• Title/Summary/Keyword: 익명처리

Search Result 87, Processing Time 0.026 seconds

A Study on the Principle of Application of Privacy by Design According to the Life Cycle of Pseudonymization Information (가명정보 생명주기에 따른 개인정보보호 중심 설계 적용 원칙에 관한 연구)

  • Kim, Dong-hyun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.2
    • /
    • pp.329-339
    • /
    • 2022
  • Recently, as personal information has been used as data, various new industries have been discovered, but cases of personal information leakage and misuse have occurred one after another due to insufficient systematic management system establishment. In addition, services that use personal information anonymously and anonymously have emerged since the enforcement of the Data 3 Act in August 2020, but personal information issues have arisen due to insufficient alias processing, safety measures for alias information processing, and insufficient hate expression. Therefore, this study proposed a new PbD principle that can be applied to the pseudonym information life cycle based on the Privacy by Design (PbD) principle proposed by Ann Cavoukian [1] of Canada to safely utilize personal information. In addition, the significance of the proposed method was confirmed through a survey of 30 experts related to personal information protection.

A Secure Protocol for the Electronic Auction (전자경매를 위한 보안 프로토콜)

  • Shi, Wenbo;Jang, In-Joo;Yoo, Hyeong-Seon
    • The Journal of Society for e-Business Studies
    • /
    • v.12 no.4
    • /
    • pp.29-36
    • /
    • 2007
  • Recently, Jaiswal et al. proposed a protocol to improve the multi-agent negotiation test-bed which was proposed by Collins et al. Using publish/subscribe system, time-release cryptography and anonymous communication, their protocol gives an improvement on the old one. However, it is shown that the protocol also has some security weaknesses: such as replay data attack and DOS (denial-of-service) attack, anonymity disclosure, collusion between customers and a certain supplier. So proposed protocol reduces DOS attack and avoids replay data attack by providing ticket token and deal sequence number to the supplier. And it is proved that the way that market generates random number to the supplier is better than the supplier do by himself in guaranteeing anonymity. Market publishes interpolating polynomial for sharing the determination process data. It avoids collusion between customer and a certain supplie

  • PDF

Threat Issues of Intelligent Transport System in the V2X Convergence Service Envrionment (V2X 융합서비스 환경에서 지능형차량시스템의 위협 이슈)

  • Hong, Jin-Keun
    • Journal of the Korea Convergence Society
    • /
    • v.6 no.5
    • /
    • pp.33-38
    • /
    • 2015
  • In a V2X convergence service environment, the principal service among infotainment services and driver management services must be supported centering on critical information of the driver, maintenance manager, customer, and anonymous user. Many software applications have considered solutions to be satisfied the specific requirements of driving care programs, and plans. This paper describes data flow diagram of a secure clinic system for driving car diagnosis, which is included in clinic configuration, clinic, clinic page, membership, clinic request processing, driver profile data, clinic membership data, and clinic authentication in the V2X convergence service environment. It is reviewed focusing on security threat issue of ITS diagnostic system such as spoofing, tampering, repudiation, disclosure, denial of service, and privilege out of STRIDE model.

Untact Teleradiology System based on Mobile medical imaging devices (모바일 영상진단기기기반 비대면 판독 시스템)

  • Noh, Si-Hyeong;Lee, Chungsub;Kim, JiEon;Kim, Tae-Hoon;Jeong, Chang-Won;Yoon, Kwon-Ha
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2021.01a
    • /
    • pp.317-319
    • /
    • 2021
  • 최근 코로나 19가 장기화하면서, 비대면서비스로 대체되고 있는 한편, 의료분야에도 서비스 패러다임이 변화되고 있다. 특히, 국내의 법 제도적으로 묶여 있는 원격 의료서비스의 적용이 가능하고 상급종합병원에서는 비대면 진료서비스를 도입하고 있다. 본 논문에서 제안하는 비대면 원격판독시스템은 모바일 의료영상진단기기를 기반으로 의료사각지대에 있는 환자들의 영상촬영과 이에 대한 판독 서비스를 제공하기 위한 시스템이다. 제안한 시스템은 의료환경에 적용하기 위해 환자의 개인정보를 보호하고, 원격으로 환자의 영상 데이터를 판독하기 위한 시스템과 그 처리 과정을 보인다. 그리고 끝으로 구축된 시스템의 수행 결과를 보인다.

  • PDF

A Study on the Doctrine of Standing in the Suits caused by the Press Reports (언론소송에 나타난 보도의 개별적 연관성과 당사자적격)

  • Lee, Seung-Sun
    • Korean journal of communication and information
    • /
    • v.34
    • /
    • pp.161-195
    • /
    • 2006
  • Standing to sue has become one of the most important and controversial issues in suits between the press and the victims injured by the press reports. Even thought Korean law was patterned after the European legal system, there is no denying that the Korean Constitution was influenced by that of the United States. The judicial system was also influenced by its counterpart in the United States. The doctrine of standing to sue has plagued the U.S. Supreme Court for several decades. The traditional test of standing in the federal courts was, at the beginning of the century, whether the interest asserted by the plaintiff amounted to a 'legal right', entitled to the protection of the common law. In recent years, the Supreme Court seems to have settled on a two-tiered method for determining whether a plaintiff has standing to sue in federal court. The first level of inquiry is the constitutional core, and the second is the judicially imposed prudential limitations. The purpose of this study is to find out the doctrine of standing in the legal proceedings caused by the press reports. The press needs to internally transform as well to prevent legal dispute, enforcing confirmation when collecting news materials and building up the device for pre-examining the news. The press is also requested to help sincerely the victim recover, realizing that they waste their reputation and credit not to mention a lot of time and monet during the legal dispute.

  • PDF

A New Method of Registering the XML-based Clinical Document Architecture Supporting Pseudonymization in Clinical Document Registry Framework (익명화 방법을 적용한 임상진료문서 등록 기법 연구)

  • Kim, Il-Kwang;Lee, Jae-Young;Kim, Il-Kon;Kwak, Yun-Sik
    • Journal of KIISE:Software and Applications
    • /
    • v.34 no.10
    • /
    • pp.918-928
    • /
    • 2007
  • The goal of this paper is to propose a new way to register CDA documents in CDR (Clinical Document Repository) that is proposed by the author earlier. One of the methods is to use a manifest archiving for seamless references and visualization of CDA related files. Another method is to enhance the CDA security level for supporting pseudonymization of CDA. The former is a useful method to support the bundled registration of CDA related files as a set. And it also can provide a seamless presentation view to end-users, once downloaded, without each HTTP connection. The latter is a new method of CDA registration which can supports a do-identification of a patient. Usually, CDA header can be used for containing patient identification information, and CDA body can be used for diagnosis or treatment data. So, if we detach each other, we can get good advantages for privacy protection. Because even if someone succeeded to get separated CDA body, he/she never knows whose clinical data that is. The other way, even if someone succeeded to get separated CDA header; he/she doesn't know what kind of treatment has been done. This is the way to achieve protecting privacy by disconnecting association of relative information and reducing possibility of leaking private information. In order to achieve this goal, the method we propose is to separate CDA into two parts and to store them in different repositories.

Dynamic Link Recommendation Based on Anonymous Weblog Mining (익명 웹로그 탐사에 기반한 동적 링크 추천)

  • Yoon, Sun-Hee;Oh, Hae-Seok
    • The KIPS Transactions:PartC
    • /
    • v.10C no.5
    • /
    • pp.647-656
    • /
    • 2003
  • In Webspace, mining traversal patterns is to understand user's path traversal patterns. On this mining, it has a unique characteristic which objects (for example, URLs) may be visited due to their positions rather than contents, because users move to other objects according to providing information services. As a consequence, it becomes very complex to extract meaningful information from these data. Recently discovering traversal patterns has been an important problem in data mining because there has been an increasing amount of research activity on various aspects of improving the quality of information services. This paper presents a Dynamic Link Recommendation (DLR) algorithm that recommends link sets on a Web site through mining frequent traversal patterns. It can be employed to any Web site with massive amounts of data. Our experimentation with two real Weblog data clearly validate that our method outperforms traditional method.

Tor Network Website Fingerprinting Using Statistical-Based Feature and Ensemble Learning of Traffic Data (트래픽 데이터의 통계적 기반 특징과 앙상블 학습을 이용한 토르 네트워크 웹사이트 핑거프린팅)

  • Kim, Junho;Kim, Wongyum;Hwang, Doosung
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.9 no.6
    • /
    • pp.187-194
    • /
    • 2020
  • This paper proposes a website fingerprinting method using ensemble learning over a Tor network that guarantees client anonymity and personal information. We construct a training problem for website fingerprinting from the traffic packets collected in the Tor network, and compare the performance of the website fingerprinting system using tree-based ensemble models. A training feature vector is prepared from the general information, burst, cell sequence length, and cell order that are extracted from the traffic sequence, and the features of each website are represented with a fixed length. For experimental evaluation, we define four learning problems (Wang14, BW, CWT, CWH) according to the use of website fingerprinting, and compare the performance with the support vector machine model using CUMUL feature vectors. In the experimental evaluation, the proposed statistical-based training feature representation is superior to the CUMUL feature representation except for the BW case.

A Measuring Model of Risk Impact on The App Development Project in The Social App Manufacturing Environment (Social App Manufacturing 환경의 앱 개발 프로젝트에서 위험영향도 측정 모델)

  • Baek, Jung Hee;Lim, Young Hwan
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.3 no.9
    • /
    • pp.335-340
    • /
    • 2014
  • Crowd Sourcing-based Social App Manufacturing environment, a small app development project by a team of anonymous virtual performed without the constraints of time and space, and manage it for the app development process need to be automated method. Virtual teams with anonymity is a feature of the Social App Manufacturing, is an important factor that increases the uncertainty of whether the completion of the project or reduction in visibility of the progress of the project. In this study, as one of how to manage the project of Social App Manufacturing environment, the impact of risk that can be used to quantitatively measure the impact of the risk of delay in development has on the project also proposes a measurement model. Effects of risk and type of the impact of risks associated with delays in the work schedule also define the characteristic function, measurement model that has been proposed, suggest the degree of influence measurement equation of risk of the project in accordance with the progressive. The advantage of this model, the project manager is able to ensure the visibility of the progress of the project. In addition, identify the project risk of work delays, and to take precautions.

Robust Data, Event, and Privacy Services in Real-Time Embedded Sensor Network Systems (실시간 임베디드 센서 네트워크 시스템에서 강건한 데이터, 이벤트 및 프라이버시 서비스 기술)

  • Jung, Kang-Soo;Kapitanova, Krasimira;Son, Sang-H.;Park, Seog
    • Journal of KIISE:Databases
    • /
    • v.37 no.6
    • /
    • pp.324-332
    • /
    • 2010
  • The majority of event detection in real-time embedded sensor network systems is based on data fusion that uses noisy sensor data collected from complicated real-world environments. Current research has produced several excellent low-level mechanisms to collect sensor data and perform aggregation. However, solutions that enable these systems to provide real-time data processing using readings from heterogeneous sensors and subsequently detect complex events of interest in real-time fashion need further research. We are developing real-time event detection approaches which allow light-weight data fusion and do not require significant computing resources. Underlying the event detection framework is a collection of real-time monitoring and fusion mechanisms that are invoked upon the arrival of sensor data. The combination of these mechanisms and the framework has the potential to significantly improve the timeliness and reduce the resource requirements of embedded sensor networks. In addition to that, we discuss about a privacy that is foundation technique for trusted embedded sensor network system and explain anonymization technique to ensure privacy.