• Title/Summary/Keyword: Proof systems

Search Result 329, Processing Time 0.025 seconds

Verification Algorithm for the Duplicate Verification Data with Multiple Verifiers and Multiple Verification Challenges

  • Xu, Guangwei;Lai, Miaolin;Feng, Xiangyang;Huang, Qiubo;Luo, Xin;Li, Li;Li, Shan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.2
    • /
    • pp.558-579
    • /
    • 2021
  • The cloud storage provides flexible data storage services for data owners to remotely outsource their data, and reduces data storage operations and management costs for data owners. These outsourced data bring data security concerns to the data owner due to malicious deletion or corruption by the cloud service provider. Data integrity verification is an important way to check outsourced data integrity. However, the existing data verification schemes only consider the case that a verifier launches multiple data verification challenges, and neglect the verification overhead of multiple data verification challenges launched by multiple verifiers at a similar time. In this case, the duplicate data in multiple challenges are verified repeatedly so that verification resources are consumed in vain. We propose a duplicate data verification algorithm based on multiple verifiers and multiple challenges to reduce the verification overhead. The algorithm dynamically schedules the multiple verifiers' challenges based on verification time and the frequent itemsets of duplicate verification data in challenge sets by applying FP-Growth algorithm, and computes the batch proofs of frequent itemsets. Then the challenges are split into two parts, i.e., duplicate data and unique data according to the results of data extraction. Finally, the proofs of duplicate data and unique data are computed and combined to generate a complete proof of every original challenge. Theoretical analysis and experiment evaluation show that the algorithm reduces the verification cost and ensures the correctness of the data integrity verification by flexible batch data verification.

Functional Status and Development Direction of Standard Records Management System (표준기록관리시스템(RMS)의 기능 현황 및 발전방향 10년의 운영 경험과 기능 개선 사항을 중심으로)

  • Yu, Young Moon
    • The Korean Journal of Archival Studies
    • /
    • no.57
    • /
    • pp.235-279
    • /
    • 2018
  • Electronic records produced by central administrative agencies are transferred to the National Archives of Korea. In the absence of defects or errors in electronic records, it is a proof that the government's electronic records management system is operating normally. Various problems have been found in this process, and there still remain problems to be solved. At the heart of it is a standard records management system, which has been continuously improved. In this paper, I introduce the functional improvement of the record management functions of the standard records management system. Among them, the important matters describe the background and reason for the improvement. In addition, the direction of development of the standard records management system was examined in terms of recognition conversion of recordkeepers, strengthen collaboration between recordkeepers and developers, improving records management metadata quality, linking related systems, automating records management, and IT environment change.

Healthcare System using Pegged Blockchain considering Scalability and Data Privacy

  • Azizan, Akmal;Pham, Quoc-Viet;Han, Suk Young;Kim, Jung Eon;Kim, Hoon;Park, Junseok;Hwang, Won-Joo
    • Journal of Korea Multimedia Society
    • /
    • v.22 no.5
    • /
    • pp.613-625
    • /
    • 2019
  • The rise of the Internet of Things (IoT) devices have greatly influenced many industries and one of them is healthcare where wearable devices started to track all your daily activities for better health monitoring accuracy and even down to tracking daily food intake in some cases. With the amounts of data that are being tracked and shared between from these devices, questions were raised on how to uphold user's data privacy when data is shared between these IoT devices and third party. With the blockchain platforms started to mature since its inception, the technology can be implemented according to a variety of use case scenarios. In this paper, we present a system architecture based on the healthcare system and IoT network by leveraging on multiple blockchain networks as the medium in between that should enable users to have direct authority on data accessibility of their shared data. We provide proof of concept implementation and highlight the results from our testing to show how the efficiency and scalability of the healthcare system improved without having a significant impact on the performance of the Electronic Medical Record (EMR) that mostly affected by the previous solution since these solutions directly connected to a public blockchain network and which resulted in significant delays and high cost of operation when a large amount of data or complicated functions are involved.

Design and Implementation of Prototype model of Vehicle speed automatic variable control System (차량속도 자동화 가변 시스템의 프로트 타입 모델 설계 및 구현)

  • Choi, Sung-Jai
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.19 no.4
    • /
    • pp.47-54
    • /
    • 2019
  • In the worldwide, The issue comes up which is the danger of car accidents from climate-change effects. We are considering about various types of speed limit signs for setting restricts to high-speed vehicles. South Korea has 4 seasons in the land. At Summer or Winter seasons have heavy rains and fogs or snow, In these seasons need to enforce speed limit laws or methods to prevent car collision. But South korea is using stationary speed limiters that is not enough to proof against rear-end car accidents in these climates. In this paper shows the necessity of independent LED speed limits display to reduce car accidents. And explaining the prototype model which is a combination of rain sensor and wiper systems. This model is independently changed the speed limits to 50%, 80%, 100% of standards by raindrops and snowflake. Also it is freely setting speed limits on each places anywhere it settled in. Visual effects of the model as being speed-down of vehicles helps to prevent rear-ending car accidents and traffic beforehand.

A Secure Receipt Issuing Scheme for e-Voting with Improved Usability (향상된 사용자 편의성을 갖는 안전한 전자 투표 영수증 발급 방식)

  • Lee, Yun-Ho;Lee, Kwang-Woo;Park, Sang-Joon;Kim, Seung-Joo;Won, Dong-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.4
    • /
    • pp.75-88
    • /
    • 2007
  • Current electronic voting systems are not sufficient to satisfy trustworthy elections as they do not provide any proof or confirming evidence of their honesty. This lack of trustworthiness is the main reason why e-voting is not widespread even though e-voting is expected to be more efficient than the current plain paper voting. Many experts believe that the only way to assure voters that their intended votes are casted is to use paper receipts. In this paper, we propose an efficient scheme for issuing receipts to voters in an e-voting environment using the well-known cut-and-choose method. Our scheme does not require any special printers or scanners, nor frequent observations of voting machines. In addition, our scheme is more secure than the previous schemes.

A Study on the Development of a Platform for the Prevention of Digital Sexual Crimes in the Virtual-Reality Metaverse (가상현실 메타버스 디지털 성범죄 예방을 위한 플랫폼 구축 제안 연구)

  • Jae-Won, Hwang;Jung-Heum, Park;Sang-Jin, Lee
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.17 no.6
    • /
    • pp.1157-1166
    • /
    • 2022
  • With the advent of the non-face-to-face era, a new type of digital sexual crime with avatars is emerging on the Metaverse virtual reality platform. Due to the lack of clearly established in legal and regulatory systems, it is challenging to punish offenders and acquire digital proof for sexual crimes using these avatars. This research aims to suggest a service and technological solution is development platform that may assist crime prevention and the collection of digital evidence, with a particular emphasis on digital sex crimes that occur in the metaverse, a virtual reality realm. This study explores the reasons behind the difficulty of legal application in the metaverse and then determines the types of digital sex crimes that may occur in the metaverse. In addition, it is suggested what service components the metaverse should contain from the stage of construction and design, can be utilized what element of metaverse in order to prevent illegal activity of avatars.

Real Estate Transaction System in Private Blockchain Environment (프라이빗 블록체인 환경에서의 부동산 거래 시스템)

  • Kim, Seugh-Ho;Kang, Hyeok;Lee, Keun-Ho
    • Journal of Internet of Things and Convergence
    • /
    • v.8 no.1
    • /
    • pp.11-16
    • /
    • 2022
  • Efforts to incorporate blockchain into various fields are continuing as cryptocurrency transactions become more active. Blockchain has the characteristic that once recorded facts cannot be modified or deleted. Due to these characteristics, the use in the field of recording and proving certain facts, such as voting or proof of ownership, is attracting attention. In this paper, users who want to participate in the transaction process using private blockchain, one of the types of blockchain, are divided into real estate brokers, building owners, and purchasers (lessors), and roles are assigned to each user. In addition, we would like to propose a system to increase reliability through the participation of institutions. Through this, we intend to not only present a real estate transaction system that prevents damage from real estate fraud related to false sales and fraudulent contracts, but also enhances reliability and contributes to finding ways to utilize blockchain in the future.

Systemic and molecular analysis dissect the red ginseng induction of apoptosis and autophagy in HCC as mediated with AMPK

  • Young Woo Kim;Seon Been Bak;Won-Yung Lee;Su Jin Bae;Eun Hye Lee;Ju-Hye Yang;Kwang Youn Kim;Chang Hyun Song;Sang Chan Kim;Un-Jung Yun;Kwang Il Park
    • Journal of Ginseng Research
    • /
    • v.47 no.3
    • /
    • pp.479-491
    • /
    • 2023
  • Background: Hepatocellular carcinoma (HCC) has a high incidence and is one of the highest mortality cancers when advanced stage is proceeded. However, Anti-cancer drugs available for treatment are limited and new anti-cancer drugs and new ways to treat them are minimal. We examined that the effects and possibility of Red Ginseng (RG, Panax ginseng Meyer) as new anti-cancer drug on HCC by combining network pharmacology and molecular biology. Materials and Methods: Network pharmacological analysis was employed to investigate the systems-level mechanism of RG focusing on HCC. Cytotoxicity of RG was determined by MTT analysis, which were also stained by annexin V/PI staining for apoptosis and acridine orange for autophagy. For the analyze mechanism of RG, we extracted protein and subjected to immunoblotting for apoptosis or autophagy related proteins. Results: We constructed compound-target network of RG and identified potential pathways related to HCC. RG inhibited growth of HCC through acceleration of cytotoxicity and reduction of wound healing ability of HCC. RG also increased apoptosis and autophagy through AMPK induction. In addition, its ingredients, 20S-PPD (protopanaxadiol) and 20S-PPT (protopanaxatriol), also induced AMPK mediated apoptosis and autophagy. Conclusion: RG effectively inhibited growth of HCC cells inducing apoptosis and autophagy via ATG/AMPK in HCC cells. Overall, our study suggests possibility as new anti-cancer drug on HCC by proof for the mechanism of the anti-cancer action of RG.

Correlation Extraction from KOSHA to enable the Development of Computer Vision based Risks Recognition System

  • Khan, Numan;Kim, Youjin;Lee, Doyeop;Tran, Si Van-Tien;Park, Chansik
    • International conference on construction engineering and project management
    • /
    • 2020.12a
    • /
    • pp.87-95
    • /
    • 2020
  • Generally, occupational safety and particularly construction safety is an intricate phenomenon. Industry professionals have devoted vital attention to enforcing Occupational Safety and Health (OHS) from the last three decades to enhance safety management in construction. Despite the efforts of the safety professionals and government agencies, current safety management still relies on manual inspections which are infrequent, time-consuming and prone to error. Extensive research has been carried out to deal with high fatality rates confronting by the construction industry. Sensor systems, visualization-based technologies, and tracking techniques have been deployed by researchers in the last decade. Recently in the construction industry, computer vision has attracted significant attention worldwide. However, the literature revealed the narrow scope of the computer vision technology for safety management, hence, broad scope research for safety monitoring is desired to attain a complete automatic job site monitoring. With this regard, the development of a broader scope computer vision-based risk recognition system for correlation detection between the construction entities is inevitable. For this purpose, a detailed analysis has been conducted and related rules which depict the correlations (positive and negative) between the construction entities were extracted. Deep learning supported Mask R-CNN algorithm is applied to train the model. As proof of concept, a prototype is developed based on real scenarios. The proposed approach is expected to enhance the effectiveness of safety inspection and reduce the encountered burden on safety managers. It is anticipated that this approach may enable a reduction in injuries and fatalities by implementing the exact relevant safety rules and will contribute to enhance the overall safety management and monitoring performance.

  • PDF

A Study on the Crime Investigation of Anonymity-Driven Blockchain Forensics (익명 네트워크 기반 블록체인 범죄 수사방안 연구)

  • Han, Chae-Rim;Kim, Hak-Kyong
    • Convergence Security Journal
    • /
    • v.23 no.5
    • /
    • pp.45-55
    • /
    • 2023
  • With the widespread use of digital devices, anonymous communication technologies such as the dark web and deep web are becoming increasingly popular for criminal activity. Because these technologies leave little local data on the device, they are difficult to track using conventional crime investigation techniques. The United States and the United Kingdom have enacted laws and developed systems to address this issue, but South Korea has not yet taken any significant steps. This paper proposes a new blockchain-based crime investigation method that uses physical memory data analysis to track the behavior of anonymous network users. The proposed method minimizes infringement of basic rights by only collecting physical memory data from the device of the suspected user and storing the tracking information on a blockchain, which is tamper-proof and transparent. The paper evaluates the effectiveness of the proposed method using a simulation environment and finds that it can track the behavior of dark website users with a residual rate of 77.2%.