This page has only limited features, please log in for full access.

Unclaimed
You-Jin Song
Department of Management, Dongguk University, Gyeongju-si 38066, Korea.

Basic Info

Basic Info is private.

Honors and Awards

The user has no records in this section


Career Timeline

The user has no records in this section.


Short Biography

The user biography is not available.
Following
Followers
Co Authors
The list of users this user is following is empty.
Following: 0 users

Feed

Journal article
Published: 26 October 2018 in Sensors
Reads 0
Downloads 0

It is expected that the number of devices connecting to the Internet-of-Things (IoT) will increase geometrically in the future, with improvement of their functions. Such devices may create a huge amount of data to be processed in a limited time. Under the IoT environment, data management should play the role of an intermediate level between objects and devices that generate data and applications that access to the data for analysis and the provision of services. IoT interactively connects all communication devices and allows global access to the data generated by a device. Fog computing manages data and computation at the edge of the network near an end user and provides new types of applications and services, with low latency, high frequency bandwidth and geographical distribution. In this paper, we propose a fog computing architecture for efficiently and reliably delivering IoT data to the corresponding IoT applications while ensuring time sensitivity. Based on fog computing, the proposed architecture provides efficient power management in IoT device communication between sensors and secure management of data to be decrypted based on user attributes. The functional effectiveness and the safe data management of the method proposed are compared through experiments.

ACS Style

Hyun-Jong Cha; Ho-Kyung Yang; You-Jin Song. A Study on the Design of Fog Computing Architecture Using Sensor Networks. Sensors 2018, 18, 3633 .

AMA Style

Hyun-Jong Cha, Ho-Kyung Yang, You-Jin Song. A Study on the Design of Fog Computing Architecture Using Sensor Networks. Sensors. 2018; 18 (11):3633.

Chicago/Turabian Style

Hyun-Jong Cha; Ho-Kyung Yang; You-Jin Song. 2018. "A Study on the Design of Fog Computing Architecture Using Sensor Networks." Sensors 18, no. 11: 3633.

Journal article
Published: 01 March 2018 in Advanced Science Letters
Reads 0
Downloads 0

Combining rapid development of information and communication technology (ICT) with real life and things social infrastructure of things, the dangers of existing cyberspace, such as the hacking of home appliances by hacking of personal information and malware infection. As these devices increase, an enormous amount of data bound and personal information etc. are bound by external environmental information and so forth. IoT device size is increasing more and more problems such as hacking by a centralized management system and a duo such as DDoS attack are emerging. The technology to distribute and manage recent data provides the reliability without the third party who has the block chain certified. Since it manages data by distributing it, it has the effect of reducing intermediate fee and construction cost, data consistency is secured and it has high security. In this paper, we discuss a method to securely manage distributed identifiers of contents. Confidential identifiers can be safely stored and managed via these identifier division management systems.

ACS Style

Ho-Kyung Yang; Hyun-Jong Cha; You-Jin Song. A Study on Configuration of NDN Based Identifier Using Block Chain in Fog Computing Environment. Advanced Science Letters 2018, 24, 2020 -2025.

AMA Style

Ho-Kyung Yang, Hyun-Jong Cha, You-Jin Song. A Study on Configuration of NDN Based Identifier Using Block Chain in Fog Computing Environment. Advanced Science Letters. 2018; 24 (3):2020-2025.

Chicago/Turabian Style

Ho-Kyung Yang; Hyun-Jong Cha; You-Jin Song. 2018. "A Study on Configuration of NDN Based Identifier Using Block Chain in Fog Computing Environment." Advanced Science Letters 24, no. 3: 2020-2025.

Journal article
Published: 01 March 2018 in Advanced Science Letters
Reads 0
Downloads 0

With the advancement of ICT technology, the use of systems capable of organizing, sorting and utilizing numerous information generated in seconds was essential. This is not only information providers but also system stability, mobile-based technology, cloud system, etc. are presented for smooth use by consumers. However, the medical information handled by the service can violate the privacy of individuals. Therefore, the introduction of security technology such as encryption is necessary. Personal information must be made available only to users with access rights. For that, delegation of access rights is required from the data constructor. Also, when the authority is lost, it must be able to deprive the access right. These problems can be improved to attribute based encryption. In this paper, user attribute based encryption which can delegate and withdraw access right to be used in medical information monitoring system is applied. In order to manage this efficiently, it is based on the network of Fog Computing environment. Authorization authentication system uses block chain method.

ACS Style

Hyun-Jong Cha; Ho-Kyung Yang; You-Jin Song. A Study on Access Structure Management of CP-ABTD Based Blockchain for Medical Information Monitoring System. Advanced Science Letters 2018, 24, 2026 -2030.

AMA Style

Hyun-Jong Cha, Ho-Kyung Yang, You-Jin Song. A Study on Access Structure Management of CP-ABTD Based Blockchain for Medical Information Monitoring System. Advanced Science Letters. 2018; 24 (3):2026-2030.

Chicago/Turabian Style

Hyun-Jong Cha; Ho-Kyung Yang; You-Jin Song. 2018. "A Study on Access Structure Management of CP-ABTD Based Blockchain for Medical Information Monitoring System." Advanced Science Letters 24, no. 3: 2026-2030.

Journal article
Published: 01 October 2017 in Advanced Science Letters
Reads 0
Downloads 0

Development of IoT (Internet of Things) under 5G environment makes collecting information of the individual’s context easier and allows to provide users with a customized service based on the contextual information collected. IoT infrastructure, platform has been combined cloudenvironment for relevant service. With such combination, our entire life is under influence of the new combined environment. However, a current contextaware system is in a basic level that demands a certain behavior through user’s recognition. Particularly, multiusers do not act witha certain purpose. They should be provided with a customized service that is created by contextual information collected according to user’s behaviors. This paper uses an ECG sensor to minimize direct intervention of a user and create an individual service for multi-users. In addition,this paper proposes a sensing data processing mechanism for vehicular CPS that has context-aware function for multi-users in order to escape from the same service for all existing users. Moreover, this paper improves safety of real-time sensing information and user’s security throughthe step of delegation of actuating that is analyzed with relevant sensing information. It is expected that the finding of this paper allows safe processing of IoT service suitable for context in 5G environment, which is expected to be commercialized in the near future.

ACS Style

Hyun-Jong Cha; Ho-Kyung Yang; Jin-Mook Kim; You-Jin Song. A Study on Data Processing for Application of Vehicular CPS in Fog Computing Environment. Advanced Science Letters 2017, 23, 10379 -10383.

AMA Style

Hyun-Jong Cha, Ho-Kyung Yang, Jin-Mook Kim, You-Jin Song. A Study on Data Processing for Application of Vehicular CPS in Fog Computing Environment. Advanced Science Letters. 2017; 23 (10):10379-10383.

Chicago/Turabian Style

Hyun-Jong Cha; Ho-Kyung Yang; Jin-Mook Kim; You-Jin Song. 2017. "A Study on Data Processing for Application of Vehicular CPS in Fog Computing Environment." Advanced Science Letters 23, no. 10: 10379-10383.

Journal article
Published: 01 October 2017 in Advanced Science Letters
Reads 0
Downloads 0

Recently, the technology that allows to remotely receive medical service through a smart medical information service has been presented. However, medical information dealt with in such service can infringe people’s privacy. Therefore, it is necessary to introduce information security technology including encryption. Only an authorized person who can access to service user’s data should be allowed to see the information. To achieve the goal, it is essential to delegate access privilege or even remove the access privilege under a certain circumstance. Such issues can be improved with attribute based encryption. This paper applies user’s attribute based encryption, which allows to delegate or revoke an access right to a medical information monitoring system. In addition, it creates a scenario of a medical information monitoring system and propose a relevant system structure using user’s attribute based encryption.

ACS Style

You-Jin Song; Hyun-Jong Cha; Ho-Kyung Yang; Jin-Mook Kim. A Medical Information Monitoring System Based CP-ABTD for Safe Medical Information Sharing in Fog Computing Environment. Advanced Science Letters 2017, 23, 10370 -10374.

AMA Style

You-Jin Song, Hyun-Jong Cha, Ho-Kyung Yang, Jin-Mook Kim. A Medical Information Monitoring System Based CP-ABTD for Safe Medical Information Sharing in Fog Computing Environment. Advanced Science Letters. 2017; 23 (10):10370-10374.

Chicago/Turabian Style

You-Jin Song; Hyun-Jong Cha; Ho-Kyung Yang; Jin-Mook Kim. 2017. "A Medical Information Monitoring System Based CP-ABTD for Safe Medical Information Sharing in Fog Computing Environment." Advanced Science Letters 23, no. 10: 10370-10374.

Journal article
Published: 01 October 2017 in Advanced Science Letters
Reads 0
Downloads 0

The potential of future Internet environment is expanding due to development of information and communication technology. It is expected that the number of objects connecting to the Internet will increase by billions, even excluding PCs, tablets and smart phones. As the number of devicesconnecting increases a numerous amount of data including personal information combining with external environmental information is exchanging. Therefore, it is necessary to share collected information at a minimum level by a legitimate user for the original purpose and control access rightto data if necessary. While existing network infrastructure uses a path to exchange data between a data center and a terminal, future infrastructure actively makes a decision about the whole process from data generated by various objects to utilization and independently plays major roles includinga service supporting function of a data center. This paper discusses a safe sharing management scheme of content identifiers. This paper proposes a system for safe management of identifiers using secret sharing and AES Cryptography algorithm as a separation and restoration scheme for identifiers.Sensitive identifiers can be safely saved and managed through such identifier separation system. In addition, they are safe in moving by segmenting and restoring an identifier through mobile device interfaces such as a smart phone.

ACS Style

Ho-Kyung Yang; Hyun-Jong Cha; Jin-Mook Kim; You-Jin Song. Anonymity Management Based on Segmentation and Restoration Scheme for Content Identifier in Future Internet Environment. Advanced Science Letters 2017, 23, 10375 -10378.

AMA Style

Ho-Kyung Yang, Hyun-Jong Cha, Jin-Mook Kim, You-Jin Song. Anonymity Management Based on Segmentation and Restoration Scheme for Content Identifier in Future Internet Environment. Advanced Science Letters. 2017; 23 (10):10375-10378.

Chicago/Turabian Style

Ho-Kyung Yang; Hyun-Jong Cha; Jin-Mook Kim; You-Jin Song. 2017. "Anonymity Management Based on Segmentation and Restoration Scheme for Content Identifier in Future Internet Environment." Advanced Science Letters 23, no. 10: 10375-10378.

Journal article
Published: 01 October 2017 in Advanced Science Letters
Reads 0
Downloads 0

As the Smart phone has propagated, the mobile application market is expanded. Recently many kinds of researches and new methods are introduced to use smart devices in many field. In 5G environment, security is a necessary enabler for continuity of the everywhere and consumers’daily lives are easily exposed to producers or companies. For this, it’s needed that cooperation and sharing information between consumers and companies. Recent applications use the sensor of smart phone and surroundings. As a result, the development of M2M platform between smart phoneand surrounding sensors is expected in a 5G system environment. This paper is designed for the Life-logging Application with M2M platform, which is applied by 5G system. Especially the sensing values of consumers’ mobile device are combined with the life device in formations like CCTV,desks and chairs. The combined information will have weight and priority through the Meta-tag between consumers and companies. Also this can be used other various practical services for living.

ACS Style

Jang-Mook Kang; You-Jin Song. A Study on Personalization Application to Use Meta-Index Extracted from Life Logging Service with M2M. Advanced Science Letters 2017, 23, 9501 -9505.

AMA Style

Jang-Mook Kang, You-Jin Song. A Study on Personalization Application to Use Meta-Index Extracted from Life Logging Service with M2M. Advanced Science Letters. 2017; 23 (10):9501-9505.

Chicago/Turabian Style

Jang-Mook Kang; You-Jin Song. 2017. "A Study on Personalization Application to Use Meta-Index Extracted from Life Logging Service with M2M." Advanced Science Letters 23, no. 10: 9501-9505.

Journal article
Published: 01 November 2016 in Advanced Science Letters
Reads 0
Downloads 0

In the future urban traffic system, there will be great demands for technologies that ensure safety on the road, specifically those that monitor illegal activities, detect risks associated with the movement of vehicles, and prevent collisions. As technologies of sensor networks and the IoT (Internet of Things) made strides, systems that monitor traffic violations have become automated, which led to increase in the amounts of data generated, and as such overheads may occur. Also, given encryption is used to prevent leakage of information on vehicles, in order to track a specific vehicle, data on the vehicle must be provided to the secondary user. To solve this problem, this paper proposes a model based on Attribute-Based Proxy Re-Encryption (ABPRE). The proposed system collects data from a place (edge) close to the sensor (device), and performs pre-processing or real-time processing on the data, or processes the data using a smart gateway that processes only sensor data. Such processing is done by the proxy of ABPRE, and the system is designed so that among the secondary users, only those with the specific privileges can decrypt the ciphertext.

ACS Style

Hyun-Jong Cha; Ho-Kyung Yang; You-Jin Song. Tracking of Specific Vehicle Using Smart Transportation Networks in the Internet of Things Environment. Advanced Science Letters 2016, 22, 3365 -3368.

AMA Style

Hyun-Jong Cha, Ho-Kyung Yang, You-Jin Song. Tracking of Specific Vehicle Using Smart Transportation Networks in the Internet of Things Environment. Advanced Science Letters. 2016; 22 (11):3365-3368.

Chicago/Turabian Style

Hyun-Jong Cha; Ho-Kyung Yang; You-Jin Song. 2016. "Tracking of Specific Vehicle Using Smart Transportation Networks in the Internet of Things Environment." Advanced Science Letters 22, no. 11: 3365-3368.

Article
Published: 11 August 2016 in Multimedia Tools and Applications
Reads 0
Downloads 0

With the introduction of the concept of information warfare, the way military operations are done is changing quickly. Now, much more than it was in past, quick acquisition of information and effective decision making are crucial. Especially, these days the ratio of multimedia data is on the rise. A data management system has been put in place since the 1980s which encrypts information before storing it, and allowing only authorized users to gain access to it according to the proper procedures. In this paper, a secure and effective multimedia data management system that uses homomorphic operations is designed and implemented. By using homomorphic operations, it is able to quickly process stored ciphertext without a decryption process, allowing fast decision making after information gathering in a NCW environment. In order to assess the performance of the effective multimedia data management system implemented in this paper, it was compared to an ordinary system in which ciphertext has to be first decrypted before it can be modified. The secure and effective multimedia data management system for information warfare implemented in this study is highly versatile because any public encryption algorithm can be used, and has short response times thanks to the homomorphic algorithm which allows processing to be done directly on the ciphertext.

ACS Style

Hyun-Jong Cha; Ho-Kyung Yang; Jin-Mook Kim; You-Jin Song. A Design of System using homomorphic encryption for multimedia data management. Multimedia Tools and Applications 2016, 76, 19897 -19912.

AMA Style

Hyun-Jong Cha, Ho-Kyung Yang, Jin-Mook Kim, You-Jin Song. A Design of System using homomorphic encryption for multimedia data management. Multimedia Tools and Applications. 2016; 76 (19):19897-19912.

Chicago/Turabian Style

Hyun-Jong Cha; Ho-Kyung Yang; Jin-Mook Kim; You-Jin Song. 2016. "A Design of System using homomorphic encryption for multimedia data management." Multimedia Tools and Applications 76, no. 19: 19897-19912.

Proceedings article
Published: 18 April 2015 in Networking and Communication 2015
Reads 0
Downloads 0
ACS Style

Jeong-Min Do; You-Jin Song. Vestibular Rehabilitation Support System Based on Multiple Depth Sensor. Networking and Communication 2015 2015, 75 -78.

AMA Style

Jeong-Min Do, You-Jin Song. Vestibular Rehabilitation Support System Based on Multiple Depth Sensor. Networking and Communication 2015. 2015; ():75-78.

Chicago/Turabian Style

Jeong-Min Do; You-Jin Song. 2015. "Vestibular Rehabilitation Support System Based on Multiple Depth Sensor." Networking and Communication 2015 , no. : 75-78.

Journal article
Published: 28 February 2014 in The Journal of the Institute of Webcasting, Internet and Telecommunication
Reads 0
Downloads 0
ACS Style

Jang-Mook Kang; You-Jin Song. A Study on Structural Holes of Privacy Protection for Life Logging Service as analyzing/processing of Big-Data. The Journal of the Institute of Webcasting, Internet and Telecommunication 2014, 14, 189 -193.

AMA Style

Jang-Mook Kang, You-Jin Song. A Study on Structural Holes of Privacy Protection for Life Logging Service as analyzing/processing of Big-Data. The Journal of the Institute of Webcasting, Internet and Telecommunication. 2014; 14 (1):189-193.

Chicago/Turabian Style

Jang-Mook Kang; You-Jin Song. 2014. "A Study on Structural Holes of Privacy Protection for Life Logging Service as analyzing/processing of Big-Data." The Journal of the Institute of Webcasting, Internet and Telecommunication 14, no. 1: 189-193.

Journal article
Published: 28 February 2013 in The Journal of the Institute of Webcasting, Internet and Telecommunication
Reads 0
Downloads 0
ACS Style

Jang-Mook Kang; You-Jin Song; Mi-Kyung Choi. Social Phenomena and Challenges for Internet Fandom Culture (Be Focussed on the Method of Link Value and Scalability for Korea Wave Fandom). The Journal of the Institute of Webcasting, Internet and Telecommunication 2013, 13, 235 -241.

AMA Style

Jang-Mook Kang, You-Jin Song, Mi-Kyung Choi. Social Phenomena and Challenges for Internet Fandom Culture (Be Focussed on the Method of Link Value and Scalability for Korea Wave Fandom). The Journal of the Institute of Webcasting, Internet and Telecommunication. 2013; 13 (1):235-241.

Chicago/Turabian Style

Jang-Mook Kang; You-Jin Song; Mi-Kyung Choi. 2013. "Social Phenomena and Challenges for Internet Fandom Culture (Be Focussed on the Method of Link Value and Scalability for Korea Wave Fandom)." The Journal of the Institute of Webcasting, Internet and Telecommunication 13, no. 1: 235-241.

Journal article
Published: 30 April 2012 in The Journal of Korean Institute of Communications and Information Sciences
Reads 0
Downloads 0
ACS Style

You-Jin Song; Jeong-Min Do. Secure Data Management based on Proxy Re-Encryption in Mobile Cloud Environment. The Journal of Korean Institute of Communications and Information Sciences 2012, 37, 288 -299.

AMA Style

You-Jin Song, Jeong-Min Do. Secure Data Management based on Proxy Re-Encryption in Mobile Cloud Environment. The Journal of Korean Institute of Communications and Information Sciences. 2012; 37 (4):288-299.

Chicago/Turabian Style

You-Jin Song; Jeong-Min Do. 2012. "Secure Data Management based on Proxy Re-Encryption in Mobile Cloud Environment." The Journal of Korean Institute of Communications and Information Sciences 37, no. 4: 288-299.

Journal article
Published: 29 February 2012 in The KIPS Transactions:PartC
Reads 0
Downloads 0
ACS Style

You-Jin Song; Jeong-Min Do. Remote Healthcare Monitoring System Using Attribute based Encryption. The KIPS Transactions:PartC 2012, 19C, 63 -70.

AMA Style

You-Jin Song, Jeong-Min Do. Remote Healthcare Monitoring System Using Attribute based Encryption. The KIPS Transactions:PartC. 2012; 19C (1):63-70.

Chicago/Turabian Style

You-Jin Song; Jeong-Min Do. 2012. "Remote Healthcare Monitoring System Using Attribute based Encryption." The KIPS Transactions:PartC 19C, no. 1: 63-70.

Book chapter
Published: 01 January 2012 in Lecture Notes in Electrical Engineering
Reads 0
Downloads 0

Hybrid application is the one with advantage of mobile web and an application. In this study, we analyzed the communication of political network campaigns based on the technical features of hybrid application. Political network campaigns strengthen relation, reputation, influence, and attention using social media. Especially, the political communication varies by political network campaigns. We analyzed the political communication structure through the communication mechanism. And we investigated various technical, social and cultural variables causing changes in the communication structure. Through this, we can identify how changes in political communication through media are made and configured.

ACS Style

Jang-Mook Kang; Hae-Gill Choi; You-Jin Song. The Communication Structure and Technologies for Political Network Campaign Using Hybrid Application. Lecture Notes in Electrical Engineering 2012, 621 -628.

AMA Style

Jang-Mook Kang, Hae-Gill Choi, You-Jin Song. The Communication Structure and Technologies for Political Network Campaign Using Hybrid Application. Lecture Notes in Electrical Engineering. 2012; ():621-628.

Chicago/Turabian Style

Jang-Mook Kang; Hae-Gill Choi; You-Jin Song. 2012. "The Communication Structure and Technologies for Political Network Campaign Using Hybrid Application." Lecture Notes in Electrical Engineering , no. : 621-628.

Journal article
Published: 31 December 2011 in The KIPS Transactions:PartC
Reads 0
Downloads 0
ACS Style

You-Jin Song; Jeong-Min Do. Distributed Access Privilege Management for Secure Cloud Business. The KIPS Transactions:PartC 2011, 18C, 369 -378.

AMA Style

You-Jin Song, Jeong-Min Do. Distributed Access Privilege Management for Secure Cloud Business. The KIPS Transactions:PartC. 2011; 18C (6):369-378.

Chicago/Turabian Style

You-Jin Song; Jeong-Min Do. 2011. "Distributed Access Privilege Management for Secure Cloud Business." The KIPS Transactions:PartC 18C, no. 6: 369-378.

Journal article
Published: 01 December 2010 in The e-Business Studies
Reads 0
Downloads 0
ACS Style

Song You Jin; Kang Jang Mook. Distributed computation model based on MapReduce of a large amount Data for e-business platform in cloud Computing environment. The e-Business Studies 2010, 11, 309 -327.

AMA Style

Song You Jin, Kang Jang Mook. Distributed computation model based on MapReduce of a large amount Data for e-business platform in cloud Computing environment. The e-Business Studies. 2010; 11 (5):309-327.

Chicago/Turabian Style

Song You Jin; Kang Jang Mook. 2010. "Distributed computation model based on MapReduce of a large amount Data for e-business platform in cloud Computing environment." The e-Business Studies 11, no. 5: 309-327.

Journal article
Published: 28 September 2010 in The Journal of the Korea Contents Association
Reads 0
Downloads 0
ACS Style

Nam-Je Park; You-Jin Song; Kwang-Yong Park. Secure Distributed Data Management Architecture for Consumer Protection of Smart Grid. The Journal of the Korea Contents Association 2010, 10, 57 -67.

AMA Style

Nam-Je Park, You-Jin Song, Kwang-Yong Park. Secure Distributed Data Management Architecture for Consumer Protection of Smart Grid. The Journal of the Korea Contents Association. 2010; 10 (9):57-67.

Chicago/Turabian Style

Nam-Je Park; You-Jin Song; Kwang-Yong Park. 2010. "Secure Distributed Data Management Architecture for Consumer Protection of Smart Grid." The Journal of the Korea Contents Association 10, no. 9: 57-67.