• Title/Summary/Keyword: 네트워크효과

Search Result 2,957, Processing Time 0.032 seconds

Efficient Privacy-Preserving Duplicate Elimination in Edge Computing Environment Based on Trusted Execution Environment (신뢰실행환경기반 엣지컴퓨팅 환경에서의 암호문에 대한 효율적 프라이버시 보존 데이터 중복제거)

  • Koo, Dongyoung
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.11 no.9
    • /
    • pp.305-316
    • /
    • 2022
  • With the flood of digital data owing to the Internet of Things and big data, cloud service providers that process and store vast amount of data from multiple users can apply duplicate data elimination technique for efficient data management. The user experience can be improved as the notion of edge computing paradigm is introduced as an extension of the cloud computing to improve problems such as network congestion to a central cloud server and reduced computational efficiency. However, the addition of a new edge device that is not entirely reliable in the edge computing may cause increase in the computational complexity for additional cryptographic operations to preserve data privacy in duplicate identification and elimination process. In this paper, we propose an efficiency-improved duplicate data elimination protocol while preserving data privacy with an optimized user-edge-cloud communication framework by utilizing a trusted execution environment. Direct sharing of secret information between the user and the central cloud server can minimize the computational complexity in edge devices and enables the use of efficient encryption algorithms at the side of cloud service providers. Users also improve the user experience by offloading data to edge devices, enabling duplicate elimination and independent activity. Through experiments, efficiency of the proposed scheme has been analyzed such as up to 78x improvements in computation during data outsourcing process compared to the previous study which does not exploit trusted execution environment in edge computing architecture.

Analysis of Deep Learning Research Trends Applied to Remote Sensing through Paper Review of Korean Domestic Journals (국내학회지 논문 리뷰를 통한 원격탐사 분야 딥러닝 연구 동향 분석)

  • Lee, Changhui;Yun, Yerin;Bae, Saejung;Eo, Yang Dam;Kim, Changjae;Shin, Sangho;Park, Soyoung;Han, Youkyung
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.39 no.6
    • /
    • pp.437-456
    • /
    • 2021
  • In the field of remote sensing in Korea, starting in 2017, deep learning has begun to show efficient research results compared to existing research methods. Currently, research is being conducted to apply deep learning in almost all fields of remote sensing, from image preprocessing to applications. To analyze the research trend of deep learning applied to the remote sensing field, Korean domestic journal papers, published until October 2021, related to deep learning applied to the remote sensing field were collected. Based on the collected 60 papers, research trend analysis was performed while focusing on deep learning network purpose, remote sensing application field, and remote sensing image acquisition platform. In addition, open source data that can be effectively used to build training data for performing deep learning were summarized in the paper. Through this study, we presented the problems that need to be solved in order for deep learning to be established in the remote sensing field. Moreover, we intended to provide help in finding research directions for researchers to apply deep learning technology into the remote sensing field in the future.

A Strategic Analysis of Digital Transformation for Data Integration based on Platform Business Model: Focusing on Financial Industry (디지털 트랜스포메이션의 플랫폼 비즈니스 모델 기반 데이터 통합 관점 분석: 금융산업 사례를 중심으로)

  • Kim, Iljoo
    • The Journal of Society for e-Business Studies
    • /
    • v.26 no.4
    • /
    • pp.119-131
    • /
    • 2021
  • With the boom of platform businesses, digital transformation has become the most important topic for businesses. Digital transformation has now become the most urgent strategy for survival, from a strategy considered as an option to choose in the past. Many companies are desperately seeking the ways to be digitally transformed. Even though there have been many studies on digital transformation, most of them are on strategic and conceptual model levels based on simple case analyses. In this study, we analyze the benefits of data integration and network effects from it, based on platform business model at the core of digital transformation. The change based on platform can be categorized into the internal one for the integration of data and better decision making, and the external one for the expansion of the businesses and better prediction of consumer behaviors through the integration of external data sets by the platform business model based enterprises. While the progress for digital transformation is not mature enough yet, financial industry is one of the most promising industries for the change and realization of the aim of it with its relatively much more advanced IT infrastructure. Many companies are making various efforts for the integration of external data, and if the good results can be accomplished, financial industry will contribute to the advancement of digital transformation in other industries as well. For "My Data" project by Korean government, we suggest the data structure and transaction of data (of Korea) should be advanced and established more quickly.

A study on the effect of managers' innovation orientation, technological innovation capability and organizational capability on corporate innovation behavior (중소기업의 전략적지향성, 기술혁신역량, 조직역량이 기업성과에 미치는 영향에 관한 연구)

  • Kim, Sang-Hwa
    • The Journal of the Convergence on Culture Technology
    • /
    • v.8 no.5
    • /
    • pp.399-407
    • /
    • 2022
  • Although Companies are forming cooperation and networks with various companies such as technology and R&D, but it is urgently necessary to secure multiple competencies of companies that can effectively adapt. This study investigated the effects of corporate strategic orientation, technological innovation capability, and organizational capability on corporate performance targeting SMEs located in the Daegu area. The survey was conducted from September 1 to November 30, 2021 for employees of Daegu companies, and a total of 183 cases were used for the final analysis. Looking at the results of the analysis, as a result of multiple regression analysis on Daegu companies, it was found that the strategic orientation, technological innovation capability, and organizational capability of managers, all independent variables, had a significant positive (+) effect on corporate performance. It can be seen that efforts should be made to improve education and R&D according to various competency bases and innovations because of the large impact on the manager's mind, the company's core technical competency, and the company's organizational performance. This study aimed to understand the importance of corporate strategic orientation, technological innovation capability, and organizational capability on corporate performance targeting relevant SMEs that can have a significant impact on national and regional economies.

Design and Forensic Analysis of a Zero Trust Model for Amazon S3 (Amazon S3 제로 트러스트 모델 설계 및 포렌식 분석)

  • Kyeong-Hyun Cho;Jae-Han Cho;Hyeon-Woo Lee;Jiyeon Kim
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.2
    • /
    • pp.295-303
    • /
    • 2023
  • As the cloud computing market grows, a variety of cloud services are now reliably delivered. Administrative agencies and public institutions of South Korea are transferring all their information systems to cloud systems. It is essential to develop security solutions in advance in order to safely operate cloud services, as protecting cloud services from misuse and malicious access by insiders and outsiders over the Internet is challenging. In this paper, we propose a zero trust model for cloud storage services that store sensitive data. We then verify the effectiveness of the proposed model by operating a cloud storage service. Memory, web, and network forensics are also performed to track access and usage of cloud users depending on the adoption of the zero trust model. As a cloud storage service, we use Amazon S3(Simple Storage Service) and deploy zero trust techniques such as access control lists and key management systems. In order to consider the different types of access to S3, furthermore, we generate service requests inside and outside AWS(Amazon Web Services) and then analyze the results of the zero trust techniques depending on the location of the service request.

A Study on the Power Converter Control of Utility Interactive Photovoltaic Generation System (계통 연계형 태양광 발전시스템의 전력변환기 제어에 관한 연구)

  • Na, Seung-Kwon;Ku, Gi-Jun;Kim, Gye-Kuk
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.2
    • /
    • pp.157-168
    • /
    • 2009
  • In this paper, a photovoltaic system is designed with a step up chopper and single phase PWM(Pulse Width Modulation) voltage source inverter. Where proposed Synchronous signal and control signal was processed by one-chip microprocessor for stable modulation. The step up chopper operates in continuous mode by adjusting the duty ratio so that the photovoltaic system tracks the maximum power point of solar cell without any influence on the variation of insolation and temperature because solar cell has typical voltage and current dropping character. The single phase PWM voltage source the inverter using inverter consists of complex type of electric power converter to compensate for the defect, that is, solar cell cannot be developed continuously by connecting with the source of electric power for ordinary use. It can cause the effect of saving electric power. from 10 to 20[%]. The single phase PWM voltage source inverter operates in situation that its output voltage is in same phase with the utility voltage. In order to enhance the efficiency of photovoltaic cells, photovoltaic positioning system using sensor and microprocessor was design so that the fixed type of photovoltaic cells and photovoltaic positioning system were compared. In result, photovoltaic positioning system can improved 5% than fixed type of photovoltaic cells. In addition, I connected extra power to the system through operating the system voltage and inverter power in a synchronized way by extracting the system voltage so that the phase of the system and the phase of single-phase inverter of PWM voltage type can be synchronized. And, It controlled in order to provide stable pier to the load and the system through maintaining high lurer factor and low output power of harmonics.

Log Collection Method for Efficient Management of Systems using Heterogeneous Network Devices (이기종 네트워크 장치를 사용하는 시스템의 효율적인 관리를 위한 로그 수집 방법)

  • Jea-Ho Yang;Younggon Kim
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.23 no.3
    • /
    • pp.119-125
    • /
    • 2023
  • IT infrastructure operation has advanced, and the methods for managing systems have become widely adopted. Recently, research has focused on improving system management using Syslog. However, utilizing log data collected through these methods presents challenges, as logs are extracted in various formats that require expert analysis. This paper proposes a system that utilizes edge computing to distribute the collection of Syslog data and preprocesses duplicate data before storing it in a central database. Additionally, the system constructs a data dictionary to classify and count data in real-time, with restrictions on transmitting registered data to the central database. This approach ensures the maintenance of predefined patterns in the data dictionary, controls duplicate data and temporal duplicates, and enables the storage of refined data in the central database, thereby securing fundamental data for big data analysis. The proposed algorithms and procedures are demonstrated through simulations and examples. Real syslog data, including extracted examples, is used to accurately extract necessary information from log data and verify the successful execution of the classification and storage processes. This system can serve as an efficient solution for collecting and managing log data in edge environments, offering potential benefits in terms of technology diffusion.

Personalized Session-based Recommendation for Set-Top Box Audience Targeting (셋톱박스 오디언스 타겟팅을 위한 세션 기반 개인화 추천 시스템 개발)

  • Jisoo Cha;Koosup Jeong;Wooyoung Kim;Jaewon Yang;Sangduk Baek;Wonjun Lee;Seoho Jang;Taejoon Park;Chanwoo Jeong;Wooju Kim
    • Journal of Intelligence and Information Systems
    • /
    • v.29 no.2
    • /
    • pp.323-338
    • /
    • 2023
  • TV advertising with deep analysis of watching pattern of audiences is important to set-top box audience targeting. Applying session-based recommendation model(SBR) to internet commercial, or recommendation based on searching history of user showed its effectiveness in previous studies, but applying SBR to the TV advertising was difficult in South Korea due to data unavailabilities. Also, traditional SBR has limitations for dealing with user preferences, especially in data with user identification information. To tackle with these problems, we first obtain set-top box data from three major broadcasting companies in South Korea(SKB, KT, LGU+) through collaboration with Korea Broadcast Advertising Corporation(KOBACO), and this data contains of watching sequence of 4,847 anonymized users for 6 month respectively. Second, we develop personalized session-based recommendation model to deal with hierarchical data of user-session-item. Experiments conducted on set-top box audience dataset and two other public dataset for validation. In result, our proposed model outperformed baseline model in some criteria.

Examining Access Mode Choice Behavior of Local Metropolitan High-Speed Rail Station - A Case Study of Dong-Daegu Station - (고속철도 지방대도시 정차역의 연계교통수단 선택모형 구축에 관한 연구 - 동대구역을 사례로 -)

  • Kim, Sang Hwang;Kim, Kap Soo
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.26 no.4D
    • /
    • pp.565-571
    • /
    • 2006
  • This study aimed to analyze access mode choice behavior for KTX Passengers. To fulfill the aims of this study, Dong-Daegu Station was selected as a station for a case study. This study takes place in two stages. These are (i) descriptive statistical analysis of transportation status before and after introduction of the KTX, (ii) empirical model estimation for analyzing access mode choice behavior. This study makes use of the data from travel survey from Daegu metropolitan area. The main part of the survey was carried out in the KTX Dong-Daegu station. The data was collected from a sample of 1,800 individuals. The survey data includes the information on travel from Dong-Daegu station to Seoul. From descriptive statistical analysis of transportation status before and after introduction of the KTX, it is found that revealed demand of the KTX is lower than that expected. Moreover, it is found that the low demand of the KTX stems from high cost for the KTX itself and inconvenience( including travel time and cost) of access mode. In order to analyze mode choice behavior for accessing Dong-Daegu station, multinomial logit model structure is used. For the model specification, a variety of behavioral assumptions about the factors which affect the access mode choice, were considered. From the empirical model estimation, it si found that access travel time and access travel cost are significant in choosing access mode. Given the empirical evidence, we see that improvement of access transportation system for Dong-Daegu station is very important for enhancing the use of KTX.

Implementation of reliable dynamic honeypot file creation system for ransomware attack detection (랜섬웨어 공격탐지를 위한 신뢰성 있는 동적 허니팟 파일 생성 시스템 구현)

  • Kyoung Wan Kug;Yeon Seung Ryu;Sam Beom Shin
    • Convergence Security Journal
    • /
    • v.23 no.2
    • /
    • pp.27-36
    • /
    • 2023
  • In recent years, ransomware attacks have become more organized and specialized, with the sophistication of attacks targeting specific individuals or organizations using tactics such as social engineering, spear phishing, and even machine learning, some operating as business models. In order to effectively respond to this, various researches and solutions are being developed and operated to detect and prevent attacks before they cause serious damage. In particular, honeypots can be used to minimize the risk of attack on IT systems and networks, as well as act as an early warning and advanced security monitoring tool, but in cases where ransomware does not have priority access to the decoy file, or bypasses it completely. has a disadvantage that effective ransomware response is limited. In this paper, this honeypot is optimized for the user environment to create a reliable real-time dynamic honeypot file, minimizing the possibility of an attacker bypassing the honeypot, and increasing the detection rate by preventing the attacker from recognizing that it is a honeypot file. To this end, four models, including a basic data collection model for dynamic honeypot generation, were designed (basic data collection model / user-defined model / sample statistical model / experience accumulation model), and their validity was verified.