• Title/Summary/Keyword: 개인정보삭제

Search Result 121, Processing Time 0.053 seconds

A GDPR based Approach to Enhancing Blockchain Privacy (GDPR에 기반한 블록체인 프라이버시 강화 방안)

  • Han, Sejin;Kim, Suntae;Park, Sooyoung
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.19 no.5
    • /
    • pp.33-38
    • /
    • 2019
  • In this paper, we propose a new blockchain technology that could comply with GDPR. The proposed model can prevent illegal access by controlling access to the personal information according to a access policy. For example, it can control access to the information on a role-basis and information validation period. The core mechanism of the proposed model is to encrypt the personal information with public key which is associated with users attributes policy, and then decrypt it with a private key and users attributes based on a Attribute-based Encryption scheme. It can reduce a trusted third-part risk by replacing it with a number of nodes selected from the blockchain. And also the private key is generated in the form of one-time token to improve key management efficiency. We proved the feasibility by simulating the proposed model using the chaincode of the Hyperledger Fabric and evaluate the security.

Cards Automated Designed Research for Personal Information Leak Prevention (개인정보 유출 방지를 위한 명함 자동화 설계 연구)

  • Park, Jong-Youel;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.10a
    • /
    • pp.275-277
    • /
    • 2015
  • This paper proposed have been the business card information to the computer when creating business card printing agency saved to a file, there is always the risk of personal information leakage. Application file organization information into the card, the name, phone number, email address information, such as is capable of easily accessible because it is not encrypted. This paper proposed it encrypts the information entered on the Business Card application file to automate the process of the card application and simplifying the business card application process minimizes the work of staff and linked directly to the print shop how to automatically delete the print file after the completion of business card printing and research.

  • PDF

Economic Valuation of the Right to be Forgotten (잊힐 권리의 경제적 가치 추정 연구)

  • Lee, Mi-Suk;Cho, Young-Sang
    • Informatization Policy
    • /
    • v.25 no.2
    • /
    • pp.84-96
    • /
    • 2018
  • The right to be forgotten means the right of people to request information and communication providers to delete their information online. As the number of people asking for deletion of their past embarrassing or negative online activities is increasing, discussions are being raised on the introduction of the right to be forgotten in South Korea. However, previous research on the right to be forgotten mainly deals with the legal concept, with insufficient consideration of economic value. The main purpose of this research is to examine social perception towards the right to be forgotten and to estimate its economic value quantitatively. According to the results, there are concerns about disclosure of personal information, but with lack of awareness on the right to be forgotten. The monthly average amount that a person is willing to pay to be forgotten is 1,218 Korean won (11 US dollars) and the total economic value is estimated to be about 540 billion won (490 million dollars) per year in 2017. Especially, those who have experienced leakage of personal information put higher value to the right to be forgotten. These results can be useful for making decisions about the right to be forgotten in the future.

Efficient Multicast Key Management for Stateless Receivers (스테이트리스 리시버를 위한 효율적인 멀티캐스트 키관리)

  • Ki, Ju-Hee;Kim, Hyun-Jueong;Lee, Dong-Hoon;Park, Chang-Seop
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2002.11b
    • /
    • pp.841-844
    • /
    • 2002
  • 이 논문에서는 동적이고 규모가 큰 그룹에 대해서 한명의 그룹 관리자가 존재하면서, 특별히 새로운 그룹키가 갱신될 때마다 새로운 정보를 받기 힘든 구성원, 즉 스테이트리스 리시버(stateless receiver)에게 적합한 방법을 제안한다. 이 방법은 구성원에게 각각 한 개씩 주어지는 개인키를 전송하는 메시지를 제외한 다른 모든 메시지들에는 암호화 과정이 요구되지 않는다. 즉, 갱신된 그룹키를 공유하기 위해 필요한 계산은 단지 O($log_2$n) 번의 해쉬함수 계산과 배타적 논리합(XOR)을 수행하는 것이며, 그룹키를 갱신하기 위해 필요한 정보는 암호화될 필요없는 멀티캐스트 메시지와 그룹에 추가될 때 그룹 관리자로부터 받은 초기값이다. 또한 제안하는 방법은 새롭게 추가된 사람이 이전의 그룹키에 대한 어떠한 정보도 알 수 없으며(후방보호 : Backward Secrecy), 삭제되는 사람 역시 이후의 새로운 그룹키에 대한 정보를 알 수 없다(전방보호 : Forward Secrecy). 또한 제안된 방법에 게시판이 이용된다면, 각 그룹의 구성원은 어떠한 멀티캐스트 메시지없이 단지 자신의 초기 개인키만으로 필요한 모든 노드키들을 계산할 수 있다.

  • PDF

Development of a Management System for Image and Personal Information for the Development of a Standard Brain for Diverse Koreans (다양한 한국인의 표준뇌를 개발하기 위한 영상 및 개인정보 관리 시스템의 개발)

  • 정순철;최도영;이정미;박현욱;손진훈
    • Journal of Biomedical Engineering Research
    • /
    • v.25 no.1
    • /
    • pp.77-82
    • /
    • 2004
  • The purpose of this study is to establish a reference for image acquisition for completion of a standard brain for diverse Korean population, and to develop a management system that saves and manage database of the acquired brain image and personal information of those who were tested. 3D MP-RAGE technique, which has excellent SNR and CNR and reduces the times for image acquisition, was selected for anatomical Image acquisition, and parameter values were obtained for the optimal image acquisition. The database management system was devised to obtain not only anatomical image data but also subjects' basic demographic factors, medical history, handedness inventory state-trait anxiety inventory, A-type personality inventory, self-assessment depression inventory questionnaires of Sasang Constitution Mini-Mental State Examination, intelligence test, and personality test via a survey questionnaire and to save and manage the results of the tests. In addition, this system was designed to have functions of saving, inserting, deleting, searching, and Printing of image da a and personal information of subjects, and to have accessibility to them as well as automatic connection setup with ODBC. This newly developed system may have major contribution to the completion of a standard brain of diverse Korean population in that it can save and manage their image date and personal information.

The design of Biometrics System to enhance the security through the Distributed Stored of Multiple Split bio_Templates (생체정보 다분할 분산저장 기법을 통한 보안성 향상의 생체인증 시스템 설계)

  • Hong, Yoon Kee;Yoon, Ji Won
    • Convergence Security Journal
    • /
    • v.16 no.7
    • /
    • pp.31-39
    • /
    • 2016
  • The biometrics information is very useful by the convenience of ownership and using. but the risk of crime of malicious re-uses and infringement of personal privacy exist because the biometrics information is impossible to change typically when the illegal interception occurred from others. therefore the importance of security on stored management of biometrics information has been increased steadily. the existing biometric authentication system has been stored only encrypted complete template at a single storage place. In this paper, we designed the Distributed Stored of Multiple Split bio_Template System that a template is divided in different ways by each user and stored in other storage places from personal information to relieve user's anxiety about the saved template and illegally leaked through restored only template to authenticate and then delete.

Analysis on Pending Issue of Information Security for Smart Disaster Investigation (스마트 재난피해조사를 위한 정보보안 현안 분석)

  • Cho, Jae-Woong;Choi, Woo-Jung;Choi, Seon-Hwa
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2012.06b
    • /
    • pp.28-30
    • /
    • 2012
  • 2010년 이후 국내 스마트폰 보급은 급속히 증가하여 2011년에 이미 스마트폰 가입자수가 2천만명을 넘어서면서 계속하여 증가하고 있으며, '12년 하반기에는 휴대폰 가입자중 79%가 스마트폰을 차지할 것으로 예측하고 있다(마케팅인사이트, '12.02). 이러한 스마트폰의 증가와 함께 스마트폰을 이용한 각종 서비스 및 업무의 비중도 증가하고 있으며, 이에 대한 정보보안의 문제도 이슈화 되고 있다. 특히 스마트폰의 경우 일반 PC와 비교하여 보안에 취약하며, 특히 분실/도난 등으로 인한 개인정보의 유출위험성 또한 높다. 본 연구에서는 국립방재연구원에서 추진중인 스마트 재난피해조사를 바탕으로 정보보안의 현안을 분석하였으며, 스마트폰 내 정보저장에 대한 보안취약을 해결하기 위해서는 MDM(Mobile Device Management)를 이용한 단말의 통제 뿐만 아니라 1차적으로 단말의 접근을 통제할 수 있는 얼굴인식, 지문인식 등의 인체인식기술과 저장된 정보의 해킹으로 인한 유출을 방지하기 위한 복호화 및 자동삭제 기능 등을 도입하여야 할 것으로 판단된다.

A Method on Protecting User Information in Lost Mobile (모바일 단말기 분실 시 사용자 정보 보호방안)

  • Jeong, Woo-Cheol;Hwang, Jae-Yeon;Lee, Dong-Min;Lee, Kyung-Seok;Jeon, Moon-Seog
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2009.04a
    • /
    • pp.1432-1435
    • /
    • 2009
  • 최근 모바일 단말기의 급격한 발전으로 인해 단말기에 유입되는 정보의 중요성이 더욱 부각되고 있다. 분실 혹은 도난 시 발생하는 사고는 서비스 과다 사용으로 인한 금전적인 피해뿐만 아니라 사용자 정보 유출 등으로 인한 정신적인 피해, 개인정보를 악용한 협박 등의 범죄로 점차 발전하여 그 심각성은 나날이 더해가고 있는 실정이다. 본 논문에서는 모바일 단말기와 이동통신사간의 상호인증을 통하여 원격제어 권한을 얻어 사용자 정보를 판독 불가능 상태 혹은 삭제할 수 있게 하여 외부 노출 시 안전하게 보호할 수 있게 하고, 이동통신사를 통해 사용자 정보를 안전하게 수집하여 향후 원래 상태로 완벽하게 복구할 수 있는 시스템을 제안한다.

Cultural Differences of Choice on Interaction Problem (인터랙션 문제에 대한 선택의 문화적 차이)

  • Yeoun, Myeong-Heum
    • Science of Emotion and Sensibility
    • /
    • v.13 no.4
    • /
    • pp.711-720
    • /
    • 2010
  • This study is aimed to compare choices on interaction problems, and to consider the reason of the choices. It was expected that the interaction problems are influenced from national culture, age, gender and so on. The first interaction problem in this study is default answer button when user operates to delete all messages on SMS in-box. Second one is action when pop-p window warning dangerousness of install showed on web browsing. The third one is type(analog/digital) and information expression of control panel on soup maker. 639 Korean data and 784 data from China, Japan and the Netherlands are analyzed through cross-tabulation and chi-square test. In the results, many Japanese choose 'No' answer at SMS delete problem, while many Dutch choose 'Yes'. The result suggests that uncertainty avoidance effect on interaction problems. On warning pop-up, Younger generation and men choose actively 'install' than older one and women. On type of control panel, Dutch subjects preferred analog type than other countries' subjects. On expression of control panel, older generation and individualistic subjects relatively preferred text style than other style.

  • PDF

Research of Specific Domestic De-identification Technique for Protection of Personal Health Medical Information in Review & Analysis of Overseas and Domestic De-Identification Technique (국내외 비식별화 기술에 관한 검토 분석에 따른 개인건강의료정보 보호를 위한 국내 특화 비식별화 기술 제안에 관한 연구)

  • Lee, Pilwoo;In, Hanjin;Kim, Cheoljung;Yeo, Kwangsoo;Song, Kyoungtaek;Yu, Khigeun;Baek, Jongil;Kim, Soonseok
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.6 no.7
    • /
    • pp.9-16
    • /
    • 2016
  • As life in a rapidly changing Internet age at home and abroad, large amounts of information are being used medical, financial, services, etc. Accordingly, especially hospitals, is an invasion of privacy caused by leakage and intrusion of personal information in the system in medical institutions, including clinics institutions. To protect the privacy & information protection of personal health medical information in medical institutions at home and abroad presented by national policies and de-identification processing technology standards in accordance with the legislation. By comparative analysis in existing domestic and foreign institutional privacy and de-identification technique, derive a advanced one of pseudonymization and anonymization techniques for destination data items that fell short in comparison to the domestic laws and regulations, etc. De-identification processing technology for personal health information is compared to a foreign country pharmaceutical situations. We propose a new de-identification techniques by reducing the risk of re-identification processing to enable the secondary use of domestic medical privacy.