• Title/Summary/Keyword: Security Platform

Search Result 806, Processing Time 0.029 seconds

Design and Implementation of the Smart Fire Detection System and Automatic Extinguish Device Interface Platform based on Thermal Imaging Camera (적외선 열 영상 카메라 기반의 스마트 화재감지 시스템 및 자동소화 장치 인터페이스 플랫폼의 설계 및 구현)

  • Chang, Rak-Ju;Lee, Soon-Yi;Kang, Suk-Won;Lee, Dong Myung
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2014.11a
    • /
    • pp.7-8
    • /
    • 2014
  • The smart fire detection and automatic extinguish device interface platform based on thermal imaging camera that early monitors fire is designed and implemented in this paper. If a fire occurs in some area, the developed system can detect and automatically extinguish the fire. The major functions for developing the system are: Image system and Viewer for fire detection based on Thermal imaging camera and Megapixel camera; Automatic extinuish device for early fir detection; Interface platform between monitoring systems and automatic extinguish device.

  • PDF

Analysis of Encryption Algorithm Performance by Workload in BigData Platform (빅데이터 플랫폼 환경에서의 워크로드별 암호화 알고리즘 성능 분석)

  • Lee, Sunju;Hur, Junbeom
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.6
    • /
    • pp.1305-1317
    • /
    • 2019
  • Although encryption for data protection is essential in the big data platform environment of public institutions and corporations, much performance verification studies on encryption algorithms considering actual big data workloads have not been conducted. In this paper, we analyzed the performance change of AES, ARIA, and 3DES for each of six workloads of big data by adding data and nodes in MongoDB environment. This enables us to identify the optimal block-based cryptographic algorithm for each workload in the big data platform environment, and test the performance of MongoDB by testing various workloads in data and node configurations using the NoSQL Database Benchmark (YCSB). We propose an optimized architecture that takes into account.

Forecasting non-traditional security threats in Korea :by Republic of Korea Army collective intelligence platform operating result (미래 한반도의 비전통적 안보위협 예측 :육군의 집단지성 플랫폼 운영 결과를 중심으로)

  • Cho, Sang Keun;Jung, Min-Sub;Moon, Sang Jun;Park, Sang-Hyuk
    • The Journal of the Convergence on Culture Technology
    • /
    • v.7 no.1
    • /
    • pp.216-222
    • /
    • 2021
  • COVID-19 pandemic brings attentions to the nonmilitary and transnational non-traditonal security threats, as the scales of such damage by these threats are beyond expectation. The Republic of Korea Army tries to forecast non-traditional security threat which may be occurred in Korean peninsula by using collective intelligence platform. In coming years, climate change, social changes and technology development caused by the 4th industrial revolution will diversify non-traditional security threat. Considering urbanization, internet distribution rate, and geopolitical location where atmosphere from continent and ocean meet, Korea would may face the most lethal ones compared to those of other countries may face. Therefore, to predict such threats in pangovernment scale using collective intelligence platforms which embrace civil, public, military, industry, academy and research center is the most important than anything.

Palliates the Attack by Hacker of Android Application through UID and Antimalware Cloud Computing

  • Zamani, Abu Sarwar;Ahmad, Sultan;Uddin, Mohammed Yousuf;Ansari, Asrar Ahmad;Akhtar, Shagufta
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.8
    • /
    • pp.182-186
    • /
    • 2021
  • The market for smart phones has been booming in the past few years. There are now over 400,000 applications on the Android market. Over 10 billion Android applications have been downloaded from the Android market. Due to the Android popularity, there are now a large number of malicious vendors targeting the platform. Many honest end users are being successfully hacked on a regular basis. In this work, a cloud based reputation security model has been proposed as a solution which greatly mitigates the malicious attacks targeting the Android market. Our security solution takes advantage of the fact that each application in the android platform is assigned a unique user id (UID). Our solution stores the reputation of Android applications in an anti-malware providers' cloud (AM Cloud). The experimental results witness that the proposed model could well identify the reputation index of a given application and hence its potential of being risky or not.

Research of Detection performance enhancement from portable radiation detection platform based on Cortex-A9 (Cortex-A9 기반 휴대용 방사선 검출장치에서의 검출성능 향상을 위한 연구)

  • Kwon, Tae-Kyung;Kim, Young-Kil
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.6
    • /
    • pp.1488-1493
    • /
    • 2014
  • Shipping and logistics safety, security system is strengthening worldwide, the development of shipping and logistics safety security core technology for national security logistics system construction has been carried out. Interest in portable radiation detection device capable detecting gamma rays nuclides is increasing. In this paper, I would like to propose the study of resolution enhancement for accurate analysis of nuclides in the platform of the radiation detector portable with Cortex-A9.

Enhancing Privacy Protection in Steppy Applications through Pseudonymization

  • Nugroho, Heri Arum;Prihatmanto, Ary Setijadi;Rhee, Kyung Hyune
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2015.10a
    • /
    • pp.763-766
    • /
    • 2015
  • Smart Healthcare System as an Open Platform (Shesop) is an integrated healthcare system and have several features, one of them is Steppy Application. Steppy does count your step and display on Shesop website. In this system security issues are not properly addressed, while Personal Health Record (PHR) patient stored in the cloud platform could be at risk. In fact, the huge electronic information available online, people needs reliable and effective technique for privacy preserving. In order to improve the security of data which are displayed on the Shesop website, so that anyone who access could not tamper without permission. Recently Xu et al. showed a pseudonym scheme using smart card as a solution in e-health systems which uses discrete logarithm problem with cyclic group. In this paper, we adopt their scheme and use it application into smartphone using Near Field Communication (NFC) to construct security in Steppy apps.

Research of Resolution enhancement from portable radiation detection platform based on Cortex-A9 (Cortex-A9 기반 휴대용 방사선 검출장치에서의 분해능 향상을 위한 연구)

  • Kwon, Tae-Kyung;Kim, Young-kil
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.05a
    • /
    • pp.373-376
    • /
    • 2014
  • Shipping and logistics safety, security system is strengthening worldwide, the development of shipping and logistics safety security core technology for national security logistics system construction has been carried out. Interest in portable radiation detection device capable detecting gamma rays nuclides is increasing. In this paper, I would like to propose the study of resolution enhancement for accurate analysis of nuclides in the platform of the radiation detector portable with Cortex-A9.

  • PDF

Saudi Universities Electronic Portals: A Case Study of Northern Border University

  • Al Sawy, Yaser Mohammad Mohammad
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.2
    • /
    • pp.103-109
    • /
    • 2021
  • The study aimed to analyze the current situation of the electronic portal of the Northern Border University, in terms of content and components, the extent of quality of use, service assurance and integrity, linguistic coverage of objective content, in addition to assessing the efficiency of the Blackboard e-learning platform and measuring the degree of safety of the portal, in addition to measuring the extent of satisfaction, through a sample that included 135 faculty members, as the researcher was keen to apply the case study methodology with the use of the questionnaire as the main tool for measurement, and the study found that there is an average trend among faculty members in the degree of content for the components of the portal and electronic security While it rose to good use, and very good at using the Blackboard platform.

Secure and Resilient Framework for Internet of Medical Things (IoMT) with an Effective Cybersecurity Risk Management

  • Latifah Khalid Alabdulwahhab;Shaik Shakeel Ahamad
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.5
    • /
    • pp.73-78
    • /
    • 2024
  • COVID-19 pandemic outbreak increased the use of Internet of Medical Things (IoMT), but the existing IoMT solutions are not free from attacks. This paper proposes a secure and resilient framework for IoMT, it computes the risk using Risk Impact Parameters (RIP) and Risk is also calculated based upon the Threat Events in the Internet of Medical Things (IoMT). UICC (Universal Integrated Circuit Card) and TPM (Trusted Platform Module) are used to ensure security in IoMT. PILAR Risk Management Tool is used to perform qualitative and quantitative risk analysis. It is designed to support the risk management process along long periods, providing incremental analysis as the safeguards improve.

A Security Nonce Generation Algorithm Scheme Research for Improving Data Reliability and Anomaly Pattern Detection of Smart City Platform Data Management (스마트시티 플랫폼 데이터 운영의 이상패턴 탐지 및 데이터 신뢰성 향상을 위한 보안 난수 생성 알고리즘 방안 연구)

  • Lee, Jaekwan;Shin, Jinho;Joo, Yongjae;Noh, Jaekoo;Kim, Jae Do;Kim, Yongjoon;Jung, Namjoon
    • KEPCO Journal on Electric Power and Energy
    • /
    • v.4 no.2
    • /
    • pp.75-80
    • /
    • 2018
  • The smart city is developing an energy system efficiently through a common management of the city resource for the growth and a low carbon social. However, the smart city doesn't counter a verification effectively about a anomaly pattern detection when existing security technology (authentication, integrity, confidentiality) is used by fixed security key and key deodorization according to generated big data. This paper is proposed the "security nonce generation based on security nonce generation" for anomaly pattern detection of the adversary and a safety of the key is high through the key generation of the KDC (Key Distribution Center; KDC) for improvement. The proposed scheme distributes the generated security nonce and authentication keys to each facilities system by the KDC. This proposed scheme can be enhanced to the security by doing the external pattern detection and changed new security key through distributed security nonce with keys. Therefore, this paper can do improving the security and a responsibility of the smart city platform management data through the anomaly pattern detection and the safety of the keys.