• Title/Summary/Keyword: 개인정보침해

Search Result 617, Processing Time 0.025 seconds

원격의료 정보시스템의 바이오 인증 융합기술

  • Hwang, Yu-Dong;Lee, You-Ri;Park, Dong-Gue;Shin, Yong-Nyuo;Kim, Ja-Son
    • Review of KIISC
    • /
    • v.17 no.5
    • /
    • pp.32-39
    • /
    • 2007
  • 언제 어디서나 예방, 진단, 치료, 사후 관리의 보건 의료 서비스를 제공하는 Ubiquitous-Healthcar(U-HC)는 최근 초보적인 단계로 IT기술과 의료 시스템이 결합된 원격 또는 재택 진료 시스템이 선을 보이고 있다. 하지만 원격 의료 시스템의 개인 신상 및 바이오 유출은 환자의 프라이버시 침해의 가능성을 내포하고 있다. 따라서 본고에서는 원격 의료 정보 시스템의 인증을 강화하기 위하여 Telebiometrics X.tsm과 X.tai 표준을 기반으로 하는 바이오 인식 기반 원격의료 정보 시스템의 사용자 인증 모델의 예를 제시하고 Telebiometrics의 X.tpp를 기반으로 시스템에서 발생 할 수 있는 취약성 및 위협을 분석한다.

A Study on the Improved SNS Implementation (개선된 SNS 구현에 관한 연구)

  • Park, Chun-Myoung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.05a
    • /
    • pp.876-877
    • /
    • 2014
  • In recently, the SNS which is the hot issue of the knowledge-based information age use various goal based on human networking. This service construct a human relationship which exchange of information and opinion freely, and can extend the human network relationship using open his profile and closeness others. But, each individual's privacy invasions and pissing based on information open and sharing are rising. In this paper we present a method of protecting the SNS group's communications and information interchangeability efficiently.

  • PDF

A Web Service Software Development Lifecycle to Reduce Cyber Attack (웹서비스의 사이버 위협을 줄이기 위한 소프트웨어 개발 방법론)

  • Kim, Ji-Yong;Lee, Song-Hee;Choi, Jin-Young
    • Annual Conference of KIPS
    • /
    • 2010.04a
    • /
    • pp.993-996
    • /
    • 2010
  • 우리나라의 전자정부 서비스 대부분은 웹 환경을 기반으로 하고 있으며, 이는 국민생활의 질적인 향상을 가져온 반면 개인정보의 수집, 활용, 유통이 급격히 증가되면서 각종 프라이버시침해, 사이버 위협 등의 부작용이 수반되고 있으며 웹 브라우저의 다양화에 따른 웹접근성이 해결되어야 하고, 장애우 차별을 금지하기 위한 서비스가 동시에 제공되어야 한다. 따라서 웹서비스를 대상으로 하는 사이버 위협에 대한 보안대책과 다양한 서비스에 대한 대책이 중요한 요소로 부각되고 있다. 웹 환경에서의 보안문제를 해결하기 위해 기존에는 방어벽등 보안 모듈 부분을 강화하는데 초점을 맞추었으나, 본 논문에서는 그에 국한되지 않고 소프트웨어 개발초기 단계인 분석, 설계단계에서부터 보안문제를 고려하여 운영단계에 이르기까지 보안 취약점을 해결할 수 있는 방안을 제시하였다.

Design and Implementation of u-Healthcare Server Login System by PKI user Authentication (PKI 사용자 인증을 통한 u-Healthcare 서버 로그인 시스템 설계 및 구현)

  • Yun, Sung-Yuol;Kim, Cheol-Joong;Park, Seok-Cheon
    • Annual Conference of KIPS
    • /
    • 2007.05a
    • /
    • pp.997-1000
    • /
    • 2007
  • u-Healthcare란 언제 어디서나 의료 장비 및 센서 등을 이용하여 수집된 생체 정보를 유선 또는 무선의 통신수단을 이용하여 유비쿼터스를 지향하는 지능형 의료정보를 제공하는데 목적을 두고 있는 서비스이다. 각종 센서에서 수집된 생체 신호 및 의료 데이터는 그 데이터를 필요로 하는 기관 또는 병원 등에 전송되어야 하는데, 현시점에서는 하드웨어나 서비스 중심의 구현에만 집중되고 있어서 전송시에 보안에 대한 연구가 제대로 이루어 지지 않고 있다. 또한 이와 같은 이런 정보들은 개인에게는 매우 중요한 데이터로써 외부로 노출될 시에 심각한 프라이버시 침해가 예상된다. 이를 위해 본 논문에서는 PKI 사용자 인증을 통하여 본인 여부를 확인하여 u-Healthcare서버에 로그인 하는 시스템을 설계하고 구현하였다.

A Study on Adversarial AI Attack Techniques for Privacy Protection (프라이버시 보호를 위한 적대적 AI 공격기법의 연구)

  • Hye-Won Jo;Ji-Eun Han;Min-Sol Kim;Ju-Hyeon Park;Ye-Ryeong Hong;Gyu-young Lee
    • Annual Conference of KIPS
    • /
    • 2024.10a
    • /
    • pp.1037-1038
    • /
    • 2024
  • AI 기술이 발전함에 따라 개인정보 유출 및 딥페이크 등의 프라이버시 침해가 심각한 사회적 문제로 대두되고 있다. 본 연구는 프라이버시 보호를 위해 FGSM, One-Pixel, Deepfool, JSMA 등 적대적 공격기법을 소프트웨어로 구현하고, 이를 활용하여 얼굴인식 AI 시스템을 공격하는 실험을 수행하였으며, 그 결과 정보 보호를 위한 최적의 적대적 공격 방안을 도출하였다.

Protection of Human Genetic Information and Citizens Participation (인간 유전정보 보호와 시민참여)

  • Lee Young-Hee;Kim Myoung-Jin;Kim Byoung-Soo
    • Journal of Science and Technology Studies
    • /
    • v.3 no.1 s.5
    • /
    • pp.41-73
    • /
    • 2003
  • Personal genetic information is information about a person's genetic characteristics, which may reveal important information about private matters such as susceptibility to disease. Progress in genetics makes it much easier to obtain personal genetic information, and this leads to concerns about confidentiality and security of genetic information, and about possible genetic discrimination. This paper examines social issues related to human genetic information in terms of individual identification, diagnosis of diseases, and non-medical genetic test, and then tries to provide desirable citizens participation methods that can be used when making public policies related to genetic information protection.

  • PDF

Study on the personal Information Retrieval of Smartphone Messenger Service (스마트폰 메신저 어플리케이션에서의 개인정보보호에 관한 연구)

  • Kang, Sunghoon;Kim, Seungjoo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.1
    • /
    • pp.97-107
    • /
    • 2013
  • The recent increase in smartphone usage has ignited the development of new applications which have changed the way of living in this internet era in the world. Almost all users which have smartphone have used many kinds of applications for lots of part. Especially, Social Network Service is the most popular part for smartphone users. The greater part of smartphone users take messenger service for smartphone. This kinds of applications provide to manage as deactivation of user or change of device. When users take to manage their information, their information would be deleted securely. If secure deletion didn't work correctly and released, their personal information can be easily abused to by others through various means such as internet phishing. In this paper, we analysis that the messenger application's management function keeps on the Personal Information Protection Act and suggest to prevent legally and technically for user's personal information and privacy.

Privacy-Preserving Credit Scoring Using Zero-Knowledge Proofs (영지식 증명을 활용한 프라이버시 보장 신용평가방법)

  • Park, Chul;Kim, Jonghyun;Lee, Dong Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.6
    • /
    • pp.1285-1303
    • /
    • 2019
  • In the current credit scoring system, the credit bureau gathers credit information from financial institutions and calculates a credit score based on it. However, because all sensitive credit information is stored in one central authority, there are possibilities of privacy violations and successful external attacks can breach large amounts of personal information. To handle this problem, we propose privacy-preserving credit scoring in which a user gathers credit information from financial institutions, calculates a credit score and proves that the score is calculated correctly using a zero-knowledge proof and a blockchain. In addition, we propose a zero-knowledge proof scheme that can efficiently prove committed inputs to check whether the inputs of a zero-knowledge proof are actually provided by financial institutions with a blockchain. This scheme provides perfect zero-knowledge unlike Agrawal et al.'s scheme, short CRSs and proofs, and fast proof and verification. We confirmed that the proposed credit scoring can be used in the real world by implementing it and experimenting with a credit score algorithm which is similar to that of the real world.

A Test of Situational Action Theory for Explaining the Moderating Effect of Self-Control and Deterrence in Digital Piracy: Comparing Download with Upload Behavior (디지털 저작권침해 행위에서 상황행위이론의 적용을 통한 자기통제와 처벌억제의 조절효과: 다운로드와 업로드 행위의 비교)

  • Lee, Seong-Sik;Jang, Ha-Young;Lim, Su-Kyung
    • Journal of Digital Convergence
    • /
    • v.19 no.4
    • /
    • pp.9-17
    • /
    • 2021
  • This study test a situational action theory for explaining online download and upload digital piracy and examines the moderating effect of self-control and punishment. Then it tests the moderating effect of self-control in high morality and low moral rule environments and tests the moderating effect of perceived punishment in low morality and high moral rule environments. Using data from 317 college students in Seoul, In case of download, results show that self-control does not control the effects of high morality and low moral rule on it. In addition, it is found that perceived punishment does not control the effects of low morality and high moral rule on it. In case of upload, results show that self-control does not control but increase the effects of high morality and low moral rule on it, while perceived punishment controls the effects of high morality and low moral rule on it.

A Study on The Preference Analysis of Personal Information Security Certification Systems: Focused on SMEs and SBs (개인정보보호 인증제도 선호도 분석에 관한 연구: 중소기업 및 소상공인을 중심으로)

  • Park, Kyeong-Tae;Kim, Sehun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.5
    • /
    • pp.911-918
    • /
    • 2014
  • Over the past few years, security breaches have been consistently reported around the world. Especially, people's personal information are at risk of being breached as the firms gather and utilize the information for their marketing purposes. As an effort to revamp their data infrastructures, companies have rebuilt their system that almost every data, including the personal information, are stored within the digital database. However, this migration provides easier access to the database but it has also increased the system vulnerability. As the data can be easily exposed to the unauthorized personnel both intentionally and unintentionally, it is necessary for companies to establish a set of security protocol and operate the personal information protection system. There are two major certified security system in South Korea; PIMS from KISA and PIPL from NIA. This paper analyzes the preferences of SMEs and small business using conjoint attributes of PIMS and PIPL. The study shows that the business owners take post certification rewards as the most important factor. It also shows that the attributes that have the highest utility rates are the following; 1) KISA certification, 2) 79 points of protection counter measurements, 3) 28 items of life cycle, 3) 50 percent discount on certification fee, and 4) Reduced amount of fine for personal information leakage incident.