DOI QR코드

DOI QR Code

A Study on the protection of personal information using a Virtual IDs in an anonymous bulletin board

익명 게시판 환경에서 가상 아이디를 이용한 개인정보보호에 관한 연구

  • Received : 2012.07.11
  • Accepted : 2012.09.06
  • Published : 2012.09.30

Abstract

The argument related to the use of real and anonymous names on the Internet bulletin board has recently become a main issue. When using real names, it is possible to violate free discussion and privacy. Also, when using anonymous names, it is possible to have the reverse function of the Internet in regard to the use of malicious replies or the distribution of false ideas. Therefore, this paper has made it possible to prevent the spread of the user's personal information and execute the single log-in process by using the XML-token method which is one of the SSO technologies. Also, by issuing virtual IDs and forming the path when establishing tokens, the anonymous bulletin board which provides anonymity with a conditional tracing process has been suggested. After analyzing the performance of visitor numbers at authentication time, the anonymous bulletin board based on the group signature method showed the average response rate of 0.72 seconds, 0.18 seconds, which was suggested scheme. In the authentication time 4-5 times faster response speed, respectively. Also, since the suggested system does not have to provide a single authentication process or make the user provide his or her signature, the level of user's convenience seems to be much higher. Such a result shows that the system suggested on the anonymous bulletin board has a more appropriate level of user's convenience.

최근 인터넷 게시판의 실명 및 익명 사용에 대한 논쟁은 주요 이슈가 되고 있다. 실명을 사용할 경우 자유로운 토론 및 프라이버시 침해할 우려가 있는 반면에, 익명을 사용하는 경우에 있어서는 악성 댓글 폭력이라든지, 존재하지 않는 허위 사실 유포 등의 인터넷의 역기능이 나타날 수 있다. 따라서 본 논문에서는 SSO의 기술 중 하나인 XML 토큰 방식을 사용하여 개인정보의 분산을 막고 단일 로그인이 가능하게 하였고 토큰 발급 시 가상 아이디와 경로구성을 통해 익명성 및 조건부 추적이 가능한 익명 게시판을 제안 하였다. 성능분석 결과 접속자 수에 따른 인증시간에서 그룹 서명 방식을 사용한 익명 게시판은 평균 응답 속도가 0.72초, 제안하는 방식은 0.18초를 나타내었다. 즉 인증시간에서 4~5배 정도 빠른 응답 속도를 보였다. 또한 제안하는 시스템은 단일 인증을 제공하고 사용자가 서명을 하지 않아도 되기 때문에 사용자 편의성에서 월등히 뛰어나며, 익명 게시판 환경에서의 사용자 편의성은 제안하는 시스템이 더 적합함을 알 수가 있었다.

Keywords

References

  1. Tae-Kyoung Kwon. et al., "The Technology and Trend of Public Key based Bulletin board", Journal of KIISC, Vol.14, No.6, pp.1-13, 2004.
  2. Jae-Hyung Yoo, "Recent Development of Integrated Identity Management Technologies to realize Multi-Domain Single Sign On", KNOM Review, Vol.10, pp.16-31, 2007.
  3. Dong-Young Cho, "Design of a Web-bulletin board System Using Anonymous Authentication of a Group Membership", Journal of KI-IT, Vol.8, No.2, pp.95-100, 2010.
  4. Seung-Geol Choi. et al., "Anonymity Mechanisms : Group Signatures and Traceable Signatures", Journal of KIISE, Vol.24, No.1, pp.32-39. 2005.
  5. Jin-Tak Choi, "A Study on Authentication Management Technique Used of SSO", KSIAM IT series, Vol.10, No.1, pp.61-69, 2006.
  6. Yun-Kyung Lee. et al., "The Technology and Trend of Anonymous Authentication", ETRI, Vol.23, No.4, pp.19-29, 2008.
  7. D. Chaum, "Blind signature systems", In Advances in Cryptology-CRYPTO'83, p.153. Plenum, 1983.
  8. D. Chaum and E. van Heyst. "Group signatures", EUROCRYPT 1991, LNCS, Springer., 1991.
  9. Jan Camenisch and Anna Lysyanskayas, "An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation", EUROCRYPT 2001, LNCS 2045, 2001.
  10. M. Bellare, D. Micciancio, and B. Warinschi, "Foundations of Group Signatures: Definition, Simplified Requirements and a Construction Based on General Assumptions", CRYPTO 2004, 2004.
  11. Rabin, Michael. "Digitalized Signatures and Public-Key Functions as Intractable as Factorization". MIT Laboratory for Computer Science, 1979.
  12. Jun young Heo, "QoS-guaranteed Routing for Wireless Sensor Networks", Journal of The Institute of Webcasting, Internet and Telecommunication, VOL. 11, No. 6, December, 2011.
  13. Sun-Jin Oh, "Design and Evaluation of a Weighted Intrusion Detection Method for VANETs", Journal of The Institute of Webcasting, Internet and Telecommunication, VOL.11, No.3, June, 2011.
  14. Sun-Jin Oh, "An Anomaly Detection Method for the Security of VANETs", Journal of The Institute of Webcasting, Internet and Telecommunication, VOL.10, No.2, April, 2010.
  15. Young-Hee Cho, Gye-Sung Lee, "Prediction on Clusters by using Information Criterion and Multiple Seeds", Journal of The Institute of Webcasting, Internet and Telecommunication, VOL.10, No.6, December, 2010.
  16. Ho-Young Hwang, Hyo-Joong Suh, "The Multi-path Power-aware Source Routing(MPSR) for the Maximum Network Lifetime in Ad-Hoc Networks", Journal of The Institute of Webcasting, Internet and Telecommunication, VOL.10, No.5, October, 2010.
  17. Eun Cheol Kim, Seo Sung Il and Jin Young Kim, "Performance of Tactics Mobile Communication System Based on UWB with Double Binary Turbo Code in Multi-User Interference Environments", Journal of The Institute of Webcasting, Internet and Telecommunication, VOL.10, No.1, February, 2010.
  18. Ju phil Cho, Sang-In Cho, Kyu-Min Kang, Heon-Jin Hong, "Analysis on Characteristics for Sharing Co-channel between Communication Systems", Journal of The Institute of Webcasting, Internet and Telecommunication, VOL.11, No.4, August, 2011.