• Title/Summary/Keyword: 보호제공시간

Search Result 359, Processing Time 0.026 seconds

A Study on IAM-Based Personal Data Protection Techniques in BaaS (BaaS에서 IAM을 이용한 개인정보 보호 기법에 관한 연구)

  • Mi-Hui Kim;Myung-Joe Kang
    • Journal of IKEEE
    • /
    • v.27 no.4
    • /
    • pp.548-555
    • /
    • 2023
  • With the advancement of the internet, the use of personal information in online interactions has increased, underscoring the significance of data protection. Breaches of personal data due to unauthorized access can result in psychological and financial damage to individuals, and may even enable wide-ranging societal attacks aimed at those associated with the victims. In response to such threats, there is active research into security measures using blockchain to safeguard personal information. This study proposes a system that uses middleware and IAM (Identity and Access Management) services to protect personal information in a BaaS (Blockchain as a Service) environment where blockchain is provided via the Internet. The middleware operates on servers where IAM roles and policies are applied, authenticates users, and performs access control to allow only legitimate users to access blockchain data existing in the cloud. Additionally, to understand the impact of the proposed personal information protection method on the system, we measure the response time according to the time taken and the number of users under three assumed scenarios, and compare the proposed method and research related to personal information protection using blockchain in terms of security characteristics such as idea, type of blockchain, authentication, and confidentiality.

Secure Multi-Party Computation of Correlation Coefficients (상관계수의 안전한 다자간 계산)

  • Hong, Sun-Kyong;Kim, Sang-Pil;Lim, Hyo-Sang;Moon, Yang-Sae
    • Journal of KIISE
    • /
    • v.41 no.10
    • /
    • pp.799-809
    • /
    • 2014
  • In this paper, we address the problem of computing Pearson correlation coefficients and Spearman's rank correlation coefficients in a secure manner while data providers preserve privacy of their own data in distributed environment. For a data mining or data analysis in the distributed environment, data providers(data owners) need to share their original data with each other. However, the original data may often contain very sensitive information, and thus, data providers do not prefer to disclose their original data for preserving privacy. In this paper, we formally define the secure correlation computation, SCC in short, as the problem of computing correlation coefficients in the distributed computing environment while preserving the data privacy (i.e., not disclosing the sensitive data) of multiple data providers. We then present SCC solutions for Pearson and Spearman's correlation coefficients using secure scalar product. We show the correctness and secure property of the proposed solutions by presenting theorems and proving them formally. We also empirically show that the proposed solutions can be used for practical applications in the performance aspect.

스마트 프린팅 서비스 보안 기술 연구 동향

  • Lee, Kwang-Woo;Kim, Seung-Joo;Won, Dong-Ho
    • Review of KIISC
    • /
    • v.21 no.3
    • /
    • pp.43-50
    • /
    • 2011
  • 최근 스마트폰, 스마트 TV 등의 스마트 기기의 도입에 따른 스마트 서비스의 등장은 기존의 방송, 통신, 교통, 업무환경을 계속 변화시키고 있다. 즉, 기존과 달리 스마트 서비스 환경에서는 스마트 기기들이 곳곳에 배치되어 유 무선 네트워크를 통해 정보를 주고받으며, 각종 서비스를 제공한다. 따라서 스마트 가기들 간의 통신은 기존 ICT(Information and Communication Technology) 시스템과 동일하게 전송 데이터를 보호하기 위한 보안 기술이 요구된다. 특히 스마트워크에서는 시간과 장소에 국한되지 않고 언제 어디서든 효율적인 업무 수행이 가능하도록 스마트폰 및 태블릿 PC와 같은 모바일 기기를 이용하게 된다. 이러한 상황에서는 여러 공간에서 업무가 이루어질 수 있으며, 프린팅 역시 다양한 네트워크 환경에서 이루어질 수 있다. 이에 본 논문에서는 업무 공간의 다양성과 모바일 기기의 도입에 따른 프린팅 서비스 기술의 발전 및 개발 현황을 살펴보고, 안전한 프린팅과 관련하여 진행되고 있는 표준화 동향을 살펴보고자 한다.

Context-Aware 환경에서의 위치정보 프라이버시 연구동향

  • 이동혁;송유진
    • Review of KIISC
    • /
    • v.15 no.5
    • /
    • pp.100-112
    • /
    • 2005
  • 유비쿼터스의 주요한 특성은 상황 인식(Context-Aware)이며 이것은 사용자의 시공간에 따라 변하는 데이터를 사용자가 직접 입력하지 않고 상황에 맞게 자동적으로 처리해 주는 것을 뜻한다. 그러나 이러한 유비쿼터스의 특성은 데이터의 보안이 취약할 경우 기존 컴퓨팅 환경보다 더 큰 문제를 가져올 수 있다. 한편, 미 벨 연구소에 의해 개발된 PCP(Privacy Conscious Personalization)는 모바일 및 유비쿼터스 환경에서 사용자의 프라이버시 문제에 Context-Aware의 특성을 반영해 준다. PCP는 위치 정보에 대한 요구를 받으면 Houdini로 명명된 Rule Engine을 작동시키며 현재의 상황 및 사용자의 설정을 고려하여 정보를 공개할지 여부를 결정한다. 또한, 네덜란드의 University of Twente는 P3P를 확장하는 P3P Extension과 상황-의존 Preference를 표현하는 XML 기반 언어를 개발하고 이를 바탕으로 WASP 플랫폼을 위한 아키텍쳐를 개발하였다. WASP Framework는 웹서비스 기반의 프라이버시 보호 아키텍쳐이며 사용자의 위치, 시간, 상태, 신원 등 다양한 Context 정보를 제공할 수 있다. 본고에서는 Location Context의 관점에서 Context Aware Computing 환경의 하나로 LBS 위치정보의 프라이버시 구조에 대한 두가지 사례 연구를 수행한다.

The Effects of the Hospice & Palliative Care Education Program for Caregivers (호스피스 완화의료 도우미 교육 프로그램의 효과)

  • Choi, Gum-Hee;Kwon, So-Hi
    • Journal of Hospice and Palliative Care
    • /
    • v.21 no.1
    • /
    • pp.33-39
    • /
    • 2018
  • Purpose: This study aimed to identify how an education program on palliative care affects nursing home caregivers' perception of hospice care and attitude towards terminally ill patient care. Methods: This study was conducted using a nonequivalent control group with a pretest-posttest design. The participants were 101 certified care workers: 58 in the experimental group and 43 in the control. The experimental group completed the palliative care education program consisted of 20 hours of classroom training and 20 hours of clinical practicum. An ANCOVA was performed to compare the score changes to outcome variables. Results: Compared with the control group, the experimental group showed significant pretest-posttest differences in both the perception of hospice care (F=21.09, P<0.001) and attitude towards caring for terminally ill patients (F=13.28, P<0.001). Conclusion: These results indicate that the palliative care education program for caregivers is effective in preparing participants to provide hospice/palliative care service. Further study is warranted to explore the effects of this program on palliative caregivers' performance.

A Study on Ticket-Based AAA Mechanism Including Time Synchronization OTP in Global Roaming Environment (글로벌 로밍 환경에서 시간 동기화 OTP를 포함한 티켓 기반 AAA 메커니즘에 관한 연구)

  • Moon, Jong-Sik;Lee, Im-Yeong
    • The KIPS Transactions:PartC
    • /
    • v.14C no.2
    • /
    • pp.129-138
    • /
    • 2007
  • AAA(Aluthentieation, Authorization, Accounting) protocol is an information securitv technology that offer secure and reliable user Authentication, Authorization, Accounting function systematically in various services. protocol and wireless network work as well as win network. Currently IETF(Internet Engineering Task Force) AAA Working Group deal with about AAA protocol and studying with activity, But, recently it exposing much problems side to user's anonymity and privacv violation. Therefore, in this paper, AAAH(Home Authentication Server) authenticaters Mobile device, after that, use ticket that is issued from AAAH even if move to outside network and can be serviced offering authentication in outside network without approaching by AAAH, Also, we study mechanism that can offer user's privacy and anonymousness to when use service. Our mechanism is using Time Synchronization OTP and focusing authentication and authorization. Therefore, our mechanism is secure from third party attack and offer secure and effective authentication scheme. Also only right user can offer services by using ticket. can reduce signal and reduce delay of message exchanged, can offer persistent service and beighten security and efficiency.

Load Balancing Mechanism for Low Efficient Device on Mix Network (믹스 네트워크에서 저성능 송신 디바이스를 위한 부하분산 기법)

  • Lee, Chang-Ho;Jung, Yoo-Suk;Hong, Man-Pyo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2007.11a
    • /
    • pp.1127-1130
    • /
    • 2007
  • 익명통신이란 통신주체인 송수신자에게 익명성을 제공하여 누가 누구와 메시지를 주고받는지 제 삼자가 모르게 하는 것으로, 사용자 정보와 사용자 상황정보가 수집되거나 저장되는 특성 때문에 개인정보의 유출이나 남용과 같은 개인정보 침해사고의 가능성이 높은 유비쿼터스 환경에서 개인정보 보호에 대한 해결방법으로 활용될 수 있다. 본 논문에서는 대표적인 익명통신 방법이면서, 송신자가 전송할 메시지를 여러 번 암호화하기 때문에 송신자의 부하가 많은 믹스형 익명통신을 대상으로 송신자의 과도한 부하문제를 해결하면서 안전하게 익명성을 제공하기 위해 부하분산 방법을 제안하고, 제안하는 방법이 적용된 믹스 시스템에서 이루어지는 메시지 전송 프로토콜을 정의한다. 제안하는 방법을 통해서 저성능의 송신 디바이스를 사용하는 사용자들은 암호화 하는데 많은 시간이 소요되어 서비스를 제공받는데 지체되거나 서비스를 제공하지 못하는 어려움을 해결할 수 있다.

  • PDF

A Study on Network Service Using Authorization Ticket in AAA system (AAA시스템의 인가 티켓을 이용한 네트워크 서비스에 관한 연구)

  • Kang, Seo-Il;Lee, Im-Yeong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.4
    • /
    • pp.11-19
    • /
    • 2007
  • A ubiquitous network environment is a system where the user can avail of the network's services anytime, anywhere. To establish such an environment, studies continue being conducted on wireless communication technology and mobile terminals. The company that provides such services should have an established system for authentication, authorization and charging for users. This service is referred to as Authentication, Authorization, Accounting(AAA), and its aspects have been consistently studied. On the other hand, existing studies have been promoted with regard to the authentication and efficiency of the mobile terminal. One of the method is that the mobile terminal contacts to the home authentication server through the external authentication server every time it is required and; another one is to use a medium server to provide authentication in the middle between them. Thus, this study aims to determine the best method to use ticketing, where tickets are provided through a mobile terminal, complete with authentication and authorization features. Also, as it uses ticket, it can efficiently provide mobile verification processing.

Study on the Thermal Protective Performance Measurements of Fire Fighter's Protective Clothing for Low Level Radiant Heat Exposures (저열유속 조건의 복사열 노출에 따른 소방보호복의 열보호성능 측정에 관한 연구)

  • Lee, Jun-Kyoung;Bang, Young-Jun;Bang, Chang-Hoon;Kwon, Jung-Suk
    • Fire Science and Engineering
    • /
    • v.28 no.2
    • /
    • pp.1-8
    • /
    • 2014
  • Despite advancements in the development of synthetic fibers and materials that provide better insulation, fire burn injuries remain a significant issue. To ensure adequate protection, clothing and equipment must be selected on the basis of performance. There are different standards like ISO standards applicable to each of the various types of clothing used by fire fighters. But, in most cases, the tests are performed in the conditions of high heat flux exposure, the clothing material can be destroyed easily. Thus the effective way to investigate the protective performance for the low (radiant) heat flux conditions should be needed. Therefore improved RPP (Radiant Protective Performance) test method based on the onset of pain burn injury was suggested. Experiments were performed to verify the proposed method with current protective clothing for fire fighters and the transient heat transfer characteristics were identified, also. Moreover, several protective performance indices were acquired from experimental results to analyze their relations.

A Protection and Management System for Broadcasting Content (디지털 방송 컨텐츠 보호 및 관리를 위한 시스템 기술)

  • 김욱중;홍진우;최범석
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2001.10a
    • /
    • pp.483-486
    • /
    • 2001
  • As the broadcasting and communications are digitalized, future broadcasting can provide us new services and content which we have never experienced before. For the services, the development of high-quality content is important as well as the development of efficient technologies. However, if there are no proper methods for protecting and managing content, we can hardly expect the creation of high-quality content to be flourished because much money, time and endeavor should be paid in producing high-quality content. Many activities are under progressing for the protection and management. However, the activities mainly concern general Internet environment which doesn't fully reflect the characteristics of broadcasting. In this paper, we provide a framework model for the protection and management of broadcasting content. First, we analyse the functionalities that must be satisfied in the broadcasting, and we propose a framework model.

  • PDF