• Title/Summary/Keyword: 개인정보관리모델

Search Result 349, Processing Time 0.027 seconds

Design of a Forecasting Model for Customer Classification in the Telecommunication Industries (통신 산업의 고객 분류를 위한 예측 모델 설계)

  • Lee Byoung-Yup;Joh Kyu-Ha;Song Seok-Il;Yoo Jae-Soo
    • The Journal of the Korea Contents Association
    • /
    • v.6 no.1
    • /
    • pp.179-189
    • /
    • 2006
  • Recently, according to the development of computer technology, a large amount of customer data have been stored in database. Using such data, decision makers extract the useful information to make a valuable plan with data mining. In this paper, we design a forecasting model that classifies the exiting customers in the telecommunication industries using the classification rule, one of the data mining technologies. In other words, this paper builds a model of customer loyalty detection and analyzes customer patterns in mobile communication service market with data mining using neural network and regression methods. This model improves the relationship of customers and enterprises. As a result, the enterprise creates the profits from many customers and the customer receives more benefits from the enterprise.

  • PDF

A Study on DSMS Framework for Data Security Certification (데이터보안인증을 위한 DSMS 프레임워크 구축 연구)

  • Yoo, Seung Jae
    • Convergence Security Journal
    • /
    • v.19 no.4
    • /
    • pp.107-113
    • /
    • 2019
  • Data security is the planning, implementation and implementation of security policies and procedures for the proper audit and authorization of access to and use of data and information assets. In addition, data serviced through internal / external networks, servers, applications, etc. are the core objects of information protection and can be said to focus on the protection of data stored in DB and DB in the category of information security of database and data. This study is a preliminary study to design a proper Data Security Management System (DSMS) model based on the data security certification system and the US Federal Security Management Act (FISMA). And we study the major security certification systems such as ISO27001 and NIST's Cybersecurity Framework, and also study the state of implementation in the data security manager solution that is currently implemented as a security platform for preventing personal data leakage and strengthening corporate security.

Secure Healthcare Data Management and Sharing Platform Based on Hyperledger Fabric (하이퍼레저 패브릭 기반의 안전한 헬스케어 데이터 관리 및 공유 플랫폼 개발 연구)

  • Choi, Ye-Jin;Kim, Kyoung-jin
    • Journal of Internet Computing and Services
    • /
    • v.21 no.1
    • /
    • pp.95-102
    • /
    • 2020
  • In this paper, we present a healthcare data integration management and sharing platform based on a permissioned blockchain-based system called the Hyperledger fabric. The Hyperledger fabric allows patients to easily access their data, share the data with agencies that need it, and also reward participants. The healthcare data is stored in the blockchain by a de-identification process. Privacy is protected by setting detailed access rights to the stored data. The proposed model provides higher security than other models using a public blockchain. This study confirms that patient data can be stored more securely, by comparing the data stored in the blockchain with that from existing information storage methods.

The study of blood glucose level prediction using photoplethysmography and machine learning (PPG와 기계학습을 활용한 혈당수치 예측 연구)

  • Cheol-Gu, Park;Sang-Ki, Choi
    • Journal of Digital Policy
    • /
    • v.1 no.2
    • /
    • pp.61-69
    • /
    • 2022
  • The paper is a study to develop and verify a blood glucose level prediction model based on biosignals obtained from photoplethysmography (PPG) sensors, ICT technology and data. Blood glucose prediction used the MLP architecture of machine learning. The input layer of the machine learning model consists of 10 input nodes and 5 hidden layers: heart rate, heart rate variability, age, gender, VLF, LF, HF, SDNN, RMSSD, and PNN50. The results of the predictive model are MSE=0.0724, MAE=1.1022 and RMSE=1.0285, and the coefficient of determination (R2) is 0.9985. A blood glucose prediction model using bio-signal data collected from digital devices and machine learning was established and verified. If research to standardize and increase accuracy of machine learning datasets for various digital devices continues, it could be an alternative method for individual blood glucose management.

A study on strategic use of MyData: Focused in Financial Services (금융 마이데이터의 전략적 활용에 관한 사례 연구)

  • Lee, Ju-Hee
    • Journal of Digital Convergence
    • /
    • v.20 no.3
    • /
    • pp.181-189
    • /
    • 2022
  • The purpose of this study is to investigate the innovation of business model and the effectiveness of the data-driven model. the main concepts and policies related to the data economy are reviewed, and implications are drawn through the analysis of data-based convergence service creation cases. This study identified the existing data-driven business model of the creation of MyData service industry in the financial industry and concept of the data economy. According to the empirical analysis result, this study confirmed that t considering the mobile environment and consumer acceptance of data portability, the ripple effect of the implementation of My Data on the financial industry is expected to be significant.

A Probabilistic Model of Damage Propagation based on the Markov Process (마코프 프로세스에 기반한 확률적 피해 파급 모델)

  • Kim Young-Gab;Baek Young-Kyo;In Hoh-Peter;Baik Doo-Kwon
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.33 no.8
    • /
    • pp.524-535
    • /
    • 2006
  • With rapid development of Internet technology, business management in an organization or an enterprise depends on Internet-based technology for the most part. Furthermore, as dependency and cohesiveness of network in the communication facilities are increasing, cyber attacks have been increased against vulnerable resource in the information system. Hence, to protect private information and computer resource, research for damage propagation is required in this situation. However the proposed traditional models present just mechanism for risk management, or are able to be applied to the specified threats such as virus or worm. Therefore, we propose the probabilistic model of damage propagation based on the Markov process, which can be applied to diverse threats in the information systems. Using the proposed model in this paper, we can predict the occurrence probability and occurrence frequency for each threats in the entire system.

A Study the Mobile Forensics Model for Improving Integrity (무결성 향상을 위한 모바일 포렌식 모델 연구)

  • Kim, Young-june;Kim, Wan-ju;Lim, Jae-sung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.3
    • /
    • pp.417-428
    • /
    • 2020
  • With the rapid development of information and communication technology, mobile devices have become an essential tool in our lives. Mobile devices are used as important evidence in criminal proof, as they accumulate data simultaneously with PIM functions while working with users most of the time. The mobile forensics is a procedure for obtaining digital evidence from mobile devices and should be collected and analyzed in accordance with due process, just like other evidence, and the integrity of the evidence is essential because it has aspects that are easy to manipulate and delete. Also, the adoption of evidence relies on the judges' liberalism, which necessitates the presentation of generalized procedures. In this paper, a mobile forensics model is presented to ensure integrity through the generalization of procedures. It is expected that the proposed mobile forensics model will contribute to the formation of judges by ensuring the reliability and authenticity of evidence.

A Study on a Smart City Supply Chain Security Model Based on Zero-Trust (제로 트러스트(Zero-Trust) 기반의 스마트시티 공급망 보안모델 연구)

  • Lee, Hyun-jin;Son, Kyung-ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.1
    • /
    • pp.123-140
    • /
    • 2022
  • Recently, research on solving problems that have introduced the concept of smart city in countries and companies around the world is in progress due to various urban problems. A smart city converges the city's ICT, connects all the city's components with a network, collects and delivers data, and consists of a supply chain composed of various IoT products and services. The increase in various cyber security threats and supply chain threats in smart cities is inevitable, in addition to establishing a framework such as supply chain security policy, authentication of each data provider and service according to data linkage and appropriate access control are required in a Zero-Trust point of view. To this end, a smart city security model has been developed for smart city security threats in Korea, but security requirements related to supply chain security and zero trust are insufficient. This paper examines overseas smart city security trends, presents international standard security requirements related to ISMS-P and supply chain security, as well as security requirements for applying zero trust related technologies to domestic smart city security models.

Smooth 핸드오프를 이용한 Mobile IP의 성능 분석

  • 차재정;김두용;최덕규
    • Proceedings of the Korea Society for Simulation Conference
    • /
    • 2000.04a
    • /
    • pp.23-24
    • /
    • 2000
  • 최근 개인 이동 통신 단말기의 수요와 인터넷 사용자의 증가와 함께, 유선 통신 서비스에서부터 개인 휴대 통신 서비스에 이르기까지 다양한 통신 서비스가 제공되기 시작하면서 이러한 서비스가 결합된 mobile IP의 관심이 높아지고 있다. 기존의 IP에서는 노드가 계속해서 접속을 유지하기 위해서는 접속되는 위치가 반드시 고정적으로 지정되는 것이 필요하며 노드의 위치가 바뀌면 기존의 IP 주소는 사용할 수 없다. 그러나 mobile IP는 인터넷상의 임의의 다른 위치에 접속해 노드가 IP 주소를 바꾸지 않고 인터넷을 사용할 수 있도록 한다. 이동(mobile) 노드가 새로운 셀 지역으로 이동하면, 그 셀에 해당하는 외부(foreign) 에이전트로부터 임시 주소(care-of address)를 할당받아 홈 네트워크에 위치한 홈 에이전트에 등록하고, 홈 에이전트는 송신 노드가 이동노드로 전송한 패킷을 새롭게 등록된 임시 주소로 터널링을 통해 전달한다. 이러한 기본적인 mobile IP 방법은 모든 패킷이 홈 에이전트를 통해 이동 노드로 전송되므로 최적화된 라우팅 방법을 제공하지 못한다. 그러므로 이러한 mobile IP의 단점을 보완한 route optimization mobile IP가 제안되고 있다. Route optimization mobile IP는 이동 노드의 현재 위치와 관련된 정보를 갖는 바인딩을 저장하여 송신 노드가 패킷을 이동 노드의 홈 에이전트를 거치지 않고 이동 노드로 직접 전송하는 기능을 제공한다. 또한 이동 노드가 다른 셀 지역으로 핸드오프가 이루어질 경우, 핸드오프 발생전의 바인딩 정보를 이용하여 송신 노드가 전송한 패킷은 이전 셀 지역에 있는 에이전트가 새로운 셀 지역에 있는 이동 노드로 패킷을 재전송하여 전달하는 smooth 핸드오프 기능을 제공한다. 이전 셀 지역에 속한 외부 에이전트가 바인딩을 갱신하기 전에 송신 노드로부터 이동노드로 전달된 패킷이 있을 경우는 패킷을 저장하여 이후에 이동 노드의 위치 정보에 관한 바인딩 정보가 갱신되면 이러한 바인딩 정보에 따라 패킷을 재전송하는 버퍼기능도 제공한다. route optimization mobile IP는 기본적인 mobile IP에서의 복잡한 라우팅 문제를 해결하고, 핸드오프에서의 패킷 손실률을 최소화 한다.본 논문에서는 컴퓨터 시뮬레이션을 통해 smooth 핸드오프를 이용한 mobile IP의 성능을 분석한다. 일반적으로 데이터 트래픽 특성, 노드의 이동성, 바인딩 갱신시간, 버퍼관리 방법 등은 핸드오프 동안 mobile IP의 성능에 많은 영향을 미친다. 따라서 시뮬레이션 모델을 이용하여 다양한 트래픽 환경에서 위에 언급된 성능 파라미터들의 영향을 분석한다. 마지막으로 시뮬레이션 결과를 이용하여 mobile IP의 성능을 개선시키기 위한 방법을 제시한다.

  • PDF

A Study on Single Sign-On Authentication Model using Multi Agent (멀티 에이전트를 이용한 Single Sign-On 인증 모델에 관한 연구)

  • 서대희;이임영
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.7C
    • /
    • pp.997-1006
    • /
    • 2004
  • The rapid expansion of the Internet has provided users with a diverse range of services. Most Internet users create many different IDs and passwords to subscribe to various Internet services. Thus, the SSO system has been proposed to supplement vulnerable security that may arise from inefficient management system where administrators and users manage a number of ms. The SSO system can provide heightened efficiency and security to users and administrators. Recently commercialized SSO systems integrate a single agent with the broker authentication model. However, this hybrid authentication system cannot resolve problems such as those involving user pre-registration and anonymous users. It likewise cannot provide non-repudiation service between joining objects. Consequently, the hybrid system causes considerable security vulnerability. Since it cannot provide security service for the agent itself, the user's private information and SSO system may have significant security vulnerability. This paper proposed an authentication model that integrates a broker authentication model, out of various authentication models of the SSO system, with a multi-agent system. The proposed method adopts a secure multi-agent system that supplements the security vulnerability of an agent applied to the existing hybrid authentication system. The method proposes an SSO authentication model that satisfies various security requirements not provided by existing broker authentication models and hybrid authentication systems.