• Title/Summary/Keyword: Internet Service Provider

Search Result 361, Processing Time 0.022 seconds

A Secure Subscription-Push Service Scheme Based on Blockchain and Edge Computing for IoT

  • Deng, Yinjuan;Wang, Shangping;Zhang, Qian;Zhang, Duo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.2
    • /
    • pp.445-466
    • /
    • 2022
  • As everything linking to the internet, people can subscribe to various services from a service provider to facilitate their lives through the Internet of Things (IoT). An obligatory thing for the service provider is that they should push the service data safely and timely to multiple IoT terminal devices regularly after the IoT devices accomplishing the service subscription. In order to control the service message received by the legal devices as while as keep the confidentiality of the data, the public key encryption algorithm is utilized. While the existing public encryption algorithms for push service are too complicated for IoT devices, and almost of the current subscription schemes based on push mode are relying on centralized organization which may suffer from centralized entity corruption or single point of failure. To address these issues, we design a secure subscription-push service scheme based on blockchain and edge computing in this article, which is decentralized with secure architecture for the subscription and push of service. Furthermore, inspired by broadcast encryption and multicast encryption, a new encryption algorithm is designed to manage the permissions of IoT devices together with smart contract, and to protect the confidentiality of push messages, which is suitable for IoT devices. The edge computing nodes, in the new system architecture, maintain the blockchain to ensure the impartiality and traceability of service subscriptions and push messages, meanwhile undertake some calculations for IoT devices with limited computing power. The legalities of subscription services are guaranteed by verifying subscription tags on the smart contract. Lastly, the analysis indicates that the scheme is reliable, and the proposed encryption algorithm is safe and efficient.

Service Management for Cloud Marketplace : A Case of Internet2 NET+ (클라우드 마켓플레이스를 위한 서비스 관리체계 연구 : Internet2 NET+ 사례)

  • Kwon, Suhn Beom;Ahn, Sung Mahn
    • Journal of Information Technology Services
    • /
    • v.14 no.4
    • /
    • pp.221-236
    • /
    • 2015
  • Application software is delivered to customers as a form of service at cloud environment. A cloud service provider is a marketplace between supply side (application providers) and demand side (customers). Cloud service providers have to validate applications to be included in their service portfolio. Not only performance, security, networking, compliances should be checked but also business contract, authentication should be provided. Organization customers are more sensitive to these validation criteria and process. We study the Internet2 NET+, which is a successful cloud marketplace of applications for research and education organizations. This case study shows us three things : (i) a cloud marketplace's application management process : selection, validation, transition to service, customization of applications (ii) what a cloud marketplace has for its infrastructure like authentication, security, access control etc. (iii) what a cloud marketplace has as its governance structure. This case study will provide informative analysis of Internet2 NET, a profit-making vertical and buyer's marketplace (education industry). And we will get some strategic implications for planning and implementing cloud marketplaces.

An Analysis on the Change of Usage Behavior for Bundle Services in Korean Telecommunication Market (방송통신 결합상품서비스 이용행태 변화 분석 연구)

  • Yu, Jieun;Lee, Seong-Jun;Cho, Chanwoo
    • The Journal of the Korea Contents Association
    • /
    • v.20 no.11
    • /
    • pp.204-215
    • /
    • 2020
  • We analyze changes of consumption behavior for bundle services for the latest three years focusing on comparing the detailed service types and service providers to understand competition structure in the market. Our major findings and implications are as follows. First, the mobile telecommunication service is certainly deemed to be a major selection criteria for bundling service provider, therefore the leading company in the mobile telecommunication has become more significant market power. Second, IPTV has an important influence for slection of bundling service provider, lately in some cases, rather than broadband Internet. Third, the individual services affecting the selection of bundling service providers clearly showed differentiation among three operators as a mobile telecommunication service of SK Group, a broadband Internet of KT, and an IPTV of LGU+. In addition, the importance of individual services in securing subscribers has been increased as the preference factors to switch a service provider were synchronized with the decision of major bundling service provider. Finally, although it is difficult to find customers' lock-In due to the latest change of their intentions to switch a provider, we find it is continuously necessary to monitor customers' lock-in as there are more long-term customers with re-contracts. Our results provide the policy implications based on the change of competition structure and usage behavior in the bundle market which is not evaluated the competiton situation.

A Study on a Secure Internet Service Provider Model Using Smart Secure-Pad (스마트 보안패드를 이용한 안전한 인터넷 서비스 제공 모델에 관한 연구)

  • Lee, Jae-Sik;Kim, Hyung-Joo;Jun, Moon-Seog
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.14 no.3
    • /
    • pp.1428-1438
    • /
    • 2013
  • Services take place in Internet environment, a formation of the trust relationship between user and service provider for services. Different authentication schemes such as using Certificate of Public Key Infrastructure authentication and using ID/PW for a simple user authentication have been proposed for trust relationship. In addition, in the case of electronic financial transactions, transaction integrity and non-repudiation features are provided. These services are provided in Internet environment, use various measures to ensure service safety. However, it was difficult to prevent attacks using existing security technology because of emergence of MITB attack that manipulate the memory area of the Web browser and social engineering attacks such as phishing/pharming, requires application of new security technologies became. In this paper, we propose a concept of smart secure-pad, and utilize it safely formed a trust relationship between user and service provider, a model has been proposed to ensure safety of data transmission. Proposed model's security evaluation results show security against to MITB attack and phishing/pharming that can't be prevent attack using existing security technology. In addition, service provider can easily apply the model in safe environment can provide Internet service using provided representative services applying the proposed model.

Studying Business Strategies in a Total Payment Service Market through Mobilians Case (모바일 결제 서비스 시장의 성공요인 분석과 나아갈 방향 모색: [주]모빌리언스[Total Payment Service Provider]사례 중심으로)

  • An, Ji-Hyeon;Yun, Sang-Won;Lee, Mi-Yeong
    • Journal of Digital Convergence
    • /
    • v.4 no.2
    • /
    • pp.127-142
    • /
    • 2006
  • This paper uses a Mobilans case based on software system to derive the results of our study. Recently, the mobile phone payment entered its matured stage and became most frequently used payment method in all internet sites. And, in order to prepare for the future ubiquitous market, every mobile phone payment methods has different speed of development, market status and target segments in the market. This paper also discusses about the background and current status of Korean mobile phone payment market using SMS(Short Message Service) to purchase items on internet which is growing sharply every year. Also, we try find the key factors to succeed in this growing market. In addition to safety, delayed payment and the immediateness for use of mobile phone, we also suggest that a highly developed hardware system is an additional factor under the increased demands for the convenience with various applications.

  • PDF

Verification Control Algorithm of Data Integrity Verification in Remote Data sharing

  • Xu, Guangwei;Li, Shan;Lai, Miaolin;Gan, Yanglan;Feng, Xiangyang;Huang, Qiubo;Li, Li;Li, Wei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.2
    • /
    • pp.565-586
    • /
    • 2022
  • Cloud storage's elastic expansibility not only provides flexible services for data owners to store their data remotely, but also reduces storage operation and management costs of their data sharing. The data outsourced remotely in the storage space of cloud service provider also brings data security concerns about data integrity. Data integrity verification has become an important technology for detecting the integrity of remote shared data. However, users without data access rights to verify the data integrity will cause unnecessary overhead to data owner and cloud service provider. Especially malicious users who constantly launch data integrity verification will greatly waste service resources. Since data owner is a consumer purchasing cloud services, he needs to bear both the cost of data storage and that of data verification. This paper proposes a verification control algorithm in data integrity verification for remotely outsourced data. It designs an attribute-based encryption verification control algorithm for multiple verifiers. Moreover, data owner and cloud service provider construct a common access structure together and generate a verification sentinel to verify the authority of verifiers according to the access structure. Finally, since cloud service provider cannot know the access structure and the sentry generation operation, it can only authenticate verifiers with satisfying access policy to verify the data integrity for the corresponding outsourced data. Theoretical analysis and experimental results show that the proposed algorithm achieves fine-grained access control to multiple verifiers for the data integrity verification.

New Fashion Industry Trend Corresponding to New Media & Internet Infrastructure (뉴미디어 및 인터넷 시대에 부응하는 패션산업의 새로운 동향)

  • 김수진;한명숙
    • The Research Journal of the Costume Culture
    • /
    • v.10 no.3
    • /
    • pp.293-305
    • /
    • 2002
  • This paper describes the new trends of fashion industry in the era of digital media and Internet paradigm, where fashion is no longer just static contents. Fashion becomes crucial and dynamic contents for infotainment, mobile Internet, and digital media. As therefore, the fashion industry could be positioned as fashion information industry and key elements of fashion communication. In the future, fashion education should be repositioned as dynamic Intermediary not only for traditional textile design, costume design, and merchandising, but also for dynamic fashion information provider, fashion communication and fashion-oriented media related to digital Information, and Internet. As a case study, we briefly describe the successful co-marketing strategies of world-class luxury fashion brands, fashion media, and Internet service provider.

  • PDF

Development of the EPG Provider System based on DAB (DAB 기반의 EPG Provider 시스템 개발)

  • Jin Hyun-Joon;Park Nho-Kyung;Hwang Woon-Jae
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.41 no.12
    • /
    • pp.51-60
    • /
    • 2004
  • DAB(Digital Audio Broadcasting) is a new media service that can provide CD quality audio, various data service, interactive and high quality mobile communications through popular media such as terrestrial broadcasting, satellite, cable TV, and internet. In this paper, a new EPG(Electronic Program Guide) application model is proposed. The model is based on DAB and combines a DAB receiver and PCs so that it can take advantages of using various multimedia services and plenty of internet contents. The developed EPSD(EPG Provider System on DAB) has Web-based Server/Client structure and povides EPG functionalities to client PCs over internet. Therefore, the DAB receiver can be smaller and cheaper, and can develop abundant data services on internet. It can also provide high quality video services and be expected to become an important component in future home network systems.

Visions and the Use of a Community Information and Communication Technology (ICT): Assessing the Effectiveness of the Delivery of Community Network Services

  • Kwon, Nahyun
    • Journal of Korean Library and Information Science Society
    • /
    • v.35 no.1
    • /
    • pp.377-397
    • /
    • 2004
  • This study investigated the use of community information and communication technologies in light of its dual visions (i.e., serving as an affordable Internet service provider and a community building tool). Surveying the randomly selected users of a community network (n = 213), this study examined the influence of the community features on service use compared to that of Internet features. The present study found that the respondents were using the service mainly for general Internet features, such as email and web access. More than two-thirds of the respondents did not recognize community contents as available service. Community features of the service were found as significant predictors of use only among people who were aware of community contents but not among people who were not. Nonetheless, there was no difference in the amount of use between the two groups, indicating that the awareness of community contents itself did not increase use. Findings suggest that the service providers did not fully communicate the community aspect of the service with the users although the very aspect distinguishes the service from other Internet services.

  • PDF

A Research on the Digital Information of the Deceased (사자(死者)의 디지털 정보에 관한 연구)

  • Kim, Young-Hwan
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.12
    • /
    • pp.247-253
    • /
    • 2010
  • The demand that needs 'Digital Legacy', a notion that an Internet user can transfer his private blogs, e-mail and financial assets to inheritors and party interested when he died suddenly in the accident, has been growing recently. This issue has become a social hot potato since Justine Ellsworth's father in USA sued Yahoo for the right to access his son's Yahoo e-mail account after Justine Ellsworth had died in Iraq, in November, 2004 and the problems happened to deal with suicide-related blogs and homepages when great entertainers in Korea committed suicide and soldiers' parents in the situation of warship Chonan tragedy in Korea demanded access to soldiers' homepages and e-mail accounts. The point at issue focuses on the property matters about the digital information of the deceased and the relationship between the deceased and the Internet Service Provider(ISP). This research looks into the trend of judicial precedents and laws related to the digital information of the deceased and suggests the preliminary data of the next research.