• Title/Summary/Keyword: User Control

Search Result 3,798, Processing Time 0.033 seconds

A Coordinated Ciphertext Policy Attribute-based PHR Access Control with User Accountability

  • Lin, Guofeng;You, Lirong;Hu, Bing;Hong, Hanshu;Sun, Zhixin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.4
    • /
    • pp.1832-1853
    • /
    • 2018
  • The personal health record (PHR) system is a promising application that provides precise information and customized services for health care. To flexibly protect sensitive data, attribute-based encryption has been widely applied for PHR access control. However, escrow, exposure and abuse of private keys still hinder its practical application in the PHR system. In this paper, we propose a coordinated ciphertext policy attribute-based access control with user accountability (CCP-ABAC-UA) for the PHR system. Its coordinated mechanism not only effectively prevents the escrow and exposure of private keys but also accurately detects whether key abuse is taking place and identifies the traitor. We claim that CCP-ABAC-UA is a user-side lightweight scheme. Especially for PHR receivers, no bilinear pairing computation is needed to access health records, so the practical mobile PHR system can be realized. By introducing a novel provably secure construction, we prove that it is secure against selectively chosen plaintext attacks. The analysis indicates that CCP-ABAC-UA achieves better performance in terms of security and user-side computational efficiency for a PHR system.

A Design and Implementation of Web Based Remote Control System for Three-Dimensional Stereo Camera (웹 기반의 삼차원 스테레오 카메라 원격제어 시스템의 설계 및 구현)

  • Kim, Sam-Ryong;Lim, In-Taek;Lee, Young-Ran;Lee, Jeong-Bae
    • The KIPS Transactions:PartD
    • /
    • v.10D no.2
    • /
    • pp.337-342
    • /
    • 2003
  • In this paper, a web based remote control system located at too dangerous field to access for the worker. The system was designed and implemented for three-dimensional stereo camera connected to web server which can be controlled easily by client side person working in the safe monitoring room. The user in the client side can control the vergence/focus control and zoom-in/out and pan/tilt functions through an user interface. The user interface for remote control environment was designed and implemented with Java applet mechanism, and was tested the operation result of the system.

A Field-based Morphing with Semi-automatic Control Lines Matching Using Image Segmentation (영상 분할을 이용한 반자동 제어선 정합에 의한 필드 기반 모핑)

  • Lee Hyoung-Jin;Kwak No-Yoon
    • Journal of Digital Contents Society
    • /
    • v.5 no.4
    • /
    • pp.269-274
    • /
    • 2004
  • The field based morping requires the user to set most of the control lines manually which require much time and skill to get satisfactory results. This tjesis proposes a method to acquire semi-automation of image morphing through first acquiring shape information from the source image and the target image, than after the user manually designates the least amount of a pair of feature points, these are used as standards for polygon based vertex to set the appropriate control line to the source image and target image, and then using the ratio of control line lengths and space. Using the proposed method the user can reduce the time setting the control line and unskilled persons can get natural image morphing results while desingnating the least amount of control line.

  • PDF

Intelligent Home Control Interface based on 3D (3D기반 지능형 흠 통합 제어 인터페이스 구현)

  • Kim, Yong-Ho
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.05a
    • /
    • pp.540-543
    • /
    • 2008
  • User interface of intelligent home must control and manage information appliances connected to the home network. But there are properties that users are inconvenient and confused using user interface of intelligent home by reason of many appliances, different control way according to types of ones, and so on. This Paper proposes the new method taking the level of convenience up and the level of complexity down which is out of many obstacles to expand intelligent home system, and implements this. The proposed interface is designed and implemented that user could model cyber space on a living space of user, and arrange home appliances on cyber space as like doing real living space and control intelligent home system. It is possible for user to read the state and location of home appliance in home, and to select and control the information appliance as using the proposed interface.

  • PDF

Wireless Remote Control and Monitoring System by using Globalstar Satellite Modem (글로벌스타 위성 모뎀을 이용한 무선 원격제어 및 감시 시스템)

  • Moon, Hyeon-Keol;Lee, Myung-Eui
    • Journal of Advanced Navigation Technology
    • /
    • v.12 no.2
    • /
    • pp.91-99
    • /
    • 2008
  • In this paper, we implemented an wireless remote control and monitoring system by using Globalstar satellite modem. This system is composed of the data terminal equipment of Globalstar data communication system using microcontroller, C8051F023, and WGIS(Web-based GIS) user program. We tested the wireless remote control and monitoring system with data terminal equipment and user program how to work properly, and verified that the user could confirm the data from the data terminal equipment, which can provide the status of input/output devices and the information of location with the main and control dialog by GIS(Geographic Information System) program. For data communication of between data terminal equipment and user program, we programed PPP and TCP/IP protocol to communicate with each other. Some GIS tools used in this program are ArcView and MapObject from ESRI to offer various visual mapping information to the user.

  • PDF

Development of a Remotely Controlled Intelligent Controller for Dynamical Systems through the Internet

  • Kim, Sung-Su;Jung, Seul
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2005.06a
    • /
    • pp.2266-2270
    • /
    • 2005
  • In this paper, an internet based control application for dynamical systems is implemented. This implementation is maily targeted for the part of advanced control education. Intelligent control algorithms are implemented in a PC so that a client can remotely access the PC to control a dynamical system through the internet. Neural network is used as an on-line intelligent controller. To have on-line learning and control capability, the reference compensation technique is implemented as intelligent control hardware of combining a DSP board and an FPGA chip. GUIs for a user are also developed for the user's convenience. Actual experiments of motion control of a DC motor have been conducted to show the performance of the intelligent control though the internet and the feasibility of advanced control education.

  • PDF

A User Authentication Model Based on Double Key for Secure Collusion Resistance in the Cloud Environment (클라우드 환경에서 공모 저항을 지원하는 이중 키 기반의 사용자 인증 모델)

  • Choi, Jeong-hee;Lee, Sang-ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.2
    • /
    • pp.261-273
    • /
    • 2019
  • Recently, with the development of IT technology, there is an increasing interest in cloud services as the number of users using mobile devices such as mobile phones and tablets is increasing. However, there is a need for techniques to control or control various methods of accessing data as the user's service demands increase. In this paper, we propose a dual key based user authentication model that improves the user 's authentication efficiency by using two keys (secret key and access control key) to access the users accessing various services provided in the cloud environment. In the proposed model, the operation process and the function are divided through the sequence diagram of the algorithms (key generation, user authentication, permission class permission, etc.) for controlling the access right of the user with dual keys. In the proposed model, two keys are used for user authentication and service authorization class to solve various security problems in the cloud service. In particular, the proposed model is one of the most important features in that the algorithm responsible for access control of the user determines the service class of the user according to the authority, thereby shortening the management process so that the cloud administrator can manage the service access permission information of the user.

Attribute based User Authentication for Contents Distribution Environments

  • Yoo, Hye-Joung
    • International Journal of Contents
    • /
    • v.8 no.3
    • /
    • pp.79-82
    • /
    • 2012
  • In digital contents distribution environments, a user authentication is an important security primitive to allow only authenticated user to use right services by checking the validity of membership. For example, in Internet Protocol Television (IPTV) environments, it is required to provide an access control according to the policy of content provider. Remote user authentication and key agreement scheme is used to validate the contents accessibility of a user. We propose a novel user authentication scheme using smart cards providing a secure access to multimedia contents service. Each user is authenticated using a subset of attributes which are issued in the registration phase without revealing individual's identity. Our scheme provides the anonymous authentication and the various permissions according to the combination of attributes which are assigned to each user. In spite of more functionality, the result of performance analysis shows that the computation and communication cost is very low. Using this scheme, the security of contents distribution environments in the client-server model can be significantly improved.

Joint User Scheduling and Power Control Considering Both Signal and Interference for Multi-Cell Networks (다중 셀 상향링크 네트워크에서 신호와 간섭을 동시에 고려하는 전력 제어 및 사용자 스케쥴링)

  • Cho, Moon-Je;Jung, Bang Chul;Ban, Tae-Won
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.3
    • /
    • pp.477-483
    • /
    • 2016
  • In this paper, we propose a distributed user scheduling with interference-aware power control (IAPC) to maximize signal to generating interference plus noise ratio (SGINR) in uplink multi-cell networks. Assuming that the channel reciprocity time-division duplexing (TDD) system is used, the channel state information (CSI) can be obtained at each user from pilot signals from other BSs. In the proposed scheduling, to be specific, each user reduces the transmit power if its generating interference to other BSs is larger than a predetermined threshold. Each BS selects the user with the largest SGINR among users. Simulation results show that the proposed technique significantly outperforms the existing user scheduling algorithms. It is worth noting that the proposed technique operates with distributed manner without information exchange among cells. Hence, it can be easily applied to the practical wireless systems like 3GPP LTE without significant modifications of the specification.

A User Scheduling with Interference-Aware Power Control for Multi-Cell MIMO Networks (다중안테나 다중셀 네트워크에서 간섭인지 기반 전력제어 기술을 이용한 사용자 스케쥴링)

  • Cho, Moon-Je;Ban, Tae-Won;Jung, Bang Chul
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.5
    • /
    • pp.1063-1070
    • /
    • 2015
  • In this paper, we propose a distributed user scheduling with transmit power control based on the amount of generating interference to other base stations (BSs) in multi-cell multi-input multi-output (MIMO) networks. Assuming that the time-division duplexing (TDD) system is used, the interference channel from users to other cell BSs is obtained at each user. In the proposed scheduling, each user first generates a transmit beamforming vector by using singular value decompositon (SVD) over MIMO channels and reduces the transmit power if its generating interference to other BSs is larger than a predetermined threshold. Each BS selects the user with the largest effective channel gains among users, which reflects the adjusted power of users. Simulation results show that the proposed technique significantly outperforms the existing user scheduling algorithms.