• Title/Summary/Keyword: Internet computing environment

Search Result 889, Processing Time 0.028 seconds

An Authentication Management using Biometric Information and ECC in IoT-Edge Computing Environments (IoT-EC 환경에서 일회용 생체정보와 ECC를 이용한 인증 관리)

  • Seungjin Han
    • Journal of Advanced Navigation Technology
    • /
    • v.28 no.1
    • /
    • pp.142-148
    • /
    • 2024
  • It is difficult to apply authentication methods of existing wired or wireless networks to Internet of Things (IoT) devices due to their poor environment, low capacity, and low-performance processor. In particular, there are many problems in applying methods such as blockchain to the IoT environment. In this paper, edge computing is used to serve as a server that authenticates disposable templates among biometric information in an IoT environment. In this environment, we propose a lightweight and strong authentication procedure using the IoT-edge computing (IoT-EC) system based on elliptic curve cryptographic (ECC) and evaluate its safety.

Construction Of The Measurement Model Of User Satisfaction In Internet Shopping Environment -Based On The End-Use Computng Satisfaction Instrument -

  • Kim, Tae-Hwan
    • International Commerce and Information Review
    • /
    • v.8 no.1
    • /
    • pp.3-13
    • /
    • 2006
  • To develop and validate an instrument to measure user satisfaction in Internet shopping environment, the EUCS instrument by Doll and Torkzadeh (1988) was used for this research. The results of the study shows how the main constructs of the model that will eventually interact for the user satisfaction in internet commerce environment. This research will present significant progress towards keeping the End-User Computing Satisfaction instrument relevant and applicable under the Internet shopping environment.

  • PDF

Application of Urban Computing to Explore Living Environment Characteristics in Seoul : Integration of S-Dot Sensor and Urban Data

  • Daehwan Kim;Woomin Nam;Keon Chul Park
    • Journal of Internet Computing and Services
    • /
    • v.24 no.4
    • /
    • pp.65-76
    • /
    • 2023
  • This paper identifies the aspects of living environment elements (PM2.5, PM10, Noise) throughout Seoul and the urban characteristics that affect them by utilizing the big data of the S-Dot sensors in Seoul, which has recently become a hot topic. In other words, it proposes a big data based urban computing research methodology and research direction to confirm the relationship between urban characteristics and living environments that directly affect citizens. The temporal range is from 2020 to 2021, which is the available range of time series data for S-Dot sensors, and the spatial range is throughout Seoul by 500mX500m GRID. First of all, as part of analyzing specific living environment patterns, simple trends through EDA are identified, and cluster analysis is conducted based on the trends. After that, in order to derive specific urban planning factors of each cluster, basic statistical analysis such as ANOVA, OLS and MNL analysis were conducted to confirm more specific characteristics. As a result of this study, cluster patterns of environment elements(PM2.5, PM10, Noise) and urban factors that affect them are identified, and there are areas with relatively high or low long-term living environment values compared to other regions. The results of this study are believed to be a reference for urban planning management measures for vulnerable areas of living environment, and it is expected to be an exploratory study that can provide directions to urban computing field, especially related to environmental data in the future.

A Enhanced Security Model for Cloud Computing in SSO Environment

  • Jang, Eun-Gyeom
    • Journal of the Korea Society of Computer and Information
    • /
    • v.22 no.8
    • /
    • pp.55-61
    • /
    • 2017
  • Cloud computing is cost-effective in terms of system configuration and maintenance and does not require special IT skills for management. Also, cloud computing provides an access control setting where SSO is adopted to secure user convenience and availability. As the SSO user authentication structure of cloud computing is exposed to quite a few external security threats in wire/wireless network integrated service environment, researchers explore technologies drawing on distributed SSO agents. Yet, although the cloud computing access control using the distributed SSO agents enhances security, it impacts on the availability of services. That is, if any single agent responsible for providing the authentication information fails to offer normal services, the cloud computing services become unavailable. To rectify the environment compromising the availability of cloud computing services, and to protect resources, the current paper proposes a security policy that controls the authority to access the resources for cloud computing services by applying the authentication policy of user authentication agents. The proposed system with its policy of the authority to access the resources ensures seamless and secure cloud computing services for users.

A Design of Broker Platform for a services interoperability on the collaboration cloud

  • Jung, Kyedong;Hwang, Chigon;Shin, Hyoyoung;Lee, Jongyong
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.7 no.1
    • /
    • pp.70-74
    • /
    • 2015
  • The cloud computing are provided various ways for accessing resources and services through collaboration. In this paper, we present a cloud computing model for collaboration in cloud environment. By introducing a model, it is possible to introduce and develop an application required for the database and business services. SaaS model can be applied overall or partially. In particular, business operations need various software. Since cost reduction and applying immediate service are available, it is possible to realize the business environment and high quality service.

King Sejong's Invention: Korean Characters and Real-time Korean Information Network (세종대왕의 발명: 한글과 실시간 한민족 정보 네트워크)

  • Kim, Yung-Bok
    • The KIPS Transactions:PartA
    • /
    • v.10A no.5
    • /
    • pp.463-468
    • /
    • 2003
  • The Internet, especially the mobile Internet influences enormously in many areas in human societym espeially in terms of the exchanging speed of knowledge and information. This new society of knowledge and information will introduce many new types of services based on valuable knowlwdge and information. Among many new services in this mobile computing environment, the real-time worldwide korean information networking service using the Korean characters invented by the mobile computing environment, the real-time worldwide Korean information networking service using the Koean characters invented by the King Sejong is possible ubiquitously with wired and mobile Internet. We studied the user interface with Korean characters in the mobile computing environment, and introduce the useful results with new metrics of performance analysis after real implementation for real-time Korean information networking using Korean domain names.

Expert System-based Context Awareness for Edge Computing in IoT Environment (IoT 환경에서 Edge Computing을 위한 전문가 시스템 기반 상황 인식)

  • Song, Junseok;Lee, Byungjun;Kim, Kyung Tae;Youn, Hee Yong
    • Journal of Internet Computing and Services
    • /
    • v.18 no.2
    • /
    • pp.21-30
    • /
    • 2017
  • IoT(Internet of Things) can enable networking and computing using any devices is rapidly proliferated. In the existing IoT environment, bottlenecks and service delays can occur because it processes data and provides services to users using central processing based on Cloud. For this reason, Edge Computing processes data directly in IoT nodes and networks to provide the services to the users has attracted attention. Also, numerous researchers have been attracted to intelligent service efficiently based on Edge Computing. In this paper, expert system-based context awareness scheme for Edge Computing in IoT environment is proposed. The proposed scheme can provide customized services to the users using context awareness and process data in real-time using the expert system based on efficient cooperations of resource limited IoT nodes. The context awareness services can be modified by the users according to the usage purpose. The three service modes in the security system based on smart home are used to test the proposed scheme and the stability of the proposed scheme is proven by a comparison of the resource consumptions of the servers between the proposed scheme and the PC-based expert system.

RDP: A storage-tier-aware Robust Data Placement strategy for Hadoop in a Cloud-based Heterogeneous Environment

  • Muhammad Faseeh Qureshi, Nawab;Shin, Dong Ryeol
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.9
    • /
    • pp.4063-4086
    • /
    • 2016
  • Cloud computing is a robust technology, which facilitate to resolve many parallel distributed computing issues in the modern Big Data environment. Hadoop is an ecosystem, which process large data-sets in distributed computing environment. The HDFS is a filesystem of Hadoop, which process data blocks to the cluster nodes. The data block placement has become a bottleneck to overall performance in a Hadoop cluster. The current placement policy assumes that, all Datanodes have equal computing capacity to process data blocks. This computing capacity includes availability of same storage media and same processing performances of a node. As a result, Hadoop cluster performance gets effected with unbalanced workloads, inefficient storage-tier, network traffic congestion and HDFS integrity issues. This paper proposes a storage-tier-aware Robust Data Placement (RDP) scheme, which systematically resolves unbalanced workloads, reduces network congestion to an optimal state, utilizes storage-tier in a useful manner and minimizes the HDFS integrity issues. The experimental results show that the proposed approach reduced unbalanced workload issue to 72%. Moreover, the presented approach resolve storage-tier compatibility problem to 81% by predicting storage for block jobs and improved overall data block placement by 78% through pre-calculated computing capacity allocations and execution of map files over respective Namenode and Datanodes.

Volume Rendering Architecture of Mobile Medical Image using Cloud Computing (클라우드 컴퓨팅을 활용한 모바일 의료영상 볼륨렌더링 아키텍처)

  • Lee, Woongkyu;Nam, Doohee
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.14 no.4
    • /
    • pp.101-106
    • /
    • 2014
  • The era came that by having fastest internet and smart phone makes cloud computing really a big merit. This paper proposes architecture for medical image volume rendering in mobile environment using cloud computing. This architecture to replace expensive workstation server and storage it use one of the service of cloud computing IaaS(Infrastructure as a Service). And this paper propose to use webGL to get rid of restriction of mobile hardware. By this research, it is expected that medical image volume rendering service in mobile environment is more effective and can be a foundation work.

Development of Wearable Assistance Suite for Interaction with Ubiquitous Environment (유비쿼터스 환경과 상호작용을 위한 착용형 도움 슈트 개발)

  • Seo, Yong-Ho;Han, Tae-Woo
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.9 no.5
    • /
    • pp.93-99
    • /
    • 2009
  • The wearable computer that can understand the context of human life and intelligently communicate with various electronic media in ubiquitous computing environment would be very useful as an assistant for humans. In this paper we introduce an intelligent wearable assistance suite. The proposed wearable suite can interact with both humans and electronic media in ubiquitous computing environment. The developed system can sense the interactive electronic media that a user wants to use and also communicate with it. By utilizing these interaction capabilities, it intermediates between each media and the user and offers a friendlier interface to the user who wears this system. We also show the usages of the proposed system by demonstrating its interaction with the interactive electronic media in ubiquitous computing environment.

  • PDF