• Title/Summary/Keyword: S&T information service

Search Result 816, Processing Time 0.026 seconds

Data Storage and Security Model for Mobile Healthcare Service based on IoT (IoT 기반의 모바일 헬스케어 서비스를 위한 데이터 저장 및 보호 모델)

  • Jeong, Yoon-Su
    • Journal of Digital Convergence
    • /
    • v.15 no.3
    • /
    • pp.187-193
    • /
    • 2017
  • Objects Internet-based healthcare services provide healthcare and healthcare services, including measurement of user's vital signs, diagnosis and prevention of diseases, through a variety of object internet devices. However, there is a problem that new security vulnerability can occur when inter-working with the security weakness of each element technology because the internet service based on the object Internet provides a service by integrating various element technologies. In this paper, we propose a user privacy protection model that can securely process user's healthcare information from a third party when delivering healthcare information of users using wearable equipment based on IoT in a mobile environment to a server. The proposed model provides attribute values for each healthcare sensor information so that the user can safely handle, store, and store the healthcare information, thereby managing the privacy of the user in a hierarchical manner. As a result of the performance evaluation, the throughput of IoT device is improved by 10.5% on average and the server overhead is 9.9% lower than that of the existing model.

Privacy-Preserving Outlier Detection in Healthcare Services (IoT환경에서 프라이버시를 보장하는 의료데이터 이상치 탐색 기법)

  • Lee, Bo Young;Choi, Wonsuk;Lee, Dong Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.5
    • /
    • pp.1187-1199
    • /
    • 2015
  • Recently, as high-quality sensors are being developed, it is available to conveniently measure any kind of data. Healthcare services are being combined with Internet of things (IoTs). And applications that use user's data which are remotely measured, such as heart rate, blood oxygen level, temperature are emerging. The typical example is applications that find ideal spouse by using a user's genetic information, or indicate the presence or absence of a disease. Such information is closely related to the user's privacy, so biometric information must be protected. That is, service provider must provide the service while preserving user's privacy. In this paper, we propose a scheme which enables privacy-preserving outlier detection in Healthcare Service.

IoT based Smart Health Service using Motion Recognition for Human UX/UI (모션인식을 활용한 Human UI/UX를 위한 IoT 기반 스마트 헬스 서비스)

  • Park, Sang-Joo;Park, Roy C.
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.18 no.1
    • /
    • pp.6-12
    • /
    • 2017
  • In this paper, we proposed IoT based Smart Health Service using Motion Recognition for Human UX/UI. Until now, sensor networks using M2M-based u-healthcare are using non-IP protocol instead of TCP / IP protocol. However, in order to increase the service utilization and facilitate the management of the IoT-based sensor network, many sensors are required to be connected to the Internet. Therefore, IoT-based smart health service is designed considering network mobility because it is necessary to communicate not only the data measured by sensors but also the Internet. In addition, IoT-based smart health service developed smart health service for motion detection as well as bio information unlike existing healthcare platform. WBAN communications used in u-healthcare typically consist of many networked devices and gateways. The method proposed in this paper can easily cope with dynamic changes even in a wireless environment by using a technology supporting mobility between WBAN sensor nodes, and systematic management is performed through detection of a user's motion.

  • PDF

System Hardening and Security Monitoring for IoT Devices to Mitigate IoT Security Vulnerabilities and Threats

  • Choi, Seul-Ki;Yang, Chung-Huang;Kwak, Jin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.2
    • /
    • pp.906-918
    • /
    • 2018
  • The advent of the Internet of Things (IoT) technology, which brings many benefits to our lives, has resulted in numerous IoT devices in many parts of our living environment. However, to adapt to the rapid changes in the IoT market, numerous IoT devices were widely deployed without implementing security by design at the time of development. As a result, malicious attackers have targeted IoT devices, and IoT devices lacking security features have been compromised by attackers, resulting in many security incidents. In particular, an attacker can take control of an IoT device, such as Mirai Botnet, that has insufficient security features. The IoT device can be used to paralyze numerous websites by performing a DDoS attack against a DNS service provider. Therefore, this study proposes a scheme to minimize security vulnerabilities and threats in IoT devices to improve the security of the IoT service environment.

Design and Implementation of Digital Contents Service System using Re-Direction Technique (Re-Direction 기법을 활용한 전자원문 연계시스템 설계 및 구현)

  • Cho, Sung-Nam;Lee, Sang-Hwan;Lee, Sang-Gi;Hwang, Chong-Sun;Chung, Taik-Yeong
    • Annual Conference of KIPS
    • /
    • 2004.05a
    • /
    • pp.1389-1392
    • /
    • 2004
  • 정보통신 및 인터넷의 급속한 발전으로 전자원문 서비스 등 웹 서비스가 활발하게 이루어지고 있으나, 기존 웹 서비스에 대한 연구는 웹 서비스를 차별화하기 위해 HTTP의 속도지연 문제해결이나 서비스 차별화 방안에 대해 이루어지고 있다. 그러나, 타 시스템의 웹 서비스와 연계시 해당 웹 문서에 대한 제어권 확보에 관한 연구는 미미하다. 따라서, 본 논문에서는 타 시스템의 웹 문서에 대해 제어권 확보를 위해 Re-Direction Agent를 활용하여 해외전자원문 연계시스템을 구현하고자 한다.

  • PDF

Consumer's Utility Attributes Analysis for T-Commerce Activation (T-Commerce 활성화를 위한 소비자 효용 속성 분석)

  • Park, Joon Yong;Shin, Min Soo
    • Journal of Information Technology Services
    • /
    • v.15 no.2
    • /
    • pp.21-33
    • /
    • 2016
  • Recently, T-Commerce is emerging to provide new services, with the proliferation of digital broadcasting services. However, T-Commerce market and TV home shopping market are being classified as a legal policy on other markets, such as regulated in the service of live broadcasts. The factor that has inhibited activation T-Commerce related to the lack of appropriate institutions and legal systems in the market, despite the environment with the digital broadcasting service is being spread. We were performed conjoint analysis. For this analysis, we select attributes as a quality attractive factors that significantly affects the satisfaction of TV based shopping customers through previous studies. The results showed that the TV-based shopping customers are important to think 'Responsive', 'Playfulness', 'Live broadcast', 'Convenience' and 'Bidirectional' in the order. The 'Responsive' and 'Live broadcast' of such attributes are served as possible only in TV home shopping, because these attributes don't service due to legal and institutional regulations in T-commerce market. The cluster analysis result also showed that TV shopping consumers are more important to think 'Responsive', 'Playfulness', 'Live broadcast' than 'Convenience' and 'Bidirectional', except one of the classification clusters. If real-time broadcast service is impossible because of the legal and institutional regulations, it seems to require the expansion of the services linked the terrestrial broadcasting to the activating T-Commerce market.

User satisfaction analysis for layer-specific differences using the IoT services (IoT 서비스를 사용하는 사용자 계층별 차이에 대한 만족도 분석)

  • Park, Chong-Woon;Kwon, Chang-Hui
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.1
    • /
    • pp.90-98
    • /
    • 2017
  • Since 2010, SNS was holding the explosive spread of smartphones has created a place of public advertising platform, and it entered the Internet of Things (IoT) is born gradually countdown of the era came to us already. In utilizing a variety of location-based services IoT services (beacon, O2O) The focus of this paper to analyze the differences in satisfaction with the oil layer by experienced users of what is being used. We consider the type and overall utilization of the concepts typical IoT service in the current service is made to expand the contents of the paper. Hypothesis was reconstructed ease, attractiveness, a survey reliability, value four kinds of models, called Honeycomb UX, User Experience Honeycomp Peter Mobil. Company that provides the service IoT in this study are expected to be used as basic data to help provide a more accurate personalized service according to the user's satisfaction difference.

RFID Authentication Protocol with Strong Resistance against Traceability and Denial of Service attack (위치 추적과 서비스 거부 공격에 강한 RFID 인증 프로토콜)

  • Kang, Jeon-Il;Nyang, Dae-Hun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.4
    • /
    • pp.71-82
    • /
    • 2005
  • Though there are many authentication protocols for RFID system, only a few protocols support location privacy. Because of tag's hardware limitation, these protocols suffer from many security threats, especially from DoS (Denial of Service) attack. In this paper, we explain location privacy problem and show vulnerabilities of RFID authentication protocols. And then, we suggest an authentication protocol that is strong against location tracing, spoofing attack and DoS attack

Device RDoS Attack Determination and Response System Design (디바이스의 DDoS 공격 여부 판단 및 대응 시스템 설계)

  • Kim, Hyo-jong;Choi, Su-young;Kim, Min-sung;Shin, Seung-soo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.05a
    • /
    • pp.108-110
    • /
    • 2021
  • Since 2015, attacks using the IoT protocol have been continuously reported. Among various IoT protocols, attackers attempt DDoS attacks using SSDP(Simple Service Discovery Protocol), and as statistics of cyber shelters, Korea has about 1 million open SSDP servers. Vulnerable SSDP servers connected to the Internet can generate more than 50Gb of traffic and the risk of attack increases gradually. Until recently, distributed denial of service attacks and distributed reflective denial of service attacks have been a security issue. Accordingly, the purpose of this study is to analyze the request packet of the existing SSDP protocol to identify an amplification attack and to avoid a response when an amplification attack is suspected, thereby preventing network load due to the occurrence of a large number of response packets due to the role of traffic reflection amplification.

  • PDF

A Study on the Difference in Expectation-Performance of Service Recovery Measurement Scale's 4 Dimensions both Korean Native Cattle Beef and Imported Beef Restaurant

  • Cho, Yoon-Shik;Lee, Mi-Ock
    • Journal of the Korean Data and Information Science Society
    • /
    • v.19 no.4
    • /
    • pp.1123-1131
    • /
    • 2008
  • A considerable amount of research has focused on the dimensionality of service failure and recovery construct. This paper is focused on service failure and recovery in the Korean native cattle and imported beef restaurant industry in the Korea. So, this paper has adapted Kau and Loh's Service recovery measurement scale so that restaurant managers can use it to determine how customers perceive the service quality in Korean native cattle beef restaurant and imported beef restaurant. The purpose of this research is to test the difference in pre-purchase expectation and post-purchase actual performance of 4 dimensions between the restaurants that sell the beef of Korean native cattle and imported cattle. The paired t -test is used to test difference of pre-purchase expectation and post-purchase actual performance for service recovery measurement scale's 4 dimensions of the 2 restaurant types. But, there is significant difference between pre-purchase expectation and post-purchase actual performance in the 2 restaurant types.

  • PDF