• Title/Summary/Keyword: multi-user and multi-service

Search Result 436, Processing Time 0.03 seconds

Multi-Behavior Analysis Based on Google Archiving Data (구글 아카이빙 데이터 기반 멀티 행위 분석)

  • Yeeun Kim;Sara Hong;Seongmin Kim
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.5
    • /
    • pp.737-751
    • /
    • 2023
  • The importance of digital forensics in the cloud environment is increasing as businesses and individuals move their data from On-premise to the cloud. Cloud data can be stored on various devices, including mobile devices and desktops, and encompasses a variety of user behavior artifacts, such as information generated from linked accounts and cloud services. However, there are limitations in securing and analyzing digital evidence due to environmental constraints of the cloud, such as distributed storage of data and lack of artifact linkage. One solution to address this is archiving services, and Google's Takeout is prime example. In this paper, user behavior data is analyzed for cloud forensics based on archiving data and necessary items are selected from an investigation perspective. Additionally, we propose the process of analyzing selectively collected data based on time information and utilizing web-based visualization to meaningfully assess artifact associations and multi-behaviors. Through this, we aim to demonstrate the value of utilizing archiving data in response to the increasing significance of evidence collection for cloud data.

A Robust Multiple Set-Top Box Authentication Scheme for IPTV Against Smart Card Cloning Attack (IPTV 환경에서 스마트카드 복제에 강건한 다중 셋톱박스 인증기법)

  • Lim, Ji-Hwan;Oh, Hee-Kuck;Kim, Sang-Jin
    • The KIPS Transactions:PartC
    • /
    • v.17C no.1
    • /
    • pp.37-46
    • /
    • 2010
  • In an IPTV system, the rights of the content and service provider can be protected by using Conditional Access System (CAS) and Digital Right Management (DRM). In case of the CAS, only the authorized user who has structured authentication keys can decrypt the encrypted content. However, since the CAS establishes a secure channel only between content provider and Smart Card (SC), it cannot protect the system against McCormac Hack attack which eavesdrops on unsecure channel between SC and Set-Top Box (STB) and SC cloning attack. In this paper, we propose a robust multi-STB assisted SC / STB authentication protocol which can protect the IPTV system against not only McCormac Hack attack, but also SC cloning attack. The previous works which bind a STB and a SC during the SC registration phase against the SC cloning attack does not support multi-STB environments. The proposed system which dynamically updates the STB information in subscriber management system using the bi-directional channel characteristic of IPTV system can support the user's multi-STB device effectively.

Design of Complex Retrieval User Interface for Multimedia Content based on Mobile TV (모바일 TV 기반의 멀티미디어 콘텐츠 복합 검색 인터페이스 설계)

  • Byeon, Jae-Hee;Moon, Nam-Mee
    • Journal of The Institute of Information and Telecommunication Facilities Engineering
    • /
    • v.9 no.3
    • /
    • pp.119-123
    • /
    • 2010
  • Since the two-way interactive broadcasting service began, remote controllers have been fitted with 4 color buttons, which enable interaction and convenience to grow between users and content. With Currently, diverse studies on IPTV are in progress. Particularly, as the mobile market rapidly grows, studies on mobile IPTV and on linkage with other media are constantly increasing. Yet, mobile IPTV has never been studied as of now. In that sense, the present study attempted to design a mobile-based IPTV UI that is fitted with more usability and functionality of 4 color buttons and multi-dimensional search based on consistent criteria for content search. The UI designed in this study was estimated using user interface design guideline. The guideline is comprised of consistency, user centered, ease of use, forgiveness, feedback, functionality, aesthetic integrity.

  • PDF

Design and Implementation of Super-peer P2P Overlay Network Protocol and System for mobile IPTV

  • Kim, Yu-Doo;Moon, Il-Young
    • Journal of information and communication convergence engineering
    • /
    • v.8 no.3
    • /
    • pp.295-300
    • /
    • 2010
  • Recent researches of network structure are moving to high-level networks because there are already many research results of low-level network. Especially, current network services has been changed to the multimedia service using multicast routing such as IPTV(Internet Protocol Television) service. And then previous multicast services were provider oriented. So previous multicast structures were organized server/client model. But future multicast services will make user oriented services. Therefore there will be many service providers in the future. At this point, we study P2P network for supporting multi provider. So we research load balancing and contents lookup protocols in P2P network. In this paper, we propose network protocol and system based on super peer P2P for load balancing and efficiently service search. And we considered mobile environment for mobile IPTV.

A Study on the Factors for Evaluating e-Government Portal Sites (전자정부 포털사이트 평가요인에 관한 연구)

  • Han, Ki-Hun;Hong, Il-Yoo
    • Asia pacific journal of information systems
    • /
    • v.16 no.1
    • /
    • pp.23-43
    • /
    • 2006
  • By far, numerous e-government projects requiring huge investments have been conducted in Korea to increase the administrative efficiency and improve the service quality via Internet. However, there's little research focusing on methods and techniques for analyzing and evaluating the projects either to economically justify the investments or to assess the quality of the system and of on-line services to citizens. The purpose of this paper is to suggest a set of factors to take into account for evaluating e-government portals and to empirically test the factors to provide useful implications for building such portals. Based on the literature reviewed, we constructed a research model that includes content, public service, community, design, technology, and portal's attributes as independent variables and the user's satisfaction and the administrative efficiency as dependent variables. A reliability test revealed that the evaluation factors proposed in the paper are sufficiently reliable, and a multi-regression analysis indicated that five hypotheses should be accepted. The findings of the study suggest that emphasis should be placed on public service quality and portal site attributes, among others, when implementing portals.

A Hybrid Rendering Model to support LOD(Level of Detail) (LOD(Level of Detail)를 지원하는 하이브리드 렌더링 모델)

  • Kim, Hak-Ran;Park, Hwa-Jin
    • Journal of Digital Contents Society
    • /
    • v.9 no.3
    • /
    • pp.509-516
    • /
    • 2008
  • We propose the Hybrid Rendering model to support multi-resolution for computer graphics. LOD method for computer graphics system considering performance of device environment and end-user preference usually adopts mesh resolution, mipmap in texture rendering, or oct-tree data structure in ray tracing. The hybrid rendering model, as a local shading model combining Gouraud shading model and a flat shading model, applies a proper shading method to each of polygons consisting of an object. This method can be an effective alternative to reduce real-time rendering time so that it can be utilized in real time adaptive service of computer graphic contents among various device environments under ubiquitous environments.

  • PDF

Cross-layer Resource Allocation Algorithm for Downlink OFDM System

  • Guo, Qianjing;Hwang, Sung-Sue;Kim, Suk-Chan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.8A
    • /
    • pp.828-834
    • /
    • 2010
  • In this paper, an adaptive cross-layer resource allocation algorithm for the downlink multi-user OFDM system is proposed. The proposed algorithm does not only concern the wireless characteristics of physical (PHY) layer, but also pays attention to the user's quality of service (QoS) requirement, fairness, and packet queue state information of medium access control (MAC) layer. The algorithm is composed of two parts: one is to decide the priority of the user, and the other is to assign the radio resource according to its priority. Simulation results show that the proposed algorithm has both steady QoS and low computation complexity, even though the mobile users have different receiving signal to noise ratio (SNR).

Congestion Control for the ABR Service of ATM networks with Multiple Congested Nodes and Multicast Connections (다수의 혼잡 노드와 멀티개스트 연결을 가지는 비동기 전송망의 ABR 서비스에 대한 혼잡 제어)

  • Nho, Ji-Myong;Lim, Jong-Tae
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.6 no.8
    • /
    • pp.629-637
    • /
    • 2000
  • Unbalance between user requirements and insufficient network resources makes a congestion. In the future since the communication networks will have very heavy traffic congestion will be more serious. The ATM networks was recommended to support the B-ISDN service for the future multimedia communication. In thie sense of congestion avoidance and recovery the ABR service category in ATM networks allows the feedback flow control mechanism to dynamically allocate the idle bandwidth of the network to users fairly and to control the network congestion rapidly In this paper we introduce a congestion control scheme using systematical approach to confirm robust stability with respect to unknown round trip delay for the network which has both unicast and multicast connections.

  • PDF

A Memory Configuration Method for Virtual Machine Based on User Preference in Distributed Cloud

  • Liu, Shukun;Jia, Weijia;Pan, Xianmin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.11
    • /
    • pp.5234-5251
    • /
    • 2018
  • It is well-known that virtualization technology can bring many benefits not only to users but also to service providers. From the view of system security and resource utility, higher resource sharing degree and higher system reliability can be obtained by the introduction of virtualization technology in distributed cloud. The small size time-sharing multiplexing technology which is based on virtual machine in distributed cloud platform can enhance the resource utilization effectively by server consolidation. In this paper, the concept of memory block and user satisfaction is redefined combined with user requirements. According to the unbalanced memory resource states and user preference requirements in multi-virtual machine environments, a model of proper memory resource allocation is proposed combined with memory block and user satisfaction, and at the same time a memory optimization allocation algorithm is proposed which is based on virtual memory block, makespan and user satisfaction under the premise of an orderly physical nodes states also. In the algorithm, a memory optimal problem can be transformed into a resource workload balance problem. All the virtual machine tasks are simulated in Cloudsim platform. And the experimental results show that the problem of virtual machine memory resource allocation can be solved flexibly and efficiently.

User Authentication Technology Using Multi-Blocks in the Cloud Computing Environment

  • Jang, Eun-Gyeom
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.11
    • /
    • pp.139-146
    • /
    • 2020
  • Cloud computing technology provides economic and efficient system operation and management features to deal with rapidly changing IT technologies. However, this is less used in institutes and companies due to low security of cloud computing service. It is recognized that storing and managing important information, which is confidential in external systems is vulnerable to security threats. In order to enhance security of this cloud computing service, this paper suggests a system and user authentication reinforcement model. The suggested technology guarantees integrity of user authentication information and provides users with convenience by creating blocks for each cloud service and connecting service blocks with chains. The block chain user authentication model offers integrity assurance technology of block chains and system access convenience for SSO users. Even when a server providing cloud computing is invaded, this prevents chained invasions not to affect other systems.