• Title/Summary/Keyword: User data

Search Result 8,969, Processing Time 0.033 seconds

A key-insulated CP-ABE with key exposure accountability for secure data sharing in the cloud

  • Hong, Hanshu;Sun, Zhixin;Liu, Ximeng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.5
    • /
    • pp.2394-2406
    • /
    • 2016
  • ABE has become an effective tool for data protection in cloud computing. However, since users possessing the same attributes share the same private keys, there exist some malicious users exposing their private keys deliberately for illegal data sharing without being detected, which will threaten the security of the cloud system. Such issues remain in many current ABE schemes since the private keys are rarely associated with any user specific identifiers. In order to achieve user accountability as well as provide key exposure protection, in this paper, we propose a key-insulated ciphertext policy attribute based encryption with key exposure accountability (KI-CPABE-KEA). In our scheme, data receiver can decrypt the ciphertext if the attributes he owns match with the self-centric policy which is set by the data owner. Besides, a unique identifier is embedded into each user's private key. If a malicious user exposes his private key for illegal data sharing, his identity can be exactly pinpointed by system manager. The key-insulation mechanism guarantees forward and backward security when key exposure happens as well as provides efficient key updating for users in the cloud system. The higher efficiency with proved security make our KI-CPABE-KEA more appropriate for secure data sharing in cloud computing.

A web-based Obesity Management system using Body variations (빅 데이터 기반 만성질환 관리 시스템)

  • Kang, Hee-Beom;Lee, Jong-Won;Kim, Kyung-Hwan;Kim, Chang-Su;Jung, Hoe-Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.10a
    • /
    • pp.787-789
    • /
    • 2016
  • Today, need for a development system that provides the data to a chronic disease, and management has emerged. However, for most of the disease management system provides a wide range of data to the user and problem does not provide for important keyword or data existed. In this paper, analyzing the data for a disease through the R Programing it makes like the most relevant keyword in the illness to the user. This study was a system in which only the important parts when the user to manage their disease can be efficiently managed. By utilizing the proposed system to the user it is considered to be Except for unnecessary data or keyword and to be able to see the data and the keyword in need.

  • PDF

End-user Computing and End- User Searching (최종이용자컴퓨팅과 최종이용자탐색)

  • 이상복
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.7 no.1
    • /
    • pp.171-192
    • /
    • 1994
  • End-user Computing(EUC) is one of the significant developments of the 1980s with the explosive supply of personal computers and application software related to it. EUC can be defined as the direct assumption of system development and data processing tasks by the user of the service for his own direct benefit. This is in contrast to the traditional approach to computing in which user requirement are identified and defined and then turned over to professional system designers and programmers for implementation, with the end-user a relatively passive participant in the process. The traditional approach to system development has two obvious drawbacks. First, there is the problem that something may be lost in translation of the problem as originally formulated by the requestor and as it is implemented by the computer specialists. Second, there is the problem that it can take a longtime as growth of significant workloads within system department staff. EUC is an attempt to compensate for this drawbacks associated with the traditional system department process. It permits the end-user to interact directly with an information system, utilizing user friendly software support tools. End-user Searching(EUS) can be defined as accessing online databases and performing search operations for the purpose of finding information to be used by that same person rather than another, in contract with intermediary searcher. The concept of EUS is related to the concept of EUS. That is, two concept are similarly to development background, effects and functions. Therefore, as EUC bring on a change the traditional data processing environment, EUS also bring on a change the traditional intermediary search environment.

  • PDF

Design of User Privacy Model for Strong Reliability in SNS Environment (SNS 환경에서 신뢰성이 강한 사용자 프라이버시 모델 설계)

  • Jeong, Yoon-Su;Kim, Yong-Tae
    • Journal of Digital Convergence
    • /
    • v.11 no.1
    • /
    • pp.237-242
    • /
    • 2013
  • SNS is emerging as an academic and social interest, as Facebook and Twitter are developed explosively. But, SNS has a problem of exposing user's privacy because it is originated by exchanging user's personal information and opinion. This paper proposes SNS user privacy protecting model using data separation and false data information instead of blocking which is using to protect user's personal privacy. The proposed model do not let the third party extract precise information after collecting user's context information by adding false information to separated context information. Also, it gets user's agreement beforehand if SNS service provider uses user's information not to be used illegally by the third party.

The Effect of User Characteristics on the User Involvement in EA Implementation : Focusing on Public Sectors in Korea (사용자 특성이 EA 활용에 대한 사용자 관여(User Involvement)에 미치는 영향에 관한 연구 : 국내 공공기관을 대상으로)

  • Cho, So-Yun;Lee, Young-Joo;Yang, Jung-In
    • Journal of Information Technology Services
    • /
    • v.9 no.2
    • /
    • pp.93-105
    • /
    • 2010
  • Enterprise Architecture has become a key tool for transforming business process, data, IT and application resources. The "Efficient Adaptation and Management of Information System Act" was established to support the planning and development of the information system in order for the public sector to adopt Information Technology Architecture (EA) into its organization through the act. Until now, the study of EA has been mainly focused on concepts, methodologies and success factors for the implementation of EA. User involvement, which is one of the critical factors in adopting information systems, has been rarely studied in the field of EA research. The purpose of this study is to identify the effects of user characteristics on user involvement in EA implementation. After discussing intrinsic motivators and situational motivators as predictors of user involvement, a research model were developed and tested using survey data. The results showed that among intrinsic motivators, perceived competence had a strong positive effect on user involvement. Some implications were discussed for implementing and utilizing EA for public agencies.

A Study on Method for User Gender Prediction Using Multi-Modal Smart Device Log Data (스마트 기기의 멀티 모달 로그 데이터를 이용한 사용자 성별 예측 기법 연구)

  • Kim, Yoonjung;Choi, Yerim;Kim, Solee;Park, Kyuyon;Park, Jonghun
    • The Journal of Society for e-Business Studies
    • /
    • v.21 no.1
    • /
    • pp.147-163
    • /
    • 2016
  • Gender information of a smart device user is essential to provide personalized services, and multi-modal data obtained from the device is useful for predicting the gender of the user. However, the method for utilizing each of the multi-modal data for gender prediction differs according to the characteristics of the data. Therefore, in this study, an ensemble method for predicting the gender of a smart device user by using three classifiers that have text, application, and acceleration data as inputs, respectively, is proposed. To alleviate privacy issues that occur when text data generated in a smart device are sent outside, a classification method which scans smart device text data only on the device and classifies the gender of the user by matching text data with predefined sets of word. An application based classifier assigns gender labels to executed applications and predicts gender of the user by comparing the label ratio. Acceleration data is used with Support Vector Machine to classify user gender. The proposed method was evaluated by using the actual smart device log data collected from an Android application. The experimental results showed that the proposed method outperformed the compared methods.

Development of a Distributed OperatorTtraining System (조업자 훈련을 위한 분산 교육시스템 구축)

  • Cho, Sung-Il;Jang, Byung-Mu;Moon, Il
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 1996.10b
    • /
    • pp.1424-1427
    • /
    • 1996
  • OTS(Operator Training System) requires computation for the systematic training in real-time. So we have developed a distributed operator training system that is composed of workstation based server and PC based user modules. Sever and OM(OTS Manager) modules are located in the workstation server and user modules are located in PCs. User modules have DCS-like user interfaces and transfer data with OM over the coaxial ethernet. This paper delineates a total system architecture and definition of data transferring between OM and User module. Having applied this system to a batch process, we could analyze operator's tasks.

  • PDF

A Case Study on the Exterior Space Improving in University Campus through the Analysis of User's Cognition - Focused on Campuses in Busan City - (사용자인식 분석을 통한 캠퍼스 외부공간 개선방향 설정에 관한 사례연구 - 부산시 소재 대학을 중심으로 -)

  • Hong, Sung-Min
    • Journal of the Korean Institute of Educational Facilities
    • /
    • v.21 no.1
    • /
    • pp.33-42
    • /
    • 2014
  • The purpose of this study is to suggest a basis for exterior space improving in university campus in terms of upgrading the quality of university education environment by analysing user's cognition and physical feature about campus exterior space. For this, this study was survey six major university students in Busan city about perception of campus exterior space, and analyzes the user's cognition by using natural-language vocabulary analysis for qualitative approach. Next, this study analyzes the physical feature of campus exterior space by investigating user's intensive using spaces and preferred, non-preferred spaces in their universities, then propose the improved direction of campus exterior space by comparing the analyzed data of user's cognition and physical feature. A SPSS20 program is used for the data analysis and the sample sizes are 171 college students.

A Study on Improving Efficiency of Recommendation System Using RFM (RFM을 활용한 추천시스템 효율화 연구)

  • Jeong, Sora;Jin, Seohoon
    • Journal of the Korean Institute of Plant Engineering
    • /
    • v.23 no.4
    • /
    • pp.57-64
    • /
    • 2018
  • User-based collaborative filtering is a method of recommending an item to a user based on the preference of the neighbor users who have similar purchasing history to the target user. User-based collaborative filtering is based on the fact that users are strongly influenced by the opinions of other users with similar interests. Item-based collaborative filtering is a method of recommending an item by comparing the similarity of the user's previously preferred items. In this study, we create a recommendation model using user-based collaborative filtering and item-based collaborative filtering with consumer's consumption data. Collaborative filtering is performed by using RFM (recency, frequency, and monetary) technique with purchasing data to recommend items with high purchase potential. We compared the performance of the recommendation system with the purchase amount and the performance when applying the RFM method. The performance of recommendation system using RFM technique is better.

An Exploratory Analysis on the User Response Pattern and Quality Characteristics of Marketing Contents in the SNS of Regional Government (지역마케팅 콘텐츠의 사용자 반응패턴과 품질특성에 관한 탐색적 분석: 지방자치단체가 운영하는 SNS를 중심으로)

  • Jeong, Yeon-Su;Jeong, Dae-Yul
    • The Journal of Information Systems
    • /
    • v.26 no.4
    • /
    • pp.419-442
    • /
    • 2017
  • Purpose The purpose of this study is to explore the pattern of user response and it's duration time through social media content response analysis. We also analyze the characteristics of content quality factors which are associate with the user response pattern. The analysis results will provide some implications to develop strategies and schematic plans for the operator of regional marketing on the SNS. Design/methodology/approach This study used mixed methods to verify the effects and responses of social media contents on the users who have concerns about regional events such as local festival, cultural events, and city tours etc. Big data analysis was conducted with the quantitative data from regional government SNSs. The data was collected through web crawling in order to analyze the social media contents. We especially analyzed the contents duration time and peak level time. This study also analyzed the characteristics of contents quality factors using expert evaluation data on the social media contents. Finally, we verify the relationship between the contents quality factors and user response types by cross correlation analysis. Findings According to the big data analysis, we could find some content life cycle which can be explained through empirical distribution with peak time pattern and left skewed long tail. The user response patterns are dependent on time and contents quality. In addition, this study confirms that the level of quality of social media content is closely relate to user interaction and response pattern. As a result of the contents response pattern analysis, it is necessary to develop high quality contents design strategy and content posting and propagation tactics. The SNS operators need to develop high quality contents using rich-media technology and active response contents that induce opinion leader on the SNS.