• Title/Summary/Keyword: 데이터 정책

Search Result 3,578, Processing Time 0.028 seconds

A study on the invigorating strategies for open government data (공공데이터 이용 활성화를 위한 정책에 관한 연구)

  • Hong, Yeon Woong
    • Journal of the Korean Data and Information Science Society
    • /
    • v.25 no.4
    • /
    • pp.769-777
    • /
    • 2014
  • Recently many countries have established open government data platforms to disclose government or government controlled entities-owned data that can be freely used, reused and redistributed by anyone. Open government data can help you to make better decisions in your own life, or enable you to be more active in society. Open data is also making government more effective and transparent, which ultimately also reduces costs. This paper explains the open data concepts and circumstances in Korea, and also suggests detailed invigorating strategies such as data quality policy, data unification and standardization policy, open data service platform, and integrated support plan of big data and open government data.

A Peer-to-Peer based Replication Strategy for Data Grid (데이터 그리드를 위한 Peer-to-Peer기반 복제 정책)

  • 오상원;이원주;전창호
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2004.10a
    • /
    • pp.49-51
    • /
    • 2004
  • 데이터 그리드를 위한 기존의 복제 정책은 계층적 구조를 기반으로 하고 있기 때문에 상위계승에서 하위계층으로만 데이터를 복제할 수 있어 비효율적이다. 따라서 본 논문에서는 기존 데이터 그리드의 계층적 구조에 P2P(Peer-to-Peer)시스템을 적용하여 효율적으로 복제본을 유지할 수 있는 새로운 복제 정책을 제안한다. 이 정책의 특징은 클라이언트 노드의 저장 공간 일정 부분을 임계 구역(critical section)으로 지정하여 데이터 조작을 방지함으로써 클라이언트 노드도 데이터 복제본을 저장할 수 있는 기능을 가지도록 한 것이다. 따라서 계층적 구조에서 상위 계층뿐만 아니라 동일 계층 또는 클라이언트 노드들 간의 데이터 전송이 가능하기 때문에 데이터 그리드의 성능을 향상시킬 수 있다.

  • PDF

Implementation of Multicore-Aware Load Balancing on Clusters through Data Distribution in Chapel (클러스터 상에서 다중 코어 인지 부하 균등화를 위한 Chapel 데이터 분산 구현)

  • Gu, Bon-Gen;Carpenter, Patrick;Yu, Weikuan
    • The KIPS Transactions:PartA
    • /
    • v.19A no.3
    • /
    • pp.129-138
    • /
    • 2012
  • In distributed memory architectures like clusters, each node stores a portion of data. How data is distributed across nodes influences the performance of such systems. The data distribution scheme is the strategy to distribute data across nodes and realize parallel data processing. Due to various reasons such as maintenance, scale up, upgrade, etc., the performance of nodes in a cluster can often become non-identical. In such clusters, data distribution without considering performance cannot efficiently distribute data on nodes. In this paper, we propose a new data distribution scheme based on the number of cores in nodes. We use the number of cores as the performance factor. In our data distribution scheme, each node is allocated an amount of data proportional to the number of cores in it. We implement our data distribution scheme using the Chapel language. To show our data distribution is effective in reducing the execution time of parallel applications, we implement Mandelbrot Set and ${\pi}$-Calculation programs with our data distribution scheme, and compare the execution times on a cluster. Based on experimental results on clusters of 8-core and 16-core nodes, we demonstrate that data distribution based on the number of cores can contribute to a reduction in the execution times of parallel programs on clusters.

An Analysis of the Relationship between Public Opinion on Social Bigdata and Results after Implementation of Public Policies: A Case Study in 'Welfare' Policy (소셜 빅데이터 기반 공공정책 국민의견 수렴과 정책 시행 이후 결과 관계 분석: '복지' 정책 사례를 중심으로)

  • Kim, Tae-Young;Kim, Yong;Oh, Hyo-Jung
    • Journal of Digital Convergence
    • /
    • v.15 no.3
    • /
    • pp.17-25
    • /
    • 2017
  • Horizon scanning that one of the methods for future prediction is adaptable way of establishing the policy strategy based on big data. This study aims to understand the social problems scientifically utilized horizon scanning technique, and contribute to public policy formulation based on scanning analysis. In this paper, we proposed a public opinion framework for public policy based on social bigdata, and then confirmed the feasibility this framework by analysis of the relationship between public opinion and results after implementation of public policy. Consequently, based on the analysis, we also drew implications of policy formulation about 'free childcare for under 5-years of age' as an object of study. The method that collects public opinion is very important to effective policy establishment and make contribution to constructing national response systems for social development.

The Security Policy for Big data of US Government (미정부의 빅데이터를 위한 보안정책)

  • Hong, Jinkeun
    • Journal of Digital Convergence
    • /
    • v.11 no.10
    • /
    • pp.403-409
    • /
    • 2013
  • This paper review about big data policy and security issue of US government. It is introduced Big data R&D initiative strategy and plan, NITRD program, and big data strategy of government. It is presented operation environment of big data in US government, big data information for military operation, major research organization and topic, security guideline and so on.

A Study on Privacy Protection in Financial Mydata Policy through Comparison of the EU's PSD2 (유럽 PSD2 시행에 따른 금융분야 마이데이터 정책의 개인정보보호 강화 방안 연구)

  • Song, Mi-Jung;Kim, In-Seok
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.5
    • /
    • pp.1205-1219
    • /
    • 2019
  • As the ability to use data becomes competitive power in the data-driven economy, the effort to create economic value by using personal data is emphasized as much as to protect personal data. EU's PSD2(the second Payment Service directive) became the initiative of the Open Banking trends all over the world, as it is the Mydata policy which protects the data subject's right by empowering the subject to control over the personal data with the right to data portability and promotes personal data usages and transfer. Korean government is now fast adopting EU's PSD2 in financial sector, but there is growing concerns in personal data abuse and misuse, and data breach. This study analyzes domestic financial Mydata policy in comparison with EU's PSD2 and focus on Personal information life-cycle risks of financial Mydata policy. Some suggestions on how to promote personal information and privacy in domestic financial Mydata Policy will be given.

Implementation of Data Mining Engine for Analyzing Alert Data of Security Policy Server (보안정책 서버의 경보데이터 분석을 위한 데이터마이닝 엔진의 구현)

  • 정경자;신문선
    • Journal of the Korea Society of Computer and Information
    • /
    • v.7 no.4
    • /
    • pp.141-149
    • /
    • 2002
  • Recently, a number of network systems are developed rapidly and network architectures are more complex than before, and a policy-based network management should be used in network system. Especially, a new paradigm that policy-based network management can be applied for the network security is raised. A security policy server in the management layer can generate new policy, delete. update the existing policy and decide the policy when security policy is requested. The security server needs to analyze and manage the alert message received from server Policy enforcement system in the enforcement layer for the available information. In this paper, we implement an alert analyzer that analyze the stored alert data for making of security policy efficiently in framework of the policy-based network security management. We also propose a data mining system for the analysis of alert data The implemented mining system supports alert analyzer and the high level analyzer efficiently for the security.

  • PDF

Kerberos Authentication Deployment Policy of US in Big data Environment (빅데이터 환경에서 미국 커버로스 인증 적용 정책)

  • Hong, Jinkeun
    • Journal of Digital Convergence
    • /
    • v.11 no.11
    • /
    • pp.435-441
    • /
    • 2013
  • This paper review about kerberos security authentication scheme and policy for big data service. It analyzed problem for security technology based on Hadoop framework in big data service environment. Also when it consider applying problem of kerberos security authentication system, it analyzed deployment policy in center of main contents, which is occurred in commercial business. About the related applied Kerberos policy in US, it is researched about application such as cross platform interoperability support, automated Kerberos set up, integration issue, OPT authentication, SSO, ID, and so on.

Implementation of a cache performance analyzer for roadside network based on SMPL (SMPL을 이용한 노변 네트워크 캐쉬 성능 분석기의 구현)

  • Lee, Junghoon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2009.04a
    • /
    • pp.1045-1046
    • /
    • 2009
  • 본 논문에서는 이산 이벤트 시뮬레이터인 SMPL을 이용하여 노변 네트워크에서의 데이터 처리에 따르는 데이터 캐쉬 성능분석기를 구현한다. 구현된 성능분석기는 SMPL의 요청 도착과 서비스 사건 처리를 기본 골격으로 하여 실제 차량의 궤적 데이터에 기반한 데이터 요청 생성부와 큐잉 정책과 캐쉬 정책을 선택할 수 있는 정책 처리부 등으로 구성된다. 이 분석기는 서비스율, 해당 정책, 캐쉬의 크기 등의 수행인자를 설정하여 이에 따르는 큐 길이의 분포, 캐쉬의 히트율, 요청 처리시간의 분포 등을 측정할 수 있도록 한다. 추정된 성능 요소를 기반으로 노변 네트워크에 기반한 차량 텔레매틱스 시스템에서 RSU(RoadSide Unit)의 배치, 성능 요구사항 분석, 새로운 큐잉 정책과 캐쉬 정책의 설계 등 다양한 응용이 가능하다.

A Study of File Replacement Policy in Data Grid Environments (데이터 그리드 환경에서 파일 교체 정책 연구)

  • Park, Hong-Jin
    • The KIPS Transactions:PartA
    • /
    • v.13A no.6 s.103
    • /
    • pp.511-516
    • /
    • 2006
  • The data grid computing provides geographically distributed storage resources to solve computational problems with large-scale data. Unlike cache replacement policies in virtual memory or web-caching replacement, an optimal file replacement policy for data grids is the one of the important problems by the fact that file size is very large. The traditional file replacement policies such as LRU(Least Recently Used) LCB-K(Least Cost Beneficial based on K), EBR(Economic-based cache replacement), LVCT(Least Value-based on Caching Time) have the problem that they have to predict requests or need additional resources to file replacement. To solve theses problems, this paper propose SBR-k(Sized-based replacement-k) that replaces files based on file size. The results of the simulation show that the proposed policy performs better than traditional policies.