- Cryptography and Data Security
- Psychosocial Factors Impacting Youth
- Privacy-Preserving Technologies in Data
- Cloud Data Security Solutions
- Multimedia Communication and Technology
- Bluetooth and Wireless Communication Technologies
- Job Satisfaction and Organizational Behavior
- Cloud Computing and Resource Management
- Migration, Ethnicity, and Economy
- Asian Culture and Media Studies
- Caching and Content Delivery
- Peer-to-Peer Network Technologies
- Internet of Things and Social Network Interactions
- Cloud Computing and Remote Desktop Technologies
- Workplace Violence and Bullying
- Consumer Perception and Purchasing Behavior
- Complexity and Algorithms in Graphs
- Emotional Labor in Professions
- Wireless Networks and Protocols
- Advanced Data Storage Technologies
- Indoor and Outdoor Localization Technologies
- Human Mobility and Location-Based Analysis
- Privacy, Security, and Data Protection
- AI and HR Technologies
- Software Reliability and Analysis Research
Jeonbuk National University
2015-2024
University of Windsor
2019-2022
McGill University
2013
Hanil E-Hwa (Slovakia)
2006
With the development of cloud computing, interest in database outsourcing has recently increased. However, when is outsourced, there a problem that information data owner exposed to internal and external attackers. Therefore, this paper, we propose decimal-based encryption operation protocols support privacy preservation. The proposed improve operational efficiency compared with binary-based by eliminating need for repetitive operations based on bit length. In addition, privacy-preserving...
Recently, privacy-preserving association rules mining algorithms have been proposed to support data privacy. However, the an additional overhead insert fake items (or transactions) and cannot hide frequency. In this paper, we propose a rule algorithm for encrypted in cloud computing. For mining, utilize Apriori by using Elgamal cryptosystem, without transactions. Thus can guarantee both privacy query privacy, while concealing We show that achieves about 3-5 times better performance than...
Hadoop is developed as a distributed data processing platform for analyzing big data. Enterprises can analyze containing users' sensitive information by using and utilize them their marketing. Therefore, researches on encryption have been widely done to protect the leakage of stored in Hadoop. However, existing support only AES international standard algorithm. Meanwhile, Korean government selected ARIA algorithm scheme domestic usages. In this paper, we propose HDFS which supports both...
패션산업은 개성과 다양성을 중시하는 시대에 진입함에 따라 패션 제품의 소비방식이 변화하였고, 대량생산 중심에서 다품종 소량생산으로 제조패러다임이 변화하고 있다. 새로운 변화에 맞서 패션기업은 디지털 전환을 통해 경쟁력을 가지고자 노력하고 본 연구의 목적은 국내에 존재하는 4개사의 패션제조협업플랫폼 사례 분석을 패션제품 제조과정에서 전환 요소를 분석함으로써 패션제조과정의 높은 수준의 위해 필요한 실무적 방향성을 제시하는 것이다. 파이, 오슬, 왓유원, 신플 총 4개의 사례를 패션제조단계의 기획, 디자인 및 설계, 생산으로 구분하여 기술의 적용 여부를 살펴보았다. 패션제조를 개발된 기술이 모두 활용되지는 않았지만 플랫폼을 생산 프로세스를 원스탑 지원하여 고객의 반응에 따른 봉제 산업의 활성화와 소규모 브랜드 신진디자이너의 유입을 통한 글로벌 경쟁력 향상에도 기여하였다.
The convergence of the telecommunications can be easily achieved by combination existing network technology and multimedia technology, but in reality, as seen actual implementation IPVT, it's difficult to provide satisfactory levels service users due issues bandwidth problems streaming system. IPTV user often experience slow response times. Therefore this thesis proposes efficient system for enhanced experience. By making IP set-top-boxes share cached channel information content with each...
Whereas the closed-caption broadcasting is provided for almost whole broadcast time in Korea, sign language interpretation not. By translating realtime closed captions, it possible to provide three-dimensional (3D) translations more time. We propose a system weather forecasts and extend all kinds of TV programs. To find frequency each word, we analyzed last three years' forecast scripts, an open-domain corpus about 1.2 million words from Korean Broadcasting System. use KorLex, wordnet, build...
Advancements of MEMS technology has enabled the development smart sensor. In order to gather sensing information from sensors, they can form wireless network. Recently, various researches for sensor network are intensively suggested and developed. However, there not addressed research about efficient base station design increasing management abilities cooperating with other networks technologies. this paper, we present new embedded system which enough hardware capacities process numerous...
Due to the popularity of location-based services, amount generated spatial data in daily life has been dramatically increasing. Therefore, database outsourcing become popular for owners reduce management cost. The most important consideration is meeting privacy requirements and guarantying integrity query result. However, existing transformation techniques do not support both To solve this problem, we propose a scheme that utilizes shearing with rotation shifting. In addition, described...
Due to the advancement in cloud computing technology, research on database outsourcing has been actively done. In outsourcing, because a service provider might be untrusted or compromised, two issues of data security emerge: confidentiality and integrity. Many transformation schemes were widely studied for preserving confidentiality, but they are vulnerable leakage problem do not consider distribution when encrypting original data. Meanwhile, several query authentication proposed verity...
최근 클라우드 컴퓨팅 기술의 발전과 함께, 데이터베이스 소유자는 자신의 데이터베이스를 서버에 아웃소싱하여 낮은 비용으로 전문적인 데이터 관리를 제공받을 수 있다. 그러나 원본 아웃소싱하는 것은 데이터베이스에 있는 금융, 의료와 같은 민감 정보가 노출될 본 논문에서는 환경에서 개인 정보를 보호하는 FP-Growth 기반 연관 규칙 마이닝 알고리즘을 제안한다. 제안하는 알고리즘은 보호하기 위해 암호문 상에서 특정 연산을 지원하는 동형 암호 체계를 사용하여 데이터와 사용자의 질의를 암호화한다. 상에서의 효율적인 질의 처리를 제공하기 위해, 데이터의 노출 없이 암호문을 비교하는 비교 연산 프로토콜을 성능평가를 통해 알고리즘이 기존 기법에 비해 약 68~123%의 성능 향상을 보인다.
최근 소셜 네트워크 서비스(SNS)의 발전으로 빅데이터가 출현하였고, 이를 분석하기 위한 분산 병렬 플랫폼으로 하둡이 개발되었다. 하둡을 사용하는 기업은 개인적인 정보가 포함된 데이터를 분석하여 마케팅 등에 활용하고 있다. 이에 따라, 하둡에 저장된 센서티브(sensitive) 데이터의 유출을 방지하기 데이터 암호화 연구가 수행되었다. 하지만 기존 암호화에 대한 연구는 국외 표준인 AES 알고리즘만을 지원하는 한계점이 존재한다. 한편 정부에서는 알고리즘으로 ARIA 알고리즘을 국내 표준으로 지정하였다. 본 논문에서는 하둡 상에서 이용한 HDFS 기법을 제안하였다. 첫째, 제안하는 기법은 하둡의 컴퓨팅 환경에서 및 복호화를 수행하는 블록 분할 컴포넌트를 제공한다. 둘째, 마지막 블록이 128비트 단위의 데이터가 아닐 경우, 더미(dummy) 추가하여 가변길이 처리 마지막으로 성능 평가를 통해, 기반 기법이 텍스트 문자열 응용 과학 분석 응용에서 효과적으로 사용될 수 있음을...
We contribute scholarly discourse associated with the wage labor relationship capitalism, a particular focus on self-presentational choices members make in workplace to cope job insecurity. Specifically, we investigates impact of insecurity degree which erect facades conformity (FOC) moderation effects age and organization have close relationships others workplace. In two studies results show that is positively related workers’ creating FOC. The from both also showed moderates between...