• Title/Summary/Keyword: cloud computing systems

Search Result 602, Processing Time 0.031 seconds

Enhancement of Enterprise Security System Using Zero Trust Security (제로 트러스트 보안을 활용한 기업보안시스템 강화 방안)

  • Lee, Seon-a;Kim, Beom Seok;Lee, Hye in;Park, Won hyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.10a
    • /
    • pp.214-216
    • /
    • 2021
  • It proposes a plan to strengthen the limitations of existing corporate security systems based on Zero-Trust. With the advent of the era of the Fourth Industrial Revolution, the paradigm of security is also changing. As remote work becomes more active due to cloud computing and COVID-19, security issues arising from the changed IT environment are raised. At the same time, in the current situation where attack techniques are becoming intelligent and advanced, companies should further strengthen their current security systems by utilizing zero trust security. Zero-trust security increases security by monitoring all data communications based on the concept of doubting and trusting everything, and allowing strict authentication and minimal access to access requestors. Therefore, this paper introduces a zero trust security solution that strengthens the existing security system and presents the direction and validity that companies should introduce.

  • PDF

Research of Deep Learning-Based Multi Object Classification and Tracking for Intelligent Manager System (지능형 관제시스템을 위한 딥러닝 기반의 다중 객체 분류 및 추적에 관한 연구)

  • June-hwan Lee
    • Smart Media Journal
    • /
    • v.12 no.5
    • /
    • pp.73-80
    • /
    • 2023
  • Recently, intelligent control systems are developing rapidly in various application fields, and methods for utilizing technologies such as deep learning, IoT, and cloud computing for intelligent control systems are being studied. An important technology in an intelligent control system is recognizing and tracking objects in images. However, existing multi-object tracking technology has problems in accuracy and speed. In this paper, a real-time intelligent control system was implemented using YOLO v5 and YOLO v6 based on a one-shot architecture that increases the accuracy of object tracking and enables fast and accurate tracking even when objects overlap each other or when there are many objects belonging to the same class. The experiment was evaluated by comparing YOLO v5 and YOLO v6. As a result of the experiment, the YOLO v6 model shows performance suitable for the intelligent control system.

Optimizing User Experience While Interacting with IR Systems in Big Data Environments

  • Minsoo Park
    • International journal of advanced smart convergence
    • /
    • v.12 no.4
    • /
    • pp.104-110
    • /
    • 2023
  • In the user-centered design paradigm, information systems are created entirely tailored to the users who will use them. When the functions of a complex system meet a simple user interface, users can use the system conveniently. While web personalization services are emerging as a major trend in portal services, portal companies are competing for a second service, such as introducing 'integrated communication platforms'. Until now, the role of the portal has been content and search, but this time, the goal is to create and provide the personalized services that users want through a single platform. Personalization service is a login-based cloud computing service. It has the characteristic of being able to enjoy the same experience at any time in any space with internet access. Personalized web services like this have the advantage of attracting highly loyal users, making them a new service trend that portal companies are paying attention to. Researchers spend a lot of time collecting research-related information by accessing multiple information sources. There is a need to automatically build interest information profiles for each researcher based on personal presentation materials (papers, research projects, patents). There is a need to provide an advanced customized information service that regularly provides the latest information matched with various information sources. Continuous modification and supplementation of each researcher's information profile of interest is the most important factor in increasing suitability when searching for information. As researchers' interest in unstructured information such as technology markets and research trends is gradually increasing from standardized academic information such as patents, it is necessary to expand information sources such as cutting-edge technology markets and research trends. Through this, it is possible to shorten the time required to search and obtain the latest information for research purposes. The interest information profile for each researcher that has already been established can be used in the future to determine the degree of relationship between researchers and to build a database. If this customized information service continues to be provided, it will be useful for research activities.

Active and Context-Resilient Cyber Defense Operation applying the Concept of Performing Mosaic Warfare (모자이크전 수행 개념을 적용한 능동형 상황 탄력적 사이버 방어작전)

  • Jung-Ho Eom
    • Convergence Security Journal
    • /
    • v.21 no.4
    • /
    • pp.41-48
    • /
    • 2021
  • Recently, the aspect of war is evolving due to the 4th industrial revolution technology. Among them, AI technology is changing the way of war as it is applied to advanced weapon systems and decision-making systems. Mosaic Warfare, presented by the U.S. DARPA, is shifting military warfare from attrition-centric warfare to decision-centric warfare by combining Internet of Things, cloud computing, big data, mobile, and artificial intelligence technologies. In addition, it is a method to perform operations quickly so that the most offensive effect can be achieved by appropriately combining the distributed and deployed forces according to the battlefield context. In other words, military operations are not carried out through a uniform combat process, but various forces are operated through a distributed system depending on the battlefield context. In cyber warfare, as artificial intelligence is applied to cyber attack technology, there is a limit to responding with the same procedural response method as the existing cyber kill chain. Therefore, in this paper, the execution method of mosaic warfare is applied to perform context-resilient cyber operations that can operate a response system according to the attack and cyberspace context.

Multiple Layer File Format for Safe Collaborative Design (안전한 협업 디자인 작업을 위한 다중 레이어 파일 포맷)

  • Kim, Kichang;Yoo, Sang Bong
    • The Journal of Society for e-Business Studies
    • /
    • v.18 no.4
    • /
    • pp.45-65
    • /
    • 2013
  • A design file can get larger in size as the complexity of the target object increases. A large design file may reside in a large parallel computing system, such as cloud computing systems, and many designers may work concurrently on the same design file. In such a case, it is obvious that we need some kind of protection mechanism so that each user can access only the area of the file he or she is entitled to. Two approaches can be taken for this problem: one is the traditional access control mechanisms and the other encryption techniques. We take the latter approach to ensure the safety of the file even in public domain such as clouding systems, and in this paper, we suggest an encryption scheme for a file where the file is encrypted in multi-layer so that each user is allowed to access the file only at the layer for which the user has the proper access right. Each layer of the file is encrypted with different keys and these keys are exposed only to those who have the right access permit. The paper explains the necessary file format to achieve this goal and discusses the file manipulation functions to handle this new file format.

A Hybrid Blockchain-Based E-Voting System with BaaS (BaaS를 이용한 하이브리드 블록체인 기반 전자투표 시스템)

  • Kang Myung Joe;Kim Mi Hui
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.12 no.8
    • /
    • pp.253-262
    • /
    • 2023
  • E-voting is a concept that includes actions such as kiosk voting at a designated place and internet voting at an unspecified place, and has emerged to alleviate the problem of consuming a lot of resources and costs when conducting offline voting. Using E-voting has many advantages over existing voting systems, such as increased efficiency in voting and ballot counting, reduced costs, increased voting rate, and reduced errors. However, centralized E-voting has not received attention in public elections and voting on corporate agendas because the results of voting cannot be trusted due to concerns about data forgery and modulation and hacking by others. In order to solve this problem, recently, by designing an E-voting system using blockchain, research has been actively conducted to supplement concepts lacking in existing E-voting, such as increasing the reliability of voting information and securing transparency. In this paper, we proposed an electronic voting system that introduced hybrid blockchain that uses public and private blockchains in convergence. A hybrid blockchain can solve the problem of slow transaction processing speed, expensive fee by using a private blockchain, and can supplement for the lack of transparency and data integrity of transactions through a public blockchain. In addition, the proposed system is implemented as BaaS to ensure the ease of type conversion and scalability of blockchain and to provide powerful computing power. BaaS is an abbreviation of Blockchain as a Service, which is one of the cloud computing technologies and means a service that provides a blockchain platform ans software through the internet. In this paper, in order to evaluate the feasibility, the proposed system and domestic and foreign electronic voting-related studies are compared and analyzed in terms of blockchain type, anonymity, verification process, smart contract, performance, and scalability.

A hybrid intrusion detection system based on CBA and OCSVM for unknown threat detection (알려지지 않은 위협 탐지를 위한 CBA와 OCSVM 기반 하이브리드 침입 탐지 시스템)

  • Shin, Gun-Yoon;Kim, Dong-Wook;Yun, Jiyoung;Kim, Sang-Soo;Han, Myung-Mook
    • Journal of Internet Computing and Services
    • /
    • v.22 no.3
    • /
    • pp.27-35
    • /
    • 2021
  • With the development of the Internet, various IT technologies such as IoT, Cloud, etc. have been developed, and various systems have been built in countries and companies. Because these systems generate and share vast amounts of data, they needed a variety of systems that could detect threats to protect the critical data contained in the system, which has been actively studied to date. Typical techniques include anomaly detection and misuse detection, and these techniques detect threats that are known or exhibit behavior different from normal. However, as IT technology advances, so do technologies that threaten systems, and these methods of detection. Advanced Persistent Threat (APT) attacks national or companies systems to steal important information and perform attacks such as system down. These threats apply previously unknown malware and attack technologies. Therefore, in this paper, we propose a hybrid intrusion detection system that combines anomaly detection and misuse detection to detect unknown threats. Two detection techniques have been applied to enable the detection of known and unknown threats, and by applying machine learning, more accurate threat detection is possible. In misuse detection, we applied Classification based on Association Rule(CBA) to generate rules for known threats, and in anomaly detection, we used One-Class SVM(OCSVM) to detect unknown threats. Experiments show that unknown threat detection accuracy is about 94%, and we confirm that unknown threats can be detected.

Efficient Information System Sizing Selection Using Cloud Computing Platform (클라우드 컴퓨팅 플랫폼을 이용한 효율적인 정보시스템 용량 산정 방법에 관한 연구)

  • Seong, Baek-min;Lee, Min-gyu;Sohn, Hyo-jung;Kim, Jong-bae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.79-81
    • /
    • 2014
  • Recently, It is built various information systems evolve IT skills. But When you build the information system, Difficult to determine whether the appropriate scale and problems that rely heavily on SI companies and professionals. To solve this problem, Korea Information Security Agency, etc., based on the primary objective was to develop H/W Capacity Equation formally to each system type. But the problems are to present H/W capacity equation by discussion of the expert group of suppliers and relatively long that it is difficult to formally apply in the situation now so it is no longer the limit. In this study, we proposes proper capacity planning techniques, which can guarantee the best performance compared to the budget invested. For this purpose, we derived the proper H/W capacity equation by regression analysis to gather performance metrics and cost of various cases by simulation of a virtual environment in the cloud. Through this study, when capacity planning, It is possible to reduce costs that It is possible to build an information system based on the digitized data and build information system in an environment that does not rely on the SI business or professional.

  • PDF

An IoT based Green Home Architecture for Green Score Calculation towards Smart Sustainable Cities

  • Kumaran, K. Manikanda;Chinnadurai, M.;Manikandan, S.;Murugan, S. Palani;Elakiya, E.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.7
    • /
    • pp.2377-2398
    • /
    • 2021
  • In the recent modernized world, utilization of natural resources (renewable & non-renewable) is increasing drastically due to the sophisticated life style of the people. The over-consumption of non-renewable resources causes pollution which leads to global warming. Consequently, government agencies have been taking several initiatives to control the over-consumption of non-renewable natural resources and encourage the production of renewable energy resources. In this regard, we introduce an IoT powered integrated framework called as green home architecture (GHA) for green score calculation based on the usage of natural resources for household purpose. Green score is a credit point (i.e.,10 pts) of a family which can be calculated once in a month based on the utilization of energy, production of renewable energy and pollution caused. The green score can be improved by reducing the consumption of energy, generation of renewable energy and preventing the pollution. The main objective of GHA is to monitor the day-to-day usage of resources and calculate the green score using the proposed green score algorithm. This algorithm gives positive credits for economic consumption of resources and production of renewable energy and also it gives negative credits for pollution caused. Here, we recommend a green score based tax calculation system which gives tax exemption based on the green score value. This direct beneficiary model will appreciate and encourage the citizens to consume fewer natural resources and prevent pollution. Rather than simply giving subsidy, this proposed system allows monitoring the subsidy scheme periodically and encourages the proper working system with tax exemption rewards. Also, our GHA will be used to monitor all the household appliances, vehicles, wind mills, electricity meter, water re-treatment plant, pollution level to read the consumption/production in appropriate units by using the suitable sensors. These values will be stored in mass storage platform like cloud for the calculation of green score and also employed for billing purpose by the government agencies. This integrated platform can replace the manual billing and directly benefits the government.

Practical Conjunctive Searchable Encryption Using Prime Table (소수테이블을 이용한 실용적인 다중 키워드 검색가능 암호시스템)

  • Yang, Yu-Jin;Kim, Sangjin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.1
    • /
    • pp.5-14
    • /
    • 2014
  • Searchable encryption systems provide search on encrypted data while preserving the privacy of the data and the search keywords used in queries. Recently, interest on data outsourcing has increased due to proliferation of cloud computing services. Many researches are on going to minimize the trust put on external servers and searchable encryption is one of them. However, most of previous searchable encryption schemes provide only a single keyword boolean search. Although, there have been proposals to provide conjunctive keyword search, most of these works use a fixed field which limit their application. In this paper, we propose a field-free conjunctive keyword searchable encryption that also provides rank information of search results. Our system uses prime tables and greatest common divisor operation, making our system very efficient. Moreover, our system is practical and can be implemented very easily since it does not require sophisticated cryptographic module.