• Title/Summary/Keyword: Convergence Protection Performance

Search Result 104, Processing Time 0.02 seconds

User privacy protection model through enhancing the administrator role in the cloud environment (클라우드 환경에서 관리자 역할을 강화한 사용자 프라이버시 보호 모델)

  • Jeong, Yoon-Su;Yon, Yong-Ho
    • Journal of Convergence for Information Technology
    • /
    • v.8 no.3
    • /
    • pp.79-84
    • /
    • 2018
  • Cloud services are readily available through a variety of media, attracting a lot of attention from users. However, there are various security damages that abuse the privacy of users who use cloud services, so there is not enough technology to prevent them. In this paper, we propose a protection model to safeguard user's privacy in a cloud environment so as not to illegally exploit user's privacy. The proposed model randomly manages the user's signature to strengthen the role of the middle manager and the cloud server. In the proposed model, the user's privacy information is provided illegally by the cloud server to the user through the security function and the user signature. Also, the signature of the user can be safely used by bundling the random number of the multiplication group and the one-way hash function into the hash chain to protect the user's privacy. As a result of the performance evaluation, the proposed model achieved an average improvement of data processing time of 24.5% compared to the existing model and the efficiency of the proposed model was improved by 13.7% than the existing model because the user's privacy information was group managed.

A Study on the Gap Analysis between Expectation and Perceptions of Users for IPTV Services based on N-Screen Technology (N-Screen 기술 기반 IPTV서비스에 대한 이용자의 기대와 인지 간의 GAP분석에 관한 연구)

  • Kim, Jun Soo;Kang, Sang Ug;Lim, Gyoo Gun
    • The Journal of Society for e-Business Studies
    • /
    • v.18 no.2
    • /
    • pp.205-222
    • /
    • 2013
  • One of the recent important issues in IT fields is the convergence. It had been simply focused on functional convergence of technologyies. However the convergence in terms of businesses or services also has been made in recent years. The convergence between broadcasting and telecommunication industries can be possible because the e-transformation of broadcasting industry based on digital technology such as multimedia and multi-channel, can be combined with the high speed telecommunication network. It is giving a birth of various convergence services such as IPTV. IPTV is a kind of new service that is combined with the convergence of network, contents, and device. Nevertheless the controversy about the scope and the value of this new convergence service has constantly been raised; for example, what is the difference between IPTV and Internet TV? or what are the benefits that customers can have? This study measured the expectation level and the cognitive level of users before and after using the service and analyzed the gap between the importance and the satisfaction of the service. From this study, we proposed the priority of each function by analysing Importance-Performance Analysis(IPA) method to suggest required functions of IPTV service based on N-Screen technology. This study will identify the gap of awareness level between service providers and end users for the functions of broadcasting and telecommunications convergence service and suggest a solution enhancing user satisfaction.

Watermarking Based on Complemented MLCA and 2D CAT

  • Li, Xiao-Wei;Yun, Jae-Sik;Cho, Sung-Jin;Kim, Seok-Tae
    • Journal of information and communication convergence engineering
    • /
    • v.9 no.2
    • /
    • pp.212-216
    • /
    • 2011
  • Digital watermarking has gained importance in recent years in copyright protection and multimedia. This paper proposes a secure and novel watermarking system based on complemented Maximum Length Cellular Automata (MLCA) and Two-Dimension Cellular Automata Transform (2D CAT). In this watermarking scheme, the original watermark is first encrypted by complemented MLCA with the private keys, and then the encrypted watermark is embedded into the CAT domain of the cover image, at last use the inverse CAT for the transformed image, the watermarked image is obtained. Experiment results show that this new method is more secure and provides robust performance against watermarking attacks.

A Study on How to vitalize Technical Innovation of the Small and Medium Firms (중소기업 기술혁신 활성화 방안 연구)

  • Lee, Seung-Hee;Noh, Kyoo-Sung;Kim, Hye-Kyung;Park, Lae-Gyu
    • Journal of Digital Convergence
    • /
    • v.5 no.1
    • /
    • pp.101-116
    • /
    • 2007
  • The purpose of this paper is to suggest field-oriented policy of regional innovation support system. To accomplish this purpose, we examined the status quo of technical support, performance satisfaction of consumers and practical issues. The key factors influencing core technical innovation of small and medium firms are development fund, R&D employees, experimental instrument, technical information, protection of intellectual property, subcontracting and so on. To make sure of practical effect, therefore, it would rather necessary to implement policy support linking government and supporting means on the ground of needs of small and medium firms than specific method such as funding.

  • PDF

An Iterative CRT Based Image Watermarking on DCT Domain

  • Choi, Ji-Su;Kim, Gye-Young
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.2
    • /
    • pp.41-48
    • /
    • 2019
  • Digital image watermarking techniques have been studied in various fields in order to protect the copyright of multimedia contents mostly composed by images. JPEG compression is a representative copyright attack for image watermarking. The CRT-based watermarking methods in DCT domain have been studied, because these are robust for JPEG compression attack. In this paper, we propose a new method with improved performance compared with the existing CRT based methods in DCT domain. The proposed method selects the DCT block according to the denseness at the watermark insertion phase, and iteratively adjust the CRT Conditional coefficients at the watermark extraction. This paper shows that it is more robust for the JPEG compression attacks through experimental results.

Mediating effect of appropriation between non-technical innovation and business performance (비 기술혁신과 기업의 경영성과 사이에서 전유성의 매개효과)

  • Choi, Jin
    • Journal of Industrial Convergence
    • /
    • v.18 no.5
    • /
    • pp.14-22
    • /
    • 2020
  • In this study, in addition to non-technical innovation activities such as organizational innovation and marketing innovation, the purpose of this study was to verify through empirical analysis what mechanism appropriation affects the business performance of a company. Data were collected from the 2018 Korean Business Innovation Survey: Manufacturing Sector and used as analysis data. As a result of the analysis, it was verified through empirical analysis that non-technical innovation improves management performance, appropriability is affected by non-technical innovation, and acts as a mediating factor between management performance. Through this empirical analysis, it was derived that considering appropriation along with non-technical innovation on the recently studied non-technical innovation can be a meaningful study, and since securing such appropriation is an important factor in determining the business performance of a company. Companies need insight into the strategic use of technology protection measures to secure appropriation. As a limitation, it was limited to studies that verify that it has a mediating effect of non-technical innovation and appropriation, and it is considered that it is possible to develop a study that affects the management performance of a company through more various verification methods for future studies.

Design and implementation of Android obfuscation technique using layout file transformation (레이아웃 파일 변환을 이용한 안드로이드 난독화 기법의 설계 및 구현)

  • Park, Heewan
    • Journal of the Korea Convergence Society
    • /
    • v.11 no.11
    • /
    • pp.1-7
    • /
    • 2020
  • Android apps are mostly distributed as an apk files, and when the apk file is uncompressed, resource files such as xml files, images, and sounds related to app design can be extracted. If the resources of banking or finance-related apps are stolen and fake apps are distributed, personal information could be stolen or financial fraud may occur. Therefore, it is necessary to make it difficult to steal the design as well as the code when distributing the app. In this paper, we implemented a tool to convert the xml file into Java code and obfuscate using the Proguard, and evaluated the execution performance. If the layout obfuscation technique proposed in this paper is used, it is expected that the app operation performance can be improved and the illegal copying damage caused by the theft of the screen design can be prevented.

Design of an Interface System IC for Automobile ABS/TCS (자동차용 ABS/TCS 인터페이스 시스템 IC의 설계)

  • Lee, Sung-Pil;Kim, Chan
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.7 no.4
    • /
    • pp.195-200
    • /
    • 2006
  • The conventional discrete circuit for ABS/TCS system was examined and the problems of the system were analyzed by computer simulation. In order to improve the performance of ABS/TCS system, interface IC which has error compensation, comparator and under voltage lock-out circuit was designed and their electrical characteristics were investigated. The voltage regulator was included to compensate the temperature variation in the temperature range from $-20^{\circ}C$ to $120^{\circ}C$ for automobile environment. ABS and brake signal were separated using the duty factor of same frequency or different frequencies. UVLO(Under Voltage Lock-Out) circuit and constant current circuit were applied for the elimination of noise, and protection circuit was applied to cut the excess current off. Layout for IC fabrication was designed to enhance the electrical performance of ABS/TCS system. Layout was consisted of 11 masks, arrayed effectively 8 pads to reduce the current loss. We can see that the result of layout simulation was better than the result of bread board.

  • PDF

DTLS-based CoAP Security Mechanism Analysis and Performance Evaluation (DTLS 기반의 CoAP 보안 메커니즘 분석 및 성능평가)

  • Han, Sang woo;Park, Chang seop;Cho, Jung mo
    • Convergence Security Journal
    • /
    • v.17 no.5
    • /
    • pp.3-10
    • /
    • 2017
  • Standard Protocol Optimized for Resource-Constrained IoT Environment Constrained Application Protocol (CoAP) supports web-based communication between a sensor node in the IoT environment and a client on the Internet. The CoAP is a Request / Response model that responds to the client's CoAP Request message by responding with a CoAP Response message from the server. CoAP recommends the use of CoAP-DTLS for message protection. However, validation of the use of DTLS in the IoT environment is underway. We analyze CoAP and DTLS security mode, evaluate performance of secure channel creation time, security channel creation step time, and RAM / ROM consumption through Cooja simulator and evaluate the possibility of real environment application.

Minimizing Sensing Decision Error in Cognitive Radio Networks using Evolutionary Algorithms

  • Akbari, Mohsen;Hossain, Md. Kamal;Manesh, Mohsen Riahi;El-Saleh, Ayman A.;Kareem, Aymen M.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.9
    • /
    • pp.2037-2051
    • /
    • 2012
  • Cognitive radio (CR) is envisioned as a promising paradigm of exploiting intelligence for enhancing efficiency of underutilized spectrum bands. In CR, the main concern is to reliably sense the presence of primary users (PUs) to attain protection against harmful interference caused by potential spectrum access of secondary users (SUs). In this paper, evolutionary algorithms, namely, particle swarm optimization (PSO) and genetic algorithm (GA) are proposed to minimize the total sensing decision error at the common soft data fusion (SDF) centre of a structurally-centralized cognitive radio network (CRN). Using these techniques, evolutionary operations are invoked to optimize the weighting coefficients applied on the sensing measurement components received from multiple cooperative SUs. The proposed methods are compared with each other as well as with other conventional deterministic algorithms such as maximal ratio combining (MRC) and equal gain combining (EGC). Computer simulations confirm the superiority of the PSO-based scheme over the GA-based and other conventional MRC and EGC schemes in terms of detection performance. In addition, the PSO-based scheme also shows promising convergence performance as compared to the GA-based scheme. This makes PSO an adequate solution to meet real-time requirements.