• Title/Summary/Keyword: Government Cloud

Search Result 139, Processing Time 0.024 seconds

Enabling Fine-grained Access Control with Efficient Attribute Revocation and Policy Updating in Smart Grid

  • Li, Hongwei;Liu, Dongxiao;Alharbi, Khalid;Zhang, Shenmin;Lin, Xiaodong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.4
    • /
    • pp.1404-1423
    • /
    • 2015
  • In smart grid, electricity consumption data may be handed over to a third party for various purposes. While government regulations and industry compliance prevent utility companies from improper or illegal sharing of their customers' electricity consumption data, there are some scenarios where it can be very useful. For example, it allows the consumers' data to be shared among various energy resources so the energy resources are able to analyze the data and adjust their operation to the actual power demand. However, it is crucial to protect sensitive electricity consumption data during the sharing process. In this paper, we propose a fine-grained access control scheme (FAC) with efficient attribute revocation and policy updating in smart grid. Specifically, by introducing the concept of Third-party Auditor (TPA), the proposed FAC achieves efficient attribute revocation. Also, we design an efficient policy updating algorithm by outsourcing the computational task to a cloud server. Moreover, we give security analysis and conduct experiments to demonstrate that the FAC is both secure and efficient compared with existing ABE-based approaches.

INTRODUCTION OF COMS SYSTEM

  • Baek, Myung-Jin;Han, Cho-Young
    • Proceedings of the KSRS Conference
    • /
    • v.1
    • /
    • pp.56-59
    • /
    • 2006
  • In this paper, Korea's first geostationary Communication, Ocean and Meteorological Satellte(COMS) program is introduced. COMS program is one of the Korea National Space Programs to develop and operate a pure civilian satellite of practical-use for the compound missions of meteorological observation and ocean monitoring, and space test of experimentally developed communication payload on the geostationary orbit. The target launch of COMS is scheduled at the end of 2008. COMS program is international cooperation program between KARI and ASTRIUM SAS and funded by Korean Government. COMS satellite is a hybrid satellite in the geostationary orbit, which accommodates multiple payloads of MI(Meteorological Imager), GOCI(Geostationary Ocean Color Imager), and the Ka band Satellite Communication Payload into a single spacecraft platform. The MI mission is to continuously extract meteorological products with high resolution and multi-spectral imager, to detect special weather such as storm, flood, yellow sand, and to extract data on long-term change of sea surface temperature and cloud. The GOCI mission aims at monitoring of marine environments around Korean peninsula, production of fishery information (Chlorophyll, etc.), and monitoring of long-term/short-term change of marine ecosystem. The goals of the Ka band satellite communication mission are to in-orbit verify the performances of advanced communication technologies and to experiment wide-band multi-media communication service mandatory.

  • PDF

4th Industry Revolution and 4G Water (4차 산업혁명과 4세대 상하수도)

  • Lee, Doojin
    • Journal of Korean Society of Water and Wastewater
    • /
    • v.31 no.5
    • /
    • pp.383-388
    • /
    • 2017
  • The $4^{th}$ Industry Revolution was advocated by Klaud Schwab who is founder of World Economic Forum at the Davos Forum in 2016, and there are big differences on ICT based $4^{th}$ Industry revolution in the aspects of speed, scope and impact compared with the 3rd Industry revolution. Creating new industries and values through technology such as internet of things, cloud, big data, and artificial intelligence are included in the meaning of The $4^{th}$ industry revolution. In this article, the direction of change to water technology in response to the $4^{th}$ Industry revolution is surveyed. 4G Water Infra should minimize environmental impact under the consideration of sustainable development and advanced technologies. To solve the existing water infra problems, it is common and fundamental that the intake water from nature can be regarded as borrowed from nature and it should be returned to natural state with improved water quality. Government, academic organizations and industries should prepare and collaborate together in order to help our country with outstanding capabilities in infrastructure construction and ICT to lead the 4G water technology development.

Internet Information Orientation: The Link to National Competitiveness on Internet

  • Song, In Kuk;Kang, Mingoo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.8
    • /
    • pp.3028-3039
    • /
    • 2015
  • Recently, the web index of Korea peaked at the top 10 among the eighty six countries, and Korea became the only Asian country ranked at the top level. Korea also has been on the top in the field of Internet penetration rate, in terms of both high-speed broadband and wireless Internet. However, such achievements did not guarantee the national level for the effective use of information utilizing Internet. According to OECD, the national informatization index of Korea has not been free from the middle of the OECD countries. Despite of the heightened pressure in practically enhancing effective information use utilizing Internet, the previous research interests and efforts to develop the Internet-related framework or to identify Internet capabilities rarely existed. The study aims to propose the framework, named "Internet Information Orientation" that illustrates the relationship between Internet capabilities and national competitiveness on Internet. The research identified the specific Internet capabilities, reclassified the capabilities based on the research issues provided at the 6th international conference on Internet held in December 2014, and finally described the rigorous research endeavors on the issues. As a result, 16 papers presented and selected as the outstanding papers at the conference handle issues to be brought together, which include: Wireless Network, Internet of Things, Green Computing, Multimedia Processing, Big Data and Text Mining, Database in Cloud Environment, Business Intelligence, Software Engineering, IT Strategy & Policy, and Social Network Services.

A Comparative Study of Dietary Related Zero-waste Patterns and Consumer Responses Before and After COVID-19 (코로나-19 이전과 이후 식생활 관련 제로웨이스트 운동 양상과 소비자 반응 비교)

  • Park, In-Hyoung;Park, You-min;Lee, Cheol;Sun, Jung-eun;Hu, Wendie;Chung, Jae-Eun
    • Human Ecology Research
    • /
    • v.60 no.1
    • /
    • pp.21-38
    • /
    • 2022
  • This study uses text mining compares and contrasts consumers' social media discourses on dietary related zero-waste movement before and after COVID-19. The results indicate that the amount of buzz on social networks for the zero- waste movement has been increasing after COVID-19. Additionally, the results of frequency analysis and topic modeling revealed that subjects associated with zero-waste movement were more diversified after COVID-19. Although the results of a sentiment analysis and word cloud visualization confirmed that consumers' positive responses toward the zero-waste have been increasing, they also revealed a need to educate and encourage those who are still not aware of the need for zero-waste. Finally, consumers mentioned only a small number of companies participating in zero-waste movement on SNS, indicating that the level of active involvement by such companies is much lower than that of consumers. Theoretical and educational implications as well as those for government policy-making are considered.

A Study on the Role and Security Enhancement of the Expert Data Processing Agency: Focusing on a Comparison of Data Brokers in Vermont (데이터처리전문기관의 역할 및 보안 강화방안 연구: 버몬트주 데이터브로커 비교를 중심으로)

  • Soo Han Kim;Hun Yeong Kwon
    • Journal of Information Technology Services
    • /
    • v.22 no.3
    • /
    • pp.29-47
    • /
    • 2023
  • With the recent advancement of information and communication technologies such as artificial intelligence, big data, cloud computing, and 5G, data is being produced and digitized in unprecedented amounts. As a result, data has emerged as a critical resource for the future economy, and overseas countries have been revising laws for data protection and utilization. In Korea, the 'Data 3 Act' was revised in 2020 to introduce institutional measures that classify personal information, pseudonymized information, and anonymous information for research, statistics, and preservation of public records. Among them, it is expected to increase the added value of data by combining pseudonymized personal information, and to this end, "the Expert Data Combination Agency" and "the Expert Data Agency" (hereinafter referred to as the Expert Data Processing Agency) system were introduced. In comparison to these domestic systems, we would like to analyze similar overseas systems, and it was recently confirmed that the Vermont government in the United States enacted the first "Data Broker Act" in the United States as a measure to protect personal information held by data brokers. In this study, we aim to compare and analyze the roles and functions of the "Expert Data Processing Agency" and "Data Broker," and to identify differences in designated standards, security measures, etc., in order to present ways to contribute to the activation of the data economy and enhance information protection.

Utilizing Block chain in the Internet of Things for an Effective Security Sharing Scheme

  • Sathish C;Yesubai Rubavathi, C
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.6
    • /
    • pp.1600-1619
    • /
    • 2023
  • Organizations and other institutions have recently started using cloud service providers to store and share information in light of the Internet of Things (IoT). The major issues with this storage are preventing unauthorized access and data theft from outside parties. The Block chain based Security Sharing scheme with Data Access Control (BSSDAC) was implemented to improve access control and secure data transaction operations. The goal of this research is to strengthen Data Access Control (DAC) and security in IoT applications. To improve the security of personal data, cypher text-Policy Attribute-Based Encryption (CP-ABE) can be developed. The Aquila Optimization Algorithm (AOA) generates keys in the CP-ABE. DAC based on a block chain can be created to maintain the owner's security. The block chain based CP-ABE was developed to maintain secures data storage to sharing. With block chain technology, the data owner is enhancing data security and access management. Finally, a block chain-based solution can be used to secure data and restrict who has access to it. Performance of the suggested method is evaluated after it has been implemented in MATLAB. To compare the proposed method with current practices, Rivest-Shamir-Adleman (RSA) and Elliptic Curve Cryptography (ECC) are both used.

A Study on the Strengthening of Smart Factory Security in OT (Operational Technology) Environment (OT(Operational Technology) 환경에서 스마트팩토리 보안 강화 방안에 관한 연구)

  • Young Ho Kim;Kwang-Kyu Seo
    • Journal of the Semiconductor & Display Technology
    • /
    • v.23 no.2
    • /
    • pp.123-128
    • /
    • 2024
  • Major countries are trying to expand the construction of smart factories by introducing ICT such as the Internet of Things, cloud, and big data into the manufacturing sector to secure national-level manufacturing competitiveness in the era of the 4th industrial revolution. In addition, Germany is pushing for Industry 4.0 to build a fully automatic production system through the Internet of Things, and China is pushing for the expansion of smart factories to enhance the country's industrial competitiveness through Made in China 2025, Japan's intelligent manufacturing system, and the Korean government's manufacturing innovation 3.0. In this study, considering the increasing security connectivity of smart factories, we would like to identify security threats in the external connection part of smart factories and suggest security enhancement measures based on domestic and international standard security models to respond to the identified security threats. Eventually the proposed method can be applied by accurately identifying the smart factory security status, diagnosing vulnerabilities, establishing appropriate improvement plans, and expanding security strategies to respond to security threats.

  • PDF

An Analysis of the Support Policy for Small Businesses in the Post-Covid-19 Era Using the LDA Topic Model (LDA 토픽 모델을 활용한 포스트 Covid-19 시대의 소상공인 지원정책 분석)

  • Kyung-Do Suh;Jung-il Choi;Pan-Am Choi;Jaerim Jung
    • Journal of Industrial Convergence
    • /
    • v.22 no.6
    • /
    • pp.51-59
    • /
    • 2024
  • The purpose of the paper is to suggest government policies that are practically helpful to small business owners in pandemic situations such as COVID-19. To this end, keyword frequency analysis and word cloud analysis of text mining analysis were performed by crawling news articles centered on the keywords "COVID-19 Support for Small Businesses", "The Impact of Small Businesses by Response System to COVID-19 Infectious Diseases", and "COVID-19 Small Business Economic Policy", and major issues were identified through LDA topic modeling analysis. As a result of conducting LDA topic modeling, the support policy for small business owners formed a topic label with government cash and financial support, and the impact of small business owners according to the COVID-19 infectious disease response system formed a topic label with a government-led quarantine system and an individual-led quarantine system, and the COVID-19 economic policy formed a topic label with a policy for small business owners to acquire economic crisis and self-sustainability. Focusing on the organized topic label, it was intended to provide basic data for small business owners to understand the damage reduction policy for small business owners and the policy for enhancing market competitiveness in the future pandemic situation.

Analysis of Defective Causes in Real Time and Prediction of Facility Replacement Cycle based on Big Data (빅데이터 기반 실시간 불량품 발생 원인 분석 및 설비 교체주기 예측)

  • Hwang, Seung-Yeon;Kwak, Kyung-Min;Shin, Dong-Jin;Kwak, Kwang-Jin;Rho, Young-J;Park, Kyung-won;Park, Jeong-Min;Kim, Jeong-Joon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.19 no.6
    • /
    • pp.203-212
    • /
    • 2019
  • Along with the recent fourth industrial revolution, the world's manufacturing powerhouses are pushing for national strategies to revive the sluggish manufacturing industry. Moon Jae-in, the government is in accordance with the trend, called 'advancement of science and technology is leading the fourth round of the Industrial Revolution' strategy. Intelligent information technology such as IoT, Cloud, Big Data, Mobile, and AI, which are key technologies that lead the fourth industrial revolution, is promoting the emergence of new industries such as robots and 3D printing and the smarting of existing major manufacturing industries. Advances in technologies such as smart factories have enabled IoT-based sensing technology to measure various data that could not be collected before, and data generated by each process has also exploded. Thus, this paper uses data generators to generate virtual data that can occur in smart factories, and uses them to analyze the cause of the defect in real time and to predict the replacement cycle of the facility.