• Title/Summary/Keyword: user attribute

Search Result 366, Processing Time 0.024 seconds

Fine-Grained and Traceable Key Delegation for Ciphertext-Policy Attribute-Based Encryption

  • Du, Jiajie;HelIl, Nurmamat
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.9
    • /
    • pp.3274-3297
    • /
    • 2021
  • Permission delegation is an important research issue in access control. It allows a user to delegate some of his permissions to others to reduce his workload, or enables others to complete some tasks on his behalf when he is unavailable to do so. As an ideal solution for controlling read access on outsourced data objects on the cloud, Ciphertext-Policy Attribute-Based Encryption (CP-ABE) has attracted much attention. Some existing CP-ABE schemes handle the read permission delegation through the delegation of the user's private key to others. Still, these schemes lack the further consideration of granularity and traceability of the permission delegation. To this end, this article proposes a flexible and fine-grained CP-ABE key delegation approach that supports white-box traceability. In this approach, the key delegator first examines the relations between the data objects, read permission thereof that he intends to delegate, and the attributes associated with the access policies of these data objects. Then he chooses a minimal attribute set from his attributes according to the principle of least privilege. He constructs the delegation key with the minimal attribute set. Thus, we can achieve the shortest delegation key and minimize the time of key delegation under the premise of guaranteeing the delegator's access control requirement. The Key Generation Center (KGC) then embeds the delegatee's identity into the key to trace the route of the delegation key. Our approach prevents the delegatee from combining his existing key with the new delegation key to access unauthorized data objects. Theoretical analysis and test results show that our approach helps the KGC transfer some of its burdensome key generation tasks to regular users (delegators) to accommodate more users.

The Impact of SNS Advertising Attribute on Advertising Likeability and Purchase Intention: A Comparison of Difference According to Use Motive and Use Intensity of SNS (SNS 광고속성이 광고호감도와 구매의도에 미치는 영향: SNS 이용동기 및 이용강도에 따른 차이 비교)

  • Kim, Hwa-Dong
    • Journal of the Korea Convergence Society
    • /
    • v.11 no.11
    • /
    • pp.155-163
    • /
    • 2020
  • This study investigated experimentally how factors of SNS advertising attribute impact on advertising likeability and purchase intention according to use motive and use intensity of SNS. Firstly showing difference according to use motive of SNS, in user of motive to managing human relation, reliability of advertising contents has effect the largest and entertainment of advertising interest has effect also as important factor. In user of motive to sharing interest information, irritation of advertising on using SNS has effect the largest negatively and information of advertising's information offering capability has effect larger as positive factor. Next showing difference according to use intensity of SNS, in user of high intensity, reliability and information of advertising contents has effect larger than other factors. In user of low intensity, irritation of advertising has effect the largest negatively and other factors have effect very small. This results can provide a practical contribution that explains important factors in producing effective SNS advertising according to using behavior characteristics of SNS.

A Study on the Residential Behavior of Family at the City Center Public Library in Japan (일본 도심 공공도서관의 가족이용자의 체재행동에 관한 연구)

  • Park, In-Kyoo
    • Journal of Korean Library and Information Science Society
    • /
    • v.38 no.3
    • /
    • pp.455-475
    • /
    • 2007
  • Library change of recent times first change of the user there is a wild possibility with most big feature. The user the housewife and unemployment sleeps from the student use center of weekday, with very old man use and to holiday the attribute of the user is changing with family accompaniment use. As the residential type library does recently and the library of new concept appears and it provides a reading service with the form which confront in attribute of the user who is various. This study which it sees the public library of the city center where there is to an execution time at the residential type library the family from inside the library tracking investigated use conduct in the object. This research analyzed the interrelation of composition feature of the type of family use and the un-reading behavior.

  • PDF

An Attribute-Based Authentication Scheme Using Smart Cards (스마트카드를 이용한 속성기반 사용자 인증 스킴)

  • Yoo, Hye-Joung;Rhee, Hyun-Sook
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.5
    • /
    • pp.41-47
    • /
    • 2008
  • In a network environment, when a user requests a server's service, he/she must pass an examination of user authentication. Through this process, the server can determine if the user can use the provided services and the exact access rights of this user in these services. In these authentication schemes, the security of private information became an important issue. For this reason, many suggestions have been made in order to protect the privacy of users and smart cards have been widely used for authentication systems providing anonymity of users recently. An remote user authentication system using smart cards is a very practical solution to validate the eligibility of a user and provide secure communication. However, there are no studies in attribute-based authentication schemes using smart cards so far. In this paper, we propose a novel user authentication scheme using smart cards based on attributes. The major merits include : (1) the proposed scheme achieves the low-computation requirement for smart cards; (2) user only needs to register once and can use permitted various services according to attributes; (3) the proposed scheme guarantees perfect anonymity to remote server.

Proposal for User-Product Attributes to Enhance Chatbot-Based Personalized Fashion Recommendation Service (챗봇 기반의 개인화 패션 추천 서비스 향상을 위한 사용자-제품 속성 제안)

  • Hyosun An;Sunghoon Kim;Yerim Choi
    • Journal of Fashion Business
    • /
    • v.27 no.3
    • /
    • pp.50-62
    • /
    • 2023
  • The e-commerce fashion market has experienced a remarkable growth, leading to an overwhelming availability of shared information and numerous choices for users. In light of this, chatbots have emerged as a promising technological solution to enhance personalized services in this context. This study aimed to develop user-product attributes for a chatbot-based personalized fashion recommendation service using big data text mining techniques. To accomplish this, over one million consumer reviews from Coupang, an e-commerce platform, were collected and analyzed using frequency analyses to identify the upper-level attributes of users and products. Attribute terms were then assigned to each user-product attribute, including user body shape (body proportion, BMI), user needs (functional, expressive, aesthetic), user TPO (time, place, occasion), product design elements (fit, color, material, detail), product size (label, measurement), and product care (laundry, maintenance). The classification of user-product attributes was found to be applicable to the knowledge graph of the Conversational Path Reasoning model. A testing environment was established to evaluate the usefulness of attributes based on real e-commerce users and purchased product information. This study is significant in proposing a new research methodology in the field of Fashion Informatics for constructing the knowledge base of a chatbot based on text mining analysis. The proposed research methodology is expected to enhance fashion technology and improve personalized fashion recommendation service and user experience with a chatbot in the e-commerce market.

Bibliographic Attribute Analysis of Reading Material Based on Book Usage Data (도서이용 데이터에 기반한 독서자료의 속성 분석)

  • Jiyoung Shim
    • Journal of the Korean Society for information Management
    • /
    • v.40 no.4
    • /
    • pp.279-306
    • /
    • 2023
  • This study analyzed bibliographic attributes related to the selection and use of reading materials based on data on books borrowed or purchased together in order to understand the properties of reading materials that have complex user needs from various perspectives. As a result of creating co-occurrence matrices of bibliographic attribute terms by dividing them into 26 sub-attribute units related to KDC main class, target reader, and user age, and performing network analyses, the details and prominent mediating role of bibliographic attributes of reading materials were identified. The results of this study will be helpful in designing facets of reading information systems, including library OPAC, in the future.

Multidimensional Scaling of User Preferences for the Transportation Modes in Seoul. (다차원척도법에 의한 서울주민의 교통수단선호 분석)

  • 허우선
    • Journal of Korean Society of Transportation
    • /
    • v.4 no.1
    • /
    • pp.12-27
    • /
    • 1986
  • This study examined user preferences toward transportation modes in Seoul. Two multidimensional scaling models, the ideal point and vector models, were applied to data on mode preferences of 114 adults in the metropolitan area. While both models produced fairly similar results, the vector model performed slightly better than the other in terms of interpretability of the results. The transport attributes elicited are comfort, flexibility, travel cost, travel time, privacy, and safety; among which comfort is salient most. The comfort variable is a multi-faceted attribute in nature. The variations of attribute preferences are most significant between the gender groups as well as worker/nonworker groups. In particular, male workers, female workers and female nonworkers form three distinctive market segments. An unidimensional scaling of the preference data reveals that subway, auto-driver, and subscription bus modes are preferred most, whereas motorcycle and bicycle least. The other modes of express bus, taxt, auto-passenger, bus and walk rank intermediately. An examination of how preference orders vary among modal groups hints that users align their stated attitudes to their choice in order to reduce cognitive dissonance.

  • PDF

A Friend Recommendation Scheme in Social Network Environments

  • Bok, Kyoungsoo;Jeon, Hyeonwook;Lee, Chunghui;Yoo, Jaesoo
    • International Journal of Contents
    • /
    • v.12 no.2
    • /
    • pp.37-41
    • /
    • 2016
  • In this paper, we propose a friend recommendation scheme that takes into consideration the attribute information of a POI and a user's movement patterns. The proposed scheme broadly consists of a part that filters out other users who have different preferences by calculating preferences using the attribute information of users and a part that finds a moving trajectory close to that of a user with a pattern-matching scheme. To verify the superiority of the proposed scheme, we compare it with existing schemes through various performance evaluations.

Design of Smart Platform based on Image Recognition for Lifelog (라이프로그용 영상인식 기반의 스마트 플랫폼 설계)

  • Choi, Youngho
    • Journal of Internet Computing and Services
    • /
    • v.18 no.1
    • /
    • pp.51-55
    • /
    • 2017
  • In this paper, we designed a LBS-based smart platform for Lifelog service that can utilize the other's lifelog information. The conventional Lifelog service means that the system records the daily activities of the smart device user so the user can retrieve the early-recorded information later. The proposed Lifelog service platform uses the GPS/UFID location information and the various information extracted from the image as the lifelog data. Further, the proposed Lifelog platform using DB can provide the user with the Lifelog data recorded by the other service user. The system usually provide the other's Lifelog data within the 500m distance from the user and the range of distance can be adjustable. The proposed smart platform based on image recognition for Lifelog can acquire the image from the smart device directly and perform the various image recognition processing to produce the useful image attributes. And it can store the location information, image data, image attributes and the relevant web informations on the database that can be retrieved by the other use's request. The attributes stored and managed in the image information database consist of the followings: Object ID, the image type, the capture time and the image GPS coordinates. The image type attribute has the following values: the mountain, the sea, the street, the front of building, the inside of building and the portrait. The captured image can be classified into the above image type by the pattern matching image processing techniques and the user's direct selection as well. In case of the portrait-attribute, we can choose the multiple sub-attribute values from the shirt, pant, dress and accessory sub-attributes. Managing the Lifelog data in the database, the system can provide the user with the useful additional services like a path finding to the location of the other service user's Lifelog data and information.

Attribute based User Authentication for Contents Distribution Environments

  • Yoo, Hye-Joung
    • International Journal of Contents
    • /
    • v.8 no.3
    • /
    • pp.79-82
    • /
    • 2012
  • In digital contents distribution environments, a user authentication is an important security primitive to allow only authenticated user to use right services by checking the validity of membership. For example, in Internet Protocol Television (IPTV) environments, it is required to provide an access control according to the policy of content provider. Remote user authentication and key agreement scheme is used to validate the contents accessibility of a user. We propose a novel user authentication scheme using smart cards providing a secure access to multimedia contents service. Each user is authenticated using a subset of attributes which are issued in the registration phase without revealing individual's identity. Our scheme provides the anonymous authentication and the various permissions according to the combination of attributes which are assigned to each user. In spite of more functionality, the result of performance analysis shows that the computation and communication cost is very low. Using this scheme, the security of contents distribution environments in the client-server model can be significantly improved.