Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Sang-Ho Na is active.

Publication


Featured researches published by Sang-Ho Na.


asia-pacific services computing conference | 2010

Personal Cloud Computing Security Framework

Sang-Ho Na; Jun-Young Park; Eui-Nam Huh

Cloud computing is an evolving term these days. It describes the advance of many existing IT technologies and separates application and information resources from the underlying infrastructure. Personal Cloud is the hybrid deployment model that is combined private cloud and public cloud. By and large, cloud orchestration does not exist today. Current cloud service is provided by web browser or host installed application directly. According to the ITU-T draft, we might consider cloud orchestration environment in collaboration with other cloud providers. Previous work proposed security framework that has limitation of scalability for cloud orchestration. In this paper, we analyze security threats and requirements for previous researches and propose service model and security framework which include related technology for implementation and are possible to provide resource mobility.


Proceedings of the 4th International Conference on Ubiquitous Information Technologies & Applications | 2009

Dementia Wandering Detection and Activity Recognition Algorithm Using Tri-Axial Accelerometer Sensors

Kyu-Jin Kim; Mohammad Mehedi Hassan; Sang-Ho Na; Eui-Nam Huh

Better life of human is a central goal of information technology. To make a useful technology, in sensor network area, activity recognition (AR) is becoming a key feature. Using the AR technology it is now possible to know peoples behaviors like what they do, how they do and when they do etc. In recent years, there have been frequent accidental reports of aged dementia patients, and social cost has been increasing to take care of them. AR can be utilized to take care of these patients. In this paper, we present an efficient method that converts sensors raw data to readable patterns in order to classify their current activities and then compare these patterns with previously stored patterns to detect several abnormal patterns like wandering which is one of the early symptoms of dementia and so on. In this way, we digitalize human activities and can detect wandering and so can infer dementia through activity pattern matching. Here, we present a novel algorithm about activity digitalization using acceleration sensors as well as a wandering estimation algorithm in order to overcome limitations of existing models to detect/infer dementia.


Security and Communication Networks | 2015

A broker-based cooperative security-SLA evaluation methodology for personal cloud computing

Sang-Ho Na; Eui-Nam Huh

An underlying cloud computing feature, outsourcing of resources, makes the service-level agreement (SLA) a critical factor for quality of service (QoS), and many researchers have addressed the question of how an SLA can be evaluated. Lately, security SLAs have also received much attention to guarantee security in a user perspective and provide optimal and efficient security service in the security paradigm shifting by cloud computing, such as security as a service. The quantitative measurement of security metrics is a considerably difficult problem and might be considered one of the multi-dimensional aspects of security threats. To address these issues, we provide a novel cooperative security-SLA evaluation model for the personal cloud service environment including a multi-dimensional approach to analyze security threats depending on services type as well as a cooperative model to reach a general consensus of priorities, that is, indicators depending on services type and security metrics based on cloud brokers. Copyright


international conference on future generation information technology | 2010

A Novel Scheme for PMIPv6 Based Wireless Sensor Network

Md. Motaharul Islam; Sang-Ho Na; Seung-Jin Lee; Eui-Nam Huh

IP based Wireless Sensor Network (IP-WSN) is gaining tremendous importance because of its broad range of commercial applications in health care, building & home automation, asset management, environmental monitoring, security & safety and industrial automation. A network-based mobility management protocol called Proxy Mobile IPv6 has been standardized by the IETF NETLMM working group, and is starting to pay close attention among the telecommunication and Internet communities. Since host based IP mobility protocol is not feasible for the low power and low cost sensor node, network based mobility management protocol will be well suited for IP-WSN. In this paper we propose SPMIPv6 architecture, respective message formats and analyze the signaling cost and finally evaluate its performance. The result shows that the SPMIPv6 has lower signaling cost and packet delivery cost and it can improve the handover performance of UDP and TCP than the other mobility management protocol.


international conference on innovative computing technology | 2014

A methodology of assessing security risk of cloud computing in user perspective for security-service-level agreements

Sang-Ho Na; Eui-Nam Huh

Underlying cloud computing feature, outsourcing of resources, makes the Service Level Agreement (SLA) is a critical factor for Quality of Service (QoS), and many researchers have addressed the question of how a SLA can be evaluated. Lately, security-SLAs have also received much attention with the Security-as-a-Service mode in cloud computing. The quantitative measurement of security metrics is a considerably difficult problem and might be considered the multi-dimensional aspects of security threats and user requirements. To address these issues, we provide a novel a methodology of security risk assessment for security-service-level agreements in the cloud service based on a multi-dimensional approach depending on services type, probabilities of threats, and network environments to reach a security-SLA evaluation.


international conference on computational collective intelligence | 2010

Energy efficient framework for mobility supported smart IP-WSN

Md. Motaharul Islam; Nguyen Tien Dung; Aymen Abdullah Al Saffar; Sang-Ho Na; Eui-Nam Huh

Energy efficient Internet Protocol based smart Wireless Sensor Networks (IP-WSN) are gaining tremendous importance because of its broad range of commercial applications in health care, building & home automation, environmental monitoring, security & safety and industrial automation. In all of these applications mobility of sensor node with special attention to energy constraints is an indispensible part. Host based mobility management protocol is inherently unsuitable for energy inefficient IP-WSN. So network-based mobility management protocol can be an alternative to the mobility supported IP-WSN. In this regard, Proxy Mobile IPv6 has been standardized by the IETF NETLMM working group, and is starting to pay close attention among the telecommunication and Internet communities. In this paper we propose energy efficient Sensor Network based PMIPv6 protocol called Sensor Proxy Mobile IPv6 (SPMIPv6). We present SPMIPv6 architecture, respective message formats and analyze the energy dissipation and finally evaluate its performance.


Journal of Internet Technology | 2012

Wandering Detection and Activity Recognition for Dementia Patients Using Wireless Sensor Networks

Sang-Ho Na; Kyu-Jin Kim; Eui-Nam Huh

A central goal of information technology is to improve human life. In terms of useful technology in the area of sensor networks, activity recognition (AR) has become a key feature. Using AR technology, it is now possible to understand human behavior, including what, how and when people perform an activity. In recent years, there has been an increase in accident reports involving aged dementia patients, resulting in higher social costs to treat and care for dementia patients. AR technology can be utilized to take monitor the activity of these patients. In this paper, we present an efficient method that converts raw sensor data to readable patterns in order to classify an individuals current activities and then compare these patterns with previously stored patterns to detect any abnormal patterns, such as wandering, which is one of the early symptoms of dementia. We used this method to digitize human activities and applied the Levy-walk model to detect wandering patterns. We developed an inference model for an early dementia symptom based on digitized human activity patterns. In this article, we also illustrate the implementation of a sensor system configured with tri-axis acceleration and an ultrasonic sensor as well as a wandering estimation algorithm in order to overcome limitations of existing models to detect/infer dementia.


international conference on ubiquitous information management and communication | 2017

An optimal investment scheme based on ATM considering cloud security environment

Jun-Young Park; Sang-Ho Na; Eui-Nam Huh

There is an increasing use of cloud computing in information technology (IT) with the widening scope of cloud computing. However, some service owners are reluctant to adopt cloud computing because the associated security technologies have not yet matured. Cloud service providers need to invest in security to improve the use of cloud computing. Additionally, research on the security investment in cloud computing is still in its early stages; due to the lack of related work, most companies or organizations should not provide an unlimited budget for security investment. Therefore, we devised an optimal investment scheme for constructing cloud security services that considers budget and the features of cloud computing services. This scheme includes an evaluation of security vulnerabilities concerning potential security attacks, and we performed an evaluation of a security investment strategy based on attack tree map (ATM) that analyze cloud security threat and vulnerabilities. Finally, we demonstrated the proposed scheme by examining two case studies using different security investment strategies.


high performance computing and communications | 2016

A Study on Cloud Forensics and Challenges in SaaS Application Environment

Jun-Hak Park; Sang-Ho Na; Jun-Young Park; Eui-Nam Huh; Chulwoo Lee; Hyoung-Chun Kim

With virtualization technique, cloud computing is developed rapidly. However, aspects of the collecting of digital proofs for forensics in cloud computing environment, certain guideline is not yet. Therefore, cloud forensic researches in progress for reactivating security incidents in cloud computing. In this paper, we analyze forensic issue, challenges, already proposed forensic model in previous researches for adopting cloud forensic. And we suggest a novel model and approach for cloud forensic in SaaS and discuss needs of Service Level Agreements (SLA) and possibilities of Forensic-as-a-Service.


international conference on future generation communication and networking | 2011

Studies on the Key Technologies of Multi-Platform Mobile Thin Client System: Cross-Layer Isolation and Session Allocation

Biao Song; Wei Tang; Tien Dung Nguyen; Sang-Ho Na; Jun-Hyung Lee; Eui-Nam Huh

Virtualization was considered as the best way to isolate independent thin client sessions on a physical machine. However, the hypervisor, guest OS and guest remote server not only consumes a considerable amount of memory but also degrades the processing power of CPU. In this paper, we propose a novel cross-layer isolation technology to support independent user sessions with only one OS and one remote server. Furthermore, a session allocation/migration algorithm is introduced in this paper. The algorithm solves the multi-user to multi-machine allocation/migration problem within thin client environment.

Collaboration


Dive into the Sang-Ho Na's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Wei Tang

Kyung Hee University

View shared research outputs
Researchain Logo
Decentralizing Knowledge