• Title/Summary/Keyword: Shared Data Storage

Search Result 75, Processing Time 0.032 seconds

Vehicle black box system with LINK blockchain (LINK 블록체인을 적용한 차량용 블랙박스 시스템)

  • An, Kyuhwang;Won, Taeyeon;Park, Sangmin;Jang, Kyoungbae;Seo, Hwajeong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.8
    • /
    • pp.1018-1023
    • /
    • 2019
  • Since 2010, vehicle black boxes have become popular with many people, if there is no record of the vehicle accident scene, or if the offender deliberately deletes the image data, the victim succeeds. The biggest advantage of blockchain is that it is impossible to modify and delete data by data distribution storage. The biggest disadvantage is that sensitive data is also distributed. In this paper, we propose a blockchain method for the black box by using the advantage of shared block data and we intend to solve the problem of personal information leakage which is a disadvantage of blockchain by storing sensitive information stored in a blockchain in a private server by LINK blockchain with a private server. We also attached code(Github) and demonstration video(Youtube) linking LINK blockchain with the private server in this paper.

Developing Standard Transmission System for Radiology Reporting Including Key Images (Key Image를 포함한 방사선과 판독결과지 표준전송시스템 개발)

  • Kim, Seon-Chil
    • Journal of radiological science and technology
    • /
    • v.30 no.1
    • /
    • pp.47-51
    • /
    • 2007
  • Development of hospital information system and Picture Archiving Communication System is not new in the medical field, and the development of internet and information technology are also universal. In the course of such development, however, it is hard to share medical information without a refined standard format. Especially in the department of radiology, the role of PACS has become very important in interchanging information with other disparate hospital information systems. A specific system needs to be developed that radiological reports are archived into a database efficiently. This includes sharing of medical images. A model is suggested in this study in which an internal system is developed where radiologists store necessary images and transmit them in the standard international clinical format, Clinical Document Architecture, and share the information with hospitals. CDA document generator was made to generate a new file format and separate the existing storage system from the new system. This was to ensure the access to required data in XML documents. The model presented in this study added a process where crucial images in reading are inserted in the CDA radiological report generator. Therefore, this study suggests a storage and transmission model for CDA documents, which is different from the existing DICOM SR. Radiological reports could be better shared, when the application function for inserting images and the analysis of standard clinical terms are completed.

  • PDF

A Study on the College Students' Awareness and Preference about House Sharing (대학생의 하우스셰어링 의식과 선호에 관한 연구)

  • Han, Jeong-Won;Jung, Su-Jin
    • Korean Institute of Interior Design Journal
    • /
    • v.25 no.1
    • /
    • pp.142-150
    • /
    • 2016
  • This study examined the general housing awareness and awareness on house sharing of college students who are present residents as well as potential residents of shared houses. To achieve this purpose, structured questionnaires were used as a survey tool to understand students' awareness on housing and opinions on house sharing including a range of space sharing, preferences on house mates, and demands on services and facilities. The survey was conducted of college students in Busan, and the data were analyzed by the PASW Statistics 18.0 program. The findings of this study are as follows: 1) The housing awareness was categorized into seven factors by factor analysis. The subjects valued 'personality factor' in the housing awareness. 2) Regarding preference of house mate type, participants preferred a person who has similar lifestyle and in the same gender. 3) As for the space sharing, the subjects didn't want to share a bathroom and shower. Also, they preferred medium or large scale dormitory layout type to small sized apartment type. 4) The most positive aspect of house sharing was 'Reduction of rental and maintenance cost'. On the other hand, 'Difference of daily life pattern' was the most negative aspect of house sharing. 5) In case of services and community spaces, they preferred 'delivery storage service' and 'coin-operated laundry facility'.

MPEG-A PART 9 DIGITAL MULTIMEDIA BROADCASTING APPLICATION FORMAT

  • Sabirin, Muhammad Syah Houari;Lee, Jung-Soo;Kim, Hui-Yong;Kim, Mun-Churl;Kim, Yong-Han
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2009.01a
    • /
    • pp.346-350
    • /
    • 2009
  • Digital Multimedia Broadcasting (DMB) is the mobile TV service based on a digital radio transmission system that provides high quality audio/video and other auxiliary data services. As users want to store the DMB content in their device to be consumed later or to be shared among users, a standardized format needs to be specified to guarantee the interoperability for the DMB contents for various devices. DMB AF (Application Format) specification defines a file format for DMB contents and services. It specifies how to combine the variety of DMB contents with associated information for a presentation in a well-defined format that facilitates storage, interchange, management, editing, and presentation of the DMB contents in protected, governed, and interoperable ways. In this paper we present our implementation of DMB AF as part of the development of DMB AF reference software. Our implementation of DMB AF is developed as the reference software for the standard specification that consists of a three applications: packager, media player, metadata browser and collection of supporting libraries used by the applications.

  • PDF

Differences in Safety Perceptions of Use According to Cosmetic Information of Women

  • SO, Young-Jin;LEE, Ye-Eun;KWON, Young-Eun;JEON, Ye-Won;KWON, Lee-Seung
    • Journal of Wellbeing Management and Applied Psychology
    • /
    • v.3 no.4
    • /
    • pp.11-20
    • /
    • 2020
  • Purposes: This is a study on the perception of safety in use according to cosmetic information. Research design, data and methodology: As a result of analyzing 324 women in their twenties living in the metropolitan area, the following conclusions were drawn. Results: As a result of measuring the awareness of cosmetic information, the awareness of 'cosmetic-related knowledge' (M=3.52) and 'cosmetic performance' (M=3.43) was high, indicating that information on cosmetic knowledge was actively shared with each other. It was understood that the method of use and effect were properly recognized and that the cosmetics were selected. 'Correct cosmetic storage method' is significant in the factors of interest in cosmetics (p<.001), and 'the harmful ingredients of cosmetics that should be avoided' are significant in the factors of cosmetic information (p<0.05) and the factors of interest in cosmetics (p<0.01). 'Trouble-causing ingredients' showed a statistically significant difference in safety perception in all factors except cosmetic performance factors. Conclusion: There is a need to construct a system that allows consumers to easily purchase cosmetics that are necessary for their skin by schematically or simplifying the information on the usage period and trouble-causing ingredients after opening the cosmetics to be easily understood.

CP-ABE Access Control that Block Access of Withdrawn Users in Dynamic Cloud

  • Hwang, Yong-Woon;Lee, Im-Yeong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.10
    • /
    • pp.4136-4156
    • /
    • 2020
  • Recently, data can be safely shared or stored using the infrastructure of cloud computing in various fields. However, issues such as data security and privacy affect cloud environments. Thus, a variety of security technologies are required, one of them is security technology using CP-ABE. Research into the CP-ABE scheme is currently ongoing, but the existing CP-ABE schemes can pose security threats and are inefficient. In terms of security, the CP-ABE approach should be secure against user collusion attacks and masquerade attacks. In addition, in a dynamic cloud environment where users are frequently added or removed, they must eliminate user access when they leave, and so users will not be able to access the cloud after removal. A user who has left should not be able to access the cloud with the existing attributes, secret key that had been granted. In addition, the existing CP-ABE scheme increases the size of the ciphertext according to the number of attributes specified by the data owner. This leads to inefficient use of cloud storage space and increases the amount of operations carried out by the user, which becomes excessive when the number of attributes is large. In this paper, CP-ABE access control is proposed to block access of withdrawn users in dynamic cloud environments. This proposed scheme focuses on the revocation of the attributes of the withdrawn users and the output of a ciphertext of a constant-size, and improves the efficiency of the user decryption operation through outsourcing.

An Efficient Management and Sliding Window Query for Real-Time Stream Data to Require frequent Update (빈번한 변경을 요구하는 실시간 스트림 데이터의 효율적 관리 및 슬라이딩 윈도우 질의)

  • Kim, Jin-Deog
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.3
    • /
    • pp.509-516
    • /
    • 2008
  • Recently, the operator modules to control external devices are concerned about automatic management system to process continuously changed signals. These signals are the stream data of which characteristics are several numbers. a short report interval and asynchronous report time. It is necessary that the system brings about high accuracy and real time process for stream data. The typical queries of these systems consist of the current query to search the latest signal value, the snapshot query at a past time, the sliding window query from a past time to current. In this paper, we propose the efficient method to manage the above signals by using a file structured database in small-size operating systems. We also propose a query model to accommodate various queries including the sliding window query. The file database in the QNX adopts a delta version and a shared memory buffering method for the resource limit of a small storage and a low computing power.

Fraud Detection in E-Commerce

  • Alqethami, Sara;Almutanni, Badriah;AlGhamdi, Manal
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.6
    • /
    • pp.312-318
    • /
    • 2021
  • Lack of knowledge and digital skills is a threat to the information security of the state and society, so the formation and development of organizational culture of information security is extremely important to manage this threat. The purpose of the article is to assess the state of information security of the state and society. The research methodology is based on a quantitative statistical analysis of the information security culture according to the EU-27 2019. The theoretical basis of the study is the theory of defense motivation (PMT), which involves predicting the individual negative consequences of certain events and the desire to minimize them, which determines the motive for protection. The results show the passive behavior of EU citizens in ensuring information security, which is confirmed by the low level of participation in trainings for the development of digital skills and mastery of basic or above basic overall digital skills 56% of the EU population with a deviation of 16%. High risks to information security in the context of damage to information assets, including software and databases, have been identified. Passive behavior of the population also involves the use of standard identification procedures when using the Internet (login, password, SMS). At the same time, 69% of EU citizens are aware of methods of tracking Internet activity and access control capabilities (denial of permission to use personal data, access to geographical location, profile or content on social networking sites or shared online storage, site security checks). Phishing and illegal acquisition of personal data are the biggest threats to EU citizens. It have been identified problems related to information security: restrictions on the purchase of products, Internet banking, provision of personal information, communication, etc. The practical value of this research is the possibility of applying the results in the development of programs of education, training and public awareness of security issues.

Terra-Scope - a MEMS-based vertical seismic array

  • Glaser, Steven D.;Chen, Min;Oberheim, Thomas E.
    • Smart Structures and Systems
    • /
    • v.2 no.2
    • /
    • pp.115-126
    • /
    • 2006
  • The Terra-Scope system is an affordable 4-D down-hole seismic monitoring system based on independent, microprocessor-controlled sensor Pods. The Pods are nominally 50 mm in diameter, and about 120 mm long. They are expected to cost approximately $6000 each. An internal 16-bit, extremely low power MCU controls all aspects of instrumentation, eight programmable gain amplifiers, and local signal storage. Each Pod measures 3-D acceleration, tilt, azimuth, temperature, and other parametric variables such as pore water pressure and pH. Each Pod communicates over a standard digital bus (RS-485) through a completely web-based GUI interface, and has a power consumption of less than 400 mW. Three-dimensional acceleration is measured by pure digital force-balance MEMS-based accelerometers. These accelerometers have a dynamic range of more than 115 dB and a frequency response from DC to 1000 Hz with a noise floor of less than $30ng_{rms}/{\surd}Hz$. Accelerations above 0.2 g are measured by a second set of MEMS-based accelerometers, giving a full 160 dB dynamic range. This paper describes the system design and the cooperative shared-time scheduler implemented for this project. Restraints accounted for include multiple data streams, integration of multiple free agents, interaction with the asynchronous world, and hardened time stamping of accelerometer data. The prototype of the device is currently undergoing evaluation. The first array will be installed in the spring of 2006.

Digital Forensic Methodology of IaaS Cloud Computing Service (IaaS 유형의 클라우드 컴퓨팅 서비스에 대한 디지털 포렌식 연구)

  • Jeong, Il-Hoon;Oh, Jung-Hoon;Park, Jung-Heum;Lee, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.6
    • /
    • pp.55-65
    • /
    • 2011
  • Recently, use of cloud computing service is dramatically increasing due to wired and wireless communications network diffusion in a field of high performance Internet technique. Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. In a view of digital forensic investigation, it is difficult to obtain data from cloud computing service environments. therefore, this paper suggests analysis method of AWS(Amazon Web Service) and Rackspace which take most part in cloud computing service where IaaS formats presented for data acquisition in order to get an evidence.