• Title/Summary/Keyword: Next Generation Security Service Platform

Search Result 14, Processing Time 0.028 seconds

The Study of Security Life Cycler Energy Service Platform or Universal Middleware (유니버설미들웨어상의 생명주기기반 보안에너지 서비스플랫폼 연구)

  • Lee, Hae-Jun;Hwang, Chi-Gon;Yoon, Chang-Pyo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.05a
    • /
    • pp.291-293
    • /
    • 2017
  • Security services that support electric energy service gateway require relatively high reliability. In particular, the application services that accompany communications and data are run organically. Each of the security services should support a secure service platform that supports a secure, scalable life cycle for existing services which should be extends security layer of Universal Middleware such as OSGi platform. In this convergence platform, it is the study of security transfer modular services that allow independent life cycle management of systems through Universal middleware. First, It is modular in terms of energy consumption service and data, enabling real-time operation, communications, remote management and applications. Second, the life cycle of the secure module to support the life cycle of secure, delete, start and updating of the security module by applying the security policy module layer concept. It is modular in terms of power generation and accountability, enabling us to distinguish between reliability and accountability in a large volume of data models in the smart grid, the service was intended to be standardized and applied to the security service platform.

  • PDF

The Security Life Cycler Energy Service Platform for Universal Middleware (유니버설미들웨어기반 생명주기 보안에너지 서비스플랫폼 연구)

  • Lee, Hae-Jun;Hwang, Chi-Gon;Yoon, Chang-Pyo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.6
    • /
    • pp.1197-1202
    • /
    • 2017
  • Security services that support electric energy service gateway require relatively high reliability. In particular, the application services that accompany communications and data are run organically. Each of the security services should support a secure service platform that supports a secure, scalable life cycle for existing services which should be extends security layer of Universal Middleware. In this convergence platform, it is the study of security transfer modular services that allow independent life cycle management of systems through Universal middleware. First, It is modular in terms of energy consumption service and data, enabling real-time operation, communications, remote management and applications. Second, the life cycle of the secure module to support start, stop and updating of the security module by applying the security policy module layer concept. It is modular system enabling to design of dyanmic models in the smart grid, the service was intended to be standardized and applied to the security service platform.

Security Consideration of Virtual Reality Service (가상현실 서비스 환경에서의 보안 고려사항)

  • Lim, Sanghyeok;Jeon, Junhyun;Lee, Youngsook
    • Convergence Security Journal
    • /
    • v.18 no.3
    • /
    • pp.11-17
    • /
    • 2018
  • As many information and communication technology companies around the world pay attention to the virtual reality as the next generation platform, the virtual reality industry is rapidly growing in various fields. For this reason, virtual reality security is becoming important as the number of users increases. In order to use the virtual reality service safely, security measures must be taken. This paper examines virtual reality trends, analyzes security threats according to vulnerabilities and vulnerabilities of virtual reality, and presents security considerations for threats.

  • PDF

The Intelligent Blockchain for the Protection of Smart Automobile Hacking

  • Kim, Seong-Kyu;Jang, Eun-Sill
    • Journal of Multimedia Information System
    • /
    • v.9 no.1
    • /
    • pp.33-42
    • /
    • 2022
  • In this paper, we have recently created self-driving cars and self-parking systems in human-friendly cars that can provide high safety and high convenience functions by recognizing the internal and external situations of automobiles in real time by incorporating next-generation electronics, information communication, and function control technologies. And with the development of connected cars, the ITS (Intelligent Transportation Systems) market is expected to grow rapidly. Intelligent Transportation System (ITS) is an intelligent transportation system that incorporates technologies such as electronics, information, communication, and control into the transportation system, and aims to implement a next-generation transportation system suitable for the information society. By combining the technologies of connected cars and Internet of Things with software features and operating systems, future cars will serve as a service platform to connect the surrounding infrastructure on their own. This study creates a research methodology based on the Enhanced Security Model in Self-Driving Cars model. As for the types of attacks, Availability Attack, Man in the Middle Attack, Imperial Password Use, and Use Inclusive Access Control attack defense methodology are used. Along with the commercialization of 5G, various service models using advanced technologies such as autonomous vehicles, traffic information sharing systems using IoT, and AI-based mobility services are also appearing, and the growth of smart transportation is accelerating. Therefore, research was conducted to defend against hacking based on vulnerabilities of smart cars based on artificial intelligence blockchain.

Open IPTV Services over NGN (NGN에서의 개방형 IPTV 서비스)

  • Park, Hyo-Jin;Bae, Young-In;Choi, Jun-Kyun
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.3 no.4
    • /
    • pp.198-206
    • /
    • 2008
  • Internet protocol television (IPTV), one of the most emerging services, offers multimedia streaming services with security, reliability, and relevant quality of service (QoS)/quality of experience (QoE). It provides added values to all the involving players and also brings technical and business challenges to them. For IPTV services, we expect to adopt the next generation network (NGN) environment for high quality and the Web technologies for personalization to meet the customer's necessity. Web can provide an open, flexible, and agile platform. Therefore, in this paper, we propose personalized IPTV services based on Web-based open platform in NGN environment and present functional architecture for Web-based personalized IPTV services. Technical issues for deploying the proposed IPTV services using Web are also provided. The objective of this paper is to analyze the critical architectural issues for developing viable and feasible networking platform models for personalized IPTV services.

  • PDF

Neural Network and Cloud Computing for Predicting ECG Waves from PPG Readings

  • Kosasih, David Ishak;Lee, Byung-Gook;Lim, Hyotaek
    • Journal of Multimedia Information System
    • /
    • v.9 no.1
    • /
    • pp.11-20
    • /
    • 2022
  • In this paper, we have recently created self-driving cars and self-parking systems in human-friendly cars that can provide high safety and high convenience functions by recognizing the internal and external situations of automobiles in real time by incorporating next-generation electronics, information communication, and function control technologies. And with the development of connected cars, the ITS (Intelligent Transportation Systems) market is expected to grow rapidly. Intelligent Transportation System (ITS) is an intelligent transportation system that incorporates technologies such as electronics, information, communication, and control into the transportation system, and aims to implement a next-generation transportation system suitable for the information society. By combining the technologies of connected cars and Internet of Things with software features and operating systems, future cars will serve as a service platform to connect the surrounding infrastructure on their own. This study creates a research methodology based on the Enhanced Security Model in Self-Driving Cars model. As for the types of attacks, Availability Attack, Man in the Middle Attack, Imperial Password Use, and Use Inclusive Access Control attack defense methodology are used. Along with the commercialization of 5G, various service models using advanced technologies such as autonomous vehicles, traffic information sharing systems using IoT, and AI-based mobility services are also appearing, and the growth of smart transportation is accelerating. Therefore, research was conducted to defend against hacking based on vulnerabilities of smart cars based on artificial intelligence blockchain.

Information Security Management System on Cloud Computing Service (클라우드 컴퓨팅 서비스에 관한 정보보호관리체계)

  • Shin, Kyoung-A;Lee, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.1
    • /
    • pp.155-167
    • /
    • 2012
  • Cloud computing service is a next generation IT service which has pay-per-use billing model and supports elastically provisioning IT infra according to user demand. However it has many potential threats originating from outsourcing/supporting service structure that customers 'outsource' their own data and provider 'supports' infra, platform, application services, the complexity of applied technology, resource sharing and compliance with a law, etc. In activation of Cloud service, we need objective assessment standard to ensure safety and reliability which is one of the biggest obstacles to adopt cloud service. So far information security management system has been used as a security standard for a security management and IT operation within an organization. As for Cloud computing service it needs new security management and assessment different from those of the existing in-house IT environment. In this paper, to make a Information Security Management System considering cloud characteristics key components from threat management system are drawn and all control domain of existing information security management system as a control components are included. Especially we designed service security management to support service usage in an on-line self service environment and service contract and business status.

Developement Strategy for the National Research Network and Next Generation Network Security (국가연구망의 발전방향 및 차세대 국가연구망 보안)

  • Lee, Myoungsun;Cho, Buseung;Park, Hyoungwoo;Kim, Hyuncheol
    • Convergence Security Journal
    • /
    • v.16 no.7
    • /
    • pp.3-11
    • /
    • 2016
  • With repid development of optical networking technology, Software-Defined Network (SDN) and Network Function Virtualization (NFV), high performance networking service, collaboration platform that enables collaborative research globally, drastically National Research Network (NRN) including Internet Service has changed. Therefore we compared and analyzed several world-class NRNs and took a view of future development strategy of the NRN. Also we suggest high speed security environment in super high bandwidth network with 40Gbps and 100Gbps optical transmission technology, network separation of NRN with Science DMZ to support high performance network transmission for science big data, building security environment for last-mile in campus network that supports programmability of IDS using BRO framework.

A Study on the Factors Affecting the Intention to Use O2O Services (O2O 서비스의 사용의도에 영향을 미치는 요인에 관한 연구)

  • Jeong, Yu Jin;Song, Yong Uk
    • Journal of Information Technology Services
    • /
    • v.15 no.4
    • /
    • pp.125-151
    • /
    • 2016
  • In recent years, O2O (Online to Offline) services get a lot of attention to improve the trust in online shopping and minimize the inconvenience and the cost burden in offline shopping as the number of consumers, who do not show concern about the purchase platform like online or offline, increases. Even though the services have been getting the spotlight as a strong business platform for next generation commerce, there have been only a few studies on the O2O services. The purpose of this research is to investigate the factors which affect the consumer's intention to use location-based O2O services. The study is based on VAM (Value-based Adoption Model) which is able to analyze those factors from the aspects of benefit and sacrifice. We used the partial least squares (PLS) method for empirical analysis, and the result shows that contextual offers, instant connectivity, webrooming and economic efficiency, which fall under the benefit, affect perceived value positively while annoyance and face consciousness, which fall under the sacrifice, do not affect perceived value significantly. In addition, contextual offers and instant connectivity affect trust positively. Location accuracy, which falls under the benefit of location-based O2O service, do not significantly affect perceived value and trust while security risk affects trust and use intention negatively. It appears that trust affects perceived value and use intention positively.

A Cooperative Security Gateway cooperating with 5G+ network for next generation mBcN (차세대 mBcN을 위한 5G+ 연동보안게이트웨이)

  • Nam, Gu-Min;Kim, Hyoungshick;Lee, Hyun-Jin;Cho, Hark-Su
    • Journal of Internet Computing and Services
    • /
    • v.22 no.6
    • /
    • pp.129-140
    • /
    • 2021
  • The next generation mBcN should be built to cooperate with the wireless network to support hyper-speed and hyper-connectivity. In this paper, we propose a network architecture for the cooperation mBcN and 5G commercial network and architecture of the cooperative security gateway required for the cooperation. The proposed cooperative security gateway is between gNB and UPF to support LBO, SFC, and security. Our analysis shows that the proposed architecture has several advantages. First of all, user equipment connected with the mBcN can be easily connected through the 5G commercial radio network to the mBcN. Second, the military application traffic can be transmitted to mBcN without going through the 5G core network, reducing the end-to-end transmission delay without causing the traffic load on the 5G core network. In addition, the security level of the military application can effectively be maintained because the user equipment can be connected to the cooperative security gateway, and the traffic generated by the user equipment is transmitted to the mBcN without going through the 5G core network. Finally, we demonstrate that LBO, SFC, and security modules are essential functions of the proposed gateway in the 5G test-bed environment.