Browse > Article
http://dx.doi.org/10.6109/jkiice.2018.22.1.69

Web Document Analysis based Personal Information Hazard Classification System  

Lee, Hyoungseon (Department of Computer Engineering, Paichai University)
Lim, Jaedon (Department of Computer Engineering, Paichai University)
Jung, Hoekyung (Department of Computer Engineering, Paichai University)
Abstract
Recently, personal information leakage has caused phishing and spam. Previously developed systems focus on preventing personal information leakage. Therefore, there is a problem that the leakage of personal information can not be discriminated if there is already leaked personal information. In this paper, we propose a personal information hazard classification system based on web document analysis that calculates the hazard. The system collects web documents from the Twitter server and checks whether there are any user-entered search terms in the web documents. And we calculate the hazard classification weighting of the personal information leaked in the web documents and confirm the authority of the Twitter account that distributed the personal information. Based on this, the hazard can be derived and the user can be informed of the leakage of personal information of the web document.
Keywords
Collection; Leak Detection; Personal Information; Web Document;
Citations & Related Records
Times Cited By KSCI : 4  (Citation Analysis)
연도 인용수 순위
1 J. H. Eom, M. J. Kim, "Effect of Information Security Incident on Outcome of Investment by Type of Investors: Case of Personal Information Leakage Incident," Journal of The Korea Institute of Information Security & Cryptology, vol. 26, no. 2, pp. 463-474, Apr. 2016.   DOI
2 Y. H. Kim, I. H. Cho, K. H. Lee, "A Decision-Making Model for Handling Personal Information Using Metadata," Journal of The Korea Institute of Information Security & Cryptology, vol. 26, no. 1, Feb. 2016.
3 C. S. Lee, Y. H. Kim, "An Analysis of Relationship between Industry Security Education and Capability: Case Centric on Insider Leakage," The Journal of Society for e-Business Studies, vol. 20, no. 2, pp. 27-36, May 2015.   DOI
4 G. H. Song, and K. S. Shim, "Privacy-Preserving Big Data Publication using MapReduce." Journal of KIISE, pp. 175-177, Oct. 2016.
5 D. Vatsalan, Z. Sehili, P. Christen, E. Rahm, "Privacy-Preserving Record Linkage for Big Data : Current Approaches and Research Challenges," Privacy-Preserving Record Linkage for Big Data, Feb. 2017.
6 Y. Li, L. Zhou, H. Zhu, "Privacy-Preserving Location Proof for Securing Large-Scale Database-Driven Cognitive Radio Networks," IEEE Internet of Things Journal, vol. 3. no. 4, pp. 563-571, Apr. 2016.   DOI
7 D. W, Park, "Analysis of Mobile Smishing Hacking Trends and Security Measures," Journal of the Korea Institute of Information and Communication Engineering, vol. 19, no. 11, pp. 2615-2622, Nov. 2015.   DOI