• Title/Summary/Keyword: 개인 식별

Search Result 1,441, Processing Time 0.029 seconds

Considering on De-Identification Method of Personal Information for National Medical Institute by using correlation (상관도를 이용한 국내 의료기관용 개인정보 비식별화 방안에 관한 연구)

  • Yeo, Kwang Soo;Kim, Chul Jung;Lee, Jae Hyun;Kim, Soon Seok
    • Smart Media Journal
    • /
    • v.5 no.4
    • /
    • pp.83-89
    • /
    • 2016
  • Guidelines for protecting personal information are already in progress in USA, UK and other countries and announced many guideline like HIPPA. However In Our national environment, we does not have specialized guideline in national medical industries. This thesis suggest De-indentification method in South Korea by referring 'bigdata De-identification Guideline by Ministry of Science, ICT and Future Planning (2015)', ICO in U. K and IHE, NIST, HIPPA in U. S. A. We suggest also correlation between Guidelines. Corelation means common techniques in three guidelines (IHE, NIST, HIPPA in U. S. A). As Point becomes closer five points, We recommend that technique to national medical institute for De-Identification. We hope this thesis makes the best use of personal information's development in National medical institute.

A Large-scale Test Set for Author Disambiguation (저자 식별을 위한 대용량 평가셋 구축)

  • Kang, In-Su;Kim, Pyung;Lee, Seung-Woo;Jung, Han-Min;You, Beom-Jong
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.11
    • /
    • pp.455-464
    • /
    • 2009
  • To overcome article-oriented search functions and provide author-oriented ones, a namesake problem for author names should be solved. Author disambiguation, proposed as its solution, assigns identifiers of real individuals to author name entities. Although recent state-of-the-art approaches to author disambiguation have reported above 90% performance, there are few academic information services which adopt author-resolving functions. This paper describes a large-scale test set for author disambiguation which was created by KISTI to foster author resolution researches. The result of these researches can be applied to academic information systems and make better service. The test set was constructed from DBLP data through web searches and manual inspection, Currently it consists of 881 author names, 41,673 author name entities, and 6,921 person identifiers.

ID기반의 영지식 대화형 프로토콜을 이용한 개인 식별 및 키 분배 프로토콜에 관한연구

  • 이윤호
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.2 no.1
    • /
    • pp.3-14
    • /
    • 1992
  • 본 논문에서는 ZKIP의 랜덤 정보를 이용한 영지식 키 분배 프로토콜을 제안하였다.제안된 방식은 이미 안전하다고 입증된 ZKIP 을 이용한 개인 식별을 행하고 더 이상의 정보 교환 없이 키 생성을 할 수 있다. 또한 키 분배 프로토콜을 행할 때, 센터에 대한 의존도를 줄이기 위해 확장 Fist-Shamir방식과 Schnorr 방식을 결합하여 인증을 행하도록 하였다. 결합된 프로토콜은 제3자의 일반적인 위장을 방지할 수 있으며, 센터와 가입자의 결탁도 방지할 수 있다.

Implementation of efficient L-diversity de-identification for large data (대용량 데이터에 대한 효율적인 L-diversity 비식별화 구현)

  • Jeon, Min-Hyuk;Temuujin, Odsuren;Ahn, Jinhyun;Im, Dong-Hyuk
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2019.10a
    • /
    • pp.465-467
    • /
    • 2019
  • 최근 많은 단체나 기업에서 다양하고 방대한 데이터를 요구로 하고, 그에 따라서 국가 공공데이터나 데이터 브로커등 데이터를 통해 직접 수집 하거나 구매해야 하는 경우가 많아지고 있다. 하지만 개인정보의 경우 개인의 동의 없이는 타인에게 양도가 불가능하여 이러한 데이터에 대한 연구에 어려움이 있다. 그래서 특정 개인을 추론할 수 없도록 하는 비식별 처리 기술이 연구되고 있다. 이러한 비식별화의 정도는 모델로 나타낼 수가 있는데, 현재 k-anonymity 와 l-diversity 모델 등이 많이 사용된다. 이 중에서 l-diversity 는 k-anonymity 의 만족 조건을 포함하고 있어 비식별화의 정도가 더욱 강하다. 이러한 l-diversity 모델을 만족하는 알고리즘은 The Hardness and Approximation, Anatomy 등이 있는데 본 논문에서는 일반화 과정을 거치지 않아 유용성이 높은 Anatomy 의 구현에 대해 연구하였다. 또한 비식별화 과정은 전체 데이터에 대한 특성을 고려해야 하기 때문에 데이터의 크기가 커짐에 따라 실질적인 처리량이 방대해지는데, 이러한 문제를 Spark 를 통해 데이터가 커짐에 따라서 최대한 안정적으로 대응하여 처리할 수 있는 시스템을 구현하였다.

Recognition of Targets Using the Measured Data of KOMSAR (KOMSAR의 실측데이터를 이용한 표적 식별)

  • Choi, In-O;Park, Sang-Hong
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2013.05a
    • /
    • pp.1010-1011
    • /
    • 2013
  • 본 논문에서는 국방과학연구소에서 운용하는 KOMSAR(Korea Miniature Synthetic Aperture Radar)장비로 측정한 실제 항공기의 데이터를 이용하여 효율적인 표적식별을 수행하였다. 표적식별과정은 수신된 모든 데이터에 대하여 거리측면도를 구한 다음 4개의 표적으로 분리한 후, 효과적인 특성벡터를 구성하여 nearest neighbor(NN) 구분기로 표적식별 성능을 수행하였다. 표적식별수행 결과, 높은 구분성능으로 구분이 가능하였다.

Improvement of Incognito by using Bitmap Index (Bitmap Index을 이용한 Incognito 성능개선)

  • Kang, Hyun-Ho;Lee, Sang-Won
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2005.11a
    • /
    • pp.67-70
    • /
    • 2005
  • 현대사회에서는 자신도 알지못하는 많은 정보들이 유포된다. 이때 정보들은 개인의 익명성을 보장하기위해 성명, 성별, 주민등록번호와 같은 개인식별 애트리뷰트를 생략한채로 유포된다. 그러나 널리퍼져있는 이러한 정보들은 다른 외부 정보와 조인되므로써 유일하게 개인을 식별하게끔 하는 조인공격을 받을 수 있다. 하지만 이러한 조인공격시 여러데이터가나오게하므로써 개인식별을 어렵게 또는 불가능하게하는 방법을 k-anonymization이라고하고 이러한 k-anonymization을 지원하는 방법으로 이전부터 여러가지가 있다. 이전의 방법들로는 각 subset마다 k-anonymization을 검사해야했으나 Lefevre와 DeWitt가 제안한 Incognito 방법을 사용하면 한번의 검사로 모든k-anonymization을 보장할 수 있다. 이 논문에서는 이러한 Incognito를 bitmap index를 사용하므로써 성능을 개선시키는 기법을 제시한다.

  • PDF

A Study on the classification of Underwater Acoustic Signal Using an Artificial Neural Network (신경회로망을 이용한 수중음향 신호의 식별에 관한 연구)

  • Na, Young-Nam;Shim, Tae-Bo;Han, Jeong-Woo;Kim, Chun-Duck
    • The Journal of the Acoustical Society of Korea
    • /
    • v.14 no.2E
    • /
    • pp.57-64
    • /
    • 1995
  • In this study, we examine the applicability of the classifier based on an artifical neural network (ANN) for the low-frequency acoustic signal in shallow water environment. The estimations of the Doppler shift and frequency spreading effect at 220 Hz reveal the frequency variation of less than 2 Hz with time This small variation enables the ANN-based classifier to identify signals using only tonal frequency information. The ANN consists of 4 layers, and has 60 input processing elements (PEs) and 4 output PEs, respectively. When measured tonal signals in the frequency 200-250 Hz are applied to the ANN-based classifier, the classifier can identify more than 67% of the signals for instantaneous frame and more than 91% for averaged one over 5 frames.

  • PDF

Personal Information Exposure on Social Network Service (소셜네트워크서비스 개인정보 노출 실태 분석)

  • Choi, Daeseon;Kim, Seok Hyun;Cho, Jin-Man;Jin, Seung-Hun;Cho, Hyun-Sook
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.5
    • /
    • pp.977-983
    • /
    • 2013
  • This paper presents result of researching personal information exposure of Korean twitter and facebook users. Personally identifiable information such as e-mail and phone numer is exposed in the accounts less than 1%. However there are many cases that a person is identified by non personally identifiable information. For example, 350 thousands accounts are distinguished with other accounts because its name is unique. Using combination of information such as name and high school, we can distinguish 2.97 millions accounts. We also found 170 thousands account pairs that are candidate of one users' own account. Linkability between two accounts in two different domains means that the person is identified. Currently, only personally identifiable information is protected by policy. This paper shows that the policy has limited effects under the circumstances that a person can be identified by non personally identifiable information and the account linking is possible.

A Study on the Analysis of Identification System and the Linkage Method of Academic-information (학술정보의 식별체계 현황 분석 및 연계 방안 연구)

  • Gang, Ju-Yeon;Seol, Jae-Wook;Hwang, Hyekyong
    • Journal of Korean Library and Information Science Society
    • /
    • v.51 no.1
    • /
    • pp.115-143
    • /
    • 2020
  • With the era of the 4th Industrial Revolution, the number of data-centric integrated researches increases. The integrated researches make information identification and linkage more important, so it is necessary to seek a method to efficiently manage and share academic-information for supporting the researches. Therefore, this study aims to analyze identification system and linkable information types of 12 major academic search engines and bibliographic databases(ASEBDs) in Korea and abroad and to propose a method to identify and link academic-information. The analysis was conducted 2 times, and academic-information types, searchable fields, linkable information types, used identification system were investigated. As a result, the ASEBDs link directly or/and indirectly 3~4 information types based on their own identifiers with persistent identifiers. In addition, they identify academic-information semi-automatically based on machine learning methodology and collect and manage the related data. Finally, the method for academic-information linkage was proposed in terms of practice and society: linkage based on persistent identifiers and linkage based on collaborative network of institutions.

A study on the method of measuring the usefulness of De-Identified Information using Personal Information

  • Kim, Dong-Hyun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.6
    • /
    • pp.11-21
    • /
    • 2022
  • Although interest in de-identification measures for the safe use of personal information is growing at home and abroad, cases where de-identified information is re-identified through insufficient de-identification measures and inferences are occurring. In order to compensate for these problems and discover new technologies for de-identification measures, competitions to compete on the safety and usefulness of de-identified information are being held in Korea and Japan. This paper analyzes the safety and usefulness indicators used in these competitions, and proposes and verifies new indicators that can measure usefulness more efficiently. Although it was not possible to verify through a large population due to a significant shortage of experts in the fields of mathematics and statistics in the field of de-identification processing, very positive results could be derived for the necessity and validity of new indicators. In order to safely utilize the vast amount of public data in Korea as de-identified information, research on these usefulness metrics should be continuously conducted, and it is expected that more active research will proceed starting with this thesis.