• Title/Summary/Keyword: File Server

Search Result 399, Processing Time 0.024 seconds

Mobile DB Service of P2P Environment (P2P 환경에서 모바일 데이터베이스 서비스)

  • Kim, Dong-Hyun
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.2 no.1
    • /
    • pp.46-51
    • /
    • 2007
  • The file sharing method from P2P environments with client/server method to be different price does not use an expensive server from radio environment not to be, uses only the client computers and dispersed the joint ownership and a management of data. Human occurs from the client/server method which uses the server of large dosage with like this reason, will be able to minimize the waste of the waste of the material resources. Also valence increasing number of days rock operation of the user provides their benefit of etc. their result comes to be high. Like this is caused by with reason and the many people have an interest in P2P, also currently footlights the researches whice use P2P even in the mobile relation field which is receiving actively, is advanced.

  • PDF

Implementation of the Secure Web Server-Client Module Based on Protocol Architecture (프로토콜 기반 웹 클라이언트-서버 보안 모듈 구현)

  • Jang, Seung-Ju;Han, Soo-Whan
    • The KIPS Transactions:PartD
    • /
    • v.9D no.5
    • /
    • pp.931-938
    • /
    • 2002
  • We implement the PBSM (Protocol-Based Security Module) system which guarantees the secure data transmission under web circumstances. There are two modules to implement for the PBSM architecture. One is Web Server Security Module (WSSM) which is working on a web server, the other is the Winsock Client Security Module (WSCSM) which is working on a client. The WSCSM security module decrypts the encrypted HTML document that is received from the security web server The decrypted HTML document is displayed on the screen of a client. The WSSM module contains the encryption part for HTML file and the decryption part for CGI (Common Gateway Interface). We also implement the proposed idea at the web system.

Side-Channel Attack against Secure Data Deduplication over Encrypted Data in Cloud Storage (암호화된 클라우드 데이터의 중복제거 기법에 대한 부채널 공격)

  • Shin, Hyungjune;Koo, Dongyoung;Hur, Junbeom
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.4
    • /
    • pp.971-980
    • /
    • 2017
  • Data deduplication can be utilized to reduce storage space in cloud storage services by storing only a single copy of data rather than all duplicated copies. Users who are concerned the confidentiality of their outsourced data can use secure encryption algorithms, but it makes data deduplication ineffective. In order to reconcile data deduplication with encryption, Liu et al. proposed a new server-side cross-user deduplication scheme by exploiting password authenticated key exchange (PAKE) protocol in 2015. In this paper, we demonstrate that this scheme has side channel which causes insecurity against the confirmation-of-file (CoF), or duplicate identification attack.

Design and Implementation of Relay File for Superdistribution of the Streaming Contents (스트리밍 콘텐츠의 초유통을 위한 중계파일 설계 및 구현)

  • Kim, Tae-Min;Yang, Young-Kyu
    • Journal of Korea Multimedia Society
    • /
    • v.12 no.7
    • /
    • pp.979-988
    • /
    • 2009
  • Illegal reproductions and subsequent copyright infringement have curtailed development of digital content industry. Many DRM systems have been developed and utilized for this purpose. However, current DRM system allow only authorized user to access the contents, and as such, redistribution to other user without getting license again entails cumbersome process. Currently, super-distribution system which can be used for redistribution of downloaded contents in more streamlined fashion is being widely conducted. But for streaming type content, it is still very difficult to redistribute with super-distribution system because the client must directly connect to streaming server to access the content. Accordingly, a new DRM streaming service structure is required to allow streamed contents to be redistributed as easily as the downloaded contents. In this paper, we proposed the relay file structure that can connect the streaming server and the user for super-distribution of the streaming contents.

  • PDF

Methodology for digital investigation of illegal sharing using BitTorrent (BitTorrent를 이용한 저작물 불법 공유 조사 방법에 관한 연구)

  • Park, Soo-Young;Chung, Hyun-Ji;Lee, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.2
    • /
    • pp.193-201
    • /
    • 2013
  • Sharing copyrighted files without copyright holder's permission is illegal. But, a number of illegal file sharers using BitTorrent increase. However, it is difficult to find appropriate digital evidences and legal basis to punish them. And, there are no framework for digital investigation of illegal sharing using BitTorrent. Additionally, role of server in BitTorrent had been reduced than server in conventional P2P. So, It is difficult to apply investigation framework for illegal sharing using conventional P2P to investigation process of illegal sharing using BitTorrent. This paper proposes the methodology about punishing illegal sharer using BitTorrent by suggesting the digital investigation framework.

Development of Automatic Data Transmitting System of Arterial Blood Gas Results via Local Area Network( LAN) (LAN을 이용한 혈액가스 검사결과 전송시스템)

  • 김남현;김원기
    • Journal of Biomedical Engineering Research
    • /
    • v.14 no.4
    • /
    • pp.327-332
    • /
    • 1993
  • Automatic transmission of data from the blood analyzer to the request site is one of the most important part in hospital computerization. We have developed a system that transmits data from the arterial blood gas analyzer to the request site automatically In this system HOST computer, FILE server,'LAN(Local Area Network) , 3270 Emulator and bfulti-port card are integrated with 3 blood gas analyzers(NOVA Inc., USA) which are connected to a single multi-port card in a personal computer. When specimen are collected from tramp)inly sites, they are transferee to the laboratory In the Yonsei Cardiovascular Center After analysis, the result is transmitted to the personal computer via serial commnunication between machine and multi-port card using interrupt method. Then, the patient's information (Name, Patient ID No., etc.) is obtained from the HOST computer througth the emulator. The combined data (patient information & lab data) is transmitted to each request site via LAN automatically These results are stored in the File Server for one year and they can be reviewed anytime. Also, it could be used for the various statistics and the flow chart for clinical research. Additionally, we found thal this system reduces the personal labor.

  • PDF

Implementation of an ASP Upload Component to Comply with RFC 1867 (RFC 1867 규격을 준수하는 ASP 업로드 컴포넌트 설계)

  • Hwang Hyun-Ju;Kang Koo-Hong
    • The Journal of the Korea Contents Association
    • /
    • v.6 no.3
    • /
    • pp.63-74
    • /
    • 2006
  • Recently many ASP applications have been released which enable them to accept, save and manipulate files uploaded with a web browser. The files are uploaded via an HTML POST form using RFC 1867 In particular, the file transfer via the HTTP port is getting more important because of the current Internet security issues. In this paper, we implement a form-based ASP upload component and disclose explicitly most of the main codes. That is, the open source might be helpful to develop the new ASP applications including file upload function in the future. We also show the upload time and CPU usage time of the proposed upload component and compare with the well-known commercial ones, showing the performance metrics of the proposed component are comparable to those of commercial ones.

  • PDF

Design of PC-based CR-PACS using Multiresolution Wavelet Transform (다해상도 웨이블릿 변환을 이용한 PC기반의 CR-PACS 설계)

  • 김광민;유선국
    • Journal of Biomedical Engineering Research
    • /
    • v.19 no.3
    • /
    • pp.305-312
    • /
    • 1998
  • A small PACS based on PC is designed for CR. To receive the digital image from CR, a DICOM Interface Unit (DIU) is designed that complied with the medical image standard, DICOM V3.0. The CR images acquired through the DIU are stored in a file-server; the patient information of the images is stored in a database. To improve the performance of PC and to use it easily, multiresolution images are constructed by wavelet transform and displayed progressively. Wavelet compression method is newly adopted to store the images hierarchically to storage units. In this compression method, the image is decomposed into subclasses of image by wavelet transform, and then the subclasses of the image are vector quantized using a multiresolution codebook. The storage units for CR images were divided into the short-term storage in file-server and the harddisk in viewing station. Image processing tools supported by general PACS is implemented based on PC.

  • PDF

Designing of On-line Backup System using Snapshot Algorithm and SCSI-Protocol (Snapshot 알고리즘을 이용한 On-line 백업시스템 설계)

  • 김정기;이춘구;박순철
    • Proceedings of the Korea Society for Industrial Systems Conference
    • /
    • 2002.06a
    • /
    • pp.177-184
    • /
    • 2002
  • In these day, the storage capacity has been growing and the informations increase in geometrically progression in a modem information age. At present the situation is required that the exchanges and access of the informations is available without regard to time and space. In this paper we present a effective backup systems to backup the information of server that continuously has to be accessible in 365's days. There are two backup cases. one is a file-base backup and the other is a block-based backup. In general, a block-based backup has a good performance than a file-based backup but it is difficult to implement a block-based systems. First, we introduce the technique of backup and methods, on-line backup. Next, we present our backup systems based on client-server model and have a snapshot facility. Finally we introduce SCSI-Protocol in order to increase the data transfer rate.

  • PDF