• Title/Summary/Keyword: Data Sharing

Search Result 321, Processing Time 0.119 seconds

UEPF:A blockchain based Uniform Encoding and Parsing Framework in multi-cloud environments

  • Tao, Dehao;Yang, Zhen;Qin, Xuanmei;Li, Qi;Huang, Yongfeng;Luo, Yubo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.8
    • /
    • pp.2849-2864
    • /
    • 2021
  • The emerging of cloud data sharing can create great values, especially in multi-cloud environments. However, "data island" between different cloud service providers (CSPs) has drawn trust problem in data sharing, causing contradictions with the increasing sharing need of cloud data users. And how to ensure the data value for both data owner and data user before sharing, is another challenge limiting massive data sharing in the multi-cloud environments. To solve the problems above, we propose a Uniform Encoding and Parsing Framework (UEPF) with blockchain to support trustworthy and valuable data sharing. We design namespace-based unique identifier pair to support data description corresponding with data in multi-cloud, and build a blockchain-based data encoding protocol to manage the metadata with identifier pair in the blockchain ledger. To share data in multi-cloud, we build a data parsing protocol with smart contract to query and get the sharing cloud data efficiently. We also build identifier updating protocol to satisfy the dynamicity of data, and data check protocol to ensure the validity of data. Theoretical analysis and experiment results show that UEPF is pretty efficient.

A Study on Efficient Friendly Forces Location Data Sharing on Battalion and Below

  • Kim, Hyung-Seok;Shin, Sang-Heon;Kim, Yong-Cheol;Lee, Jeong-Min
    • Journal of the Korea Society of Computer and Information
    • /
    • v.23 no.11
    • /
    • pp.95-101
    • /
    • 2018
  • In this paper, we propose an efficient friendly forces location data sharing algorithm in a troops using a low bandwidth radio. The future battlefield is a 'Network Centric Warfare' with a concept of identifying the position and power of the enemy and friendly forces and leading the battlefield to victory through proper links at the time of our need. One of the basic elements in the 'Network Centric Warfare' is to share friendly forces location data. The bandwidth and transmission rates of radio used in battalion are low. Nevertheless, we should share our locations data almost in real time for effective fighting in a war situation. This paper describes the efficient method of friendly forces location data sharing based on low bandwidth radio. In particular, the concept of 'network-centered warfare' is reflected in the troop below the battalion to present an integrated and efficient way to shared location data of friendly forces.

A key-insulated CP-ABE with key exposure accountability for secure data sharing in the cloud

  • Hong, Hanshu;Sun, Zhixin;Liu, Ximeng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.5
    • /
    • pp.2394-2406
    • /
    • 2016
  • ABE has become an effective tool for data protection in cloud computing. However, since users possessing the same attributes share the same private keys, there exist some malicious users exposing their private keys deliberately for illegal data sharing without being detected, which will threaten the security of the cloud system. Such issues remain in many current ABE schemes since the private keys are rarely associated with any user specific identifiers. In order to achieve user accountability as well as provide key exposure protection, in this paper, we propose a key-insulated ciphertext policy attribute based encryption with key exposure accountability (KI-CPABE-KEA). In our scheme, data receiver can decrypt the ciphertext if the attributes he owns match with the self-centric policy which is set by the data owner. Besides, a unique identifier is embedded into each user's private key. If a malicious user exposes his private key for illegal data sharing, his identity can be exactly pinpointed by system manager. The key-insulation mechanism guarantees forward and backward security when key exposure happens as well as provides efficient key updating for users in the cloud system. The higher efficiency with proved security make our KI-CPABE-KEA more appropriate for secure data sharing in cloud computing.

A Study on the Factors Affecting Sharing of Research Data of Science and Technology Researchers (과학기술분야 연구자의 연구데이터 공유의 영향요인에 대한 연구)

  • Kim, Moonjeong;Kim, Seonghee
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.49 no.2
    • /
    • pp.313-334
    • /
    • 2015
  • The purpose of this study was to investigate factors affecting the sharing of research data of science and technology researchers. Data was collected through a survey of 198 science and technology researchers. Independent variables in this study included perception, openness in communication, collaboration, and trust. Latent variable was selected as reward system and dependent variable was research data sharing. The results of analysis of structural equation modeling showed that perception were found to have a positive impact on reward system for data sharing for research. Other factors such as trust, openness in communication and collaboration were not statistically significant in their affect on reward system for data sharing. Finally, reward system was identified as the influential factor on research data sharing.

Development of National Qualification Management System for Performance Improvement based on Real-Time Data Sharing (자료공유를 이용한 국가자격관리 성능개선 시스템의 개발)

  • Chang, Young-Hyun;Seo, Jeong-Man
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.4
    • /
    • pp.213-220
    • /
    • 2008
  • The purpose of this paper is to improve efficiency in the construction and operation of a total management system for the national technical qualification through the design and development of a real-time data sharing system which is connected with the management system of external consignment. The current a total management system for the national technical qualification precesses the work depend on information and results which pass over by external IT company. But this method of processing has some unstable elements with regards to information reprocessing, functional supplement, system stability, etc. The proposed system's technological concepts have been tested through a basic simulation pilot program. The pilot program will be expanded to include the local Chamber of Commerce and Industry because the stability of the system was proved through its application to the real-time national technical qualification examination of KCCI(Korea Chamber of Commerce and Industry). The real-time data sharing system has shown great efficiency in terms of system management, and has solved problems of developmental period for information reprocessing and functional supplement. The real-time data sharing system has been given good evaluations with regard to the convenience of their use and the management system for operators and supervisors.

  • PDF

Data Sharing Technique between Heterogeneous based on Cloud Service (클라우드 서비스 기반 이기종간의 데이터 공유 기법)

  • Seo, Jung-Hee;Park, Hung-Bog
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.3
    • /
    • pp.391-398
    • /
    • 2018
  • There are many problems caused by data sharing between general heterogeneous digital devices due to various interfaces. To solve this problem, this paper proposes heterogeneous data sharing with cloud service and mobile through D2D communication that supports communication between different devices. The proposed technique is used to reduce the load on the server to perform data synchronization. Also, in order to minimize data latency caused by data replication between different devices, a technique to enhance the speed of data writing with copying only the modified parts in the chunk list is adopted and cloud service model integrated with mobile environment is realized in order to minimize the network bandwidth consumed for synchronization for data sharing. Therefore, it is possible to share data in different spaces efficiently with maintaining data integrity and minimizing latency in data.

Data Sharing Architecture for an Effective Implementation of Underwater Robot S/W Framework (효과적인 수중로봇 S/W 프레임웍 구현을 위한 데이터 공유구조)

  • Jeong, Soon-Yong;Choi, Hyun-Taek
    • Journal of the Institute of Electronics Engineers of Korea SC
    • /
    • v.48 no.2
    • /
    • pp.1-8
    • /
    • 2011
  • An underwater robot S/W framework consists of various sub-modules such as sensory data processing module, thruster control module, cognition module and behavior control module. Performance of a robot is determined by not only the efficiency of algorithms used but also effectiveness of their implementations. One most important factor of the effective implementation is the efficiency of data sharing module, as it transmits signals and data between the sub-modules and thus is directly related to the cycles of sensing and control The ideal data sharing module enables immediate access to any data source irrespective of system configurations. In reality, however, there are lots of obstacles including limitation of processing capacity of source modules, delay over network, and scheduling latency of operating systems. The paper proposes a new data sharing architecture and programming models to effectively handle such obstacles in implementation of underwater S/W framework on a small scale distributed computing system.

Object Detection on the Road Environment Using Attention Module-based Lightweight Mask R-CNN (주의 모듈 기반 Mask R-CNN 경량화 모델을 이용한 도로 환경 내 객체 검출 방법)

  • Song, Minsoo;Kim, Wonjun;Jang, Rae-Young;Lee, Ryong;Park, Min-Woo;Lee, Sang-Hwan;Choi, Myung-seok
    • Journal of Broadcast Engineering
    • /
    • v.25 no.6
    • /
    • pp.944-953
    • /
    • 2020
  • Object detection plays a crucial role in a self-driving system. With the advances of image recognition based on deep convolutional neural networks, researches on object detection have been actively explored. In this paper, we proposed a lightweight model of the mask R-CNN, which has been most widely used for object detection, to efficiently predict location and shape of various objects on the road environment. Furthermore, feature maps are adaptively re-calibrated to improve the detection performance by applying an attention module to the neural network layer that plays different roles within the mask R-CNN. Various experimental results for real driving scenes demonstrate that the proposed method is able to maintain the high detection performance with significantly reduced network parameters.

Secure and Scalable Key Aggregation Scheme for Cloud Storage

  • Park, YoHan;Park, YoungHo
    • Journal of the Korea Industrial Information Systems Research
    • /
    • v.20 no.2
    • /
    • pp.11-18
    • /
    • 2015
  • As the communication technology and mobile devices develop, the need for the efficient and secure remote storage is required. And recently, many companies support cloud storages to meet the requirements of the customers. Especially in the business field where various companies collaborate, data sharing is an essential functionality to enhance their work performance. However, existing researches have not fully satisfied the requirement either efficiency and security. This paper suggests efficient and secure data sharing scheme for cloud storage by using secret sharing scheme. Proposed scheme can be applied to business collaborations and team projects.

Proactive Task Execution Using Data Sharing and Event Transition among Personal Devices

  • Jeon, Ho-Cheol;Kim, Tae-Hwan;Choi, Joong-Min
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.4 no.6
    • /
    • pp.1237-1252
    • /
    • 2010
  • This paper proposes an intelligent technique for data sharing and event transition among personal devices including smart phones, laptops, and desktops. We implemented the PES (Personal Event Service) system that proactively executes appropriate tasks across multiple devices without explicit user requests by sharing the data used by the user and recognizing user intention based on the observed actions of the user for specific devices. The client module of PES installed on each device monitors the user actions and recognizes the intention of the user. The server provides data sharing and maintenance for clients. The connection between client and server is established by Java RMI (Remote Method Invocation). A series of experiments were performed to evaluate user satisfaction and system accuracy, and the results showed that the PES system can proactively provide appropriate, personalized services with a high degree of satisfaction to the user in an effective and efficient manner.