11
Lecture Notes in Electrical Engineering Volume 120 For further volumes: http://www.springer.com/series/7818

Lecture Notes in Electrical Engineering - Springer978-94-007-2911-7/1.pdf · Prof. Kuinam J. Kim Convergence Security Kyoung-gi University Iui-dong San 94-6 Gyeonggi-do Suwon 443-760

  • Upload
    haque

  • View
    215

  • Download
    0

Embed Size (px)

Citation preview

Lecture Notes in Electrical Engineering

Volume 120

For further volumes:http://www.springer.com/series/7818

Kuinam J. Kim • Seong Jin AhnEditors

Proceedings of theInternational Conferenceon IT Convergenceand Security 2011

123

Prof. Kuinam J. KimConvergence SecurityKyoung-gi UniversityIui-dong San 94-6Gyeonggi-doSuwon 443-760Republic of South Koreae-mail: [email protected]

Prof. Seong Jin AhnComputer ScienceSungkyunkwan UniversityCheonchoen-dong, Jangan-gu 300Gyeonggi-doSuwon 110-745Republic of South Koreae-mail: [email protected]

ISSN 1876-1100 e-ISSN 1876-1119ISBN 978-94-007-2910-0 e-ISBN 978-94-007-2911-7DOI 10.1007/978-94-007-2911-7Springer Dordrecht Heidelberg London New York

Library of Congress Control Number: 2011943212

� Springer Science+Business Media B.V. 2012No part of this work may be reproduced, stored in a retrieval system, or transmitted in any form or byany means, electronic, mechanical, photocopying, microfilming, recording or otherwise, without writtenpermission from the Publisher, with the exception of any material supplied specifically for the purposeof being entered and executed on a computer system, for exclusive use by the purchaser of the work.

Printed on acid-free paper

Springer is part of Springer Science+Business Media (www.springer.com)

Forword

As we entered the twentyfirst century, the rapid growth of information technologyhas changed our lives more conveniently than we have ever speculated. Recentlyin all fields of the industry, heterogeneous technologies have converged withinformation technology resulting in a new paradigm, information convergence.In the process of information convergence, the latest issues in the structure of data,system, network, and infrastructure have become the most challenging task.The goal of this proceedings is to discover a new progressive technology byupgrading the previous technologies and to solve the technical problems that mayhave occurred in the process of converging technology in various fieldsof industry.

v

Contents

Part I Security Fundamentals

1 A Secure Service Framework for Handling SecurityCritical Data on the Public Cloud . . . . . . . . . . . . . . . . . . . . . . . . 3Gi-Hwan Cho and Seung-Ah Lee

2 The Understanding of Building Trust Model on SmartphoneApplication: Focusing on Users’ Motivation . . . . . . . . . . . . . . . . 13Hun Choi, Yoo-Jung Choi and Ki-Mun Kim

3 Towards Understanding Deterrence: InformationSecurity Managers’ Perspective . . . . . . . . . . . . . . . . . . . . . . . . . 21Sangseo Park, Anthonie B. Ruighaver, Sean B. Maynardand Atif Ahmad

Part II Industrial and Business Information Security

4 Design of Attribute-Based Access Controlin Cloud Computing Environment . . . . . . . . . . . . . . . . . . . . . . . 41ByungRae Cha, JaeHyun Seo and JongWon Kim

5 Realizing Security Requirements with Physical Properties:A Case Study on Paper Voting . . . . . . . . . . . . . . . . . . . . . . . . . . 51André van Cleeff, Trajce Dimkov, Wolter Pietersand Roel Wieringa

6 Controlling Decryption of Personal Health Recordsin the Cloud . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69Yi-Chang Hsu and Jing-Jang Hwang

vii

7 Access Control Mechanism for XML Document . . . . . . . . . . . . . 81Sun-Moon Jo and Kyung-Yong Chung

8 A Collaborative Intrusion Detection System Frameworkfor Cloud Computing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91Nguyen Doan Man and Eui-Nam Huh

9 Criteria for Comparing Cyberwarfare Capability . . . . . . . . . . . . 111Hyung-Jun Seo and Yoon-Cheol Choy

Part III Security Protocols and Applications

10 A RSSI-Based Approach for Localization of WirelessSensor Network in Indoor. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 123Hyochang Ahn, Yong-Hwan Lee, Han-Jin Cho, Sang-Burm Rheeand June-Hwan Lee

11 Semantic Search and Retrieval System for Learning Objects . . . . 129M. Arshad Awan, A. Sattar, Cheong Ghil Kim, Chung Pyo Hongand Shin Dug Kim

12 Wear Leveling for PCM Using Hot Data Identification . . . . . . . . 145Inhwan Choi and Dongkun Shin

13 Monitoring and Feedback Tools for Realtime Workloadsfor Xen Virtual Machine . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 151Byung Ki Kim, Jae Hyeok Jang, Kyung Woo Hur, Jeong Gun Leeand Young Woong Ko

14 HARD: Host-Level Address Remapping Driverfor Solid-State Disk . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 163Young-Joon Jang and Dongkun Shin

15 Ubiquitous Based Personalized HypertensionMonitoring System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 169Jonghun Kim, Sihoon Ahn, Jaeyoung Soh, Daesung Leeand Kyung-Yong Chung

16 Customized IPTV Content Recommendation ServiceModel Based on Personal Preference. . . . . . . . . . . . . . . . . . . . . . 179Si-Jung Kim, Do-Eun Cho and Bong-Han Kim

viii Contents

17 A Study on the Touch Process of Android Smartphoneon Froyo and Gingerbread . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 191Yeong-Gyu Lim, Cheong Ghil Kim and Shin Dug Kim

18 Case Study of QoS-Assured Convergence Service Overlayin Open Service Platform Environment . . . . . . . . . . . . . . . . . . . . 205Nam-Kyung Lee, Hyun-Woo Lee and Won Ryu

19 Aspect Oriented Software Development UsingRequirement Engineering . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 217Seung-Hyung Lee and Young-Jae Song

20 A Review of Accelerometer-Based PhysicalActivity Measurement. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 223Yao Meng and Hee-Cheol Kim

21 A Group Data Synchronization Protocol in MobileEnvironments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 239Ju-Geon Pak and Kee-Hyun Park

22 Efficient Transmission Method for Mobile Data SynchronizationBased on Data Characteristics . . . . . . . . . . . . . . . . . . . . . . . . . . 253Kee-Hyun Park and Ju-Geon Pak

Part IV Convergence Security

23 A Dynamic Buffer Management of Hybrid Solid State Diskfor Media Applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 267In-Pyo Cho, So-Hyang Ko, Hoon-Mo Yang, Cheong-Ghil Kimand Shin-Dug Kim

24 An Efficient Live Stream Community Management Schemefor the Mobile . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 281Chung-Pyo Hong, Muhammad Arshad Awan, Cheong-Ghil Kimand Shin-Dug Kim

25 Development of Real-Time Gesture Recognition SystemUsing Visual Interaction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 295Sung-Kwan Kang, Kyung-Yong Chung, Kee-Wook Rimand Jung-Hyun Lee

Contents ix

26 Architecture of Image Encryption Hardware UsingTwo Dimensional Cellular Automata. . . . . . . . . . . . . . . . . . . . . . 307Abdul Raouf Khan

27 Simulation of 3D Information Visualization . . . . . . . . . . . . . . . . . 317Gui-Jung Kim and Jung-Soo Han

28 Group Based Vehicular Machine to Machine CommunicationScheme in Cellular Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . 325Kyu Chul Kim, Chan Jung Park and Ronny Yongho Kim

29 Development of Real-Time Location-Based MultimediaStyle Slop Information Retrieval System . . . . . . . . . . . . . . . . . . . 331Sung-Ho Kim

30 Augmented Reality-Based Role-Playing Contentsfor Education . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 337Sukhyun Lim, Hyung-Keun Jee, Jinyoung Youn and Junsuk Lee

31 Vertex Propagation for Fast Ray-Casting of DigitalElevation Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 345Eun-Seok Lee, Jin-Hee Lee, Inwoo Jo and Byeong-Seok Shin

32 A Study of a Network Capacity Planning by AnalyzingJoint Probability of a Virtual Organization . . . . . . . . . . . . . . . . . 357Kyuho Lee and Seongjin Ahn

33 Image Registration for Sub-Pixel Using Pyramid Edge Images . . . 367Jae-Young Lee, Kee-Baek Kim, Seok-Han Lee, Tae-Eun Kimand Jong-Soo Choi

34 Real-Time Camera Tracking Using Planar Object Detection . . . . 373Ahr-Hyun Lee, Seok-Han Lee, Jae-Young Lee, Tae-Eun Kimand Jong-Soo Choi

35 Bidirectional Propagation Method for Analysis of Reflectionon Radio Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 379Reza Malekian and Abdul Hanan Abdullah

36 Robust Estimation of Heights of Moving People Usinga Single Camera . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 389Sang-Wook Park, Tae-Eun Kim and Jong-Soo Choi

x Contents

Part V IT Convergence Applications

37 Goal-Heuristic Analysis Method for an AdaptiveProcess Mining. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 409Su-Jin Baek, Jong-Won Ko, Gui-Jung Kim, Jung-Soo Hanand Young-Jae Song

38 Security Threat Modeling and Requirement AnalysisMethod Based on Goal-Scenario . . . . . . . . . . . . . . . . . . . . . . . . . 419Su-Jin Baek, Jung-Soo Han and Young-Jae Song

39 An Effective Learning Method in Art Using VirtualReality and Ontology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 425Sang-Jin Cha, Gahee Kim, Chol-Hee Jang and Geun-Sik Jo

40 Development of Pain Prescription Decision Systemsfor Nursing Intervention . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 435Yoo Hyun, Ho-Il Jung and Kyung-Yong Chung

41 Performance Sensibility Influence of RecommendedMakeup Styles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 445Kyung-Yong Chung, Kee-Wook Rim and Jung-Hyun Lee

42 Affective Social Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 455Hyun-Jun Kim

43 A Study on the Metadata Extraction and RepositoryBased on Web Service Meta Broker . . . . . . . . . . . . . . . . . . . . . . 463Sung-Ho Sim and Young-Jae Song

44 Discovering Knowledge Flow in Social Network . . . . . . . . . . . . . 469Hyun-Jun Kim

45 Model Optimization with Graph Transformationand PSO Algorithm for Model Transformation Verification. . . . . 479Jong-Won Ko, Su-Jin Beak and Young-Jae Song

46 Pattern Based Model Transformation Using Mapping Patternsfor Model Transformation Verification . . . . . . . . . . . . . . . . . . . . 489Jong-Won Ko, Jung-Soo Han and Young-Jae Song

47 Improved Performance of Emotion Extraction ThroughBanned Words . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 495Eunsoon You and Seung-Bo Park

Contents xi

48 Potential Emotion Word in Movie Dialog . . . . . . . . . . . . . . . . . . 507Seung-Bo Park, Eunsoon You and Jason J. Jung

49 Story Modeling for Green Light Decision Making . . . . . . . . . . . . 517Seung-Bo Park and Eunsoon You

50 Reducing the Gap of Provided Services and RequiresServices Based on Service Approach . . . . . . . . . . . . . . . . . . . . . . 523Hamid Mcheick, Mohamad Dbouk and Fady Dagher

51 An Extended XML Compression Technique for XMLElement Retrieval. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 539Tanakorn Wichaiwong and Chuleerat Jaruskulchai

Part VI Mobile Computing and Future Networks

52 Fuel Cell System Control Algorithm for Stable Operationof Residential Fuel Cell System . . . . . . . . . . . . . . . . . . . . . . . . . . 557Sunhoe Kim

53 Types of Fuel Cells and Applications for Electricityand Heat Co-Generation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 561Sunhoe Kim

54 Integrated Energy Management System Framework for theDistributed Smart Meters in Smart Grid Environment . . . . . . . . 567Yoon-Sik Yoo, Wan-Ki Park and II-Woo Lee

Part VII Multimedia and Information Visualization

55 Malware Detection Techniques Using ArtificialImmune System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 575Mohamed Ahmed Mohamed Ali and Mohd Aizaini Maarof

56 A Survey on P2P Botnet Detection . . . . . . . . . . . . . . . . . . . . . . . 589Kyoung-Soo Han and Eul Gyu Im

57 A Study on Instruction Substitution Analysisof Metamorphic Malware . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 595Kyoung-Soo Han, Kyoung-Yong Chung and Eul Gyu Im

xii Contents

58 An Analysis of Malware Attached in Spam . . . . . . . . . . . . . . . . . 601Eul Gyu Im and Kyoung-Soo Han

59 Detection Methods for Malware Variant Using APICall Related Graphs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 607Kyoung-Soo Han, In-Kyoung Kim and Eul Gyu Im

60 Malware Classification Methods Using API SequenceCharacteristics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 613Kyoung-Soo Han, In-Kyoung Kim and Eul Gyu Im

Part VIII Web Technology and Software Engineering

61 Practical Firewall Policy Inspection Using AnomalyDetection and Its Visualization . . . . . . . . . . . . . . . . . . . . . . . . . . 629Ui-Hyong Kim, Jung-Min Kang, Jae-Sung Lee and Hyong-Shik Kim

Contents xiii