• Title/Summary/Keyword: confidentiality benefits

Search Result 16, Processing Time 0.026 seconds

AVK based Cryptosystem and Recent Directions Towards Cryptanalysis

  • Prajapat, Shaligram;Sharma, Ashok;Thakur, Ramjeevan Singh
    • Journal of Internet Computing and Services
    • /
    • v.17 no.5
    • /
    • pp.97-110
    • /
    • 2016
  • Cryptanalysis is very important step for auditing and checking strength of any cryptosystem. Some of these cryptosystem ensures confidentiality and security of large information exchange from source to destination using symmetric key cryptography. The cryptanalyst investigates the strengths and identifies weakness key as well as enciphering algorithm. With increase in key size the time and effort required to guess the correct key increases so trend is increase key size from 8, 16, 24, 32, 56, 64, 128 and 256 bits to strengthen the cryptosystem and thus algorithm continues without compromise on the cost of time and computation. Automatic Variable Key (AVK) approach is an alternative to the approach of fixing up key size and adding security level with key variability adds new dimension in the development of secure cryptosystem. Likewise, whenever any new cryptographic method is invented to replace per-existing vulnerable cryptographic method, its deep analysis from all perspectives (Hacker / Cryptanalyst as well as User) is desirable and proper study and evaluation of its performance is must. This work investigates AVK based cryptic techniques, in future to exploit benefits of advances in computational methods like ANN, GA, SI etc. These techniques for cryptanalysis are changing drastically to reduce cryptographic complexity. In this paper a detailed survey and direction of development work has been conducted. The work compares these new methods with state of art approaches and presents future scope and direction from the cryptic mining perspectives.

Women s Experience of Abortion : Phenomenological Perspectives (여성의 유산경험에 대한 현상학적 연구)

  • 이경혜;고명숙
    • Journal of Korean Academy of Nursing
    • /
    • v.24 no.2
    • /
    • pp.157-174
    • /
    • 1994
  • Women’s experience of abortion are not only widespread but also significant event in their lives. But this experience has not been a concern for professional care by health care providers, especially nurses. As professional nurses should have holistic approaches to clients, need to understand the lived experience of abortion from women’s perspectives. These Nurses must identify unique means for improving the quality of life of women. This study identified the meaning and structure of the lived experience of abortion. The participants were residents of Seoul and Kwang ju who were recruited through personal recommendation. Colaizzi’s method was used for the phenomenological analysis. The research question was aimed at revealing the covert meaning of abortion. The 14 women who had a spontaneous abortion and /or an artificial abortion and who argeed to participate in the study were informed of the purpose of the study, the possible risks and benefits of participation, the data generation method and they were assured of privacy and confidentiality. The investigator conducted in-depth unstructured interviews which were audiotaped with the permission of the participants. The investigator read the data repeatdly to identify and categorize themes and basic structural elements. Eight themes of abortion as experienced by these participants were : 1) complicated feelings about the anticipated abortion 2) feelings of fear and anxiety about the operation and complications 3) grieving related loss and injury 4) feelings of lonliness in perceiving no supportive person, 5) attributing the cause of the abortion to siginificant others or to self, 6) guilt feelings and resentment, 7) vacillating between regretting and not regretting, 8) struggling to a responsible person. Five basic structures identified were : 1) Complicated feelings 2) Feelings of loss and need for caring 3) Attributings to cause to significant others 4) Paradoxical emotion 5) Struggling to be a responsible being The significes of this study for nursing are : 1) It enables nurses and other health care providers understand more clearly the lived experience of abortion 2) It provides information which can be used in for women who experience abortion.

  • PDF

IoT Security and Machine Learning

  • Almalki, Sarah;Alsuwat, Hatim;Alsuwat, Emad
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.5
    • /
    • pp.103-114
    • /
    • 2022
  • The Internet of Things (IoT) is one of the fastest technologies that are used in various applications and fields. The concept of IoT will not only be limited to the fields of scientific and technical life but will also gradually spread to become an essential part of our daily life and routine. Before, IoT was a complex term unknown to many, but soon it will become something common. IoT is a natural and indispensable routine in which smart devices and sensors are connected wirelessly or wired over the Internet to exchange and process data. With all the benefits and advantages offered by the IoT, it does not face many security and privacy challenges because the current traditional security protocols are not suitable for IoT technologies. In this paper, we presented a comprehensive survey of the latest studies from 2018 to 2021 related to the security of the IoT and the use of machine learning (ML) and deep learning and their applications in addressing security and privacy in the IoT. A description was initially presented, followed by a comprehensive overview of the IoT and its applications and the basic important safety requirements of confidentiality, integrity, and availability and its application in the IoT. Then we reviewed the attacks and challenges facing the IoT. We also focused on ML and its applications in addressing the security problem on the IoT.

Securing Sensitive Data in Cloud Storage (클라우드 스토리지에서의 중요데이터 보호)

  • Lee, Shir-Ly;Lee, Hoon-Jae
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2011.04a
    • /
    • pp.871-874
    • /
    • 2011
  • The fast emerging of network technology and the high demand of computing resources have prompted many organizations to outsource their storage and computing needs. Cloud based storage services such as Microsoft's Azure and Amazon's S3 allow customers to store and retrieve any amount of data, at anytime from anywhere via internet. The scalable and dynamic of the cloud storage services help their customer to reduce IT administration and maintenance costs. No doubt, cloud based storage services brought a lot of benefits to its customer by significantly reducing cost through optimization increased operating and economic efficiencies. However without appropriate security and privacy solution in place, it could become major issues to the organization. As data get produced, transferred and stored at off premise and multi tenant cloud based storage, it becomes vulnerable to unauthorized disclosure and unauthorized modification. An attacker able to change or modify data while data inflight or when data is stored on disk, so it is very important to secure data during its entire life-cycle. The traditional cryptography primitives for the purpose of data security protection cannot be directly adopted due to user's lose control of data under off premises cloud server. Secondly cloud based storage is not just a third party data warehouse, the data stored in cloud are frequently update by the users and lastly cloud computing is running in a simultaneous, cooperated and distributed manner. In our proposed mechanism we protect the integrity, authentication and confidentiality of cloud based data with the encrypt- then-upload concept. We modified and applied proxy re-encryption protocol in our proposed scheme. The whole process does not reveal the clear data to any third party including the cloud provider at any stage, this helps to make sure only the authorized user who own corresponding token able to access the data as well as preventing data from being shared without any permission from data owner. Besides, preventing the cloud storage providers from unauthorized access and making illegal authorization to access the data, our scheme also protect the data integrity by using hash function.

User Experience (UX) in the Early Days of Generative AI : The benefits and concerns of employees in their 30s and 40s through the Q-methodology (생성형 인공지능 초기 단계의 사용자경험(UX): Q-방법론을 통해 살펴본 30-40대 직장인의 편의와 우려)

  • Yi, Eunju;Yun, Ji-Chan;Lee, Junsik;Park, Do-Hyung
    • The Journal of Information Systems
    • /
    • v.33 no.1
    • /
    • pp.1-30
    • /
    • 2024
  • Purpose The purpose of this study is to examine the customer experience of generative AI among office workers aged 30 to 40, investigating usability, usefulness, and affect, and understanding concerns and expectations. Design/Methodology/Approach This research used Q methodology to assess the customer experience of generative AI. Users are engaged in a problem-solving journey, and data is collected by having participants rank 36 statements based on usability, usefulness, and affect, referred to as the three goals of User Experience. Participants use a forced distribution table with a scale from -5 to +5 to indicate the subjective importance of each statement. The results identified four groups, reflecting different perspectives and attitudes toward generative AI. Findings Participants express overall comfort with generative AI, perceive AI as more knowledgeable in unfamiliar domains, but harbor doubts about AI's understanding. Disagreements emerge on AI replacing humans, the value of unique human roles, data confidentiality, fears of AI advancement, and emotional impacts. Identified four groups: Users who treat AI as a soulless assistant and are active in business use, Uncle users who want to use new technologies properly and are not afraid of technology, users who recognize the limits of AI despite its efficiency, and users who require strong verification in the future. It has the potential to guide future guidelines, ethical codes, and regulations for the appropriate use of AI. In addition, this approach lays the groundwork for future empirical analyses of generative AI.

A study on an application of 'Virtual Reality Therapy' concerning a technology of real-time interaction. (실시간 상호작용 기술의 '가상현실치료' 적용에 관한 연구)

  • Kim, Jeong-Hwan
    • Cartoon and Animation Studies
    • /
    • s.22
    • /
    • pp.81-97
    • /
    • 2011
  • The technology of 'Virtual Reality' has placed in advanced tools for human beings' joy and anger together with sorrow and pleasure in our generation. It has recently tried in a variety ways to use as an implication for treatment in the field of Cognitive Psychology. Especially, it widely approaches to human in terms of that a sense of reality in a virtual world through the five senses should reinterpret the meaning of cognition in the real world. Based on this paradigm shift, it allows for new treatment using the technology of virtual reality. A typical example is a field of Therapy in order to overcome panic disorder. It has advantages that in particular development of flexible interaction technologies in a virtual space can lead patients to experience psychological environments rather than physical one. the interaction technology provides environments in which users' five senses can be actively stimulated, it is very useful that information from the experiences in the virtual world allows people to learn through real experiences by renewing potential energies, advantages of Virtual Reality Therapy can be customized treatment by depending on symptoms in patients with panic disorder and are capable of differentiate application for the cure at each stage. It is to treat by leading patients to get accustomed to environments and situations in real world through care process with each symptom and stage. It is helpful that based on A Human-Sensibility Ergonomics, technologies like immersive virtual reality equipment, force-relative feedback and stereophonic sound, and like stimulating the sense of smell make people to induce experiences by stimulating human's five senses. There are many advantages of immersion in virtual world in that the phenomenon such as challenge, interaction, reality, illusion, and cooperation is expanded. As an application for therapy by growing such augmented reality, virtual space and sharing of data through the Internet and also inexpensive its availability have recently expanded the base. There are other benefits of Virtual Reality Therapy offering active interaction environments for cognitive experience which can provide appropriately adjusted environments for patients who are hard to overcome the real situation because of phobia. In addition to that it is safe and economical and patients' confidentiality is assured. Moreover, due to the principles of applying real-time navigation the Virtual Reality Therapy makes modification and supplementation easier and also it can reduce cybersickness because of the supply of Lenticular allowing people to see stereoscopy without eyeglasses, which makes sense of presence clearer. On top of that due to the development of interactive technologies, it is becoming close to sense of reality similar to real world by leading users to navigate by themselves and to operate objects in a virtual space. This paper will therefore examine, although it is of limited, characteristics of application of virtual reality technology based on A Human-Sensibility Ergonomics used for treatment for a disorder. this paper will analyse a range of its application and problems and it will suggest the future possibilities.

  • PDF