• Title/Summary/Keyword: Information Infrastructures

Search Result 434, Processing Time 0.026 seconds

mVDI : A New Paradigm Shift for Mobile Cloud

  • Nguyen, Tien-Dung;Huynh, Cong-Thinh;Huh, Eui-Nam
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2013.05a
    • /
    • pp.175-178
    • /
    • 2013
  • Mobile Virtual Desktop Infrastructures (mVDI) are gaining popularity in cloud computing by allowing mobile devices to execute their mobile applications in a cloud server instead of relying on physical mobile devices. Consolidating many users into mVDI environment can significantly lower IT management expenses and enables new features such as "available-anywhere" desktops. However, there are many barriers to broad adoption including the slow performance of virtualized I/O, CPU scheduling interference problems. In this paper, we will discuss about mVDI with the current issues, the corresponding solutions and challenges.

Key Management Scheme for Providing the Confidentiality in Mobile Multicast (이동 멀티캐스트에서 기밀성을 제공하기 위한 키관리 방법)

  • Roh Jong-Hyuk;Jin Seung-Hun;Lee Kyoon-Ha
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.1
    • /
    • pp.97-104
    • /
    • 2006
  • For successfully deploying many multicast service in the mobile environment, security infrastructures must be developed that manage the keys needed to provide access control to content. In this paper, we propose two methods for designing the key management scheme for the mobile multicast environment. The proposed schemes match the key management tree to the mobile multicast environment for localizing the delivery of he rekeying messages, reducing the communication costs, and solving the handoff problem in wireless region.

FLORA: Fuzzy Logic - Objective Risk Analysis for Intrusion Detection and Prevention

  • Alwi M Bamhdi
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.5
    • /
    • pp.179-192
    • /
    • 2023
  • The widespread use of Cloud Computing, Internet of Things (IoT), and social media in the Information Communication Technology (ICT) field has resulted in continuous and unavoidable cyber-attacks on users and critical infrastructures worldwide. Traditional security measures such as firewalls and encryption systems are not effective in countering these sophisticated cyber-attacks. Therefore, Intrusion Detection and Prevention Systems (IDPS) are necessary to reduce the risk to an absolute minimum. Although IDPSs can detect various types of cyber-attacks with high accuracy, their performance is limited by a high false alarm rate. This study proposes a new technique called Fuzzy Logic - Objective Risk Analysis (FLORA) that can significantly reduce false positive alarm rates and maintain a high level of security against serious cyber-attacks. The FLORA model has a high fuzzy accuracy rate of 90.11% and can predict vulnerabilities with a high level of certainty. It also has a mechanism for monitoring and recording digital forensic evidence which can be used in legal prosecution proceedings in different jurisdictions.

A Virtual Storage System for Smart Home/Office Embedded Devices (스마트 홈/오피스 임베디드 장치를 위한 가상 저장 시스템)

  • They, Yu-Shu;Kim, Young-Jin;Lim, Hyo-Taek
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2007.05a
    • /
    • pp.1237-1239
    • /
    • 2007
  • This paper proposes a virtual storage system for smart home/office embedded devices by utilizing AoE and HyperSCSI protocols. It relies on current Ethernet infrastructures and aims to provide a low-cost solution for the storage limitation problem on embedded devices. We choose AoE (ATA over Ethernet) and HyperSCSI in our implementation because they are relatively lightweight compared to other network storage protocols such as NFS(Network File System), CIFS(Common Internet File System) and iSCSI(internet Small Computer System Interface). The design and architecture of our proposed virtual system as well as the prototype demonstration are presented in this paper.

AgroMeteorological Prognosis and Information Communication System (농업기상 예측 및 정보전달 시스템)

  • LEE Byong-Lyol
    • Proceedings of the Korean Society of Crop Science Conference
    • /
    • 2000.11a
    • /
    • pp.46-78
    • /
    • 2000
  • This paper is to introduce recent collaborative activities in agricultural weather information services among institutions in Korea as well as key concepts for understanding agrometeorological services. KMA and RDA have agreed upon the establishment of the Joint Committee for Agrometeorolgy at national level to strengthen the national agrometeorological services in data collection, information production, research, and services to end-users of agrometeorological information in Korea. Several on-going joint projects in agrometeorology by RDA/KMA are introduced in brief. The projects being developed are : Strengthening of the Joint Committee of agrometeorology, Extension of observation network for agricultural weather, Production of the detailed agrometeorological information based on numerical weather forecasts, Development of seasonal and interannual weather forecasts for agricultural applications, Information network system for supporting agrometeorological research, and Improvement of agrometeorological information services at national and regional level. Strengthening of programs for the education and training of agrometeorologists will be impending responsibilities of the government. The government must consider establishment of organizations dedicated to and in charge of national agrometeorological services to end-users. RDA and KMA should play a major role to obtain this goal, based on a close cooperation with universities, scientific societies, and other relevant institutions. If this plan is successful, major infrastructures and services in agrometeorology shall be established in the next 5 years, and we can contribute to regional and global societies through sharing experiences and know-hows.

  • PDF

A Study on the Shipbuilding Yard Information System Based on Wireless LAN (Wireless LAN 기반의 조선소 현장 정보시스템에 관한 연구)

  • SEO K. H.;KIM H. M.;KIM S. Y.
    • Journal of Ocean Engineering and Technology
    • /
    • v.19 no.6 s.67
    • /
    • pp.86-91
    • /
    • 2005
  • Regarding some of tire important works in tire shipyard, like tire production process, quality control, and material handling, there are many elements that disturb tire work-flaw. For example, there are mistakes in manufacturing, delay of production, and poor quality. These kinds of disturbances are from tire delay of communication time between tire production field and tire management. Therefore, it would be possible to strengthen tire competitiveness of shipbuilding industries by applying tire information technology based on Wireless Local Area Network (Wireless LAN), in order to establish tire multi-possession of real time production information in limited large shipbuilding yard. In this study, tire construction concept of tire information system, based on Wireless LAN, is proposed to build communication infrastructures in shipyards. The various information regarding shipbuilding inspection, process management, and material flaw are analyzed and constructed to databases in tire middle ware system, as tire platform for using Personal Display Agent (PDA). At last, tire middle ware system, which delivers tire information, is developed by tire C$\sharp$ and Microsoft.net; also, tire PDA application system is structured in WinCE O/S, and is tested and evaluated under tire server linked condition.

A New Fuzzy Key Generation Method Based on PHY-Layer Fingerprints in Mobile Cognitive Radio Networks

  • Gao, Ning;Jing, Xiaojun;Sun, Songlin;Mu, Junsheng;Lu, Xiang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.7
    • /
    • pp.3414-3434
    • /
    • 2016
  • Classical key generation is complicated to update and key distribution generally requires fixed infrastructures. In order to eliminate these restrictions researchers have focused much attention on physical-layer (PHY-layer) based key generation methods. In this paper, we present a PHY-layer fingerprints based fuzzy key generation scheme, which works to prevent primary user emulation (PUE) attacks and spectrum sensing data falsification (SSDF) attacks, with multi-node collaborative defense strategies. We also propose two algorithms, the EA algorithm and the TA algorithm, to defend against eavesdropping attacks and tampering attacks in mobile cognitive radio networks (CRNs). We give security analyses of these algorithms in both the spatial and temporal domains, and prove the upper bound of the entropy loss in theory. We present a simulation result based on a MIMO-OFDM communication system which shows that the channel response characteristics received by legitimates tend to be consistent and phase characteristics are much more robust for key generation in mobile CRNs. In addition, NIST statistical tests show that the generated key in our proposed approach is secure and reliable.

Development on the 3D Station Management System for Urban Transit (도시철도 역사시설물의 효율적인 관리를 위한 삼차원 역사관리시스템 개발)

  • Ahn, Tae-Ki;Lee, Woo-Dong;Park, Kee-Jun;Shin, Jeong-Ryol
    • Proceedings of the KSR Conference
    • /
    • 2006.11b
    • /
    • pp.310-315
    • /
    • 2006
  • In several years, the geographic information system has been being applied into various departments, i.e. estate, transportation, prevention against disasters, agriculture, environment, etc. Especially, it is very useful for us to manage the infrastructures of urban transit which are scattered and located in the vast areas of city. But, in the 2D geographic information system, it is impossible to manage the various inner facilities of stations which are in the same spatial location on GIS. Then, the 3D station management system has been developed for the efficient management of station facilities in urban transit. Through this system, from the virtual cyberspace of station on PC, we can move and go to any places of station we want without going to the station fields. So, we can manage the various information of location information, basis information, maintenance information about the inner facilities such as architectural structures, machinery facilities, electronic equipments. And, this system is also connected with the drawings and technical documents in each facilities. So, we're sure, this system will improve the efficiency of maintenance work and information management of stations.

  • PDF

WORM-HUNTER: A Worm Guard System using Software-defined Networking

  • Hu, Yixun;Zheng, Kangfeng;Wang, Xu;Yang, Yixian
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.1
    • /
    • pp.484-510
    • /
    • 2017
  • Network security is rapidly developing, but so are attack methods. Network worms are one of the most widely used attack methods and have are able to propagate quickly. As an active defense approach to network worms, the honeynet technique has long been limited by the closed architecture of traditional network devices. In this paper, we propose a closed loop defense system of worms based on a Software-Defined Networking (SDN) technology, called Worm-Hunter. The flexibility of SDN in network building is introduced to structure the network infrastructures of Worm-Hunter. By using well-designed flow tables, Worm-Hunter is able to easily deploy different honeynet systems with different network structures and dynamically. When anomalous traffic is detected by the analyzer in Worm-Hunter, it can be redirected into the honeynet and then safely analyzed. Throughout the process, attackers will not be aware that they are caught, and all of the attack behavior is recorded in the system for further analysis. Finally, we verify the system via experiments. The experiments show that Worm-Hunter is able to build multiple honeynet systems on one physical platform. Meanwhile, all of the honeynet systems with the same topology operate without interference.

A Hierarchical Context Dissemination Framework for Managing Federated Clouds

  • Famaey, Jeroen;Latre, Steven;Strassner, John;Turck, Filip De
    • Journal of Communications and Networks
    • /
    • v.13 no.6
    • /
    • pp.567-582
    • /
    • 2011
  • The growing popularity of the Internet has caused the size and complexity of communications and computing systems to greatly increase in recent years. To alleviate this increased management complexity, novel autonomic management architectures have emerged, in which many automated components manage the network's resources in a distributed fashion. However, in order to achieve effective collaboration between these management components, they need to be able to efficiently exchange information in a timely fashion. In this article, we propose a context dissemination framework that addresses this problem. To achieve scalability, the management components are structured in a hierarchy. The framework facilitates the aggregation and translation of information as it is propagated through the hierarchy. Additionally, by way of semantics, context is filtered based on meaning and is disseminated intelligently according to dynamically changing context requirements. This significantly reduces the exchange of superfluous context and thus further increases scalability. The large size of modern federated cloud computing infrastructures, makes the presented context dissemination framework ideally suited to improve their management efficiency and scalability. The specific context requirements for the management of a cloud data center are identified, and our context dissemination approach is applied to it. Additionally, an extensive evaluation of the framework in a large-scale cloud data center scenario was performed in order to characterize the benefits of our approach, in terms of scalability and reasoning time.