Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Jaeheung Lee is active.

Publication


Featured researches published by Jaeheung Lee.


acm symposium on applied computing | 2008

Secure deletion for NAND flash file system

Jaeheung Lee; Junyoung Heo; Yookun Cho; Jiman Hong; Sung Y. Shin

In most file systems, if a file is deleted, only the metadata of the file is deleted or modified and the files data is still stored on the physical media. Some users require that deleted files no longer be accessible. This requirement is more important in embedded systems that employ flash memory as a storage medium. In this paper, we have designed a NAND flash file system that has a secure deletion functionality. We modified YAFFS to support secure deletion. Our method uses encryption to delete files and forces all keys of a specific file to be stored in the same block. Therefore, only one erase operation is required to securely delete a file. The proposed method securely deletes not only keys but also all of the metadata of that file. Our simulation results show that the number of block erases due to file creation and file modification is very low and the amortized number of block erases is lower than the simple encryption method. Even though we applied our method only to the YAFFS, our method can be easily applied to other NAND flash file systems.


Information Processing Letters | 2012

HORSIC: An efficient one-time signature scheme for wireless sensor networks

Jaeheung Lee; Seok-Hyun Kim; Yookun Cho; Yoojin Chung; Yongsu Park

One-time signature schemes are promising candidates for broadcast authentication, which is an essential security primitive in wireless sensor networks. This paper proposes HORSIC, an efficient one-time signature scheme for broadcast authentication in wireless sensor networks. Different from previous one-time signature schemes, HORSIC can reduce the public key size and signature size simultaneously at the cost of increased overhead in key generation and signature verification.


Simulation | 2013

An optimal distributed trigger counting algorithm for large-scale networked systems

Seok-Hyun Kim; Jaeheung Lee; Yongsu Park; Yookun Cho

Distributed trigger counting (DTC) is a problem related to the detection of w triggers with n nodes in large-scale distributed systems that have general characteristics of complex adaptive systems. The triggers come from an external source, and no a priori information about the triggers is given. DTC algorithms can be used for distributed monitoring and global snapshots. When designing an efficient DTC algorithm, the following goals should be considered: minimizing the overall message complexity and distributing the loads for detecting triggers among nodes. In this paper, we propose a randomized algorithm called TreeFill, which satisfies the message complexity of O ( n log ( w / n ) ) with high probability. The maximum number of received messages to detect w triggers in each node is O ( log ( w / n ) ) with high probability. These results satisfy the lower bounds of DTC problems. We prove the upper bounds of TreeFill. The performance of TreeFill is also evaluated by means of an agent-based simulation using NetLogo. The simulation results show that TreeFill uses about 54–69% of the messages used in a previous work called CoinRand. The maximum number of received messages in each node of TreeFill is also smaller than that in the previous work.


embedded and ubiquitous computing | 2007

Buffer cache level encryption for embedded secure operating system

Jaeheung Lee; Junyoung Heo; Jaemin Park; Yookun Cho; Jiman Hong; Minkyu Park

A cryptographic file system is the representative way of assuring confidentiality of files in operating systems. For secure embedded operating systems, the cryptographic file system could be a practical technique. In general, cryptographic file systems are implemented using a stackable file system or a device driver. These two mechanisms can provide user transparent encryption/decryption of cryptographic file systems. But these mechanisms sometimes encrypt or decrypt data redundantly or unnecessarily. Embedded systems with a low speed CPU and flash storage are more affected by the problems than general systems. We addressed the above mentioned problems by applying an encryption algorithm on buffer caches and enabling one buffer cache to have both encrypted and decrypted data together. Experimental results show that the proposed mechanisms reduce the redundant or unnecessary operations and it can improve the performance of cryptographic file systems.


Journal of Information Science and Engineering | 2010

An Efficient Secure Deletion Scheme for Flash File Systems

Jaeheung Lee; Sangho Yi; Junyoung Heo; Hyungbae Park; Sung Y. Shin; Yookun Cho


Korean Journal of Ophthalmology | 1995

Retinal circulation times in branch retinal vein occlusion

Gumin Kang; Jaeheung Lee


Journal of The Korean Ophthalmological Society | 2007

Photodynamic Therapy for Choroidal Neovascularization Secondary to Age-Related Macular Degeneration

Hyeong-Gon Yu; Se-Woong Kang; Wooho Nam; Hyoung-Jun Koh; Hyoung-Woo Kwak; Oh-Woong Kwon; Sei-Yeol Kim; In-Taek Kim; Ha-Kyoung Kim; Hyun-Woong Kim; Young-Jung Roh; Jun-Woong Moon; Kyu-Hyung Park; Suk-Ho Byeon; Su-Jeong Song; Jae-Kyoun Ahn; Boo-Sup Oum; Jaeryung Oh; Seung-Young Yu; Ill-Han Yoon; Sungchul Lee; Won-Ki Lee; Jaeheung Lee; Jeong-Hee Lee; Ji-Eun Lee; Tae-Gon Lee; Gwang-Ju Choi; Don-Il Ham; Kuhl Huh; Hum Chung


Journal of Internet Technology | 2012

A Hierarchical Clustering-Based Spatial Cloaking Algorithm for Location-Based Services

Jaeheung Lee; Seok-Hyun Kim; Yookun Cho; Yoojin Chung; Yongsu Park


Korean Journal of Ophthalmology | 1991

Cellular components of proliferative vitreoretinal membranes

Sang In Kwak; Hum Chung; Jaeheung Lee


Korean Journal of Ophthalmology | 1987

The effects of experimental ocular hypertension on the electroretinogram and ultrastructure of the retina in rabbits

Dong He Youn; Young Ill Kim; Jaeheung Lee; Bong Leen Chang; Jin Hak Lee

Collaboration


Dive into the Jaeheung Lee's collaboration.

Top Co-Authors

Avatar

Yookun Cho

Seoul National University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Junyoung Heo

Seoul National University

View shared research outputs
Top Co-Authors

Avatar

Seok-Hyun Kim

Seoul National University

View shared research outputs
Top Co-Authors

Avatar

Sangho Yi

Seoul National University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Hum Chung

Seoul National University

View shared research outputs
Top Co-Authors

Avatar

Yoojin Chung

Hankuk University of Foreign Studies

View shared research outputs
Top Co-Authors

Avatar

Sung Y. Shin

South Dakota State University

View shared research outputs
Top Co-Authors

Avatar

Bong Leen Chang

Seoul National University

View shared research outputs
Researchain Logo
Decentralizing Knowledge