• Title/Summary/Keyword: User Internet

Search Result 4,231, Processing Time 0.028 seconds

DART: Fast and Efficient Distributed Stream Processing Framework for Internet of Things

  • Choi, Jang-Ho;Park, Junyong;Park, Hwin Dol;Min, Ok-gee
    • ETRI Journal
    • /
    • v.39 no.2
    • /
    • pp.202-212
    • /
    • 2017
  • With the advent of the Internet-of-Things paradigm, the amount of data production has grown exponentially and the user demand for responsive consumption of data has increased significantly. Herein, we present DART, a fast and lightweight stream processing framework for the IoT environment. Because the DART framework targets a geospatially distributed environment of heterogeneous devices, the framework provides (1) an end-user tool for device registration and application authoring, (2) automatic worker node monitoring and task allocations, and (3) runtime management of user applications with fault tolerance. To maximize performance, the DART framework adopts an actor model in which applications are segmented into microtasks and assigned to an actor following a single responsibility. To prove the feasibility of the proposed framework, we implemented the DART system. We also conducted experiments to show that the system can significantly reduce computing burdens and alleviate network load by utilizing the idle resources of intermediate edge devices.

The PC Internet Stock Photo Systems Implementation of End User Computing (최종사용자요구중심의 PC Internet Stock Photo 시스템 구현)

  • 권영직;백영욱;이승아
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.5 no.1
    • /
    • pp.69-76
    • /
    • 2000
  • This thesis implements retrieving systems with easy to retrieve photos which end-user want to find based m end-user computing(EUC)'s a theoretical study on factors in exert a effect on the computing systems. And also this systems allow a photographer to store his works in the database of this systems by himself on internet environment. This sock photo systems is developed with object oriented design methodology so it is easy to modify and to reuse software. And this systems can use for electronic commerce by adding the electronic payment systems.

  • PDF

Internet-Based Remote Control of the Intelligent Robot (지능형 로봇의 인터넷 기반 원격 제어)

  • Yu, Young-Sun;Kim, Jong-Sun;Kim, Hyong-Suk;Joo, Young-Hoon
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.13 no.3
    • /
    • pp.242-248
    • /
    • 2007
  • In this paper, we implement the internet-based remote control system for intelligent robot. For remote control of the robot, it uses the socket communication of the TCP/IP. It consists of the user interface and the robot control interface. Robot control interface transmits the navigation and environmental informations of the robot into the user interface. In order to transmit the large environmental images, a JPEG compression algorithm is used. User interface displays the navigation status of the robot and transmits the navigation order into the robot control interface. Also, we propose the design method of the fuzzy controller using navigation data acquired by expert's knowledge or experience. To do this, we use virus-evolutionary genetic algorithm(VEGA). Finally, we have shown the proposed system can be operated through the real world experimentations.

An ID-Based Remote User Authentication Scheme in IoT (사물인터넷에서 ID기반 원격 사용자 인증 방식)

  • Park, KiSung;Lee, SungYup;Park, YoHan;Park, YoungHo
    • Journal of Korea Multimedia Society
    • /
    • v.18 no.12
    • /
    • pp.1483-1491
    • /
    • 2015
  • Applications of Internet of Things (IoT) supply various conveniences, however unsolved security problems such as personal privacy, data manipulation cause harm to persons, even nations and an limit the applicable areas of Internet of IoT technology. Therefore, study about secure and efficient security system on IoT are required. This paper proposes ID-based remote user authentication scheme in IoT environments. Proposed scheme provides untraceability of users by using different pseudonym identities in every session and reduces the number of variables. Our proposal is secure against inside attack, smart card loss attack, user impersonation attack, server masquerading attack, online/offline password guessing attack, and so on. Therefore, this can be applied to the lightweight IoT environments.

Research towards the relationship between the user characteristics and the design factors of internet shopping mall (인터넷 쇼핑몰 디자인 요소와 사용자 특성과의 관계에 관한 연구)

  • Son, Dal-Ho;Lim, Seon-Yeong
    • IE interfaces
    • /
    • v.14 no.1
    • /
    • pp.84-94
    • /
    • 2001
  • Through the use of internet, a new trend of business which is now known as electronic commerce has emerged. Although the importance of shopping mall design has been mentioned frequently, empirical study towards the design factors has been scarcely carried. The purpose of this study is to identify the relationship between the design factors of a shopping mall and the user characteristics. Result showed that there is a significant relationship between the some design factors of shopping mall and user characteristics. Especially the users of internet shopping mall those who have used the web frequently tend to dislike the diverse use of complex fonts, bold, or italics. The result of this paper can give some ideas to the people who are designing a shopping mall and company who tries to construct a shopping mall.

  • PDF

Research on Correlating Data Loading with User Experience (데이터 로딩과 사용자 경험의 상관관계 분석에 관한 연구)

  • In-sik Yun;Il-young Moon
    • Journal of Practical Engineering Education
    • /
    • v.16 no.2
    • /
    • pp.185-193
    • /
    • 2024
  • With the advent of smartphones, people can access various information through the internet anytime and anywhere. Even in the vehicle environment, users can use the internet. Users interact with web and applications every day and get information. However, as the amount of data to be processed by the program increases, users inevitably receive a message to wait. User waiting is an inconvenient experience, but minimizing user waiting is the best way because there is time required for data processing. However, if the service processing time exceeds the expected time, users experience more severe boredom and pain. Therefore, various methods and researches are being conducted to alleviate the boredom of user waiting. The most commonly used method to alleviate user waiting boredom is loading. In this study, we investigated the effect of skeleton loading, the latest loading technique, on user waiting experience, and how attractive it is as a design technique in terms of UI compared to other loading techniques.

An Extended Multi-Server-Based User Authentication and Key Agreement Scheme with User Anonymity

  • Li, Chun-Ta;Lee, Cheng-Chi;Weng, Chi-Yao;Fan, Chun-I
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.1
    • /
    • pp.119-131
    • /
    • 2013
  • With the explosive growth of computer networks, many remote service providing servers and multi-server network architecture are provided and it is extremely inconvenient for users to remember numerous different identities and passwords. Therefore, it is important to provide a mechanism for a remote user to use single identity and password to access multi-server network architecture without repetitive registration and various multi-server authentication schemes have been proposed in recent years. Recently, Tsaur et al. proposed an efficient and secure smart card based user authentication and key agreement scheme for multi-server environments. They claimed that their scheme satisfies all of the requirements needed for achieving secure password authentication in multi-server environments and gives the formal proof on the execution of the proposed authenticated key agreement scheme. However, we find that Tsaur et al.'s scheme is still vulnerable to impersonation attack and many logged-in users' attack. We propose an extended scheme that not only removes the aforementioned weaknesses on their scheme but also achieves user anonymity for hiding login user's real identity. Compared with other previous related schemes, our proposed scheme keeps the efficiency and security and is more suitable for the practical applications.

Security Analysis of a Secure Dynamic ID based Remote User Authentication Scheme for Multi-server Environment (멀티서버를 위한 안전한 동적 ID 기반 원격 사용자 인증 방식에 대한 안전성 분석)

  • Yang, Hyung-Kyu
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.13 no.1
    • /
    • pp.273-278
    • /
    • 2013
  • Recently, user authentication schemes using smart cards for multi-server environment have been proposed for practical applications. In 2009, Liao-Wang proposed a secure dynamic ID based remote user authentication scheme for multi-server environment that can withstand the various possible attacks and provide user anonymity. In this paper, we analyze the security of Liao-Wang's scheme, and we show that Liao-Wang's scheme is still insecure against the forgery attack, the password guessing attack, the session key attack, and the insider attack. In addition, Liao-Wang's scheme does not provide user anonymity between the user and the server.

Design and Implementation of IoT Collaboration Module Supporting User Context Management (사용자 상황 정보 관리를 지원하는 IoT 통합 제어 모듈 설계 및 구현)

  • Kum, Seung Woo;Lim, Tae Beom;Park, Jong Il
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.10 no.3
    • /
    • pp.129-137
    • /
    • 2015
  • Various personalized services are provided based on user context these days, and IoT(Internet of Things) devices provides effective ways to collect user context. For example, user's activity such as walking steps, calories, and sleeping hours can be collected using smart activity tracker. Smart scale can sense change of user's weight or body fat percentage. However, these services are independent to each other and not easy to make them collaborate. Many standard bodies are working on the documents for this issue, but due to diversity of IoT use case scenarios, it seems that multiple IoT technologies co-exist for the time being. This paper propose a framework to collaborate heterogeneous IoT services. The proposed framework provides methods to build application for heterogeneous IoT devices and user context management in more intuitive way using HTTP. To improve compatibility and usability, gathered user contexts are based on MPEG-UD. Implementation of framework and service with real-world devices are also presented.

Improving Security and Privacy-Preserving in Multi-Authorities Ciphertext-Policy Attribute-Based Encryption

  • Hu, Shengzhou;Li, Jiguo;Zhang, Yichen
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.10
    • /
    • pp.5100-5119
    • /
    • 2018
  • Most of existing privacy-preserving multi-authorities attribute-based encryption schemes (PP-MA-ABE) only considers the privacy of the user identity (ID). However, in many occasions information leakage is caused by the disclosing of his/her some sensitive attributes. In this paper, we propose a collusion-resisting ciphertext-policy PP-MA-ABE (CRPP-MACP-ABE) scheme with hiding both user's ID and attributes in the cloud storage system. We present a method to depict anonymous users and introduce a managerial role denoted by IDM for the management of user's anonymous identity certificate ($AID_{Cred}$). The scheme uses $AID_{Cred}$ to realize privacy-preserving of the user, namely, by verifying which attribute authorities (AAs) obtain the blinded public attribute keys, pseudonyms involved in the $AID_{Cred}$ and then distributes corresponding private keys for the user. We use different pseudonyms of the user to resist the collusion attack launched by viciousAAs. In addition, we utilize IDM to cooperate with multiple authorities in producing consistent private key for the user to avoid the collusion attack launched by vicious users. The proposed CRPP-MACP-ABE scheme is proved secure. Some computation and communication costs in our scheme are finished in preparation phase (i.e. user registration). Compared with the existing schemes, our scheme is more efficient.