• Title/Summary/Keyword: Service Ubiquity

Search Result 53, Processing Time 0.021 seconds

Design and Analysis of Fabrication Threat Management in Peer-to-Peer Collaborative Location Privacy

  • Jagdale, Balaso;Sugave, Shounak;Kolhe, Kishor
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12spc
    • /
    • pp.399-408
    • /
    • 2021
  • Information security reports four types of basic attacks on information. One of the attacks is named as fabrication. Even though mobile devices and applications are showing its maturity in terms of performance, security and ubiquity, location-based applications still faces challenges of quality of service, privacy, integrity, authentication among mobile devices and hence mobile users associated with the devices. There is always a continued fear as how location information of users or IoT appliances is used by third party LB Service providers. Even adversary or malicious attackers get hold of location information in transit or fraudulently hold this information. In this paper, location information fabrication scenarios are presented after knowing basic model of information attacks. Peer-to-Peer broadcast model of location privacy is proposed. This document contains introduction to fabrication, solutions to such threats, management of fabrication mitigation in collaborative or peer to peer location privacy and its cost analysis. There are various infrastructure components in Location Based Services such as Governance Server, Point of interest POI repository, POI service, End users, Intruders etc. Various algorithms are presented and analyzed for fabrication management, integrity, and authentication. Moreover, anti-fabrication mechanism is devised in the presence of trust. Over cost analysis is done for anti-fabrication management due to nature of various cryptographic combinations.

QoS-based P2P Streaming Protocol (QoS 기반이 P2P 스트리밍 프로토콜)

  • Park, Seung-Chul
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.8
    • /
    • pp.1571-1579
    • /
    • 2009
  • This paper proposes a P2P(Peer-to-Peer) streaming protocol which allows various QoS(Qualify of Service) requirements of video streaming to be supported for various personal IPTV applications in ubiquitous Internet environments. The proposed P2P streaming protocol takes fairly short startup delay, guarantees end-to-end delay bound and bandwidth requirements, and supports reliability level of video streaming for an IPTV application. The QoS-based P2P streaming protocol can properly use not only the advantages of scalability, availability, and ubiquity of P2P streaming but also complement its disadvantages of performance and reliability so that various types of personal IPTV applications can be properly implemented in the existing broadband Internet environments.

A Research on the Cloud Computing Security Framework (클라우드 컴퓨팅 정보보호 프레임워크에 관한 연구)

  • kim, Jung-Duk;Lee, Seong-Il
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.6
    • /
    • pp.1277-1286
    • /
    • 2013
  • Cloud computing's unique attributes such as elasticity, rapid provisioning and releasing, resource pooling, multi-tenancy, broad-network accessibility, and ubiquity bring many benefits to cloud adopters(company and organization), but also entails specific security risks associated with the type of adopted cloud and deployment mode. To minimize those types of risk, this paper proposed cloud computing security framework refered to strategic alliance model. The cloud computing security framework has main triangles that are cloud threat, security controls, cloud stakeholders and compose of three sides that are purposefulness, accountability, transparent responsibility. Main triangles define purpose of risk minimization, appointment of stakeholders, security activity for them and three sides of framework are principles of security control in the cloud computing, provide direction of deduction for seven service packages.

A Study on Intention to Use Personal Cloud Services: Focusing on Value Comparison (개인용 클라우드 서비스 사용 의도 연구: 가치 비교를 중심으로)

  • Kyunghoi Min;Chanhee Kwak;HanByeol Stella Choi;Heeseok Lee
    • Information Systems Review
    • /
    • v.22 no.2
    • /
    • pp.1-24
    • /
    • 2020
  • Cloud computing technology is expanding its services to individual consumers through storage and applications. This study aims to compare the predisposing factors that affect the perceived value and the intention to use between users who have used or experienced services and those who have never experienced services from the perspective of benefit and sacrifice based on the value-based acceptance model. The results showed that the sacrifice factor (perceived cost) had a significant effect on perceived value and perceived value had a significant effect on intention to use, but showed a difference in perceived benefit. Perceived usefulness, ubiquity, and network effects had significant impact for experienced users' perceived value, but for inexperienced users, ubiquity did not have significant impact. In addition, usefulness was the most significant factor for experienced users while network effect was the same for inexperienced users. The results of this study suggest that consumers' intention to use personal cloud service is evaluated as a benefit and sacrifice point and a new attempt to re-examine the role of previous experience.

The Effect of Product Scarcity and Purchase Behavior in Location-Based Application Services (위치기반 어플리케이션 서비스에서 제품의 희소성과 구매행동과의 영향)

  • Wang Ming;Hyeokjun Kwon;Jaewon Choi
    • Information Systems Review
    • /
    • v.20 no.2
    • /
    • pp.209-226
    • /
    • 2018
  • Location-based services have distinctive service characteristics compared to the past online commerce used on the desktop. In any place, mobile communication devices can be used to access online and utilize online shopping, and it is more convenient for users. In addition, by providing shopping and service information specific to each location, it is possible to provide convenience to the consumers according to their locations. In addition, it provides scarcity of information as well as location, thereby increasing consumers' desire to purchase. In this study, we investigated the effect of scarcity on the Purchase intention of consumers in location-based services. The steps of scarcity are: first, a step without scarcity, Second, providing time limit information, Third, providing quantity limitation information, Fourth, the experiment was designed to provide time and quantity limitation, and 4 groups were analyzed through experimental stimuli The purpose of this study is to verify the moderating effect of the dependent variable on the degree of scarcity by adding 'ubiquity', 'interactivity' and 'privacy' which are characteristics of location-based service. As a result of the analysis, scarcity of time and scarcity of quantity limitation scarcity stimuli showed a moderating effect on ubiquity, interactivity and consumer's purchase intention, and these variables also directly or indirectly affected positively. Consumer confidence was found to have a negative effect on consumers' purchase intentions.

GAMEVIL'S GLOBAL STRATEGY : IMPLICATIONS FOR MOBILE GAME INDUSTRY

  • Yoo, Byung-Joon;Jeon, Seong-Min
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.5 no.4
    • /
    • pp.113-128
    • /
    • 2010
  • Moblie games are getting popular in that more mobile handsets are available. The mobile phone is expected to be the dominant platform the way the PC turned out to be the dominant platform of desktop computing. Ubiquity enables the mobile phone users interact socially with other users. Mobile game developers are now competing globally on the Apple Appstore, where any developers in the world are able to publish their own games easily. This study reviews the case of Gamevil, one of the leading mobile game service providers, from its foundation to the current global competition in order to draw implications for mobile game industry.

  • PDF

Client Technology on a Server for Mobile Cloud

  • Nguyen, Tien-Dung;Biao, Song;Wei, Tang;Lee, Jun-Hyung;Huh, Eui-Nam
    • Information and Communications Magazine
    • /
    • v.28 no.10
    • /
    • pp.3-10
    • /
    • 2011
  • The increasing ubiquity of wireless networks and decreasing cost of hardware is fueling a proliferation of mobile devices. These devices are enabling a new revolution in mobile technology, not only running locally on them, but running on cloud as a service as well. From web browsing, email, or video conferencing, presentations to movie and music entertainment or games, multimedia applications, mobile cloud enables providing such diverse applications. Many technologies have been designed to address the limited hardware and performance in thin client PC. However, with the assorted network and graphic condition, those proposed technologies is obligated to alter aim to adapt mobile cloud. In this paper, we provide a survey of client technology on a Server that can be sufficed the requirements of Mobile Cloud. We also analyze each technology and classify with its individual difficulties and challenges.

A Study of Technology of Mobile Service Support Based on Home Automation (홈 오토메이션을 기반으로 하는 모바일 서비스 지원 기법)

  • 박정현;정화영
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2002.11a
    • /
    • pp.597-600
    • /
    • 2002
  • 새 천년이 시작하면서 자본주의의 새로운 기업 모델로 e-Biz가 각광받았다. 하지만 곧바로 사양되었으며, 이 시점에서 새로운 대안으로 떠오른 것이 바로 모바일 인터넷 비즈니스였다. M-Biz는 편재성(Ubiquity), 접근성(Reachability), 보안성(Security), 위치확인(Localiz ation), 즉시 연결성(Instant Connectivity), 개인화(Personalization)의 모바일 인터넷 장점을 이용하여 뚜렷한 수익모델로 가능해졌기 때문이다. 이런 모바일 컨텐츠 서비스는 정보제공(Information), Entertainment, 상거래(Transaction), 단문메시지 (Communication) 등을 현재 제공하고 있으며, 이러한 기능들을 현재 개발되고 있는 홈 오토메이션 시스템과 결합하여 새로운 형태의 홈 오토메이션을 기반으로 하는 모바일 서비스 지원 기법을 본 논문에서는 논하였다.

  • PDF

Protecting Privacy of User Data in Intelligent Transportation Systems

  • Yazed Alsaawy;Ahmad Alkhodre;Adnan Abi Sen
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.5
    • /
    • pp.163-171
    • /
    • 2023
  • The intelligent transportation system has made a huge leap in the level of human services, which has had a positive impact on the quality of life of users. On the other hand, these services are becoming a new source of risk due to the use of data collected from vehicles, on which intelligent systems rely to create automatic contextual adaptation. Most of the popular privacy protection methods, such as Dummy and obfuscation, cannot be used with many services because of their impact on the accuracy of the service provided itself, they depend on changing the number of vehicles or their physical locations. This research presents a new approach based on the shuffling Nicknames of vehicles. It fully maintains the quality of the service and prevents tracking users permanently, penetrating their privacy, revealing their whereabouts, or discovering additional details about the nature of their behavior and movements. Our approach is based on creating a central Nicknames Pool in the cloud as well as distributed subpools in fog nodes to avoid intelligent delays and overloading of the central architecture. Finally, we will prove by simulation and discussion by examples the superiority of the proposed approach and its ability to adapt to new services and provide an effective level of protection. In the comparison, we will rely on the wellknown privacy criteria: Entropy, Ubiquity, and Performance.

A Study on the Influence of Telephone Apprehension Affecting Continuous Use Intention of Mobile O2O Commerce (모바일 O2O 커머스 지속이용의도에 영향을 미치는 전화 불안감에 관한 연구)

  • Lee, Kyeong-Rak;Kim, Mee-Sung;Lee, Sang-Joon
    • Journal of Digital Contents Society
    • /
    • v.19 no.4
    • /
    • pp.661-671
    • /
    • 2018
  • The avoidance tendency of voice call in younger generation facilitates the growth of mobile O2O service that utilizes Messaging. This study adopted and elaborated original concepts of telephone apprehension to apply phone anxiety to O2O. We examined previous researches related to the ubiquity of service quality, communication ability and anxiety, and then conducted a survey to understand the consciousness of mobile O2O service users. The results show that users with high message intimacy and users with poor logicality are afraid of voice calls. The mobile O2O service is considered useful as a means to replace an unstable situation. In this study, we considered individual characteristics of acceptance factor of O2O mobile service technology, and it was a new attempt to expand telephone apprehension characteristic reflecting current situation. In addition, the different results of this research from prior studies that examined the relationships among apprehension, usefulness, and continuous use intentions might be helpful to expand and sophisticate the research area.