• Title/Summary/Keyword: Mobile Cloud Services

Search Result 189, Processing Time 0.025 seconds

IoT Based Real-Time Indoor Air Quality Monitoring Platform for a Ventilation System (청정환기장치 최적제어를 위한 IoT 기반 실시간 공기질 모니터링 플랫폼 구현)

  • Uprety, Sudan Prasad;Kim, Yoosin
    • Journal of Internet Computing and Services
    • /
    • v.21 no.6
    • /
    • pp.95-104
    • /
    • 2020
  • In this paper, we propose the real time indoor air quality monitoring and controlling platform on cloud using IoT sensor data such as PM10, PM2.5, CO2, VOCs, temperature, and humidity which has direct or indirect impact to indoor air quality. The system is connected to air ventilator to manage and optimize the indoor air quality. The proposed system has three main parts; First, IoT data collection service to measure, and collect indoor air quality in real time from IoT sensor network, Second, Big data processing pipeline to process and store the collected data on cloud platform and Finally, Big data analysis and visualization service to give real time insight of indoor air quality on mobile and web application. For the implication of the proposed system, IoT sensor kits are installed on three different public day care center where the indoor pollution can cause serious impact to the health and education of growing kids. Analyzed results are visualized on mobile and web application. The impact of ventilation system to indoor air quality is tested statistically and the result shows the proper optimization of indoor air quality.

Malware Behavior Analysis based on Mobile Virtualization (모바일 가상화기반의 악성코드 행위분석)

  • Kim, Jang-Il;Lee, Hee-Seok;Jung, Yong-Gyu
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.2
    • /
    • pp.1-7
    • /
    • 2015
  • As recent smartphone is used around the world, all of the subscribers of the mobile communication is up to 47.7% about 24 million people. Smartphone has a vulnerability to security, and security-related incidents are increased in damage with the smartphone. However, precautions have been made, rather than analysis of the infection of most of the damage occurs after the damaged except for the case of the expert by way of conventional post-countermeasure. In this paper, we implement a mobile-based malware analysis systems apply a virtualization technology. It is designed to analyze the behavior through it. Virtualization is a technique that provides a logical resources to the guest by abstracting the physical characteristics of computing resources. The virtualization technology can improve the efficiency of resources by integrating with cloud computing services to servers, networks, storage, and computing resources to provide a flexible. In addition, we propose a system that can be prepared in advance to buy a security from a user perspective.

A Meta-Model for Development Process of IoT Application by Using UML

  • Cho, Eun-Sook;Song, Chee-Yang
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.1
    • /
    • pp.121-128
    • /
    • 2019
  • An Internet of Things(IoT) technology which provides intelligent services by combining context-awareness based intelligences, inter-communication is made of between things and things or between things and person through the network connected with intelligent things is spreading rapidly. Especially as this technology is converged into smart device, mobile, cloud, big data technologies, it is applied into various domains. Therefore, this is different from existing Web or Mobile Application. New types of IoT applications are emerging by adapting IoT into Web or mobile. Because IoT application is not only focused on software but also considering hardware or things aspect, there are limitations existing development process. Existing development processes don't consider analysis and design techniques considering both hardware and things. We propose not only a meta-model for development process which can support IoT application's development but also meta-models for main activities in this paper. Especially we define modeling elements by using UML's extension mechanisms, provide development process, and suggest design techniques how to apply those elements into IoT application's modeling phase. Because there are many types of IoT application's type, we propose an Android and Arduino-based on IoT application as a case study. We expect that proposed technique can be applied into many of various IoT application development and design with a form of flexible and extensible as well as main functionalities or elements are more concretely described. As a result, it brings IoT application's flexibility and the effect of quality improvement.

Implementation of Dynamic Situation Authentication System for Accessing Medical Information (의료정보 접근을 위한 동적상황인증시스템의 구현)

  • Ham, Gyu-Sung;Seo, Own-jeong;Jung, Hoill;Joo, Su-Chong
    • Journal of Internet Computing and Services
    • /
    • v.19 no.6
    • /
    • pp.31-40
    • /
    • 2018
  • With the development of IT technology recently, medical information systems are being constructed in an integrated u-health environment through cloud services, IoT technologies, and mobile applications. These kinds of medical information systems should provide the medical staff with authorities to access patients' medical information for emergency status treatments or therapeutic purposes. Therefore, in the medical information systems, the reliable and prompt authentication processes are necessary to access the biometric information and the medical information of the patients in charge of the medical staff. However, medical information systems are accessing with simple and static user authentication mechanism using only medical ID / PWD in the present system environment. For this reason, in this paper, we suggest a dynamic situation authentication mechanism that provides transparency of medical information access including various authentication factors considering patient's emergency status condition and dynamic situation authentication system supporting it. Our dynamic Situation Authentication is a combination of user authentication and mobile device authentication, which includes various authentication factor attributes such as emergency status, role of medical staff, their working hours, and their working positions and so forth. We designed and implemented a dynamic situation authentication system including emergency status decision, dynamic situation authentication, and authentication support DB construction. Finally, in order to verify the serviceability of the suggested dynamic situation authentication system, the medical staffs download the mobile application from the medical information server to the medical staff's own mobile device together with the dynamic situation authentication process and the permission to access medical information to the patient and showed access to medical information.

Efficient Operation and Management Scheme of Micro Data Centers for Realization of Edge Computing (에지 컴퓨팅의 실현을 위한 마이크로 데이터센터의 효율적인 운영 및 관리 기법)

  • Choi, JungYul
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.11
    • /
    • pp.30-39
    • /
    • 2020
  • As 5G mobile communication services are provided, efforts are being made to provide various services to users with ultra-low latency. This raises interest in edge computing, which can provide high performance computing services near users instead of cloud computing at the network core. This paper presents an efficient operation and management scheme of a micro data center, which is an essential equipment for realizing edge computing. First, we present the functional structure and deployment plan of edge computing. Next, we present the requirements for the micro data centers for edge computing and the operation and management scheme accordingly. Finally, in order to efficiently manage resources in the micro data centers, we present resource management items to be collected and monitored, and propose a performance indicator to measure the energy efficiency.

The Study of Sensor Data Integration for Medical Information Processing in a Cloud Computing (클라우드 컴퓨팅에서 의료 정보 처리를 위한 센서 데이터 통합에 대한 연구)

  • Hwang, Chi-Gon;Yoon, Chang-Pyo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.10a
    • /
    • pp.285-287
    • /
    • 2015
  • Recently, the development of sensors and the mobile communication device offers a number of possibilities in the medical and related fields. However, this data is generated, it is difficult to match the metadata and standard units. The data integration is required to use the data generated by the different specifications of the sensor efficiently. Accordingly, in this paper we propose a method using an ontology as a method to integrate the data generated by the existing sensors and the new sensor. The ontology is mapping to the standard item and sensors, also include a type and structural difference. The mapping is comprised of two : data mapping, and metadata mapping. There are standard items that are created in this way, type of data exchange between services. This can solve the heterogeneous problem generated by sensors.

  • PDF

A Study on the Latency Analysis of Bus Information System Based on Edge Cloud System (엣지 클라우드 시스템 기반 버스 정보 시스템의 지연시간 분석연구)

  • SEO Seungho;Dae-Sik Ko
    • Journal of Platform Technology
    • /
    • v.11 no.3
    • /
    • pp.3-11
    • /
    • 2023
  • Real-time control systems are growing rapidly as infrastructure technologies such as IoT and mobile communication develop and services that value real-time such as factory management and vehicle operation checks increase. Various solutions have been proposed to increase the time sensitivity of this system, but most real-time control systems are currently composed of local servers and multiple clients located in control stations, which are transmitted to local servers where control systems are located. In this paper, we proposed an edge computing-based real-time control model that can reduce the time it takes for the bus information system, one of the real-time control systems, to provide the information to the user at the time it collects the information. Simulating the existing model and the edge computing model, the edge computing model confirmed that the cost for users to receive data is reduced from at least 10% to up to 80% compared to the existing model.

  • PDF

A New Approach Towards Aggregation in VANET

  • Hussain, Rasheed;Abbas, Fizza;Son, Junggab;Kim, Sangjin;Oh, Heekuck
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2013.11a
    • /
    • pp.214-217
    • /
    • 2013
  • Advancements in automobile industries and the communication technologies caused VANET (Vehicular Ad Hoc NETwork) to evolve to VANET-based clouds before its deployment. It is more likely that VANET clouds will replace the traditional VANET in the deployment phase. It is to be noted that an abrupt deployment is out of question because it would require mass of resources and money to do so; instead incremental deployment is more ideal. In this paper, we aim at the incremental deployment phase of VANET clouds and focus on the well-established public transport networks. Data aggregation is one of the essential aspects in traditional VANET and has been researched for quite long time. However the previously proposed schemes are still controversial. Keeping in mind the time and space prediction of public buses, we leverage these buses as potential aggregators and MG (Mobile Gateways) in VANET clouds. Buses gather cooperative whereabouts information from neighbors, aggregate that information, disseminate it to the neighbor MGs and also send it to the cloud for storage and for services exchange. In our proposed scheme, we believe that the dissemination will be effective and cover most of the urban area since at any instant of time; buses cover most part of the urban areas. Besides, the effective transmission range is higher due to tall buses.

Image Security System Using Push Server and Smart Device (푸시 서버와 스마트 디바이스를 이용한 영상보안 시스템)

  • Park, Seung-Hwan;Oh, U-Chul;Kim, Chang-Bok
    • Journal of Advanced Navigation Technology
    • /
    • v.18 no.6
    • /
    • pp.588-593
    • /
    • 2014
  • Recently, the smart devices has been possessed by a large majority of the adult, and offered various personalization services. This paper proposed the lightweight Intelligent Image Security System that notice the existence of any intruder in real time at the place of requiring the security by using smart device. The proposed image security system recognized whether or not intruder exists using the difference frame on the basis of Integral Image and the dynamic background updating algorithms. The intrusion notification is achieved by using the GCM push server that send massages in the application unit of user mobile device, and the SMTP mail server which is use of e-mail standard protocol. In case of the occurrence of intruder, GCM push server send an push-massage by the private mobile device, and SMTP mail server send the intruder's photograph and intrusion time. By the convergence of the various image processing algorithms and the performance of smart device, The proposed image security system can be applied to the various Intelligent Image Security field.

Design of Encryption/Decryption IP for Lightweight Encryption LEA (경량 블록암호 LEA용 암·복호화 IP 설계)

  • Sonh, Seungil
    • Journal of Internet Computing and Services
    • /
    • v.18 no.5
    • /
    • pp.1-8
    • /
    • 2017
  • Lightweight Encryption Algorithm(LEA) was developed by National Security Research Institute(NSRI) in 2013 and targeted to be suitable for environments for big data processing, cloud service, and mobile. LEA specifies the 128-bit message block size and 128-, 192-, and 256-bit key sizes. In this paper, block cipher LEA algorithm which can encrypt and decrypt 128-bit messages is designed using Verilog-HDL. The designed IP for encryption and decryption has a maximum throughput of 874Mbps in 128-bit key mode and that of 749Mbps in 192 and 656Mbps in 256-bit key modes on Xilinx Vertex5. The cryptographic IP of this paper is applicable as security module of the mobile areas such as smart card, internet banking, e-commerce and IoT.