• Title/Summary/Keyword: storage attribute

Search Result 86, Processing Time 0.023 seconds

Security Enhancement to an Biometric Authentication Protocol for WSN Environment (WSN 환경에서 Biometric 정보를 이용한 안전한 사용자 인증 스킴의 설계)

  • Lee, Youngsook
    • Convergence Security Journal
    • /
    • v.16 no.6_2
    • /
    • pp.83-88
    • /
    • 2016
  • Over recent years there has been considerable growth in interest in the use of biometric systems for personal authentication. Biometrics is a field of technology which has been and is being used in the identification of individuals based on some physical attribute. By using biometrics, authentication is directly linked to the person, rather than their token or password. Biometric authentication is a type of system that relies on the unique biological characteristics of individuals to verify identity for secure access to electronic systems. In 2013, Althobati et al. proposed an efficient remote user authentication protocol using biometric information. However, we uncovered Althobati et al.'s protocol does not guarantee its main security goal of mutual authentication. We showed this by mounting threat of data integrity and bypassing the gateway node attack on Althobati et al.'s protocol. In this paper, we propose an improved scheme to overcome these security weaknesses by storing secret data in device. In addition, our proposed scheme should provide not only security, but also efficiency since sensors in WSN(Wireless Sensor Networks) operate with resource constraints such as limited power, computation, and storage space.

A Study on Improvement Methods for Encrytion and Authentication in Batt le Field Management System(C4I) (전장관리체계(C4I)에서의 암호 및 인증방법 개선 방안에 관한연구)

  • Lee, Won Man;Koo, Woo Kwon;Park, Tae Hyeong;Lee, Dong Hoon
    • Convergence Security Journal
    • /
    • v.12 no.6
    • /
    • pp.39-50
    • /
    • 2012
  • Battlefield management systems are operated by the Public Key Infrastructure (PKI) and cryptographic equipment is distributed through the personal delivery to the enemy has deodorizing prone to structure. In addition, Per person each battlefield management system (C4I) encryption key operate and authentication module to manage multiple encryption so, encryption key operating is restrictions. Analysis of the problems of this public key infrastructure(PKI), Identity-Based Cryptosystem(IBC) and Attribute-Based Cryptosystem(ABC) to compare construct the future of encrypt ion and authentication system were studied. Authentication method for the connection between the system that supports data encryption and secure data communication, storage, and communication scheme is proposed.

An Efficient Real-time Rendering Method for Compressed Terrain Dataset with Wavelet Transform (웨이블릿 변환으로 압축된 지형 데이터의 효율적인 실시간 렌더링 기법)

  • Kim, Tae-Gwon;Lee, Eun-Seok;Shin, Byeong-Seok
    • Journal of Korea Game Society
    • /
    • v.14 no.4
    • /
    • pp.45-52
    • /
    • 2014
  • We cannot load the entire data for high-resolution terrain model to the GPU memory since its size is too big. Out-of-core approaches are commonly used to solve the problem. However, due to limited bandwidth of the secondary storage, it is difficult to render the terrain in real-time. A method that compresses the DEM data with wavelet transform on GPU, and renders the decoded data is suggested. However, it is inefficient since it has to sample the values from textures, convert them to vertices, and generate a mesh periodically. We propose a method to store the approximation coefficients of wavelet compression as vertex attributes and render the terrain by decoding the data on geometric shader. It can reduce the amount of transferring terrain texture since approximation coefficients are given as an attribute of the vertex. Also, it generate meshes without additional upload of terrain texture.

A Study on Redesign of Spatial Data Structure of Korean Reach File for Improving Adaptability (하천망분석도(KRF)의 활용성 증대를 위한 공간데이터 구조 개선에 관한 연구)

  • Song, Hyunoh;Lee, Hyuk;Kang, Taegu;Kim, Kyunghyun;Lee, Jaekwan;Rhew, Doughee;Jung, Dongil
    • Journal of Korean Society on Water Environment
    • /
    • v.32 no.6
    • /
    • pp.511-519
    • /
    • 2016
  • National Institute of Environmental Research (NIER) has developed the Korean Reach File (KRF) for scientific and systematic analysis of variables related to water quality, pollutant sources and aquatic ecosystems in consideration of steam reach networks. The KRF provides a new framework for data production, storage, management and analysis for water related variables in relation to spatial characteristics, connections, and topologies of stream reaches. However, the current version of KRF (ver.2) has limited applicability because its nodes include not only the stream points based on topological characteristics but also those based on water quality monitoring stations, which may undermine its generality. In this study, a new version of KRF (ver.3) was designed and established to overcome the weak point of version 2. The version 3 is a generalization of the old KRF graphic data and it integrates the attribute data while separating it from the graphic data to minimize additional work that is needed for data association and search. We tested the KRF (ver.3) on actual cases and convenience and adaptability for each application was verified. Further research should focus on developing a database link model and real-world applications that are targeted to process event data.

Data Storage and Security Model for Mobile Healthcare Service based on IoT (IoT 기반의 모바일 헬스케어 서비스를 위한 데이터 저장 및 보호 모델)

  • Jeong, Yoon-Su
    • Journal of Digital Convergence
    • /
    • v.15 no.3
    • /
    • pp.187-193
    • /
    • 2017
  • Objects Internet-based healthcare services provide healthcare and healthcare services, including measurement of user's vital signs, diagnosis and prevention of diseases, through a variety of object internet devices. However, there is a problem that new security vulnerability can occur when inter-working with the security weakness of each element technology because the internet service based on the object Internet provides a service by integrating various element technologies. In this paper, we propose a user privacy protection model that can securely process user's healthcare information from a third party when delivering healthcare information of users using wearable equipment based on IoT in a mobile environment to a server. The proposed model provides attribute values for each healthcare sensor information so that the user can safely handle, store, and store the healthcare information, thereby managing the privacy of the user in a hierarchical manner. As a result of the performance evaluation, the throughput of IoT device is improved by 10.5% on average and the server overhead is 9.9% lower than that of the existing model.

CP-ABE Access Control that Block Access of Withdrawn Users in Dynamic Cloud

  • Hwang, Yong-Woon;Lee, Im-Yeong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.10
    • /
    • pp.4136-4156
    • /
    • 2020
  • Recently, data can be safely shared or stored using the infrastructure of cloud computing in various fields. However, issues such as data security and privacy affect cloud environments. Thus, a variety of security technologies are required, one of them is security technology using CP-ABE. Research into the CP-ABE scheme is currently ongoing, but the existing CP-ABE schemes can pose security threats and are inefficient. In terms of security, the CP-ABE approach should be secure against user collusion attacks and masquerade attacks. In addition, in a dynamic cloud environment where users are frequently added or removed, they must eliminate user access when they leave, and so users will not be able to access the cloud after removal. A user who has left should not be able to access the cloud with the existing attributes, secret key that had been granted. In addition, the existing CP-ABE scheme increases the size of the ciphertext according to the number of attributes specified by the data owner. This leads to inefficient use of cloud storage space and increases the amount of operations carried out by the user, which becomes excessive when the number of attributes is large. In this paper, CP-ABE access control is proposed to block access of withdrawn users in dynamic cloud environments. This proposed scheme focuses on the revocation of the attributes of the withdrawn users and the output of a ciphertext of a constant-size, and improves the efficiency of the user decryption operation through outsourcing.

A Method of Measuring the International Competitiveness of Container Ports: A DEA Approach, Focused on Productivity Analysis (컨테이너항만의 국제경쟁력분석방법 : DEA접근 - 생산효율성분석을 중심으로 -)

  • 오성동;박노경
    • Journal of Korea Port Economic Association
    • /
    • v.17 no.1
    • /
    • pp.27-51
    • /
    • 2001
  • The purpose of this paper is to investigate the productive efficiency of world container ports by using the DEA (Data Envelopment Analysis) method and raw data from previous research in measuring the international competitiveness of world container ports. Ports have to cope with rapid changes in shipping environments. In order for a port to compete in the global market, it must provide port services promptly and accurately. Basically, there are two approaches to measuring the international competitiveness of a container port. First, there is the traditional productivity analysis method, which analyzes productivity based on the container port's facilities (efficiency, selectivity, land availability), and by its general capacity (handling ability, storage capacity, terminal productivity). Second there is multi-attribute utility analysis, which considers several elements including the reasons for selecting particular container ports and factors determining international competitiveness. This paper follows the first method (traditional productivity analysis) and extends the limitation of previous studies by using the DEA method newly, and suggesting: the relative productive efficiency of container ports. The main results of this paper are as follows: First, the results of the DEA analysis in terms of world container ports matches that of a previous study (Jun et al., 1993) at a level of 35%. The low ratio is due to the constrained set of input-output elements, the result of only twenty container ports being analyzed in this paper. Second, the result of the DEA analysis in terms of North-East Asia's container ports matches with that of a previous study (Ha, 1996) at a level of 100 percent. Therefore we can conclude that the DEA analysis is the best measurement method for international competitiveness. Policy implications for this study are as follows: First, when port authorities want to measure the international competition power of container ports and enhance their productive efficiency, they should consider the traditional method and newly introduce the DEA method. Second, according to the analysis results of the DEA method, pen authorities should recommend benchmarking ports as reference ports in order to enhance the productive efficiency of container ports that show an efficiency score of below 1.

  • PDF

An Energy Efficient Query Processing Mechanism using Cache Filtering in Cluster-based Wireless Sensor Networks (클러스터 기반 WSN에서 캐시 필터링을 이용한 에너지 효율적인 질의처리 기법)

  • Lee, Kwang-Won;Hwang, Yoon-Cheol;Oh, Ryum-Duck
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.8
    • /
    • pp.149-156
    • /
    • 2010
  • As following the development of the USN technology, sensor node used in sensor network has capability of quick data process and storage to support efficient network configuration is enabled. In addition, tree-based structure was transformed to cluster in the construction of sensor network. However, query processing based on existing tree structure could be inefficient under the cluster-based network. In this paper, we suggest energy efficient query processing mechanism using filtering through data attribute classification in cluster-based sensor network. The suggestion mechanism use advantage of cluster-based network so reduce energy of query processing and designed more intelligent query dissemination. And, we prove excellence of energy efficient side with MATLab.

Case Study: Record Management & Maintenance System Implementation with Architectural Drawings on GIS Platform (GIS 플렛폼을 활용한 건축도면 및 자료 유지관리시스템 적용 사례연구 - 미국 버지니아주 리치몬드시청 건축도면 및 자료 유지관리시스템 사례연구 -)

  • Chong, K. Chul;Sho, Kwang-Ho
    • Journal of the Architectural Institute of Korea Structure & Construction
    • /
    • v.36 no.1
    • /
    • pp.163-172
    • /
    • 2020
  • This study is a case study for in-house developed Record Maintenance and Management (RMMS) which is a digital data storage/retrieval system in a GIS-enabled solution. RMMS is designed for reorganizing submitted architectural drawings associated with scanned drawings files & geodatabase, managing metadata/table and geometric features in ArcSDE/Enterprise geodatabase format. The birth of the RMMS was borne out of a necessity for a modernized approach in digital file basis to provide improved customer services for various architectural drawings and associated with geo-spatial and its attribute information. Through a case study for building permit & review practice implemented on an internet-based Electronic Architectural administration Information System (EAIS) at the local governments in Korea, this study is able to derive differences between GIS-enabled RMMS system implemented in the Richmond City and internet-based EAIS system implemented in the local government in Korea. In an effort to be the most effective, it presents meaningful ways of maximizing efficiency in record maintenance & management system derived from the case studies that looked into in ways of a method in RMMS' operation, implementation on GIS platform, mutual interface among various programs with various digital files and finally technical supports and system development /upgrade.

Shelf-life prediction of fresh ginseng packaged with plastic films based on a kinetic model and multivariate accelerated shelf-life testing

  • Jong-Jin Park;Jeong-Hee Choi;Kee-Jai Park;Jeong-Seok Cho;Dae-Yong Yun;Jeong-Ho Lim
    • Food Science and Preservation
    • /
    • v.30 no.4
    • /
    • pp.573-588
    • /
    • 2023
  • The purpose of this study was to monitor changes in the quality of ginseng and predict its shelf-life. As the storage period of ginseng increased, some quality indicators, such as water-soluble pectin (WSP), CDTA-soluble pectin (CSP), cellulose, weight loss, and microbial growth increased, while others (Na2CO3-soluble pectin/NSP, hemicellulose, starch, and firmness) decreased. Principal component analysis (PCA) was performed using the quality attribute data and the principal component 1 (PC1) scores extracted from the PCA results were applied to the multivariate analysis. The reaction rate at different temperatures and the temperature dependence of the reaction rate were determined using kinetic and Arrhenius models, respectively. Among the kinetic models, zeroth-order models with cellulose and a PC1 score provided an adequate fit for reaction rate estimation. Hence, the prediction model was constructed by applying the cellulose and PC1 scores to the zeroth-order kinetic and Arrhenius models. The prediction model with PC1 score showed higher R2 values (0.877-0.919) than those of cellulose (0.797-0.863), indicating that multivariate analysis using PC1 score is more accurate for the shelf-life prediction of ginseng. The predicted shelf-life using the multivariate accelerated shelf-life test at 5, 20, and 35℃ was 40, 16, and 7 days, respectively.