• Title/Summary/Keyword: 보안신뢰

Search Result 1,280, Processing Time 0.028 seconds

Redactable Blockchain Based Authority Alteration and Accessn Control System (수정 가능한 블록체인 기반 권한 변경 및 접근 제어시스템)

  • Lee, Yeon Joo;Choi, Jae Hyun;Noh, Geontae;Jeong, Ik Rae
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.3
    • /
    • pp.513-525
    • /
    • 2022
  • The immutability of blockchain is core elements of security of blockchain and guarantee data integrity. However, the characteristic that the data recoreded once in the blockchain cannot be modified has place for abuse by a specific user. In fact improper contents that is inappropriate to be recorded on the blockchain, such as harmful data and user personal data, is exposed on Bitcoin. As a way to manage improper content existing in the blockchain, there is a redactable blockchain using chameleon hash proposed for the first time by Ateniese. The redactable blockchain meet the right to be forgotten of GDPR by allowing data modification and deletion. Recently, Research on personal data management is being conducted in a redactable blockchain. Research by Jia et al. proposed a model that enables users to manage their personal data in the redactable blockchain. However, semi trusted regulators, which are blockchain participation nodes, have powerful authority in the blockchain, such as modification rights and deprivation of transaction rights for all blocks, which may cause side effects. In this paper, to weaken the authority of regulators in Y. Jia et al., we propose a method of authority subject altering and authority sharing, and propose a redactable blockchain-based authority change and access control system model based on applicable scenarios.

A Study on the Use and Risk of Artificial Intelligence (Focusing on the eproperty appraiser industry) (인공지능의 활용과 위험성에 관한 연구 (감정 평가 산업 중심으로))

  • Hong, Seok-Do;You, Yen-Yoo
    • The Journal of the Korea Contents Association
    • /
    • v.22 no.7
    • /
    • pp.81-88
    • /
    • 2022
  • This study is to investigate the perception of domestic appraisers about the possibility of using artificial intelligence (AI) and related risks from the use of AI in the appraisal industry. We conducted a mobile survey of evaluators from February 10 to 18, 2022. We collected survey data from 193 respondents. Frequency analysis and multiple response analysis were performed for basic analysis. When AI is used in the appraisal industry, factor analysis was used to analyze various types of risks. Although appraisers have a positive perception of AI introduction in the appraisal industry, they considered collateral, consulting, and taxation, mainly in areas where AI is likely to be used and replaced, mainly negative effects related to job losses and job replacement. They were more aware of the alternative risks caused by AI in the field of human labor. I was very aware of responsibilities, privacy and security, and the risk of technical errors. However, fairness, transparency, and reliability risks were generally perceived as low risk issues. Existing studies have mainly studied analysis methods that apply AI to mass evaluation models, but this study focused on the use and risk of AI. Understanding industry experts' perceptions of AI utilization will help minimize potential risks when AI is introduced on a large scale.

An Efficient and Transparent Blockchain-based Electronic Voting and Survey System (효율성과 투명성을 확보한 블록체인 기반 전자투표 및 설문조사 시스템)

  • Kim, HyeonA;Na, YeonJu;Lee, JaeYun;Jeong, YuRi;Kim, Hyung-Jong
    • Journal of the Korea Society for Simulation
    • /
    • v.30 no.4
    • /
    • pp.9-19
    • /
    • 2021
  • Electronic voting has been recognized as an alternative to complement the limitations of existing paper voting. At the same time, security concerns are being raised. This paper presents a blockchain-based electronic voting and survey system that can guarantee reliability. Our smart contract was created using Solidity on Ethereum which is a blockchain-based distributed computing platform, and the system was implemented in connection with the Javascript based user interface. In addition, in order to protect the personal information of participants, the system is generating hash of the personal data and storing the hash of users for the contract data. Since we exploited different kinds of languages for the system, we derived items of functionality testing and presented the functionality testing result. Moreover, we made use of the Chrome's performance evaluation functionality to see the response time of the blockchain-based system. In addition, we compared the performance with the system which has the same functionality on database. The contribution of this research is design and implementation of blockchain-based electronic voting system and presentation of the functionality and performance simulation result.

A Study on the Safety Navigational Width of Bridges Across Waterways Considering Optimal Traffic Distribution (최적 교통분포를 고려한 해상교량의 안전 통항 폭에 관한 연구)

  • Son, Woo-Ju;Mun, Ji-Ha;Gu, Jung-Min;Cho, Ik-Soon
    • Journal of Navigation and Port Research
    • /
    • v.46 no.4
    • /
    • pp.303-312
    • /
    • 2022
  • Bridges across waterways act as interference factors, that reduce the navigable water area from the perspective of navigation safety. To analyze the safety navigational width of ships navigating bridges across waterways, the optimal traffic distribution based on AIS data was investigated, and ships were classified according to size through k-means clustering. As a result of the goodness-of-fit analysis of the clustered data, the lognormal distribution was found to be close to the optimal distribution for Incheon Bridge and Busan Harbor Bridge. Also, the normal distributions for Mokpo Bridge and Machang Bridge were analyzed. Based on the lognormal and normal distribution, the analysis results assumed that the safe passage range of the vessel was 95% of the confidence interval, As a result, regarding the Incheon Bridge, the difference between the normal distribution and the lognormal distribution was the largest, at 64m to 98m. The minimum difference was 10m, which was revealed for Machang Bridge. Accordingly, regarding Incheon Bridge, it was analyzed that it is more appropriate to present a safety width of traffic by assuming a lognormal distribution, rather than suggesting a safety navigation width by assuming a normal distribution. Regarding other bridges, it was analyzed that similar results could be obtained using any of the two distributions, because of the similarity in width between the normal and lognormal distributions. Based on the above results, it is judged that if a safe navigational range is presented, it will contribute to the safe operation of ships as well as the prevention of accidents.

A Study on Effective Adversarial Attack Creation for Robustness Improvement of AI Models (AI 모델의 Robustness 향상을 위한 효율적인 Adversarial Attack 생성 방안 연구)

  • Si-on Jeong;Tae-hyun Han;Seung-bum Lim;Tae-jin Lee
    • Journal of Internet Computing and Services
    • /
    • v.24 no.4
    • /
    • pp.25-36
    • /
    • 2023
  • Today, as AI (Artificial Intelligence) technology is introduced in various fields, including security, the development of technology is accelerating. However, with the development of AI technology, attack techniques that cleverly bypass malicious behavior detection are also developing. In the classification process of AI models, an Adversarial attack has emerged that induces misclassification and a decrease in reliability through fine adjustment of input values. The attacks that will appear in the future are not new attacks created by an attacker but rather a method of avoiding the detection system by slightly modifying existing attacks, such as Adversarial attacks. Developing a robust model that can respond to these malware variants is necessary. In this paper, we propose two methods of generating Adversarial attacks as efficient Adversarial attack generation techniques for improving Robustness in AI models. The proposed technique is the XAI-based attack technique using the XAI technique and the Reference based attack through the model's decision boundary search. After that, a classification model was constructed through a malicious code dataset to compare performance with the PGD attack, one of the existing Adversarial attacks. In terms of generation speed, XAI-based attack, and reference-based attack take 0.35 seconds and 0.47 seconds, respectively, compared to the existing PGD attack, which takes 20 minutes, showing a very high speed, especially in the case of reference-based attack, 97.7%, which is higher than the existing PGD attack's generation rate of 75.5%. Therefore, the proposed technique enables more efficient Adversarial attacks and is expected to contribute to research to build a robust AI model in the future.

Comparison of Adversarial Example Restoration Performance of VQ-VAE Model with or without Image Segmentation (이미지 분할 여부에 따른 VQ-VAE 모델의 적대적 예제 복원 성능 비교)

  • Tae-Wook Kim;Seung-Min Hyun;Ellen J. Hong
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.23 no.4
    • /
    • pp.194-199
    • /
    • 2022
  • Preprocessing for high-quality data is required for high accuracy and usability in various and complex image data-based industries. However, when a contaminated hostile example that combines noise with existing image or video data is introduced, which can pose a great risk to the company, it is necessary to restore the previous damage to ensure the company's reliability, security, and complete results. As a countermeasure for this, restoration was previously performed using Defense-GAN, but there were disadvantages such as long learning time and low quality of the restoration. In order to improve this, this paper proposes a method using adversarial examples created through FGSM according to image segmentation in addition to using the VQ-VAE model. First, the generated examples are classified as a general classifier. Next, the unsegmented data is put into the pre-trained VQ-VAE model, restored, and then classified with a classifier. Finally, the data divided into quadrants is put into the 4-split-VQ-VAE model, the reconstructed fragments are combined, and then put into the classifier. Finally, after comparing the restored results and accuracy, the performance is analyzed according to the order of combining the two models according to whether or not they are split.

Detecting Adversarial Examples Using Edge-based Classification

  • Jaesung Shim;Kyuri Jo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.28 no.10
    • /
    • pp.67-76
    • /
    • 2023
  • Although deep learning models are making innovative achievements in the field of computer vision, the problem of vulnerability to adversarial examples continues to be raised. Adversarial examples are attack methods that inject fine noise into images to induce misclassification, which can pose a serious threat to the application of deep learning models in the real world. In this paper, we propose a model that detects adversarial examples using differences in predictive values between edge-learned classification models and underlying classification models. The simple process of extracting the edges of the objects and reflecting them in learning can increase the robustness of the classification model, and economical and efficient detection is possible by detecting adversarial examples through differences in predictions between models. In our experiments, the general model showed accuracy of {49.9%, 29.84%, 18.46%, 4.95%, 3.36%} for adversarial examples (eps={0.02, 0.05, 0.1, 0.2, 0.3}), whereas the Canny edge model showed accuracy of {82.58%, 65.96%, 46.71%, 24.94%, 13.41%} and other edge models showed a similar level of accuracy also, indicating that the edge model was more robust against adversarial examples. In addition, adversarial example detection using differences in predictions between models revealed detection rates of {85.47%, 84.64%, 91.44%, 95.47%, and 87.61%} for each epsilon-specific adversarial example. It is expected that this study will contribute to improving the reliability of deep learning models in related research and application industries such as medical, autonomous driving, security, and national defense.

5G Network Resource Allocation and Traffic Prediction based on DDPG and Federated Learning (DDPG 및 연합학습 기반 5G 네트워크 자원 할당과 트래픽 예측)

  • Seok-Woo Park;Oh-Sung Lee;In-Ho Ra
    • Smart Media Journal
    • /
    • v.13 no.4
    • /
    • pp.33-48
    • /
    • 2024
  • With the advent of 5G, characterized by Enhanced Mobile Broadband (eMBB), Ultra-Reliable Low Latency Communications (URLLC), and Massive Machine Type Communications (mMTC), efficient network management and service provision are becoming increasingly critical. This paper proposes a novel approach to address key challenges of 5G networks, namely ultra-high speed, ultra-low latency, and ultra-reliability, while dynamically optimizing network slicing and resource allocation using machine learning (ML) and deep learning (DL) techniques. The proposed methodology utilizes prediction models for network traffic and resource allocation, and employs Federated Learning (FL) techniques to simultaneously optimize network bandwidth, latency, and enhance privacy and security. Specifically, this paper extensively covers the implementation methods of various algorithms and models such as Random Forest and LSTM, thereby presenting methodologies for the automation and intelligence of 5G network operations. Finally, the performance enhancement effects achievable by applying ML and DL to 5G networks are validated through performance evaluation and analysis, and solutions for network slicing and resource management optimization are proposed for various industrial applications.

The Design and Application of Vibrator Type(AM) Combination Apparatus for Improving Police Equipment for Fugitive Prevention (도주방지용 경찰장구의 기능개선을 위한 진동자 방식(AM) 결속장치 설계 및 응용)

  • Choi, Ki-Nam;Lee, Seon-Jeh
    • Convergence Security Journal
    • /
    • v.11 no.2
    • /
    • pp.13-24
    • /
    • 2011
  • Policemen judge the situations rationally and use their equipment such as handcuffs and rope within the purview, finding them needed to arrest criminals in the act who commit crimes which conforms to death penalty, life imprisonment or long imprisonment for over 3 years in accordance with Clause 10-2, Article 1 of the Police Mandate Law and prevent fleeing from them, defend their and others' lives and bodies, or if there are probable causes to be recognized that using equipment is necessary to restrain the interference with government officials in the execution of their duties. However, as the cases which the criminals run away in handcuffs or with both hands tied occur, it results in the waste of police force, distrust and enormous trouble in the pursuit of their duties. Therefore, if the way to perceive fleeing of criminals who have already worn the police equipment by some simple assistive devices without developing other new equipment, it will be very effective for police duties. This study is about the combination apparatus for fugitive prevention attached to the existing handcuffs and rope whose alert sounds let the staffs working inside the office perceive the fleeing of wanted criminals and examined suspects who wear the handcuffs or are tied up with rope, providing that they go through the exit where a transmitter and a receiver were set. The combination apparatus for fugitive prevention which the study introduces contains the connecting parts which connect a flexible tube(cognition tags inside of the tube) of connector equipped with the police equipment with the ends of the tube and the part where these two meet and which connect them inside of the tube. The connecting parts are easy to be attached to the police equipment such as handcuffs and rope, but hard to be dismantled by the people tied up with the equipment. It enables watchers to perceive the fleeing of wanted criminals and examined suspects who wear the handcuffs or are tied up with rope, providing that they go through the exit where a transmitter and a receiver were set. Plus, if it is combined together with the portable receiver, it can be installed on the patrol cars and easily adopted to supervise illegally accessing of evidences. It is also avaliable to be adjunctively utilized for the handcuffs provided and the cost is so reasonable. Owing to its snap-on way to the cuffs, it can clear up any invasion of privacy and it can not be used as a self-injury tool because of the soft tube. Using AM Tag minimizes the lack of malfunction.

A Study on the Qualitative Evaluation Factors for Mobile Game Company (모바일게임 기업의 정성적 평가요인에 관한 연구)

  • Choi, Seok Kyun;Hwangbo, Yun;Rhee, Do Yun
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.8 no.3
    • /
    • pp.125-146
    • /
    • 2013
  • Nowadays, the performance of the mobile game sales is influencing the ranking of game companies listed on KOSDAQ. In the meantime, venture capital companies had focused on online game. Recently, however, they have great interest in mobile games and mobile game companies. In addition, angel investors and accelerators are increasing investment for the mobile game companies. The most important issues for mobile game investor is how to evaluate the mobile game companies and their contents. Therefore, this study derived the evaluation factors for the mobile game company. And research method converged of the opinions of both supply side and demand side of the game industry. Ten professionals who are responsible for the supply of the game industry and CEO group & development experts of game development company were selected for survey in this study. Also ten professionals who are responsible for the demand of the game industry and the investment company were selected for survey in this study. And Delphi technique was performed according to the survey. Management skills, development capabilities, game play, feasibility, operational capabilities has emerged as five evaluation factors to evaluate the mobile game company. And the 20 sub-factors including CEO's reliability were derived. AHP(Analytic Hierarchy Process) theory is applied to analyze the importance of the qualitative elements which were derived by Delphi technique. As a result, the analysis hierarchy of evaluation factors for the mobile game company was created. Pair-wise comparison for each element was performed to analyze the importance. As a result, 'Core fun of the game' (12,2%), 'Involvement of the game' (10.3%), 'Security Reliability' (8.9%), 'Core developers' ability' (7.6%) appeared in order of importance. The significance of this study is offering more objective methodology for realistic assessment and importance of elements to evaluate mobile game company.

  • PDF