• Title/Summary/Keyword: 익명화

Search Result 95, Processing Time 0.036 seconds

Status and Measures for Cyber Sexual Violence (사이버 성폭력에 대한 실태와 대책방안)

  • Park, Cho-A
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2012.07a
    • /
    • pp.191-193
    • /
    • 2012
  • 인터넷과 기타 휴대용 PC등이 발전하고 보편화됨에 따라 인터넷 이용이 편리해짐은 좋지만 비대면성, 비익명성, 비 국경성 등 인터넷의 이러한 특성상 사이버 범죄들이 나날이 다양해지고 증가하고 있는 추세이다. 특히 사이버 범죄 중에서도 스토킹, 원조교제의 수단, 몰래카메라, 사이버음란물 유통 등 각종 신종 성폭력이 심각해지고 있어 사회문제로 끈임 없이 등장하고 있다. 현실세계에서의 성폭력과 마찬가지로 피해자가 느끼는 성적 수치심이나 심적 고통은 피해자의 자아에 깊은 상처를 남기며 더 나아가 왜곡된 성문화를 정착 시키는 새로운 사회적 문제로 작용한다는 점에서 사이버성폭력의 심각성과 문제는 오프라인상의 성폭력범죄에 비해 결코 뒤지지 않을 것이다. 물론 이러한 범죄들에 대한 처벌 조항들은 있다. 그러나 이런 것들이 있음에도 사이버상의 성폭력은 근절되지 않고 있다. 이것은 법적인 조치의 강화를 요구하는 동시에 인터넷을 사용하는 네티즌 스스로의 적극적 대처를 요구하는 것이기도 하다.

  • PDF

The Need for Homomorphic Encryption to Protection Privacy (프라이버시 보호를 위한 동형암호의 필요성)

  • Seo, Jin-Beom;Cho, Young-Bok
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.10a
    • /
    • pp.47-49
    • /
    • 2021
  • According to the revision of the Data 3 Act in 2020, personal information of medical data can be processed anonymously for statistical purposes, research, and public interest record keeping. However, unidentified data can be re-identified using genetic information, credit information, etc., and personal health information can be abused as sensitive information. In this paper, we derive the need for homomorphic encryption to protect the privacy of personal information separated by sensitive information.

  • PDF

A Survey on Hardware Characteristic-based Drone Identification and Authentication Technology (하드웨어적 고유 특성 기반 드론 식별 및 인증 기술 연구 동향 분석)

  • Sungbin Park;Hoon Ji;Yeonjoon Lee
    • Annual Conference of KIPS
    • /
    • 2023.11a
    • /
    • pp.1181-1184
    • /
    • 2023
  • 최근 드론은 군사 작전, 물류 운송, 인명 구조 등 다양한 분야에서 활용되고 있으며 관련 산업의 규모는 증가하는 추세이다. 이에 따라, GPS 스푸핑, 조종사 비익명화 등의 드론을 향한 공격 기법들 또한 발달하고 있다. 이런 공격들은 드론에 대한 인증을 도입함으로써 대비할 수 있는 공격들이다. 이에, 학계에서는 강건한 인증을 위해 드론 하드웨어의 고유 특성을 활용할 수 있는 RF 신호, 소리 신호, 드론 내부 센서 신호 등에 기반한 인증 기술들이 연구되어온 바 있다. 본 논문에서는 지금까지의 드론 인증 기술 연구 동향을 분석하고, 이를 기반으로 향후 연구 방향을 제시한다.

A Legal Review on Abuse Cases of Virtual Currency and Legal Responses (가상화폐의 악용사례와 법적 대응방안에 관한 고찰)

  • Hwang, Suk-Jin
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.2
    • /
    • pp.585-594
    • /
    • 2018
  • Virtual currencies have emerged along with new technologies such as block chain, artificial intelligence (AI), and big data. This study examines the benefits of a security-enhanced block chain resulting from individual trading, decentralized from governments, as well as the problems associated with misuse of virtual currencies. Virtual currencies, due to its anonymity, is vulnerable to financial crimes, such as ransom-ware, fraud, drug trafficking, tax evasion and money laundering. Use of virtual currencies can facilitate criminals avoid detection from investigative agencies. Government regulatory policy continues to address these concerns, and the virtual currency exchange has also announced a self-regulation proposal. However, a fundamental solution remains necessary. The purpose of this paper is to investigate the problems regarding abuse of virtual currency and to identify a practical system for transactions involving virtual currencies. However, in order to promote transactions involving virtual currencies and to institutionalize a governance system, multilateral cooperation is required. Although the restricting the use of virtual currencies regarding minors and foreign trade, as well as the introduction of a real-name system are considered promising prospects, many problems remain. Virtual currency is not a simple digital item but a method of redesigning the function of money. Coordinated efforts are needed globally to be able to further activate the positive aspects concerning the use of virtual currencies.

A User Privacy Protection Scheme based on Password through User Information Virtuality in Cloud Computing (클라우드 컴퓨팅에서 패스워드기반의 사용자 정보 가상화를 통한 사용자 프라이버시 보장 기법)

  • Jeong, Yoon-Su;Lee, Sang-Ho
    • Journal of Convergence Society for SMB
    • /
    • v.1 no.1
    • /
    • pp.29-37
    • /
    • 2011
  • As the area of informatization has been expanding followed by the development of information communication technology, cloud computing which can use infra sources like server, storage, and network in IT area as an efficient service whenever and wherever skyrockets. But users who use cloud computing technology may have some problems like exposure personal data, surveillance on person, and process on commercial purpose on their personal data. This paper proposes a security technique which protect user's privacy by creating imaginary user information not to be used by other people. The proposed technique virtualizes user's information as an anonymity value not to let other people know user's identity by combining PIN code with it and guarantees user's anonymity. Also it can manage and certificate personal information that is important in cloud computing, so that it can solve security problem of cloud computing which centers all informations. Therefore this paper can assist upgrading of the level of information of poor SMBs through safe use of cloud computing.

  • PDF

An efficient cloud security scheme for multiple users (다중 사용자를 위한 효율적인 클라우드 보안 기법)

  • Jeong, Yoon-Su
    • Journal of Convergence for Information Technology
    • /
    • v.8 no.2
    • /
    • pp.77-82
    • /
    • 2018
  • Recently, as cloud services become popular with general users, users' information is freely transmitted and received among the information used in the cloud environment, so security problems related to user information disclosure are occurring. we propose a method to secure personal information of multiple users by making personal information stored in the cloud server and a key for accessing the shared information so that the privacy information of the multi users using the cloud service can be prevented in advance do. The first key used in the proposed scheme is a key for accessing the user 's personal information, and is used to operate the information related to the personal information in the form of a multi - layer. The second key is the key to accessing information that is open to other users than to personal information, and is necessary to associate with other users of the cloud. The proposed scheme is constructed to anonymize personal information with multiple hash chains to process multiple kinds of information used in the cloud environment. As a result of the performance evaluation, the proposed method works by allowing third parties to safely access and process the personal information of multiple users processed by the multi - type structure, resulting in a reduction of the personal information management cost by 13.4%. The efficiency of the proposed method is 19.5% higher than that of the existing method.

A Study on the Aesthetic Characteristics of the Digital Rotoscoping Images in Jonas Odell's Animations (요나스 오델(Jonas Odell)의 작품 세계에 나타난 디지털 로토스코핑 이미지의 특성)

  • Kim, Young-Ok
    • Cartoon and Animation Studies
    • /
    • s.39
    • /
    • pp.111-132
    • /
    • 2015
  • Although Rotoscoping technique has been used for a long time to mimic the natural and smooth motion since the early 20th century, its artistic value was devalued as tricks because it traces the already recorded images. But the fact that the rotoscoping images can cross the boundaries between animation and live action in an infinite integral freedom in the digital era became rather expansive new aesthetic possibilities of representation of the reality. In addition, Jonas Odell's animations such as (2010), (2008), (2006) are good example to prove that the rotoscoping images also can serve as means to enhance its narrative. This study is to analyze how rotoscoping images act as a unique role in relation with the narrative based on the said person's real stories and realistic images. I argue that his animated films constantly contain these three characteristics -Images to mediate Auditory sensitivity as a record of inner metaphysical reality, anonymous images to represent a specific existential character, and images that act as physical representation that holds the physical space/time and related memory. This reveals that rotoscoping images in this digital era went beyond reproduction for natural movements or special type of style. It rather suggests new layers of experience, and acquires new value in animation. I hope that this study could serve as a foundation to rediscover and re-position the value of rotoscoping images as well as good opportunity to introduce very talented swedish animation artist who already received global attention with his unique philosophical and aesthetic style.

The Evaluation for Web Mining and Analytics Service from the View of Personal Information Protection and Privacy (개인정보보호 관점에서의 웹 트래픽 수집 및 분석 서비스에 대한 타당성 연구)

  • Kang, Daniel;Shim, Mi-Na;Bang, Je-Wan;Lee, Sang-Jin;Lim, Jong-In
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.6
    • /
    • pp.121-134
    • /
    • 2009
  • Consumer-centric marketing business is surely one of the most successful emerging business but it poses a threat to personal privacy. Between the service provider and the user there are many contrary issues to each other. The enterprise asserts that to abuse the privacy data which is anonymous there is not a problem. The individual only will not be able to willingly submit the problem which is latent. Web traffic analysis technology itself doesn't create issues, but this technology when used on data of personal nature might cause concerns. The most criticized ethical issue involving web traffic analysis is the invasion of privacy. So we need to inspect how many and what kind of personal informations being used and if there is any illegal treatment of personal information. In this paper, we inspect the operation of consumer-centric marketing tools such as web log analysis solutions and data gathering services with web browser toolbar. Also we inspect Microsoft explorer-based toolbar application which records and analyzes personal web browsing pattern through reverse engineering technology. Finally, this identified and explored security and privacy requirement issues to develop more reliable solutions. This study is very important for the balanced development with personal privacy protection and web traffic analysis industry.

A Study on the Fraud Detection for Electronic Prepayment using Machine Learning (머신러닝을 이용한 선불전자지급수단의 이상금융거래 탐지 연구)

  • Choi, Byung-Ho;Cho, Nam-Wook
    • The Journal of Society for e-Business Studies
    • /
    • v.27 no.2
    • /
    • pp.65-77
    • /
    • 2022
  • Due to the recent development in electronic financial services, transactions of electronic prepayment are rapidly growing, leading to growing fraud attempts. This paper proposes a methodology that can effectively detect fraud transactions in electronic prepayment by machine learning algorithms, including support vector machines, decision trees, and artificial neural networks. Actual transaction data of electronic prepayment services were collected and preprocessed to extract the most relevant variables from raw data. Two different approaches were explored in the paper. One is a transaction-based approach, and the other is a user ID-based approach. For the transaction-based approach, the first model is primarily based on raw data features, while the second model uses extra features in addition to the first model. The user ID-based approach also used feature engineering to extract and transform the most relevant features. Overall, the user ID-based approach showed a better performance than the transaction-based approach, where the artificial neural networks showed the best performance. The proposed method could be used to reduce the damage caused by financial accidents by detecting and blocking fraud attempts.

Anonymity of Tor Users on Unsecured Applications (비 암호화 프로그램 사용자의 토르망 익명성 보장 분석)

  • Shin, Seok-Joo;Dahal, Saurav;Pudasaini, Amod;Kang, Moon-Soo
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.12 no.5
    • /
    • pp.805-816
    • /
    • 2017
  • Tor is a popular, low-latency open network that offers online anonymity to users by concealing their information from anyone conducting traffic analysis. At the same time, a number of conventional passive and active attacking schemes have been proposed to compromise the anonymity provided by the Tor network. In addition to attacks on the network through traffic analysis, interacting with an unsecured application can reveal a Tor user's IP address. Specific traffic from such applications bypasses Tor proxy settings in the user's machine and forms connections outside the Tor network. This paper presents such applications and shows how they can be used to deanonymize Tor users. Extensive test studies performed in the paper show that applications such as Flash and BitTorrent can reveal the IP addresses of Tor users.