Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where You-Jin Song is active.

Publication


Featured researches published by You-Jin Song.


Sensors | 2018

A Study on the Design of Fog Computing Architecture Using Sensor Networks

Hyun-Jong Cha; Ho-Kyung Yang; You-Jin Song

It is expected that the number of devices connecting to the Internet-of-Things (IoT) will increase geometrically in the future, with improvement of their functions. Such devices may create a huge amount of data to be processed in a limited time. Under the IoT environment, data management should play the role of an intermediate level between objects and devices that generate data and applications that access to the data for analysis and the provision of services. IoT interactively connects all communication devices and allows global access to the data generated by a device. Fog computing manages data and computation at the edge of the network near an end user and provides new types of applications and services, with low latency, high frequency bandwidth and geographical distribution. In this paper, we propose a fog computing architecture for efficiently and reliably delivering IoT data to the corresponding IoT applications while ensuring time sensitivity. Based on fog computing, the proposed architecture provides efficient power management in IoT device communication between sensors and secure management of data to be decrypted based on user attributes. The functional effectiveness and the safe data management of the method proposed are compared through experiments.


Multimedia Tools and Applications | 2018

Characterization of privacy based on context sensitivity and user preference for multimedia context-aware on IoT

You-Jin Song; Jin-Mook Kim

In an IoT environment, building a Context-Aware system is mandatory and can provide a suitable and timely (just-in-time) service suited to the context of the user. In addition, the IoT environment is made on the assumption that maximum collection of the user’s context is done. However, if the context of the user is collected beyond necessary, or when a context the user did not agree with was collected, a problem arises regarding a violation on the user’s privacy. Asking for the user’s approval on the collection of all context brings unnecessarily many steps and inconvenience to the users. Therefore, there is a need for user preferences to be dynamically controlled by the system. An IoT system must adjust its preferences so that it provides the maximum context to the service provider and minimizes the intrusion of the user’s privacy. However, the current Context-Aware IoT does not consider these problems. Therefore, there is a need for a Dynamic Preference structure that protects the privacy of the user. This paper uses quantitative methods in formalizing the Privacy Invasion Value (PIV) of the users and discusses the methods in minimizing the PIV values through Dynamic Preference. The method used in this paper can solve privacy infringement issues in the Context-Aware IoT environment.


Multimedia Tools and Applications | 2017

A Design of System using homomorphic encryption for multimedia data management

Hyun-Jong Cha; Ho-Kyung Yang; Jin-Mook Kim; You-Jin Song

With the introduction of the concept of information warfare, the way military operations are done is changing quickly. Now, much more than it was in past, quick acquisition of information and effective decision making are crucial. Especially, these days the ratio of multimedia data is on the rise. A data management system has been put in place since the 1980s which encrypts information before storing it, and allowing only authorized users to gain access to it according to the proper procedures.In this paper, a secure and effective multimedia data management system that uses homomorphic operations is designed and implemented. By using homomorphic operations, it is able to quickly process stored ciphertext without a decryption process, allowing fast decision making after information gathering in a NCW environment. In order to assess the performance of the effective multimedia data management system implemented in this paper, it was compared to an ordinary system in which ciphertext has to be first decrypted before it can be modified. The secure and effective multimedia data management system for information warfare implemented in this study is highly versatile because any public encryption algorithm can be used, and has short response times thanks to the homomorphic algorithm which allows processing to be done directly on the ciphertext.


Advanced Science Letters | 2018

A Study on Access Structure Management of CP-ABTD Based Blockchain for Medical Information Monitoring System

Hyun-Jong Cha; Ho-Kyung Yang; You-Jin Song


Advanced Science Letters | 2018

A Study on Configuration of NDN Based Identifier Using Block Chain in Fog Computing Environment

Ho-Kyung Yang; Hyun-Jong Cha; You-Jin Song


Advanced Science Letters | 2018

Sensor Data Processing for Vehicular Cyber Physical System with Context Awareness

You-Jin Song


Advanced Science Letters | 2017

Anonymity Management Based on Segmentation and Restoration Scheme for Content Identifier in Future Internet Environment

Ho-Kyung Yang; Hyun-Jong Cha; Jin-Mook Kim; You-Jin Song


Advanced Science Letters | 2017

A Study on Data Processing for Application of Vehicular CPS in Fog Computing Environment

Hyun-Jong Cha; Ho-Kyung Yang; Jin-Mook Kim; You-Jin Song


information technology and computer science | 2016

Delegation Scheme based on Proxy Re-encryption in Cloud Environment

You-Jin Song


information technology and computer science | 2016

A Secure Content Delivery Service in CPS Environments

Jin-Mook Kim; Jeong-Kyung Moon; You-Jin Song

Collaboration


Dive into the You-Jin Song's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Jeong-Kyung Moon

Kongju National University

View shared research outputs
Researchain Logo
Decentralizing Knowledge