Browse > Article
http://dx.doi.org/10.13089/JKIISC.2015.25.6.1435

Study on Detection Technique of Privacy Distribution Route based on Interconnection of Security Documents and Transaction ID  

Shin, Jae-ho (Center for Information Security Technologies(CIST), Korea University)
Kim, In-seok (Center for Information Security Technologies(CIST), Korea University)
Abstract
Finance Companies are operating a security solution such as E-DRM(Enterprise-Digital Right Management), Personal information search, DLP(Data Loss Prevention), Security of printed paper, Internet network separation system, Privacy monitoring system for privacy leakage prevention by insiders. However, privacy leakages are occurring continuously and it is difficult to the association analysis about relating to the company's internal and external distribution of private document. Because log system operated in the separate and independent security solutions. This paper propose a systematic chains that can correlatively analyze business systems and log among heterogeneous security solutions organically and consistently based on security documents. Also, we suggest methods of efficient detection for Life-Cycle management plan about security documents that are created in the personal computer or by individual through the business system and distribution channel tracking about security documents contained privacy.
Keywords
Personal Information; DRM; Distribution channel; Systematic chains; Life-Cycle management;
Citations & Related Records
Times Cited By KSCI : 4  (Citation Analysis)
연도 인용수 순위
1 Yonhapnews, http://www.yonhapnews.co.kr/economy/2014/02/13/0301000000AKR20140213044400002.HTML
2 Yonhapnews, http://www.yonhapnews.cokr/bulletin/2015/03/05/0200000000AKR20150305081700004.HTML
3 Financial Supervisory Service, http://www.fss.or.kr/fss/kr/promo/bodobbs_view.jsp? url=&seqno=17681
4 Financial Supervisory Service, http://www.fss.or.kr/fss/kr/promo/bodobbs_view.jsp? url=&seqno=18293
5 Jingue Moon, "A Design of DRM solution for Prevention of Proprietary Information Leakage," Korea Computer Congress , pp. 7-10, Jun. 2007
6 Hangbae Chang, Sang-Soo Yeo, Gilcheol Park, and Changhoon Lee, "The Study on Development of Document Security Components," Journal of Security Engineering, 5(1), pp. 57-66, Feb. 2008.
7 Jong-Uk Choi, Yong-Jin Lee, and Ju-Mi Park, "E-DRM-based Privacy Protection Technology for Overcoming Technical Limitations of DLP-based Solutions," Journal of The Korea Institute of Information Security & Cryptology, 22(5), pp. 1103-1113, Oct. 2014.
8 Chae, Eun Ji, "A study on the PIMS based methodology for monitoring to prevent leakage of personal information in the banking industry," Graduate School of Dongguk University, Feb 2015.
9 Sung-Kyu Cho and Moon-Seog Jun, "Privacy Leakage Monitoring System Design for Privacy Protection," Journal of The Korea Institute of Information Security & Cryptology, 22(1), pp. 99-106, Feb. 2012.
10 Hyun tak Chae and Sang-jin Lee "Security Policy Proposals through PC Security Solution Log Analysis (Prevention Leakage of Personal Information)," Journal of The Korea Institute of Information Security & Cryptology, 24(5), pp. 961-968, Oct. 2014.   DOI