Byoung-Soo Koh

Daejeon University, Taiden, Daejeon, South Korea

Are you Byoung-Soo Koh?

Claim your profile

Publications (13)1.28 Total impact

  • [Show abstract] [Hide abstract]
    ABSTRACT: Information security management has become an important research issue in distributed systems, and the detection of failures is a fundamental issue for fault tolerance in large distributed systems. Recently, many people have come to realize that failure detection ought to be provided as some form of generic service, similar to IP address lookup. However, this has not been successful so far; one of the reasons being the fact that classical failure detectors were not designed to satisfy several application requirements simultaneously. More specifically, traditional implementations of failure detectors are often tuned for running over local networks and fail to address some important problems found in wide-area distributed systems with a large number of monitored components, such as Grid systems. In this paper, we study the security management scheme for failure detector distributed systems. We first identify some of the most important QoS problems raised in the context of large wide-area distributed systems. Then we present a novel failure detector scheme combined with self-tuning control theory that can help in solving or optimizing some of these problems. Furthermore, this paper discusses the design and analysis of implementing a scalable failure detection service for such large wide-area distributed systems considering dynamically adjusting the heartbeat streams, so that it satisfies the bottleneck router requirements. The basic z-transformation stability test is used to achieve the stability criterion, which ensures the bounded rate allocation without steady state oscillation. We further show how the online failure detector control algorithm can be used to design a controller, analyze the theoretical aspects of the proposed algorithm and verify its agreement with the simulations in the LAN and WAN case. Simulation results show the efficiency of our scheme in terms of high utilization of the bottleneck link, fast response and good stability of the bottleneck router buffer occupancy as well as of the controlled sending rates. In conclusion, the new security management failure detector algorithm provides a better QoS than an algorithm that is proposed by Stelling etal. (Proceedings of 7th IEEE symposium on high performance distributed computing, pp. 268–278, 1998), Foster etal. (Int J Supercomput Appl, 2001). KeywordsFailure detection–Distributed systems–Quality of service–Heartbeat–Self-tuning control theory
    Journal of Intelligent Manufacturing 04/2011; 22(2):333-342. · 1.28 Impact Factor
  • Eun-Gyeom Jang, Byoung-Soo Koh, Yong-Rak Choi
    [Show abstract] [Hide abstract]
    ABSTRACT: Digital content services in pervasive computing environment provide a vast range of information and rapidly. However, in this environment where various information flow the copyright infringement problems such as modification and fraudulent use of digital content without permission of copyright holder are increased. In this paper, we proposed an original digital content authentication method to protect the intellectual property from such infringements. The proposed mechanism sets the scope of content usage and limits the access privilege to digital content by copyright holder. The modification of digital content and its usage are act of copyright infringement. That is, modification of color and resolution out of the limited scope and partial modification or extraction are part of copyright infringement. Consequently, we proposed a mechanism which proves the fact of trespass by extracting and comparing the similarity of the original and the target content.
    Information Security and Assurance, 2008. ISA 2008. International Conference on; 05/2008
  • [Show abstract] [Hide abstract]
    ABSTRACT: The digital content services in home network provide a various kind of services such as cultural life and offer convenience, accessibility and effectiveness to users. But, digital contents are easy to be duplicated illegally and used fraudulent by malicious party which break down the development of digital content services in smart home environment. To protect digital contents from those problems, Watermark or DRM (Digital Rights Management) technique has been researched. The existing technique is only for a specific format, which do not have a universal feature. In addition, there is a technique using encryption algorithms to protect digital contents but the problem is when lots of digital contents are used, encrypting and decrypting times are extremely long to be processed.
    Future Generation Communication and Networking Symposia, International Conference on. 01/2008; 3:175-180.
  • [Show abstract] [Hide abstract]
    ABSTRACT: In Ubiquitous Computing Environment (UCE), volatile information such as register, cache memory, and network information are hard to make certain of a real-time collection because such volatile information are easily modified or disappeared. Thus, a collection of volatile information is one of important step for computer forensics system on ubiquitous computing. In this paper, we propose a volatile information collection module, which collects variable volatile information of server system based on memory mapping in real-time. In addition, the proposed module ensure the integrity of collected information, thus, the collected information have legal force.
    Natural Computation, 2007. ICNC 2007. Third International Conference on; 09/2007
  • [Show abstract] [Hide abstract]
    ABSTRACT: In pervasive environment, for the mal functions in appliances and system errors, the unaccepted intrusion should be occurred. The evidence collecting technology uses the system which was damaged by intruders and that system is used as evidence materials in the court of justice. However the collected evidences are easily modified and damaged in the gathering evidence process, the evidence analysis process and in the court. That’s why we have to prove the evidence’s integrity to be valuably used in the court. In this paper, we propose a mechanism for securing the reliability and the integrity of digital evidence that can properly support the Computer Forensics. The proposed mechanism shares and manages the digital evidence through mutual authenticating the damaged system, evidence collecting system, evidence managing system and the court(TTP: Trusted Third Party) and provides a secure access control model to establish the secure evidence management policy which assures that the collected evidence has the corresponded legal effect.
    Advances in Web and Network Technologies, and Information Management, APWeb/WAIM 2007 International Workshops: DBMAN 2007, WebETrends 2007, PAIS 2007 and ASWAN 2007, Huang Shan, China, June 16-18, 2007, Proceedings; 01/2007
  • [Show abstract] [Hide abstract]
    ABSTRACT: In this paper, we propose a uiH-PMAC (ubi-intelligent Home – Privilege Management Access Control) model which is suitable to access control of ubiquitous intelligent environment. The model considers the temporary limit conditions as access control of home device or user location information considering the characteristics of members who could limit the use of resource. In addition, the model provides authentication policy which authenticates not only devices but also domains and access control policy which considers inheritance of role. Finally, the model can be applied various and scalable access control policies which are suitable to the characteristics of intelligent digital environment as considering the user location information as a temporary limit condition.
    10/2006: pages 777-784;
  • [Show abstract] [Hide abstract]
    ABSTRACT: In intelligent ubiquitous home environments, access control should be able to accommodate dynamic mechanism that was considered various access control components including temporal and spatial information. In this paper, we propose dynamic role based access control model can support smart and secure services suitable for intelligent ubiquitous home. The proposed model is appropriate for user-oriented service based on ubiquitous computing. In the proposed model, a permission is assigned by context information. In addition, this paper observes detailed access control procedures for service in intelligent ubiquitous home, providing use case scenarios and prototype design.
    08/2006: pages 893-901;
  • Jong Hyuk Park, Sangjin Lee, Byoung-Soo Koh
    [Show abstract] [Hide abstract]
    ABSTRACT: In this paper, we design and implement the Flexible DRM (Digital Right Management) system based on using subject-mode for flexible multimedia service considering ubiquitous environment. The proposed system is complementary to inflexibility of the users which is a weakness of the traditional contents distribution system. Specifically, because a single using-subject can be flexibly changed under the ubiquitous environment, we attempted to seek the way to support the interactive transaction where both creation and consumption are available. In addition, It supports the super-distribution of the contents under the various environments. Furthermore, we design and apply the license format which can be flexibly used in multimedia devices under the wire or wireless environment.
    05/2006: pages 236-244;
  • Advances in Hybrid Information Technology, First International Conference, ICHIT 2006, Jeju Island, Korea, November 9-11, 2006, Revised Selected Papers; 01/2006
  • Ubiquitous Intelligence and Computing, Third International Conference, UIC 2006, Wuhan, China, September 3-6, 2006, Proceedings; 01/2006
  • [Show abstract] [Hide abstract]
    ABSTRACT: In this paper, we design and implement the intelligent IPMPS (Intellectual Property Management and Protection System) in Ubi-Home. The proposed system supports flexible distribution platform for secure multimedia Service. In addition, we design user location recognition algorithm in order to provide intelligent services, and implement sensor network module using the algorithm to collaborate among devices in Ubi-Home. Furthermore, the proposed system provides multimedia service to authorized users who are using PC, STB, PDA, and Portable Device, etc. in Ubi-Home. Finally, Finally, we adopt the concept of domain authentication to improve the efficiency of license management for all device in Ubi-Home.
    Computational Science and Its Applications - ICCSA 2006, International Conference, Glasgow, UK, May 8-11, 2006, Proceedings, Part IV; 01/2006
  • [Show abstract] [Hide abstract]
    ABSTRACT: The traditional contents distribution architecture was fixed pattern, as the distribution subjects – Contents Provider (CP), Contents Distributor (CD), and Contents Consumer (CC) – create, distribute, and consume the digital contents, while in Convergence Home-network Environment (CHE) it would be necessary for each subject to have the distribution system that can be flexibly changed. In this paper, we designed and implemented the Interactive Multimedia Service- Intellectual Property Management and Protection (IMS-IPMPS) by supplementing and expanding MPEG-21 DID, IPMP, REL, and the mechanism of OMA-DRM. In the proposed system, it is possible for CP to complete the appropriate authentication in CHE, generate the contents, and then register the packaged contents in safety for its distribution. In addition, it is the IMS-IPMP system where one can simultaneously consume the contents that the users from the different home network environments have generated and registered.
    11/2005: pages 465-466;
  • Jong Hyuk Park, Sangjin Lee, Yeog Kim, Byoung-Soo Koh
    Digital Libraries: Implementing Strategies and Sharing Experiences, 8th International Conference on Asian Digital Libraries, ICADL 2005, Bangkok, Thailand, December 12-15, 2005, Proceedings; 01/2005