• Title/Summary/Keyword: storage location

Search Result 408, Processing Time 0.029 seconds

Status-Based RFID Authentication Protocol (상태기반 RFID 인증 프로토콜)

  • Yoo Sung Ho;Kim KiHyun;Hwang Yong Ho;Lee Pil Joong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.6
    • /
    • pp.57-68
    • /
    • 2004
  • Recently, Radio Frequency Identification (RFID) systems stands in the spotlight of industry as a common and useful tool in manufacturing, supply chain management (SCM) and stock management. In the near future, low-cost RFID Electronic Product Code; (EPC) or smart-labels may be a practical replacement for optical barcodes on consumer items. However, manufacturing cheap and small RFID tags, and developing secure RFID authentication Protocols are problems which need to be solved. In spite of advances in semiconductor technology, computation and storage ability of the tag are so limited that it is difficult and too expensive to apply existing crypto-systems to RFID tags. Thus it is necessary to create a new protocol which would require less storage space and lower computation costs and that is secure in the RFID system's environments. In this paper, we propose a RFID authentication protocol that is secure against location tracking and spoofing attacks. Our protocol can be used as a practical solution for privacy protection because it requires less computations in database than the previous RFID authentication protocol.

Video Data Collection Scheme From Vehicle Black Box Using Time and Location Information for Public Safety (사회 안전망 구축을 위한 시간과 위치 정보 기반의 차량 블랙박스 영상물 수집 기법)

  • Choi, Jae-Duck;Chae, Kang-Suk;Jung, Sou-Hwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.4
    • /
    • pp.771-783
    • /
    • 2012
  • This paper proposes a scheme to collect video data of the vehicle black box in order to strengthen the public safety. The existing schemes, such as surveillance system with the fixed CCTV and car black box, have privacy issues, network traffic overhead and the storage space problems because all video data are sent to the central server. In this paper, the central server only collects the video data related to the accident or the criminal offense using the GPS information and time in order to investigation of the accident or the criminal offense. The proposed scheme addresses the privacy issues and reduces network traffic overhead and the storage space of the central server since the central server collects the video data only related to the accident and the criminal offense. The implementation and experiment shows that our service is feasible. The proposed service can be used as a component of remote surveillance system to prevent the criminal offense and to investigate the criminal offense.

Designing the Record Management Functions for Record Content Using Advantages of Cloud Storage (클라우드 저장소 장점을 활용한 기록 콘텐츠 관리기능 설계)

  • Yim, Jin-Hee
    • Journal of Korean Society of Archives and Records Management
    • /
    • v.19 no.3
    • /
    • pp.271-292
    • /
    • 2019
  • Recently, the central administrative agency changed its business management system to cloud-based On-nara 2.0. To transfer and manage the records of the cloud business management system, the National Archives Service has developed and distributed a cloud-based records management system. It serves as an opportunity to maximize the benefits of cloud computing and redesign the records management to be more effective and efficient. The process and method of electronic record management can be transformed through digital technologies. First, we can change the transfer method for electronic records. When the business and the records management systems share the same cloud storage, it is possible to transfer the content files between the two systems without moving the contents files physically, thus copying only the metadata and reducing the cost and the risk of integrity damage. Second, the strategy for allocating storage space for contents can be conceived. Assuming that the cloud storage is shared by the business and the record management systems, it is advantageous to distinguish the storage location based on the retention period of the content files. Third, systems that access content files, such as records creation, records management, and information disclosure systems, can share the cloud storage and minimize the duplication of content files.

Three-Dimensional Stacked Memory System for Defect Tolerance (적층 구조의 3차원 결함극복 메모리)

  • Han, Se-hwan;You, Young-Gap;Cho, Tae-Won
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.47 no.11
    • /
    • pp.23-29
    • /
    • 2010
  • This paper presents a method for constructing a memory system using defective memory chips comprising faulty storage blocks. The three-dimensional memory system introduced here employs a die-stacked structure of faulty memory chips. Signals lines passing through the through-silicon-vias (TSVs) connect chips in the defect tolerant structure. Defective chips are classified into several groups each group comprising defective chips having faulty blocks at the same location. A defect tolerant memory system is constructed using chips from different groups. Defect-free storage blocks from spare chips replace faulty blocks using additional routing circuitry. The number of spare chips for defect tolerance is $s={\ulcorner}(k{\times}n)/(m-k){\urcorner}$ to make a system defect tolerant for (n+s) chips with k faulty blocks among m independently addressable blocks.

Personal-usage Authentication of Broadcast Programs Using a Secure Portable Storage (휴대용 보안 저장매체 기반 방송프로그램 사적이용 인증 기법)

  • Lee, Joo-Young;Choo, Hyon-Gon;Nam, Je-Ho
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.46 no.2
    • /
    • pp.10-18
    • /
    • 2009
  • In this paper, we propose a novel method for authenticating a user's personal-usage using a secure portable storage, so that the user carrying the secure portable storage is able to consume his/her own broadcast programs freely, regardless of the location of the devices. The proposed authentication process is performed by a portable personal-usage authentication device, an access-control module for the portable personal-usage authentication device, and a player integrating the access control module. The portable personal-usage authentication device plays a role of secure storage in which domain authentication information is securely stored, while the access-control module is in charge of accessing the authentication information and, consequently, acquiring a decryption key. The player decrypts the broadcast programs in real time and processes the decrypted media streams. In this Paper, we describe the structure and procedure of the proposed model, and verify its feasibility by implementation.

Determination of Optimal Location of Washlands Considering Design Frequency (설계빈도변화를 고려한 천변저류지 최적위치 선정)

  • Baek, Chun-Woo;Ahn, Tae-Jin
    • Journal of Korea Water Resources Association
    • /
    • v.42 no.7
    • /
    • pp.559-569
    • /
    • 2009
  • Due to environmental, economical and the other limitations, it has been more difficult to construct new large hydraulic structure such as dam. For this reason, it has been tried to use small hydraulic structure such as washland as alternative of hydraulic facility. Because the flood control effect of small hydraulic structure are affected by runoff volume, hydrograph, storage capacity and weir crest elevation, and design frequency must be predetermined for the design of the hydraulic structure. Multiple washlands will be required to satisfy enough peak reduction effect so that considering washlands as a network, rather than individually, are critical to analysis of flood reduction effect. In this study, new index for determination of optimal location for washlands is presented and the existing model for this determination is modified by adopting the new index. Developed new model is applied to Ansung river basin for examination and the new model shows its' applicability as a decision making criteria for the determination of optimal location for washlands.

A Study on the Factor Analysis of Distribution Center Location Selection by Industry (업종별 물류단지 입지 선정을 위한 실증적 연구)

  • Oh, Sun-Il;Cho, Kwang-Hee;Kang, Kyung-Sik
    • Journal of the Korea Safety Management & Science
    • /
    • v.14 no.3
    • /
    • pp.207-220
    • /
    • 2012
  • Nowadays, logistics parks are no longer simply storage areas but rather the center of corporate supply activities. As the importance of logistics increases, so does the value of logistics related facilities. Unlike the past, in which the sole purpose of logistics services was the spatial movement of materials through transportation, modern logistics are required to carry out functions such as timely adjustment and swift adaptation to changing patterns, and this leads to the emphasis on forming logistics parks. Logistics parks make profits using the efficiency of time and space. Such logistics parks play an important role in a corporation creating operating profits as well as acting as a method of alternative investment for individuals. Logistics parks no longer simply store materials, but have become a place that plays an important role in various areas of corporate and individual activities, and thus the analysis of the selection of the location of logistics parks and the related characteristics is extremely important. There are many existing studies on the selection of locations of logistics parks but work on the factors related to location selection by industry seem lacking. As such, in the course of this study we have used preceeding studies to draft a questionnaire on which selection factors affect the selection of logistics park location in different industries and conducted empirical analysis of the questionnaire results to uncover the factors that affect the selection of the locations of logistics parks in different industries.

An Experimental Study on the Estimation of Chloride Diffusion Coefficient of LNG Storage Tanks (LNG 저장탱크 염해 확산 계수 산출을 위한 실험적 고찰)

  • Lee, Seung-Rim;Hwang, Seung-Hyun
    • Journal of Energy Engineering
    • /
    • v.21 no.2
    • /
    • pp.119-123
    • /
    • 2012
  • Although LNG storage tanks are very delicate with chloride attack owing to its operating inshore location, specific integrity management system for chloride attack has not been studied so far. As the design warranty life time, about 25 years, has come, to prevent paying huge amount of construction cost and required resources for new alternative storage tanks and manage the life time of operating storage tanks, the basic data of chloride attack is necessary. This study intended to build up basic data for following detailed study to develop technologies for life time management of LNG storage tanks, NT Build 492 method in North Europe was used to test chloride diffusion coefficient for the newly-constructing concrete outer tank. Results of these tests lead us to the conclusion that 90 days diffusion coefficients show 46% of 28 days' due to a large quantity of fly ash mixing and much similar to estimation from concrete process table. It seems resonable to conclude that 90 days specimens are recommended estimating the chloride diffusion coefficient for LNG storage tanks to enhance the reliabilities.

A Study on Creation of Secure Storage Area and Access Control to Protect Data from Unspecified Threats (불특정 위협으로부터 데이터를 보호하기 위한 보안 저장 영역의 생성 및 접근 제어에 관한 연구)

  • Kim, Seungyong;Hwang, Incheol;Kim, Dongsik
    • Journal of the Society of Disaster Information
    • /
    • v.17 no.4
    • /
    • pp.897-903
    • /
    • 2021
  • Purpose: Recently, ransomware damage that encrypts victim's data through hacking and demands money in exchange for releasing it is increasing domestically and internationally. Accordingly, research and development on various response technologies and solutions are in progress. Method: A secure storage area and a general storage area were created in the same virtual environment, and the sample data was saved by registering the access process. In order to check whether the stored sample data is infringed, the ransomware sample was executed and the hash function of the sample data was checked to see if it was infringed. The access control performance checked whether the sample data was accessed through the same name and storage location as the registered access process. Result: As a result of the experiment, the sample data in the secure storage area maintained data integrity from ransomware and unauthorized processes. Conclusion: Through this study, the creation of a secure storage area and the whitelist-based access control method are evaluated as suitable as a method to protect important data, and it is possible to provide a more secure computing environment through future technology scalability and convergence with existing solutions.

Design of the Flexible Buffer Node Technique to Adjust the Insertion/Search Cost in Historical Index (과거 위치 색인에서 입력/검색 비용 조정을 위한 가변 버퍼 노드 기법 설계)

  • Jung, Young-Jin;Ahn, Bu-Young;Lee, Yang-Koo;Lee, Dong-Gyu;Ryu, Keun-Ho
    • The KIPS Transactions:PartD
    • /
    • v.18D no.4
    • /
    • pp.225-236
    • /
    • 2011
  • Various applications of LBS (Location Based Services) are being developed to provide the customized service depending on user's location with progress of wireless communication technology and miniaturization of personalized device. To effectively process an amount of vehicles' location data, LBS requires the techniques such as vehicle observation, data communication, data insertion and search, and user query processing. In this paper, we propose the historical location index, GIP-FB (Group Insertion tree with Flexible Buffer Node) and the flexible buffer node technique to adjust the cost of data insertion and search. the designed GIP+ based index employs the buffer node and the projection storage to cut the cost of insertion and search. Besides, it adjusts the cost of insertion and search by changing the number of line segments of the buffer node with user defined time interval. In the experiment, the buffer node size influences the performance of GIP-FB by changing the number of non-leaf node of the index. the proposed flexible buffer node is used to adjust the performance of the historical location index depending on the applications of LBS.