• Title/Summary/Keyword: set sharing

Search Result 349, Processing Time 0.026 seconds

Towards efficient sharing of encrypted data in cloud-based mobile social network

  • Sun, Xin;Yao, Yiyang;Xia, Yingjie;Liu, Xuejiao;Chen, Jian;Wang, Zhiqiang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.4
    • /
    • pp.1892-1903
    • /
    • 2016
  • Mobile social network is becoming more and more popular with respect to the development and popularity of mobile devices and interpersonal sociality. As the amount of social data increases in a great deal and cloud computing techniques become developed, the architecture of mobile social network is evolved into cloud-based that mobile clients send data to the cloud and make data accessible from clients. The data in the cloud should be stored in a secure fashion to protect user privacy and restrict data sharing defined by users. Ciphertext-policy attribute-based encryption (CP-ABE) is currently considered to be a promising security solution for cloud-based mobile social network to encrypt the sensitive data. However, its ciphertext size and decryption time grow linearly with the attribute numbers in the access structure. In order to reduce the computing overhead held by the mobile devices, in this paper we propose a new Outsourcing decryption and Match-then-decrypt CP-ABE algorithm (OM-CP-ABE) which firstly outsources the computation-intensive bilinear pairing operations to a proxy, and secondly performs the decryption test on the attributes set matching access policy in ciphertexts. The experimental performance assessments show the security strength and efficiency of the proposed solution in terms of computation, communication, and storage. Also, our construction is proven to be replayable choosen-ciphertext attacks (RCCA) secure based on the decisional bilinear Diffie-Hellman (DBDH) assumption in the standard model.

Cooperative spectrum leasing using parallel communication of secondary users

  • Xie, Ping;Li, Lihua;Zhu, Junlong;Jin, Jin;Liu, Yijing
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.8
    • /
    • pp.1770-1785
    • /
    • 2013
  • In this paper, a multi-hop transmission protocol based on parallel communication of secondary users (SUs) is proposed. The primary multi-hop network coexists with a set of SUs by cooperative spectrum sharing. The main optimization target of our protocol is the overall performance of the secondary system with the guarantee of the primary outage performance. The energy consumption of the primary system is reduced by the cooperation of SUs. The aim of the primary source is to communicate with the primary destination via a number of primary relays. SUs may serve as extra decode-and-forward relays for the primary network. When an SU acts as a relay for a primary user (PU), some other SUs that satisfy the condition for parallel communication are selected to simultaneously access the primary spectrum for secondary transmissions. For the proposed protocol, two opportunistic routing strategies are proposed, and a search algorithm to select the SUs for parallel communication is described. The throughput of the SUs and the PU is illustrated. Numerical results demonstrate that the average throughput of the SUs is greatly improved, and the end-to-end throughput of the PU is slightly increased in the proposed protocol when there are more than seven SUs.

A Study on Software Development and Legal Regulation (소프트웨어 개발과 법적규제)

  • Kim, Hyung-Man
    • Journal of Digital Convergence
    • /
    • v.9 no.5
    • /
    • pp.11-20
    • /
    • 2011
  • Internet users and copyright holder have been at the center of a severe legal dispute because file-sharing soft (P2P) through Napster aggravates the violation of copyright as well as takes on the world. Though it is natural that we should hold users a criminal penalty for the illegal use of various computer programs, I think that if the supply of a computer program is generally within a circle of development act, program developer ought not to hold users criminally liable for the unintended illegal act of users. Two main issues are addressed in this work: (i) the basis and validity of legal responsibility and condemnation that appear in the precedent set as to P2P in America, Japan, and Korea. (ii) the necessity of both scientific technology development and efficient legal regulation of copyright holder. For this purpose, software development and legal regulation are reviewed analyzed from viewpoint of the criminal law.

Cell Marking Priority Control Considering User Level Priority in ATM Network (ATM 네트워크에서 사용자 레벨 우선 순위를 고려한 셀 마킹 및 우선 순위 제어)

  • O, Chang-Se;Kim, Tae-Yun
    • The Transactions of the Korea Information Processing Society
    • /
    • v.1 no.4
    • /
    • pp.490-501
    • /
    • 1994
  • In this study the problems of cell marking method used in the field of ATM network traffic control are presented. Also an extended cell marking method considering the user level priority is proposed. The conventional traffic monitoring schemes set the CLP bit of a cell to 1 only under the circumstance of the violation of traffic contract. It causes that the number of low level cells increases and the levels of cells are lowered regardless of the user level priority. The three level priority control method combining FCI bit with CLP bit has also been proposed. It divides CLP=0 cells into two levels. Consequently, the proposed method preserves more cells in high level than the conventional one and the real loss of high level cells can be reduced. The performance of the proposed scheme has also been analyzed by the PBS(partial buffer sharing) with two thresholds for the proposed three levels. The result shows that the PBS with two thresholds can give more efficient control than the scheme with no priority, or the PBS with one threshold.

  • PDF

A Message Conversion System based on MDR for Resolving Metadata Heterogeneity (메타데이타 이질성 해결을 위한 MDR 기반의 메시지 변환 시스템)

  • 김진관;김중일;정동원;백두권
    • Journal of KIISE:Databases
    • /
    • v.31 no.3
    • /
    • pp.232-242
    • /
    • 2004
  • Metadata is a general notion of data about data to improve data sharing and exchanging by definitely describing meaning and representation of data. However, metadata has been created in various ways and It caused another kind of heterogeneity problem named metadata heterogeneity problem. Recently, the research on metadata gateway approach that allows metadata heterogeneity is being more actively progressed. However, the existing commercialized systems that have been implemented with the metadata gateway approach are dependent on a metadata schema. In this paper, we propose a message conversion system which separates the mapping information from the mapping rules between heterogeneous metadata schemas. The proposed system dynamically manages standardized data elements by applying ISO/IEC l1179. Therefore, the proposed system provides the set of standard data elements to create consistently metadata of new databases and provides a fundamental resolution to the metadata heterogeneity problem.

Fusion of Evolutionary Neural Networks Speciated by Fitness Sharing (적합도 공유에 의해 종분화된 진화 신경망의 결합)

  • Ahn, Joon-Hyun;Cho, Sung-Bae
    • Journal of KIISE:Software and Applications
    • /
    • v.29 no.1_2
    • /
    • pp.1-9
    • /
    • 2002
  • Evolutionary artificial neural networks (EANNs) are towards the near optimal ANN using the global search of evolutionary instead of trial-and-error process. However, many real-world problems are too hard to be solved by only one ANN. Recently there has been plenty of interest on combining ANNs in the last generation to improve the performance and reliability. This paper proposes a new approach of constructing multiple ANNs which complement each other by speciation. Also, we develop a multiple ANN to combine the results in abstract, rank, and measurement levels. The experimental results on Australian credit approval data from UCI benchmark data set have shown that combining of the speciated EANNs have better recognition ability than EANNs which are not speciated, and the average error rate of 0.105 proves the superiority of the proposed EANNs.

A Priority-Based Bandwidth Management Method in Public Safety Networks (재난 안전 통신망에서 우선순위를 고려한 대역폭 관리 방법)

  • Lee, Sang-Hoon;Kim, Hyun-Woo;Yoon, Hyun-Goo;Choi, Yong-Hoon
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.15 no.2
    • /
    • pp.102-110
    • /
    • 2016
  • After Sewol ferry disaster occurred in April 2014, Korean government began investing to deploy LTE-based public safety network until the year of 2017. In order to reduce the operating and capital costs, resource sharing scheme among public safety network and commercial LTE networks is considered as one of the viable approaches. This thesis proposes a method of allocating bandwidth of public safety network based on various priorities required for disaster scenarios and stages in a resource sharing environment. In order to obtain the highest efficiency, we formulate the bandwidth allocation problem as a Fractional Knapsack Problem. Greedy algorithm was applied to solve the problem. For performance evaluation, we created several disaster scenarios and set suitable parameters for each scenario based on a disaster manual. The proposed method is compared with two typical methods, which are Class-based bandwidth allocation and Uniform bandwidth allocation. The results showed that the better performance in terms of the sum of the values and the amount of lost bytes.

Computation of an Equilibrium in Spectrum Markets for Cognitive Radio Networks (인지무선네트워크를 위한 스펙트럼 마켓에서 평형상태 계산)

  • Byun, Sang-Seon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.10a
    • /
    • pp.197-199
    • /
    • 2016
  • In this paper, we investigate a market equilibrium in multi-channel sharing cognitive radio networks (CRNs): it is assumed that every subchannel is orthogonally licensed to a single primary user (PU), and can be shared with multiple secondary users (SUs). We model this sharing as a spectrum market where PUs offer SUs their subchannels with limiting the interference from SUs; the SUs purchase the right to transmit over the subchannels while observing the interference limits set by the PUs and their budget constraints. The utility function of SU is defined as least achievable transmission rate, and that of PU is given by the net profit. We define a market equilibrium in the context of extended Fisher model, and show that the equilibrium is yielded by solving an optimization problem, Eisenberg-Gale convex program.

  • PDF

Policy Agenda Setting of Floating Solar PV - Based on the Co-evolution of Technology and Institutions - (수상태양광 정책의제설정 연구 - 기술과 제도의 공진화 관점 -)

  • Lee, Youhyun;Kim, Kyoung-min
    • Journal of Korean Society on Water Environment
    • /
    • v.37 no.6
    • /
    • pp.493-500
    • /
    • 2021
  • Floating solar photovoltaic (hereinafter PV) power generation is emerging as a proper alternative to overcome various environmental limitations of existing offshore PV generation. However, more government-led policy design and technical and institutional development are still required. Based on the policy agenda setting theory and technological innovation theory, this study contains the research questions concerning the co-evolution of technology and the floating solar PV policy. This study primarily evaluates the technological and institutional development level of floating solar PV policy through a survey of domestic floating solar PV experts. Secondly, we also analyze the kind of policy agenda that should be set a priori. Analyzing the priorities to be considered, the first environmental enhancement needs to be considered from both the technical and institutional aspects. The second candidate task for the policy agenda is residents' conflict and improvement of regulations. Both candidate tasks need to be actively considered in the policy agenda from the institutional point of view. The third is publicity, profit sharing, follow-up monitoring, and cost. Among them, public relations and profit sharing are tasks that need to be considered in the policy agenda from the institutional point of view. On the other hand, the cost of follow-up monitoring should be considered as a policy agenda in terms of technology, system, and common aspects. Finally, there are technical standards. Likewise, technical standards need to be considered in the policy agenda in terms of both technical and institutional commonality.

Development of an Object-Relational IFC Server

  • Hoon-sig Kang;Ghang Lee
    • International conference on construction engineering and project management
    • /
    • 2009.05a
    • /
    • pp.1346-1351
    • /
    • 2009
  • In this paper we propose a framework for an Object Relational IFC Server (OR-IFC Server). Enormous amounts of information are generated in each project. Today, many BIM systems are developed by various CAD software vendors. Industry Foundation Classes (IFC) developed by International Alliance for Interoperability (IAI) is an open standard data model for exchanging data between the various BIM tools. The IFC provides a foundation for exchanging and sharing of information directly between software applications and define a shared building project model. The IFC model server is a database management system that can keep track of transactions, modifications, and deletions. It plays a role as an information hub for storing and sharing information between various parties involved in construction projects. Users can communicate with each other via the internet and utilize functions implemented in the model server such as partial data import/export, file merge, version control, etc. IFC model servers using relational database systems have been developed. However, they suffered from slow performance and long transaction time due to a complex mapping process between the IFC structure and a relational-database structure because the IFC model schema is defined in the EXPRESS language which is object-favored language. In order to simplify the mapping process, we developed a set of rules to map the IFC model to an object-relational database (ORDB). Once the database has been configured, only those pieces of information that are required for a specific information-exchange scenario are extracted using the pre-defined information delivery manual (IDM). Therefore, file sizes will be reduced when exchanging data, meaning that files can now be effectively exchanged and shared. In this study, the framework of the IFC server using ORDB and IDM and the method to develop it will be examined.

  • PDF