• Title/Summary/Keyword: location provider

Search Result 88, Processing Time 0.029 seconds

A Conceptual Model for Location Based Public Transit Transfer Information Service (사용자 위치기반 환승정보서비스 개념모델)

  • Lim, Jung-Sil;Moon, Young-Jun;Oh, Young-Tae;Lee, Choul-Ki;Bae, Myoung-Hwan
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.7 no.4
    • /
    • pp.1-12
    • /
    • 2008
  • The issues of developing the value added services for public transport connectivity and transfer with information and communication technologies has been discussed in terms of incorporating system facilities with public transit modes to increase the ridership of public transit. This paper demonstrates a conceptual model for providing the location based public transit transfer information service on demand with respect to system requirements, subsystems, and logical architecture based on the national ITS architecture. The subsystems in this study which include transfer information center, parking concierge, user route guidance and information provision system are also investigated in detail in order for information service and/or contents provider to develop business models on public transit connectivity and transfer. This model is expected to be utilized in providing the variety of service models with the different types of public transit connectivity and transfer systems according to the system scale and the public transit modes.

  • PDF

QoS Support Mechanisms in Mobile MPLS VPN (이동 MPLS VPN에서의 QoS 지원 방안)

  • Lee Young-seok;Yang Hae-kwon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.1
    • /
    • pp.65-73
    • /
    • 2006
  • Network based VPN(Virtual Private Network) using MPLS(Multiprotocol Label Switching) technology, called PE(Provider Edge router) based MPLS VPN, is regarded as a good solution for intranets or ext3nets because of the low cost and the flexibility of the service provision. In this paper, we describe a mechanism that allows the VPN users to move from one site to another site of the VPN network based on the BGP-E MPLS technology. This mechanism is designed for PE(Provider Edge) routers of the backbone network. PE routers connected to the VPN sites establish a new MPLS path to the mobile node after they detect movement of the mobile VPN node. The new location may belong to the same VPN or to different VPN. We desisted VPN management and control functions of the PE routers in order to interface with the Mobile IP protocol and support the QoS mechanism. The pilot implementation and performance measurement were carried out on a simulation using COVERS tool.

A Mutual P3P Methodology for Privacy Preserving Context-Aware Systems Development (프라이버시 보호 상황인식 시스템 개발을 위한 쌍방향 P3P 방법론)

  • Kwon, Oh-Byung
    • Asia pacific journal of information systems
    • /
    • v.18 no.1
    • /
    • pp.145-162
    • /
    • 2008
  • One of the big concerns in e-society is privacy issue. In special, in developing robust ubiquitous smart space and corresponding services, user profile and preference are collected by the service providers. Privacy issue would be more critical in context-aware services simply because most of the context data themselves are private information: user's current location, current schedule, friends nearby and even her/his health data. To realize the potential of ubiquitous smart space, the systems embedded in the space should corporate personal privacy preferences. When the users invoke a set of services, they are asked to allow the service providers or smart space to make use of personal information which is related to privacy concerns. For this reason, the users unhappily provide the personal information or even deny to get served. On the other side, service provider needs personal information as rich as possible with minimal personal information to discern royal and trustworthy customers and those who are not. It would be desirable to enlarge the allowable personal information complying with the service provider's request, whereas minimizing service provider's requiring personal information which is not allowed to be submitted and user's submitting information which is of no value to the service provider. In special, if any personal information required by the service provider is not allowed, service will not be provided to the user. P3P (Platform for Privacy Preferences) has been regarded as one of the promising alternatives to preserve the personal information in the course of electronic transactions. However, P3P mainly focuses on preserving the buyers' personal information. From time to time, the service provider's business data should be protected from the unintended usage from the buyers. Moreover, even though the user's privacy preference could depend on the context happened to the user, legacy P3P does not handle the contextual change of privacy preferences. Hence, the purpose of this paper is to propose a mutual P3P-based negotiation mechanism. To do so, service provider's privacy concern is considered as well as the users'. User's privacy policy on the service provider's information also should be informed to the service providers before the service begins. Second, privacy policy is contextually designed according to the user's current context because the nomadic user's privacy concern structure may be altered contextually. Hence, the methodology includes mutual privacy policy and personalization. Overall framework of the mechanism and new code of ethics is described in section 2. Pervasive platform for mutual P3P considers user type and context field, which involves current activity, location, social context, objects nearby and physical environments. Our mutual P3P includes the privacy preference not only for the buyers but also the sellers, that is, service providers. Negotiation methodology for mutual P3P is proposed in section 3. Based on the fact that privacy concern occurs when there are needs for information access and at the same time those for information hiding. Our mechanism was implemented based on an actual shopping mall to increase the feasibility of the idea proposed in this paper. A shopping service is assumed as a context-aware service, and data groups for the service are enumerated. The privacy policy for each data group is represented as APPEL format. To examine the performance of the example service, in section 4, simulation approach is adopted in this paper. For the simulation, five data elements are considered: $\cdot$ UserID $\cdot$ User preference $\cdot$ Phone number $\cdot$ Home address $\cdot$ Product information $\cdot$ Service profile. For the negotiation, reputation is selected as a strategic value. Then the following cases are compared: $\cdot$ Legacy P3P is considered $\cdot$ Mutual P3P is considered without strategic value $\cdot$ Mutual P3P is considered with strategic value. The simulation results show that mutual P3P outperforms legacy P3P. Moreover, we could conclude that when mutual P3P is considered with strategic value, performance was better than that of mutual P3P is considered without strategic value in terms of service safety.

Development of Android App to Record and Manage Travel Routes for Location Information Protection (위치정보 보호를 위한 이동 경로 기록 및 관리 서비스 앱 개발)

  • Seoyeon Kim;Ah Young Kim;Minjung Oh;Saem Oh;Sungwook Kim
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.12 no.10
    • /
    • pp.437-444
    • /
    • 2023
  • Location-based services play a vital role in our daily lives. While these services enhance user convenience, user's privacy is at risk because they lead to a rapid surge in collecting and utilizing location information for a user. In this paper, we design and implement an application that securely records and manages user location information. We enhance the privacy protection aspect concerning location information by providing some features. Utilizing Room DB, we store collected personal location information in the user's local database instead of the server of the location-based service provider. Furthermore, user can initiate and terminate recording at their discretion, thereby enhancing the protection of personal information related to location data. User's unease regarding their movement paths is reduced by empowering them to have control over their own location information.

The Effect of Location of Waiting Place on Consumers' Perceived Waiting Time in a Family Restaurant (레스토랑의 대기 장소의 위치가 고객의 대기시간 지각에 미치는 영향)

  • PARK, Eun-Young
    • Journal of Distribution Science
    • /
    • v.17 no.6
    • /
    • pp.77-84
    • /
    • 2019
  • Purpose - Although an extensive body of research in psychology and marketing focuses on perceived waiting time, no research has examined the effect of the location of the waiting place on perceived waiting time. In particular, this study suggests that customers who are waiting in a restaurant may have different perceived waiting time depending on whether they are in close proximity to the service area (e.g., dining area) or farther from it. In particular, the author examines how and why the location of the waiting place affects the perceived waiting time of the consumer and reveals the mental simulation as its psychological mechanism. Research design, data, and methodology - This study conducted field surveys with customers waiting in real restaurants. Eighty-eight people participated under two conditions: a restaurant with a waiting place near the dining area and a restaurant with a waiting place far from the dining area. Participants responded to questions about perceived waiting time (the dependent variable), mental simulation (the mediator), and demographic variables. To verify the hypothesis, ANOVA and bootstrapping analysis were performed. Results - The major results from the field study are as follows. First, participants perceived wait time differently depending on the location of the restaurant's waiting place: participants in the restaurant with a waiting place close to the dining area perceived significantly shorter waiting times. Second, the effect of the location of the waiting place on the perceived waiting time was mediated by mental simulation: the closer the wait location is to the dining area, the more imagination the customer exercises about the meal, which in turn distracts attention from time flow and shortens the perceived wait time. Conclusion - This study has a theoretical implication in that it extends research on perceived waiting time as the first study of how and why the location of a waiting place affects a customer's perceived waiting time. It has a practical implication that can be used as a marketing tactics to improve the image of the service provider by changing the location of the waiting place.

A Study on Development of A GPS navigation system based on RFID which contains location information (위치정보가 기록된 RFID를 이용한 택배차량용 내비게이션 시스템 개발에 관한 연구)

  • Shim, Jin-Bum;Han, Yeong-Geun
    • Journal of the Korea Safety Management & Science
    • /
    • v.12 no.1
    • /
    • pp.113-118
    • /
    • 2010
  • "Domestic delivery service" is defined the service to deliver goods or packages from point of senders to point of receiver. With the characteristics of door to door, it is must a service provider should know the exact location of destination assuring best utilization of moving path. Generally, location information consist of postal code and address only, which result in difficulties to identify the precise location of destination. It is relatively less correlated between the information that address refers and practical location in Korea address system. For example, the next door to house number 100 is not always house number 101. Therefore, a delivery man additionally uses a paper map or a GPS navigation which carry extra job to input every code of location to the device in order to know precise location. It is also very inconvenient that every delivery man identify the location that address information refers and make a personal decision of the optimum moving path dropping each destination without calculating provisioning process of whole delivery path. As explained above, it is inefficient to find information delivery service required and to generate the optimum path. In results, these difficulties bring in delay of service and increase of cost. In this point, the contents of the thesis suggest a GPS navigation system easy to obtain accuracy of delivery information which enables to automate optimum moving path based on RFID which contains location information.

Cryptography in the Cloud: Advances and Challenges

  • Boyd, Colin
    • Journal of information and communication convergence engineering
    • /
    • v.11 no.1
    • /
    • pp.17-23
    • /
    • 2013
  • Cloud computing is a currently developing revolution in information technology that is disturbing the way that individuals and corporate entities operate while enabling new distributed services that have not existed before. At the foundation of cloud computing is the broader concept of converged infrastructure and shared services. Security is often said to be a major concern of users considering migration to cloud computing. This article examines some of these security concerns and surveys recent research efforts in cryptography to provide new technical mechanisms suitable for the new scenarios of cloud computing. We consider techniques such as homomorphic encryption, searchable encryption, proofs of storage, and proofs of location. These techniques allow cloud computing users to benefit from cloud server processing capabilities while keeping their data encrypted; and to check independently the integrity and location of their data. Overall we are interested in how users may be able to maintain and verify their own security without having to rely on the trust of the cloud provider.

A Nearest Neighbor Query Processing Algorithm Supporting K-anonymity Based on Weighted Adjacency Graph in LBS (위치 기반 서비스에서 K-anonymity를 보장하는 가중치 근접성 그래프 기반 최근접 질의처리 알고리즘)

  • Jang, Mi-Young;Chang, Jae-Woo
    • Spatial Information Research
    • /
    • v.20 no.4
    • /
    • pp.83-92
    • /
    • 2012
  • Location-based services (LBS) are increasingly popular due to the improvement of geo-positioning capabilities and wireless communication technology. However, in order to enjoy LBS services, a user requesting a query must send his/her exact location to the LBS provider. Therefore, it is a key challenge to preserve user's privacy while providing LBS. To solve this problem, the existing method employs a 2PASS cloaking framework that not only hides the actual user location but also reduces bandwidth consumption. However, 2PASS does not fully guarantee the actual user privacy because it does not take the real user distribution into account. Hence, in this paper, we propose a nearest neighbor query processing algorithm that supports K-anonymity property based on the weighted adjacency graph(WAG). Our algorithm not only preserves the location of a user by guaranteeing k-anonymity in a query region, but also improves a bandwidth usage by reducing unnecessary search for a query result. We demonstrate from experimental results that our algorithm outperforms the existing one in terms of query processing time and bandwidth usage.

Design and Implementation of a Protocol for u-Safety Service (u-안심 서비스 프로토콜 설계 및 구현)

  • Cho, Byung Soon;Lee, Jae Min
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.12
    • /
    • pp.117-128
    • /
    • 2013
  • u-safety service system inter-works with the diverse operation agencies, through CCTV network, such as the emergency call terminal with built-in GPS, the mobile communication network, u-safety service provider, relay system and CCTV control center. In the case of the emergency call, this service searches the location of caller in real time, and then continues to search the location of caller through the control of CCTV in the searched place, and can provide the several agencies like guardian, police office, fire station, hospitals, relief organizations and municipalities, with the diverse information necessary for the secure rescue through SMS and wired network. In this paper, a new protocol and specification for u-safety service relay system is designed and implemented. The effectiveness of presented protocol is verified by computer simulation. The designed protocol of u-safety service is applied to real 3GPP and 3GPP2 mobile communication networks to verify its performance.

Logistics Peculiarities for the Firms in the Daegu-Gyeongbuk Area (대구.경북지역 기업의 물류특성 분석)

  • Ha, Yeong-Seok;Seo, Jung-Soo
    • Journal of Korea Port Economic Association
    • /
    • v.27 no.2
    • /
    • pp.241-260
    • /
    • 2011
  • This paper qualitatively describes logistics behaviors of 113 companies located in Daegu-Gyeongbuk by considering various characteristics such as business location, trade volume, cargo types and the possession of company's own warehouse. A logit model is developed to investigate how predictor variables affect these companies' inclination of utilizing Third Party Logistics Provider(3PL). The estimation results of 102 effective data points show that among the four predictors the location of company's HQs (HQADD) and trade volume (TRDTEU) significantly increase company's tendency towards utilizing 3PL while the remaining two variables (BULK, WAREHS) imparting statistically insignificant influence. The results indicate that those companies located outside the region tend to implement a strategy of using more 3PL and also that the larger the trade volume of the company the more 3PL the company uses to improve the efficiency in logistics.