This page has only limited features, please log in for full access.
Yoon-Su Jeong gained his B.Sc. in the department of computer science, Cheongju National University, in 1998. He gained his M.Sc. and Ph.D. in the department of computer science, Chungbuk National University, in 2000 and 2008. He is currently working as a professor in the department of Information and Communication Convergence Engineering, Mokwon University. His research interests also include cryptography, network security, information security, healthcare service, bioinformatic, cloud service, wire/wireless communication security, privacy, and big data.
As IoT (Internet of Things) devices are diversified in the fields of use (manufacturing, health, medical, energy, home, automobile, transportation, etc.), it is becoming important to analyze and process data sent and received from IoT devices connected to the Internet. Data collected from IoT devices is highly dependent on secure storage in databases located in cloud environments. However, storing directly in a database located in a cloud environment makes it not only difficult to directly control IoT data, but also does not guarantee the integrity of IoT data due to a number of hazards (error and error handling, security attacks, etc.) that can arise from natural disasters and management neglect. In this paper, we propose an optimized hash processing technique that enables hierarchical distributed processing with an n-bit-size blockchain to minimize the loss of data generated from IoT devices deployed in distributed cloud environments. The proposed technique minimizes IoT data integrity errors as well as strengthening the role of intermediate media acting as gateways by interactively authenticating blockchains of n bits into n + 1 and n − 1 layers to normally validate IoT data sent and received from IoT data integrity errors. In particular, the proposed technique ensures the reliability of IoT information by validating hash values of IoT data in the process of storing index information of IoT data distributed in different locations in a blockchain in order to maintain the integrity of the data. Furthermore, the proposed technique ensures the linkage of IoT data by allowing minimal errors in the collected IoT data while simultaneously grouping their linkage information, thus optimizing the load balance after hash processing. In performance evaluation, the proposed technique reduced IoT data processing time by an average of 2.54 times. Blockchain generation time improved on average by 17.3% when linking IoT data. The asymmetric storage efficiency of IoT data according to hash code length is improved by 6.9% on average over existing techniques. Asymmetric storage speed according to the hash code length of the IoT data block was shown to be 10.3% faster on average than existing techniques. Integrity accuracy of IoT data is improved by 18.3% on average over existing techniques.
Yoon-Su Jeong. Blockchain Processing Technique Based on Multiple Hash Chains for Minimizing Integrity Errors of IoT Data in Cloud Environments. Sensors 2021, 21, 4679 .
AMA StyleYoon-Su Jeong. Blockchain Processing Technique Based on Multiple Hash Chains for Minimizing Integrity Errors of IoT Data in Cloud Environments. Sensors. 2021; 21 (14):4679.
Chicago/Turabian StyleYoon-Su Jeong. 2021. "Blockchain Processing Technique Based on Multiple Hash Chains for Minimizing Integrity Errors of IoT Data in Cloud Environments." Sensors 21, no. 14: 4679.
As the development of IoT technologies has progressed rapidly recently, most IoT data are focused on monitoring and control to process IoT data, but the cost of collecting and linking various IoT data increases, requiring the ability to proactively integrate and analyze collected IoT data so that cloud servers (data centers) can process smartly. In this paper, we propose a blockchain-based IoT big data integrity verification technique to ensure the safety of the Third Party Auditor (TPA), which has a role in auditing the integrity of AIoT data. The proposed technique aims to minimize IoT information loss by multiple blockchain groupings of information and signature keys from IoT devices. The proposed technique allows IoT information to be effectively guaranteed the integrity of AIoT data by linking hash values designated as arbitrary, constant-size blocks with previous blocks in hierarchical chains. The proposed technique performs synchronization using location information between the central server and IoT devices to manage the cost of the integrity of IoT information at low cost. In order to easily control a large number of locations of IoT devices, we perform cross-distributed and blockchain linkage processing under constant rules to improve the load and throughput generated by IoT devices.
Sung-Ho Sim; Yoon-Su Jeong. Multi-Blockchain-Based IoT Data Processing Techniques to Ensure the Integrity of IoT Data in AIoT Edge Computing Environments. Sensors 2021, 21, 3515 .
AMA StyleSung-Ho Sim, Yoon-Su Jeong. Multi-Blockchain-Based IoT Data Processing Techniques to Ensure the Integrity of IoT Data in AIoT Edge Computing Environments. Sensors. 2021; 21 (10):3515.
Chicago/Turabian StyleSung-Ho Sim; Yoon-Su Jeong. 2021. "Multi-Blockchain-Based IoT Data Processing Techniques to Ensure the Integrity of IoT Data in AIoT Edge Computing Environments." Sensors 21, no. 10: 3515.
As cloud services become so ubiquitous that they can be used anytime, anywhere, there is an increasing interest in IoT privacy protection. Manufacturers of small and medium-sized businesses that produce IT devices are increasingly using a variety of technologies to easily connect to other devices, with ease and affordability. However, the importance of protection against IoT privacy is growing as devices connected to the Internet do not know what information is transmitted by third parties. In this paper, we propose an IoT privacy protection technique in which users’ privacy-related elements are classified into block chains and non-block chains so that the third parties do not use the information used in the cloud environment maliciously, so that users’ privacy can be handled probabilistically by grouping them into service chains. The proposed model uses user privacy information as a block chain to handle identity attributes and access control policies so that IoT privacy information is not exposed to third parties. This process can be used to protect users’ privacy, regardless of the size or purpose of the cloud environment. In the proposed technique, IoT privacy was grouped into hierarchical multilevel forms, while efficiency was improved by an average of 11.1% using computational-intensive cryptographic policies. In addition, because the proposed technique has improved the accessibility of IoT privacy information over the existing one, it has reduced the overhead of cloud servers by more than 17.2%.
Yoon-Su Jeong; Dong-Ryool Kim; Seung-Soo Shin. Efficient data management techniques based on hierarchical IoT privacy using block chains in cloud environments. The Journal of Supercomputing 2021, 77, 9810 -9826.
AMA StyleYoon-Su Jeong, Dong-Ryool Kim, Seung-Soo Shin. Efficient data management techniques based on hierarchical IoT privacy using block chains in cloud environments. The Journal of Supercomputing. 2021; 77 (9):9810-9826.
Chicago/Turabian StyleYoon-Su Jeong; Dong-Ryool Kim; Seung-Soo Shin. 2021. "Efficient data management techniques based on hierarchical IoT privacy using block chains in cloud environments." The Journal of Supercomputing 77, no. 9: 9810-9826.
As the number of users using cloud services has increased in recent years, the number of users leaving the group or changing their personal information is often the case. In this paper, a blockchain-based cloud user information management scheme is proposed using stochastic weights to confirm that the information of users receiving cloud services has not been tampered with. The proposed scheme uses color keys to reliably distinguish blockchains of user information in a cloud environment. The quality of service is improved by pasting user attribute information generated using color keys to the front of the blockchain. The proposed scheme uses different color key information and attribute information, so they have the advantage of effectively processing user information in different cloud environments. It also supports lower overhead and higher efficiency compared to traditional techniques that individually add authentication keys to users by authenticating information from multiple users who receive cloud services with color keys. In addition, the proposed scheme allows the provision of reliable real-time cloud services by creating a stochastic sum of weights for the first and last users that make up the cloud. As a result of the performance analysis, the proposed scheme reduced the time of blockchain generation by \(7.9\%\) on average by linking user information to the probability value of user information. Efficiency in managing blockchain-based user information over overlay networks was up to \(11.5\%\) better than using RSA alone, with an average \(7.7\%\) lower overhead.
Yoon-Su Jeong; Byeong-Tae Ahn. An efficient management scheme of blockchain-based cloud user information using probabilistic weighting. The Journal of Supercomputing 2020, 77, 3339 -3358.
AMA StyleYoon-Su Jeong, Byeong-Tae Ahn. An efficient management scheme of blockchain-based cloud user information using probabilistic weighting. The Journal of Supercomputing. 2020; 77 (4):3339-3358.
Chicago/Turabian StyleYoon-Su Jeong; Byeong-Tae Ahn. 2020. "An efficient management scheme of blockchain-based cloud user information using probabilistic weighting." The Journal of Supercomputing 77, no. 4: 3339-3358.
Wearable and portable medical devices are one of the fastest growing sectors in the Internet of Things (IoT) market. However, medical services specialize in the processing of personal health data, which carries issues that are not faced by other industries. In this paper, we propose a multi-dimensional color vector information based IoT device authentication protocol that can provide benefits for medical work, assuming that a hospital has the capability of integrating IoT devices and has access to patient information. The proposed protocol uses multi-dimensional color vectors to help users who use IoT devices to manage their condition in multiple groups, stochastically. In addition, the proposed protocol provides the health and medical service status of users to medical staff in real time using IoT authentication keys generated through the proposed multi-dimensional color vectors. The proposed protocol not only addresses health care problems yet to be tackled in the management of hospital and health services, but also minimizes administrative time and procedures for current medical services. As a result of the performance evaluation, the proposed protocol improved the efficiency of hospital IoT devices by an average of 31.1%, and the time delay for medical services was improved by 19.8%, compared to the existing protocol. By using the proposed protocol and IoT devices, the average overhead of healthcare providers could be reduced by as much as 15.3%.
Yoon-Su Jeong; Dong-Ryool Kim; Seung-Soo Shin. Efficient Mutual Authentication Protocol between Hospital Internet of Things Devices Using Probabilistic Attribute Information. Sustainability 2019, 11, 7214 .
AMA StyleYoon-Su Jeong, Dong-Ryool Kim, Seung-Soo Shin. Efficient Mutual Authentication Protocol between Hospital Internet of Things Devices Using Probabilistic Attribute Information. Sustainability. 2019; 11 (24):7214.
Chicago/Turabian StyleYoon-Su Jeong; Dong-Ryool Kim; Seung-Soo Shin. 2019. "Efficient Mutual Authentication Protocol between Hospital Internet of Things Devices Using Probabilistic Attribute Information." Sustainability 11, no. 24: 7214.
Due to the development of the Internet of Things (IoT) in the medical field, special medical equipment such as CT and MRI, which are used in medical institutions, can be used for digital healthcare services by medical staff using VR. However, the integrity and confidentiality of multimedia health care information handled through special medical equipment using VR is still one of the major issues that cause many problems in the application sector of medical services. This paper proposes a steganography-based digital healthcare model to ensure the integrity of user multimedia image information processed through special medical equipment using VR. The proposed model aims to prevent illegal use by the medical team through VR of multimedia image information collected through special medical equipment without the consent of the user. The proposed model uses the user’s signature and credentials in a hybrid cipher for multimedia health care information. The proposed model has features that ensure the integrity and confidentiality of the user’s medical image information without disturbing the user’s multimedia image quality filmed through special medical equipment. In addition, multimedia medical information viewed through VR is not exploited without the consent of users because the user’s signature information was encrypted using steganography-based cryptography-based ciphering techniques. In particular, the proposed model provides real-time guidance related to users’ health conditions and first-aid care in connection with the hospital health service to improve the management of medical image information for users in hospitals. As a result of the performance evaluation, the proposed model averaged 12.5% improvement in the management of the user’s medical image information compared to the existing technique, and the user’s accuracy in extracting medical image information was averaged 10.4% higher than that of the existing technique.
Jeong Yoon-Su; Shin Seung-Soo. Staganography-based healthcare model for safe handling of multimedia health care information using VR. Multimedia Tools and Applications 2019, 79, 16593 -16607.
AMA StyleJeong Yoon-Su, Shin Seung-Soo. Staganography-based healthcare model for safe handling of multimedia health care information using VR. Multimedia Tools and Applications. 2019; 79 (23-24):16593-16607.
Chicago/Turabian StyleJeong Yoon-Su; Shin Seung-Soo. 2019. "Staganography-based healthcare model for safe handling of multimedia health care information using VR." Multimedia Tools and Applications 79, no. 23-24: 16593-16607.
As IoT technologies have become more available, healthcare patients increasingly want to be provided with services at places other than hospitals or their homes. Most patients with implantable devices still visit hospitals, sometimes using a self-driving car or public transportation to obtain services. When an emergency situation develops for a patient in a vehicle lacking the means to address the crisis, the patient’s life cannot help but be in danger. The present paper proposes an IoT healthcare service model that will enable patients with a medical sensor to be provided healthcare services in a vehicle installed with IoT devices. To solve problems in existing models that do not include electromagnetic interference-based (EMI) multiple property management and control, the proposed model involves medical sensors with different multiple-property information guarantee targeted SINRs and minimum blackouts. The model also features the ability to connect to hospital healthcare service centers using the IoT devices installed in vehicles, thereby enabling information on the patient’s condition and first aid needs to be transmitted in real time. To secure the patient’s biometric data during information transmission, the proposed model weights that information to enhance the efficiency of the IoT devices. Performance evaluation results revealed that compared to existing algorithms, the communication strength of the proposed model is an average of 5.2% higher, and network efficiency between IoT devices and medical sensors is an average of 7.6% higher. In addition, the overhead on IoT devices was an average of 3.5% lower.
Yoon-Su Jeong; Seung-Soo Shin. An IoT healthcare service model of a vehicle using implantable devices. Cluster Computing 2016, 21, 1059 -1068.
AMA StyleYoon-Su Jeong, Seung-Soo Shin. An IoT healthcare service model of a vehicle using implantable devices. Cluster Computing. 2016; 21 (1):1059-1068.
Chicago/Turabian StyleYoon-Su Jeong; Seung-Soo Shin. 2016. "An IoT healthcare service model of a vehicle using implantable devices." Cluster Computing 21, no. 1: 1059-1068.
Recently, as the amount of genetic information has been increasing following the completion of the human genome project, bioinformatics information management has been coming to the fore. However, since bioinformatics information is composed of diverse kinds of genetic information, users cannot easily approach and use it. In the present paper, a high-dimensionality information management scheme is proposes that enables users to select those pieces of bioinformatics information that are highly frequently used using the Bernoulli distribution so that users can easily approach those pieces of bioinformatics information that are preferred by them. The proposed scheme is an approach to high-dimensionality priority selection that requires the presentation of two or more pieces of bioinformatics information. In addition, in the case of the proposed scheme, since the order of priority of information is determined based on the kinds, functions, and characteristics of bioinformatics information, users can easily approach bioinformatics information according to their purpose of use of the information. According to the results of experiments, the proposed scheme showed a success rate 11.6 % higher than that of existing schemes in terms of bioinformatics information searches and the delay time of bioinformatics information services used by independent users was shown to be 17.3 % shorter than that of existing schemes .
Yoon-Su Jeong; Seung-Soo Shin; Kun-Hee Han. High-dimensionality priority selection scheme of bioinformatics information using Bernoulli distribution. Cluster Computing 2016, 20, 539 -546.
AMA StyleYoon-Su Jeong, Seung-Soo Shin, Kun-Hee Han. High-dimensionality priority selection scheme of bioinformatics information using Bernoulli distribution. Cluster Computing. 2016; 20 (1):539-546.
Chicago/Turabian StyleYoon-Su Jeong; Seung-Soo Shin; Kun-Hee Han. 2016. "High-dimensionality priority selection scheme of bioinformatics information using Bernoulli distribution." Cluster Computing 20, no. 1: 539-546.
Social media networks along with mobile devices are major sources of big data. A recent trend involves using Hadoop for big data to extract unique trends, insights, and patterns. However, Hadoop lacks secure authentication mechanisms that prevent unauthorized access to data. The current authentication token system that is used for user authentication in the Hadoop distributed file system (HDFS) is vulnerable to replay and datanode hacking attacks. This paper proposes a data authentication protocol that protects sensitive data in HDFS against malicious attacks. The proposed protocol uses the hash chain method instead of the key exchange method based on public-key encryption. An HDFS blocks in datanodes of the proposed protocol are accessed by a client with a valid block access token from a namenode. In addition, clients’ anonymity is guaranteed because an HDFS adopting the proposed protocol passes hash-chained block values so the HDFS blocks that generates security awareness information is not exposed unnecessarily to a third party. An HDFS adopting the proposed protocol has the performance (e.g., communication power, computational power, and area efficiency) as good as that of conventional HDFS systems.
Yoon-Su Jeong; Seung-Soo Shin; Kun-Hee Han. High-dimentional data authentication protocol based on hash chain for Hadoop systems. Cluster Computing 2015, 19, 475 -484.
AMA StyleYoon-Su Jeong, Seung-Soo Shin, Kun-Hee Han. High-dimentional data authentication protocol based on hash chain for Hadoop systems. Cluster Computing. 2015; 19 (1):475-484.
Chicago/Turabian StyleYoon-Su Jeong; Seung-Soo Shin; Kun-Hee Han. 2015. "High-dimentional data authentication protocol based on hash chain for Hadoop systems." Cluster Computing 19, no. 1: 475-484.
Recently, due to the increase in the volume and types of data processed in cloud environments, methods that allow easy access to Big Data stored in heterogeneous devices in different network environments are in demand. This study proposes a security management scheme that allows users to easily access Big Data from different network environments by assigning a key shared among users and servers, and linking Big Data and user’s attribute information in order to protect the privacy of users using Big Data in cloud environments and the data itself. The proposed scheme possesses a high level of safety even when the user-generated random-bit signal is interrupted or modulated by a third party. It is also used in sharing users’ security awareness information since it passes sufficient random bits. In addition, users’ anonymity is guaranteed because the scheme passes hash-chained bit sequence values so the bit sequence that generates security awareness information is not exposed unnecessarily to a third party.
Yoon-Su Jeong; Seung-Soo Shin. An Efficient Authentication Scheme to Protect User Privacy in Seamless Big Data Services. Wireless Personal Communications 2015, 86, 7 -19.
AMA StyleYoon-Su Jeong, Seung-Soo Shin. An Efficient Authentication Scheme to Protect User Privacy in Seamless Big Data Services. Wireless Personal Communications. 2015; 86 (1):7-19.
Chicago/Turabian StyleYoon-Su Jeong; Seung-Soo Shin. 2015. "An Efficient Authentication Scheme to Protect User Privacy in Seamless Big Data Services." Wireless Personal Communications 86, no. 1: 7-19.
Information analysis of high dimensional data was carried out through similarity measure application. High dimensional data were considered as the a typical structure. Additionally, overlapped and non-overlapped data were introduced, and similarity measure analysis was also illustrated and compared with conventional similarity measure. As a result, overlapped data comparison was possible to present similarity with conventional similarity measure. Non-overlapped data similarity analysis provided the clue to solve the similarity of high dimensional data. Considering high dimensional data analysis was designed with consideration of neighborhoods information. Conservative and strict solutions were proposed. Proposed similarity measure was applied to express financial fraud among multi dimensional datasets. In illustrative example, financial fraud similarity with respect to age, gender, qualification and job was presented. And with the proposed similarity measure, high dimensional personal data were calculated to evaluate how similar to the financial fraud. Calculation results show that the actual fraud has rather high similarity measure compared to the average, from minimal 0.0609 to maximal 0.1667.
Sang-Hyuk Lee; Sun Yan; Yoon-Su Jeong; Seung-Soo Shin. Similarity measure design for high dimensional data. Journal of Central South University 2014, 21, 3534 -3540.
AMA StyleSang-Hyuk Lee, Sun Yan, Yoon-Su Jeong, Seung-Soo Shin. Similarity measure design for high dimensional data. Journal of Central South University. 2014; 21 (9):3534-3540.
Chicago/Turabian StyleSang-Hyuk Lee; Sun Yan; Yoon-Su Jeong; Seung-Soo Shin. 2014. "Similarity measure design for high dimensional data." Journal of Central South University 21, no. 9: 3534-3540.
In mobile healthcare (“m-healthcare”), a lot of attention is being paid nowadays to the construction of a better healthcare environment than the existing health monitoring system provided by connecting the smart phone to an implantable medical device. In the case of m-healthcare, however, the problem of a patient’s information easily exposed to a third party and misused in an emergency situation still persists. This research paper proposed the attribute-based patient access control protocol to minimize violation of a patient’s privacy using the patient’s information saved in a smart phone in the environment of an emergency situation of m-healthcare. The proposed protocol, to prevent the exposure of a patient’s sensitive information to a third party, includes sensitive information of the patient in Personal Health Information (PHI) and encodes the information with a signature key hashed by a random number created by the u-healthcare service center and the patient in question. In addition, to prevent misuse of patient information by a third party, the leak of PHI can be prevented by maintaining synchronization between the patient and officials at a hospital.
Yoon-Su Jeong; Sang-Ho Lee; Seung-Soo Shin. Access Control Protocol Based on Privacy Property of Patient in m-Healthcare Emergency. Wireless Personal Communications 2014, 79, 2565 -2578.
AMA StyleYoon-Su Jeong, Sang-Ho Lee, Seung-Soo Shin. Access Control Protocol Based on Privacy Property of Patient in m-Healthcare Emergency. Wireless Personal Communications. 2014; 79 (4):2565-2578.
Chicago/Turabian StyleYoon-Su Jeong; Sang-Ho Lee; Seung-Soo Shin. 2014. "Access Control Protocol Based on Privacy Property of Patient in m-Healthcare Emergency." Wireless Personal Communications 79, no. 4: 2565-2578.