusing on Gosangol Village in Daegu City- (도시농업공원 조성을 위한 전략 및 기본계획 연구 - 대구광역시 고산골마을을 대상으로 -)

  • Lee, Jong-Il;Kwon, Jin-Wook
    • Journal of the Korean Institute of Landscape Architecture
    • /
    • v.45 no.4
    • /
    • pp.23-34
    • /
    • 2017
  • This study focused on a planned site located in Gosangol Village in Daegu Metropolitan City that aims to build an urban agricultural park combining urban agriculture and urban park for the sustainable realization of urban agriculture. Accordingly, this study has significance in two perspectives: firstly, suggesting development strategies to be considered when building an urban agricultural park as a theme park, and secondly, presenting guidelines for spatial programs and facilities to be introduced for actual applications. The results are as follows. Firstly, building an urban agricultural park fills a role as a local community space prompted by the demand-oriented evolution of urban parks, and agricultural behaviors to be incorporated in the theme. In this context, 'building an urban agricultural space focusing on sustainability', 'constructing green space systems focusing on agricultural landscape', and 'structuring leisure spaces for communications in the community' are presented as development strategies. Secondly, key functions that an urban agricultural park should have include production and trade of agricultural products on the production side, soil preservation, resource cycling and green space provision on the environmental side, leisure and experience, community vitalization, education, and social security on the social and cultural side, and entertainment functions, ecological functions, and protective functions as urban park functionality. Thirdly, key facilities needed when building an urban agricultural park include urban agricultural facilities other than park management facilities, landscape facilities, recreational facilities, sports facilities, educational facilities, and convenient facilities, and family gardens as the key facility of the urban agricultural park should be scaled in consideration of various purposes and behaviors of their use. This study has a limitation that the subject site was limited to a specific area but has significance in that it presented a planning model for the spatial structuring of park-type urban agriculture.

Design of a Bit-Serial Divider in GF(2$^{m}$ ) for Elliptic Curve Cryptosystem (타원곡선 암호시스템을 위한 GF(2$^{m}$ )상의 비트-시리얼 나눗셈기 설계)

  • 김창훈;홍춘표;김남식;권순학
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.27 no.12C
    • /
    • pp.1288-1298
    • /
    • 2002
  • To implement elliptic curve cryptosystem in GF(2$\^$m/) at high speed, a fast divider is required. Although bit-parallel architecture is well suited for high speed division operations, elliptic curve cryptosystem requires large m(at least 163) to support a sufficient security. In other words, since the bit-parallel architecture has an area complexity of 0(m$\^$m/), it is not suited for this application. In this paper, we propose a new serial-in serial-out systolic array for computing division operations in GF(2$\^$m/) using the standard basis representation. Based on a modified version of tile binary extended greatest common divisor algorithm, we obtain a new data dependence graph and design an efficient bit-serial systolic divider. The proposed divider has 0(m) time complexity and 0(m) area complexity. If input data come in continuously, the proposed divider can produce division results at a rate of one per m clock cycles, after an initial delay of 5m-2 cycles. Analysis shows that the proposed divider provides a significant reduction in both chip area and computational delay time compared to previously proposed systolic dividers with the same I/O format. Since the proposed divider can perform division operations at high speed with the reduced chip area, it is well suited for division circuit of elliptic curve cryptosystem. Furthermore, since the proposed architecture does not restrict the choice of irreducible polynomial, and has a unidirectional data flow and regularity, it provides a high flexibility and scalability with respect to the field size m.