• Title/Summary/Keyword: dynamic mobile computing

Search Result 127, Processing Time 0.019 seconds

Traceable Dynamic Public Auditing with Identity Privacy Preserving for Cloud Storage

  • Zhang, Yinghui;Zhang, Tiantian;Guo, Rui;Xu, Shengmin;Zheng, Dong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.11
    • /
    • pp.5653-5672
    • /
    • 2019
  • In cloud computing era, an increasing number of resource-constrained users outsource their data to cloud servers. Due to the untrustworthiness of cloud servers, it is important to ensure the integrity of outsourced data. However, most of existing solutions still have challenging issues needing to be addressed, such as the identity privacy protection of users, the traceability of users, the supporting of dynamic user operations, and the publicity of auditing. In order to tackle these issues simultaneously, in this paper, we propose a traceable dynamic public auditing scheme with identity privacy preserving for cloud storage. In the proposed scheme, a single user, including a group manager, is unable to know the signer's identity. Furthermore, our scheme realizes traceability based on a secret sharing mechanism and supports dynamic user operations. Based on the security and efficiency analysis, it is shown that our scheme is secure and efficient.

Context Awareness Reasoning System for Personalized Services in Ubiquitous Mobile Environments (유비쿼터스 모바일 환경에서 개인화 서비스를 위한 상황인지 추론 시스템)

  • Moon, Aekyung;Park, Yoo-mi;Kim, Sang-gi;Lee, Byung-sun
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.4 no.3
    • /
    • pp.139-147
    • /
    • 2009
  • This paper proposed the context awareness reasoning system to provide the personalized services dynamically in a ubiquitous mobile environments. The proposed system is designed to provide the personalized services to mobile users and consists of the context aggregator and the knowledge manager. The context aggregator can collect information from networks through Open API Gateway as well as sensors in a various ubiquitous environment. And it can also extract the place types through the geocoding and the social address domain ontology. The knowledge manager is the core component to provide the personalized services, and consists of activity reasoner, user pattern learner and service recommender to provide the services predict by extracting the optimized service from user situations. Activity reasoner uses the ontology reasoning and user pattern learner learns with previous service usage history and contexts. And to design service recommender easy to flexibly apply in dynamic environments, service recommender recommends service in the only use of current accessible contexts. Finally, we evaluate the learner and recommender of proposed system by simulation.

  • PDF

A Simulation Modeling for the Effect of Resource Consumption Attack over Mobile Ad Hoc Network

  • Raed Alsaqour;Maha Abdelhaq;Njoud Alghamdi;Maram Alneami;Tahani Alrsheedi;Salma Aldghbasi;Rahaf Almalki;Sarah Alqahtani
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.9
    • /
    • pp.111-119
    • /
    • 2023
  • Mobile Ad-hoc Network (MANET) is an infrastructure-less network that can configure itself without any centralized management. The topology of MANET changes dynamically which makes it open for new nodes to join it easily. The openness area of MANET makes it very vulnerable to different types of attacks. One of the most dangerous attacks is the Resource Consumption Attack (RCA). In this type of attack, the attacker consumes the normal node energy by flooding it with bogus packets. Routing in MANET is susceptible to RCA and this is a crucial issue that deserves to be studied and solved. Therefore, the main objective of this paper is to study the impact of RCA on two routing protocols namely, Ad hoc On-Demand Distance Vector (AODV) and Dynamic Source Routing (DSR); as a try to find the most resistant routing protocol to such attack. The contribution of this paper is a new RCA model (RCAM) which applies RCA on the two chosen routing protocols using the NS-2 simulator.

Dynamic Load Balancing Scheme Based on Resource Reservation for Migration of Agents in Pure P2P Network Environments (순수 P2P 네트워크 환경에서 에이전트 이주를 위한 자원 예약 기반 동적 부하 균형 기법)

  • Kim, Kyung-In;Kim, Young-jin;Eom, Young-Ik
    • The KIPS Transactions:PartA
    • /
    • v.11A no.4
    • /
    • pp.257-266
    • /
    • 2004
  • Mobile agents are defined as processes which can be autonomously delegated or transferred among the hosts in a network in order to perform some computations on behalf of the user and co-operate with other agents. Currently, mobile agents are used in various fields, such as electronic commerce, mobile communication, parallel processing, search of information, recovery, and so on. In pure P2P network environment, if mobile agents that require computing resources rashly migrate to another peers without consideration on the peer's capacity of resources, the peer may have a problem that the performance of the peer is degraded due to lack of resources. To solve this problem, we propose resource reservation based load balancing scheme of using RMA(Resource Management Agent) that monitors workload information of the peers and that decides migrating agents and destination peers. In mobile agent migrating procedure, if the resource of specific peer is already reserved, our resource reservation scheme prevents other mobile agents from allocating the resource.

Dynamic Power Management for Webpage Loading on Mobile Devices (모바일 웹 페이지 로딩에서 동적 관리 기법)

  • Park, Hyunjae;Choi, Youngjune
    • Journal of KIISE
    • /
    • v.42 no.12
    • /
    • pp.1623-1628
    • /
    • 2015
  • As the performance of mobile devices has increased, high-end multicore CPUs have become the norm in smartphones. However, such high performance devices are exposed to the problem of battery depletion due to the energy consumption caused by software performance, and despite increases in battery capacity. The required resources are dynamic and varied, and further user interaction is highly random; thus, Linux-based power management such as DVFS is needed to fulfill requirements. In order to reduce power consumption, we propose a method to restrict the CPU frequency of data download while maintaining user reactivity. This can supplement the weakness of existing Linux-based power management techniques like DVFS in relation to webpage loading. Through the implementation of our method at the application level, we confirm that energy consumption from webpage loading is reduced.

Development of GML Map Visualization Service and POI Management Tool using Tagging (GML 지도 가시화 서비스 및 태깅을 이용한 POI 관리 도구 개발)

  • Park, Yong-Jin;Song, Eun-Ha;Jeong, Young-Sik
    • Journal of Internet Computing and Services
    • /
    • v.9 no.3
    • /
    • pp.141-158
    • /
    • 2008
  • In this paper, we developed the GML Map Server which visualized the map based on GML as international standard for exchanging the common format map and for interoperability of GIS information. And also, it should transmit effectively GML map into the mobile device by using dynamic map partition and caching. It manages a partition based on the visualization area of a mobile device in order to visualize the map to a mobile device in real time, and transmits the partition area by serializing it for the benefit of transmission. Also, the received partition area is compounded in a mobile device and is visualized by being partitioned again as four visible areas based on the display of a mobile device. Then, the area is managed by applying a caching algorithm in consideration of repetitiveness for a received map for the efficient operation of resources. Also, in order to prevent the delay in transmission time as regards the instance density area of the map, an adaptive map partition mechanism is proposed for maintaining the regularity of transmission time. GML Map Server can trace the position of mobile device with WIPI environment in this paper. The field emulator can be created mobile devices and mobile devices be moved and traced it's position instead of real-world. And we developed POIM(POI Management) for management hierarchically POI information and for the efficiency POI search by using the individual tagging technology with visual interface.

  • PDF

Mobile Agents Framework for Adaptability Support based on Meta Level (적응성 지원을 위한 메타 레벨 기반의 이동 에이전트 프레임워크)

  • Ghim, Soo-Joong;Yoon, Yong-Ik
    • The KIPS Transactions:PartA
    • /
    • v.10A no.6
    • /
    • pp.651-656
    • /
    • 2003
  • Emerging technologies, such as multimedia and mobile computing, require that middleware platforms can support high adaptability in order to provide more flexible services in heterogeneous environments. To support high quality of service in distributed wired/wireless environments, it will be necessary for applications and middleware to be aware of changes in users requirements as well as environmental conditions, also to be able to adapt their behaviour as such changes. According to the needs of adaptability supporting in middleware, we structure a component-based, mobile agents framework in base level and meta level by using reflection. We propose concepts of meta agents and meta-service agents that are able to reflect changes made by mobile agents to the system. At the meta level of our framework, meta agents monitor execution of mobile agents and it is possible to provide dynamic adaptation of users requirements, deployment of application services and service customization with meta agents and meta-service agents.

Predictive Control for Mobile Robots Using Genetic Algorithms (유전알고리즘을 이용한 이동로봇의 예측제어)

  • Son, Hyun-sik;Park, Jin-hyun;Choi, Young-kiu
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.4
    • /
    • pp.698-707
    • /
    • 2017
  • This paper deals with predictive control methods of mobile robots for reference trajectory tracking control. Predictive control methods using predictive model are known as effective schemes that minimize the future errors between the reference trajectories and system states; however, the amount of real-time computation for the predictive control are huge so that their applications were limited to slow dynamic systems such as chemical processing plants. Lately with high computing power due to advanced computer technologies, the predictive control methods have been applied to fast systems such as mobile robots. These predictive controllers have some control parameters related to control performance. But these parameters have not been optimized. In this paper we employed the genetic algorithm to optimize the control parameters of the predictive controller for mobile robots. The improved performances of the proposed control method are demonstrated by the computer simulation studies.

AdaBoost-based Real-Time Face Detection & Tracking System (AdaBoost 기반의 실시간 고속 얼굴검출 및 추적시스템의 개발)

  • Kim, Jeong-Hyun;Kim, Jin-Young;Hong, Young-Jin;Kwon, Jang-Woo;Kang, Dong-Joong;Lho, Tae-Jung
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.13 no.11
    • /
    • pp.1074-1081
    • /
    • 2007
  • This paper presents a method for real-time face detection and tracking which combined Adaboost and Camshift algorithm. Adaboost algorithm is a method which selects an important feature called weak classifier among many possible image features by tuning weight of each feature from learning candidates. Even though excellent performance extracting the object, computing time of the algorithm is very high with window size of multi-scale to search image region. So direct application of the method is not easy for real-time tasks such as multi-task OS, robot, and mobile environment. But CAMshift method is an improvement of Mean-shift algorithm for the video streaming environment and track the interesting object at high speed based on hue value of the target region. The detection efficiency of the method is not good for environment of dynamic illumination. We propose a combined method of Adaboost and CAMshift to improve the computing speed with good face detection performance. The method was proved for real image sequences including single and more faces.

A Routing Security Authentication using S-EKE in MANET Environments (MANET 환경에서 S-EKE를 이용한 라우팅 보안 인증)

  • Lee, Cheol-Seung
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.9 no.4
    • /
    • pp.433-438
    • /
    • 2014
  • The demanding in construction of the stand-alone networks and interconnection between convergence devices have led an increase in research on MANET and the application of MANET has been paid much attention as a Ubiquitous computing which is growing fast in the field of computer science. With performance both as hosts and routers, easy network configuration, and fast response, mobile nodes participating in MANET are suitable for Embedded computing but have vulnerable points, about lack of dynamic network topology due to mobility, network scalability, passive attacks, and active attacks which make it impossible to manage continuous security authentication service. In this study, proposes S-EKE authentication mechanism for a robust authentication based on MANET and through identify wireless environment security vulnerabilities, currently being used in OTP S/Key and DH-EKE analyzes.