DOI QR코드

DOI QR Code

Design of Mobile-based Security Agent for Contents Networking in Mixed Reality

융합현실에서 콘텐츠 네트워킹을 위한 모바일 기반 보안 중계 설계

  • 김동현 (한남대학교 멀티미디어학과) ;
  • 임재현 (한남대학교 멀티미디어학과) ;
  • 김석수 (한남대학교 멀티미디어학과)
  • Received : 2019.02.12
  • Accepted : 2019.03.20
  • Published : 2019.03.28

Abstract

Due to the development of ICT technology, convergence reality contents are utilized as technology for providing services in various industrial fields by visualizing various information such as sensor information and shared information in a service platform showing only simple three-dimensional contents. Research is underway to reduce the weight of applications by transmitting the resources of the object to be enhanced to the network as the information and the contents to be provided increase. In order to provide resources through the network, servers for processing various information such as pattern information, content information, and sensor information must be constructed in a cloud environment. However, in order to authenticate data transmitted and received in real-time in a cloud environment, there is a problem in that the processing is delayed and a delay phenomenon occurs in the rendering process and QoS is lowered. In this paper, we propose a system to distribute cloud server which provides augmented contents of convergent reality service that provides various contents such as sensor information and three - dimensional model, and shorten the processing time of reliable data through distributed relay between servers Respectively.

ICT 기술의 발전으로 인하여 융합현실 콘텐츠는 단순한 3차원 콘텐츠만을 보여주는 서비스 플랫폼에서 센서 정보, 공유 정보등 다양한 정보 등을 가시화하여 제공함으로서 다양한 산업분야에서 서비스 제공을 위한 기술로서 활용되어지고 있다. 제공되는 정보와 콘텐츠가 증가함에 따라 증강되는 오브젝트의 리소스를 네트워크로 전송하여 어플리케이션을 경량화하는 연구들이 진행되고 있다. 네트워크를 통해 리소스를 제공하기 위해서는 패턴 정보, 콘텐츠 정보, 센서 정보 등 다양한 정보들을 처리하기 위한 서버들이 클라우드 환경에서 구축되어야 한다. 그러나 클라우드 환경에서 실시간으로 송수신되는 데이터를 인증하기 위해서는 그 처리과정이 길기 때문에 랜더링 과정에서 딜레이 현상이 발생하여 QoS가 떨어지는 문제가 있다. 따라서 본 연구에서는 센서 정보, 3차원 모델 등 다양한 콘텐츠를 제공해주는 융합현실 서비스의 증강 콘텐츠를 제공해주는 클라우드 서버를 분산하고 분산된 서버간 중계를 통하여 신뢰된 데이터를 처리하는 시간을 단축하기 위한 시스템을 설계하였다.

Keywords

JKOHBZ_2019_v9n3_22_f0001.png 이미지

Fig. 1. Cloud Server Networking

JKOHBZ_2019_v9n3_22_f0002.png 이미지

Fig. 2. Cloud Server Layer

JKOHBZ_2019_v9n3_22_f0003.png 이미지

Fig. 3. Cloud Security Framework

JKOHBZ_2019_v9n3_22_f0004.png 이미지

Fig. 4. Trust between Host and Agent

JKOHBZ_2019_v9n3_22_f0005.png 이미지

Fig. 5. Security Test-bed

JKOHBZ_2019_v9n3_22_f0006.png 이미지

Fig. 6. Detection Time

JKOHBZ_2019_v9n3_22_f0007.png 이미지

Fig. 7. False Positive Comparison

JKOHBZ_2019_v9n3_22_f0008.png 이미지

Fig. 8 False Negative Comparison

References

  1. K. J. Lee & W. S. Jeong. (2011). An Analysis of the Economic Effects for the Immersive Media Industry. The Journal of Korean Institute of Communications and Information Sciences, 36(7), 795-805. https://doi.org/10.7840/KICS.2011.36B.7.795
  2. S. Jonathan (1992). Defining virtual reality: Dimensions determining telepresence. Journal of communication, 42(4), 73-93. https://doi.org/10.1111/j.1460-2466.1992.tb00812.x
  3. E. Damiani, S. Vimercati, S. Paraboschi & P. Samarati (2000). Securing XML Documents. Proceedings of the 2000 International Conference on Extending Database Technology(EDBT2000).
  4. Wen, Quan, Yufei Wang & Peng Li. (2018). Two Zero-Watermark methods for XML documents. Journal of Real-Time Image Processing, 14(1), 183-192. https://doi.org/10.1007/s11554-016-0647-2
  5. J. L. Raheja, A. Chaudhary, K. Singal. (2011). Tracking of fingertips and centers of palm using kinect. In Computational intelligence, modelling and simulation (CIMSiM), 248-252.
  6. S. A. Kumar. (2017). Improved hybrid algorithm for robust and imperceptible multiple watermarking using digital images. Multimedia Tools and Applications, 76(6), 8881-8900. https://doi.org/10.1007/s11042-016-3514-z
  7. S. H. Kim. (2016). Realtime 3D Human Full-Body Convergence Motion Capture using a Kinect Sensor. Journal of Digital Convergence, 14(1), 189-194. https://doi.org/10.14400/JDC.2016.14.1.189
  8. K. W. Park & J. Y. Lee. (2015). A Morphology Technique-Based Boundary Detection in a Two-Dimensional QR Code. Journal of Digital Convergence, 13(12), 159-175.
  9. S. M. Jung, J. G. Song, D. J. Hwang, J. Y. Aan & S. S. Kim. (2010). A Study on Software-based Sensing Technology for Multiple Object Control in AR Video. Sensors, 10(11), 9857-9871. https://doi.org/10.3390/s101109857
  10. J. U. Hou, D. G. Kim & H. K. Lee. (2017). Blind 3D Mesh Watermarking for 3D Printed Model by Analyzing Layering Artifact. IEEE Transactions on Information Forensics and Security, 12(11), 2712-2725. https://doi.org/10.1109/TIFS.2017.2718482
  11. A. F. Tawfiq & J. Lu. (2017). Securing Financial XML Transactions Using Intelligent Fuzzy Classification Techniques: A Smart Fuzzy-Based Model for Financial XML Transactions Security Using XML Encryption. Ontologies and Big Data Considerations for Effective Intelligence. IGI Global, 2017, 214-326.
  12. K. Fatma. (2017). High Performance and Reliable Fault Detection Scheme for the Secure Hash Algorithm. Indian Journal of Science and Technology 10.19 (2017).
  13. S. R. Kokate & S. G. Salunke. (2017). Implementation of Intelligent Malware Detection System Using Post Processing Techniques. 2017 International Conference on Computing, Communication, Control and Automation (ICCUBEA). (pp. 1-4).
  14. S. W Jeong, U. R Chio & I. G. Lee. (2018). Cyber KillChain Based Security Policy Utilizing Hash for Internet of Things. Journal of Digital Convergence, 16(9), 179-185. https://doi.org/10.14400/JDC.2018.16.9.179
  15. H. U. Kim, H. J. Kim, J. H. Kang & M. S. Jun. (2017). A Study on Analysis and Countermeasure of Security threat in NFC. Journal of Digital Convergence, 14(12), 183-191. https://doi.org/10.14400/JDC.2016.14.12.183
  16. K. H Ko. (2018). An Estimating Algorithm of Vehicle Collision Speed Through Images of Blackbox. Journal of Digital Convergence, 16(9), 173-178. https://doi.org/10.14400/JDC.2018.16.5.173