• Title/Summary/Keyword: Information Sharing Platform

Search Result 363, Processing Time 0.031 seconds

ShareSafe: An Improved Version of SecGraph

  • Tang, Kaiyu;Han, Meng;Gu, Qinchen;Zhou, Anni;Beyah, Raheem;Ji, Shouling
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.11
    • /
    • pp.5731-5754
    • /
    • 2019
  • In this paper, we redesign, implement, and evaluate ShareSafe (Based on SecGraph), an open-source secure graph data sharing/publishing platform. Within ShareSafe, we propose De-anonymization Quantification Module and Recommendation Module. Besides, we model the attackers' background knowledge and evaluate the relation between graph data privacy and the structure of the graph. To the best of our knowledge, ShareSafe is the first platform that enables users to perform data perturbation, utility evaluation, De-A evaluation, and Privacy Quantification. Leveraging ShareSafe, we conduct a more comprehensive and advanced utility and privacy evaluation. The results demonstrate that (1) The risk of privacy leakage of anonymized graph increases with the attackers' background knowledge. (2) For a successful de-anonymization attack, the seed mapping, even relatively small, plays a much more important role than the auxiliary graph. (3) The structure of graph has a fundamental and significant effect on the utility and privacy of the graph. (4) There is no optimal anonymization/de-anonymization algorithm. For different environment, the performance of each algorithm varies from each other.

Design and Implementation of User Location-based N-Screen Service System (사용자 위치 인식 기반 맞춤형 N-Screen Service 시스템 설계 및 구현)

  • Kim, Jung Jae;Ryu, Min Woo;Cha, Si Ho;Cho, Kuk Hyun
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.10 no.1
    • /
    • pp.139-146
    • /
    • 2014
  • Through numerous mobile device technology advances, various multimedia contents is moving towards mobile devices from existing personal computer (PC). These paradigm has emerged taking into account these idea, the so-called N-Screen, N-Screen is user-centric service to provide running and sharing on everywhere via advanced smart system in C-P-N-T (Content, Platform, Network, Terminal). Therefore we must provide securing of various contents, openended platform, and user-centric service for efficient N-Screen service. For These characteristic of N-Screen, this paper propose design and implementation of user location-based N-Screen service system. The proposed system realize user location through user's smart phone and offer automatic streaming service to user. And also, we provide web service-based extended N-Screen service. Thus, user can access various device, such as laptop, tablet, and mobile device.

Education Content Service Platform Using the Near Field Communication based on IoT (IoT 기반의 근거리 통신 기술을 활용한 교육콘텐츠 서비스 플랫폼)

  • Ryu, Chang-su
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.690-692
    • /
    • 2014
  • Conventional one-way cramming education at schools has the disadvantage of poor student interest in learning, immersion, and learning efficiency as well as a limitation in realizing collective intelligence and collaborative learning. Therefore, an educational content service platform using a near-field communication(NFC) technology is required as a tool for encouraging the voluntary learning participation of students and increasing learning effectiveness through self-directed studying. This study focuses on the development of an educational content production system that creates high-quality education contents suitable for smart schools. In these schools, students and teachers generally communicate through an electronic blackboard using Bluetooth, which is an NFC technology. Further, the lecture notes of individual students are reproduced and collected as big data, which will facilitate the sharing of these notes.

  • PDF

Development of Web-Based Platform System for Sharing Manufacturing Technologies on Housing Parts of Mobile Products (휴대폰 외장부품 제조기술 공유를 위한 웹기반 플랫폼 개발)

  • Jung, Tae Sung;Yoon, Gil Sang;Heo, Young Moo;Lee, Hyo Soo;Kang, Moon Jin
    • Transactions of the Korean Society of Mechanical Engineers A
    • /
    • v.37 no.1
    • /
    • pp.113-119
    • /
    • 2013
  • Despite rapid changes in the structure of industry, manufacturing remains a key industry for economic progress, promotion of trade, increased employment, and the creation of new industries. Production technologies are essential for strengthening the competitiveness of small- and medium-sized manufacturing industries. However, it is very difficult to standardize and systematically propagate production technology from an experienced worker to an inexperienced worker because these technologies are generally improved by the skilled people in a workshop. In this study, we introduce a Web-based platform system consisting of a knowledge authoring tool, technology database, semantic database, and Web portal service for sharing production technologies for the exterior housing parts of mobile products. By investigating various cellular phone designs, reference form factors for three types of mobile phone housings were designed based on the standard features. In addition, several manufacturing technologies and considerable information such as reference mold designs and molding conditions optimized using CAE and recent R&D outputs are stored in this system.

Study on Context-Aware SOA based on Open Service Gateway initiative platform (OSGi플렛폼 기반의 상황인식 서비스지향아키텍쳐에 관한 연구)

  • Choi, Sung-Wook;Oh, Am-Suk;Kwon, Oh-Hyun;Kang, Si-Hyeob;Hong, Soon-Goo;Choi, Hyun-Rim
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.11
    • /
    • pp.2083-2090
    • /
    • 2006
  • In an proposed Context-Aware SOA(Service Oriented Architecture) based OSGi(Open Service Gateway initiative) platform, Service provider manages relative kinds of services in an integrative basis from various sensors, puts each service in a SOAP (Simple Object access Protocol) message, and register thorn to the UDDI(Universal Description Discovery and Integration) server of service registry, service requester retrivel the specified kinds of services and call them to service provider. Recently most context-aware technologies for ubiquitous home network are mainly putting emphasis on RFID/USN and location-based technology. Because of this, service-oriented architecture researches have not been made enough. Under the environment of an OSGi service platform, various context-aware services are dynamically mapping from various sensors, new services are being offered for the asking of users, and existing services are changing. Accordingly, the data sharing between services provided, management of service life cycle, and the facilitation of service distribution are needed. Taking into considering all these factors, this study has suggested an Context-Aware SOA based eclipse SOA Tools Platform using OSGi platform that can transaction throughtput of more than 546 TPS of distributional Little's Law from ATAM(Architecture Tradeoff Analysis Method) while remaining stable other condition.

Social Media Security and Attacks

  • Almalki, Sarah;Alghamdi, Reham;Sami, Gofran;Alhakami, Wajdi
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.1
    • /
    • pp.174-183
    • /
    • 2021
  • The advent of social media has revolutionized the speed of communication between millions of people around the world in various cultures and disciplines. Social media is the best platform for exchanging opinions and ideas, interacting with other users of similar interests and sharing different types of media and files. With the phenomenal increase in the use of social media platforms, the need to pay attention to protection and security from attacks and misuse has also increased. The present study conducts a comprehensive survey of the latest and most important research studies published from 2018-20 on security and privacy on social media and types of threats and attacks that affect the users. We have also reviewed the recent challenges that affect security features in social media. Furthermore, this research pursuit also presents effective and feasible solutions that address these threats and attacks and cites recommendations to increase security and privacy for the users of social media.

A Privacy-preserving Image Retrieval Scheme in Edge Computing Environment

  • Yiran, Zhang;Huizheng, Geng;Yanyan, Xu;Li, Su;Fei, Liu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.2
    • /
    • pp.450-470
    • /
    • 2023
  • Traditional cloud computing faces some challenges such as huge energy consumption, network delay and single point of failure. Edge computing is a typical distributed processing platform which includes multiple edge servers closer to the users, thus is more robust and can provide real-time computing services. Although outsourcing data to edge servers can bring great convenience, it also brings serious security threats. In order to provide image retrieval while ensuring users' data privacy, a privacy preserving image retrieval scheme in edge environment is proposed. Considering the distributed characteristics of edge computing environment and the requirement for lightweight computing, we present a privacy-preserving image retrieval scheme in edge computing environment, which two or more "honest but curious" servers retrieve the image quickly and accurately without divulging the image content. Compared with other traditional schemes, the scheme consumes less computing resources and has higher computing efficiency, which is more suitable for resource-constrained edge computing environment. Experimental results show the algorithm has high security, retrieval accuracy and efficiency.

Empowering Blockchain For Secure Data Storing in Industrial IoT

  • Firdaus, Muhammad;Rhee, Kyung-Hyune
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2020.05a
    • /
    • pp.231-234
    • /
    • 2020
  • In the past few years, the industrial internet of things (IIoT) has received great attention in various industrial sectors which have potentially increased a high level of integrity, availability, and scalability. The increasing of IIoT is expected to create new smart industrial enterprises and build the next generation smart system. However existing IIoT systems rely on centralized servers that are vulnerable to a single point of failure and malicious attack, which exposes the data to security risks and storage. To address the above issues, blockchain is widely considered as a promising solution, which can build a secure and efficient environment for data storing, processing and sharing in IIoT. In this paper, we propose a decentralized, peer-to-peer platform for secure data storing in industrial IoT base on the ethereum blockchain. We exploit ethereum to ensure data security and reliability when smart devices store the data.

Exploring News Sharers' Characteristics and Factors Affecting News Sharing Behavior (온라인 뉴스 공유자의 특성 및 뉴스 공유에 미치는 요인 탐색)

  • Hwang, HaSung;Jiang, XueJin;Zhu, LiuCun
    • Journal of Internet Computing and Services
    • /
    • v.21 no.6
    • /
    • pp.105-112
    • /
    • 2020
  • The present study aims to explore news sharers' characteristic. Specifically, it aims to look at news sharers' demographic characteristics, old media news usage and new media news usage. Besides, it also explores factors affecting news sharing behavior. The study used the second data of Korea Press Foundation. Findings from surveys suggest that first, news sharers are younger and have higher education than not news sharers. Second, news sharers use less news through old media while more news through new media. Third, political orientation, portal, SNS and online video platform new usage, messenger news reliability have positive effects on news sharing, while age and portal news reliability have negative effects on it. Based on these findings, implication, limitations, and topics for future research are discussed.

IECS: an Integrated E-Community System for Management, Decision and Service

  • Bo, Yu;Wang, Hongding;Peng, Zhang;Tong, Yunhai;Tang, Shiwei;Yang, Dongqing
    • 한국디지털정책학회:학술대회논문집
    • /
    • 2004.11a
    • /
    • pp.375-387
    • /
    • 2004
  • The paper presents an Integrated E-Community System (IECS) for management, decision and service, designed for the e-government project of Haishu District of Ningbo, Zhejiang, China. The project need is to promote the integration of management information and service information of communities, providing a unified platform on which different departments of the district government can share and exchange community information, government officers can analyze information and make decisions, and the outside users can access and request services. To meet the project need, the IECS consists of five parts: 1) The Central DataBase (CDB) that stores all information related with management, decision and service of communities: 2) Information Extracting Subsystem (IES) that provides functions of extracting data from data sources, transforming and loading them into the CDB for system administrators; 3) Information Management Subsystem (IMS) that provides functions of querying and sharing of information for government users, and functions of information maintenance, rights and log management for system administrators: 4) Intelligent Analysis Subsystem (IAS) that provides functions of extracting analysis related data from the CDB and loading them into the DW, and functions of multi-dimensional analysis and decision-making based on the DW and OLAP for government users; 5) Information Service Website (ISW) that provides functions of promulgating and collecting of information for government users and system administrators, and functions of browsing, querying and requesting of service information for outside users. The IECS supports management, decision and service of a government based on a unified data platform--the CDB, and ensures data security by providing different workplaces and rights for different users. In the real application, the system works well.

  • PDF