• Title/Summary/Keyword: 민감개인정보

Search Result 297, Processing Time 0.028 seconds

Privacy Information Protection Model in e-Healthcare Environment (e-Healthcare 환경 내 개인정보 보호 모델)

  • Kim, Kyong-Jin;Hong, Seng-Phil
    • Journal of Internet Computing and Services
    • /
    • v.10 no.2
    • /
    • pp.29-40
    • /
    • 2009
  • The development of information technology such as the internet has brought about rapidly changes the old medical technology, e-Healthcare has been to raise social issue. The e-Healthcare which new turning point of paradigm in the medical information develops the medical policy in Korea and the technology, the prospective of reverse engineering in internet environment is incurring problems such as distribution of critical information and invasion and infringement of privacy, etc. In this research, we suggest the Role Based Access Control System, HPIP-e-Healthcare Privacy Information Protection, for solving above problem. The HPIP is composed 4 mechanisms such as Consolidate User Identity, Hospital Authorization, Medical Record Access Control, Patient Diagnosis and we are also prototyping the HPIP for feasible approach in the real computing environment.

  • PDF

A Study on Laws Related to Anonymization of Medical Image Information in PACS (PACS에서 의료영상정보의 익명처리와 관련된 법의 연구)

  • Kweon, Dae Cheol
    • Journal of the Korean Society of Radiology
    • /
    • v.16 no.5
    • /
    • pp.627-637
    • /
    • 2022
  • The purpose of this study is to comply with the operation and management of medical image information in PACS, the necessity of anonymizing the patient's personal information and the management status of the medical image information related to the personal The purpose of this study was to raise, discuss, and suggest the need for unification and coherence of the law by studying the content of the issues related to information related laws. In order to utilize information related to medical image information, it is necessary to unify the "Medical Act" or the "Bioethics Act" for clear legal application and consider the legal system's consistency. Since there is a possibility of conflict due to issues that are not yet established, systematic coherence of the law is required to find the basic common denominator for the utilization and use of medical image information and to harmonize the law. In addition, the necessity of enacting the "Medical Information Protection Act" that can be practically applied and easily practiced by medical personnel and managers in the clinical field so that sensitive matters of medical image information and personal information can be protected and managed in a specific and systematic way.

A Study on Undeniable Multi-Signatures Scheme (부정할 수 없는 다중 서명 기법에 관한 연구)

  • 최재귀;김문수;박지환
    • Proceedings of the Korea Multimedia Society Conference
    • /
    • 2000.04a
    • /
    • pp.111-116
    • /
    • 2000
  • 컴퓨터네트워크를 통한 정보의 이동이 빈번한 오늘날, 중요 정보를 지키는 정보 보호 기술의 요구는 점차 늘어나고 있다. 이에 따라, 통신망 상의 프라이버시 보호, 기밀성, 무결성 같은 개인정보보호를 위해서 필수적인 암호학적 도구로 디지털 서명이 이용되고 있다. 본 논문에서는 이산대수 문제의 어려움에 기반하여, 디지털 서명대상을 2명에서 n명으로 확대한 다중서명 기법에 서명자 전원의 동의 없이는 서명을 검증할 수 없는 부정할 수 없는 서명의 기능을 부여한다. 이는 전자, 선거, 전자 현금 등 보다 복잡하고 민감한 사회적 영역에 적용될 수 있을 것이다.

  • PDF

Windows 10 환경의 Box 클라우드 아티팩트 분석

  • Yun, Hyemin;Kim, Jaeuk;Hwang, Eunbi;Kim, Haeni;Kwon, Taekyoung
    • Review of KIISC
    • /
    • v.29 no.6
    • /
    • pp.29-37
    • /
    • 2019
  • 클라우드 서비스는 사용자에게 데이터 저장, 공유, 다운로드 등을 용이하게 해주는 성질과 시, 공간적 특성과 관계없이 사용할 수 있는 특성으로 최근 IT 산업에서 많이 사용되고 있다. 그러나 서버가 공격당할 경우 데이터와 사용자 개인 정보를 포함한 민감 정보가 유출되는 등 다양한 범죄에 노출되어 있다. 이러한 이유로 클라우드의 포렌식 분석 필요성이 증가하였으며, 현재 많이 상용화되어 있는 응용 프로그램에 대해서는 많은 연구가 진행되었다. 본 논문에서는 Box 클라우드에 대해 포렌식 분석을 진행하고 수집한 아티팩트에 관해 설명한다.

Pseudonymization's effect on data quality: A study under personal information protection act (개인정보보호법에 따른 가명처리로 인한 데이터 손실이 데이터 분석의 정확도에 미치는 영향)

  • Minjeong Kim;Jae Keun Yoo
    • The Korean Journal of Applied Statistics
    • /
    • v.37 no.3
    • /
    • pp.381-393
    • /
    • 2024
  • This study investigates the impact of pseudonymization of personal information and its effect on the accuracy of data analysis. We quantitatively evaluated the relationship between the degree of pseudonymization and the accuracy of data analysis using logistic regression models, decision trees, and random forests. Through this, we confirmed that pseudonymizing sensitive information can realize personal information protection without significantly damaging data quality. However, we recognized limitations such as single sample data and consistent application of pseudonymization ratios. To overcome these limitations, additional research on diverse datasets is necessary to strengthen the generalizability of results. Moreover, we propose developing and applying methodologies to find optimal pseudonymization ratios for individual variables. The results from this study provide new insights into maintaining usability of data while achieving regulatory compliance and personal information protection.

Personal Information Protection for Biometric Verification based TeleHealth Services (바이오인식을 이용한 원격의료에서의 개인정보보호)

  • Shin, Yong-Nyuo;Chun, Myung-Geun
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.20 no.5
    • /
    • pp.659-664
    • /
    • 2010
  • This paper provides an integrated framework for biometric data and private information protection in TeleHealth. Biometric technology is indispensable in providing identification and convenience in the TeleHealth environment. Once biometric information is exposed to mallicious attacker, he will suffer great loss from the illegferuse of his biometric data by someone else because of difficulty of change not like ID and password. We have to buil by someone esystem data bon the integrated framework for biometric data and private information protection in TeleHealth. First, we consider the structure of the biometric system and the security requirements of y someone esystem data bon the biometrics. And then, we define the TeleHealth system model and provide the vulnerabilities and countermeasures of the biometric-data by someone eintegrated model.byhe TeleHealth sse bec requires two-phata authentication for countermeasure. Finally, we made some functionferrequirements for main componenets of biometric-data bintegrated TeleHealth system framework to protect biometric data.

Trait individual difference of reinforcement-based decision criterial learning during episodic recognition judgments (일화 재인 기억에서 강화에 근거한 의사결정 준거 학습의 특성 개인차 연구)

  • Han, Sang-Hoon
    • Korean Journal of Cognitive Science
    • /
    • v.20 no.3
    • /
    • pp.357-381
    • /
    • 2009
  • Although it is known that there are personality characteristic variances in the sensitivity to environmental feedback, the trait individual difference has scarcely been explored in the context of recognition memory decision. The present study investigated this issue by examining the relationship between the feedback-based adaptive flexibility of recognition criterion positioning and personality differences in general sensitivity to non-laboratory outcomes. Experiment 1 demonstrated that veridical feedback itself had little effect on the recognition decision criterion whereas Experiment 2 demonstrated that biased feedback manipulations selectively restricted to high confidence errors, induced shifts even in the overall Old/New category criterion. Critically, individual differences in stable personality characteristic linked to reward seeking(Behavioral Activation System-BAS) and anxiety avoidance (Behavioral Inhibition System-BIS) has been shown to predict the sensitivity of subjects to this form of feedback-induced criterion learning. This data further support the idea that incremental reinforcement-based learning mechanism not often considered important during explicit recognition decisions may play a key role in criterion setting.

  • PDF

A Study on Legal Issues of Data Portability and the Direction of Legislative Policy (개인정보 이동권의 법적 이슈와 입법 정책 방향)

  • Yi, Chang-Beom
    • Informatization Policy
    • /
    • v.28 no.4
    • /
    • pp.54-75
    • /
    • 2021
  • The right to data portability needs to be introduced to strengthen the self-control of data subjects and promote personal data use. However, the right to data portability constitutes a high risk of invasion of privacy of data subjects and may infringe on the property rights of data controllers, so careful and thorough design is warranted. The right to data portability can intensify the concentration and monopoly of personal data, result in problems of overseas transfer of personal data held by public institutions, and enrich only the profits of giant platforms by burdening the data subject with high transfer cost. By contrast, SMEs are more likely to endure a personal data deprivation. From the proposed amendment to the Personal Data Protection Act are raised various legal issues such as. i) Whether to include inferred/derived data, personal data held by public institutions, activity data, sensitive data, and personal data of third parties within the scope of data portability; ii) whether SMEs are included in the data porting organization; iii) whether to exclude SMEs or large platforms from the scope of the data receiving organization; iv) Whether to allow the right to transmit to other data controllers, v) Whether to allow the overseas transfer of personal data held by public institutions, vi) How to safely exercise the right to data portability, vii) the scope of responsibility and immunity of a data porting organization, etc. The purpose of this paper is to propose the direction for legislative action based on various legal issues related to data portability.

Trends in deep learning technology to protect the privacy of training data (학습 데이터의 프라이버시 보호를 위한 딥러닝 기술 동향)

  • Kim, Hyunji;Seo, Hwajeong
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2021.05a
    • /
    • pp.451-453
    • /
    • 2021
  • 2021년 9대 전략 기술 트렌드로 선정된 인공지능 기술은 다양한 산업 분야에 활용되었다. 그러나 많은 데이터를 필요로 하는 딥러닝의 특성상 민감 데이터 유출 및 악용과 같은 이슈가 존재한다. 최근 개인정보 보호를 위한 규제들이 강화되었으며, 이는 산업 발전을 저해할 것이라는 우려가 커지고 있다. 따라서 데이터 프라이버시 보호와 활용이 모두 가능한 방법론에 대한 연구들이 진행되어야한다. 본 논문에서는 민감 데이터를 보호를 위한 딥러닝 기술 동향에 대해 살펴본다.

Technique of Range Query in Encrypted Database (암호화 데이터베이스에서 영역 질의를 위한 기술)

  • Kim, Cheon-Shik;Kim, Hyoung-Joong;Hong, You-Sik
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.45 no.3
    • /
    • pp.22-30
    • /
    • 2008
  • Recently, protection of personal information is getting more important. Many countries have legislated about the protection of personal information. Now, the protection of relevant personal information is required not for a simple image of enterprises but law obligation. Most databases in enterprises used to store customers' names, addresses and credit card numbers with no exceptions. The personal information about a person is sensitive, and this asset is strategic. Therefore, most enterprises make an effort to preserve personal information safely. If someone, however, hacks password information of DBMS manager, no one can trust this system. Therefore, encryption is required based in order to protect data in the database. Because of database encryption, however, it is the problem of database performance in terms of computation time and the limited SQL query. Thus, we proposed an efficient query method to solve the problem of encrypted data in this paper.