• 제목/요약/키워드: Concept of Protection

검색결과 529건 처리시간 0.03초

Preserving User Anonymity in Context-Aware Location-Based Services: A Proposed Framework

  • Teerakanok, Songpon;Vorakulpipat, Chalee;Kamolphiwong, Sinchai;Siwamogsatham, Siwaruk
    • ETRI Journal
    • /
    • 제35권3호
    • /
    • pp.501-511
    • /
    • 2013
  • Protecting privacy is an important goal in designing location-based services. Service providers want to verify legitimate users and allow permitted users to enjoy their services. Users, however, want to preserve their privacy and prevent tracking. In this paper, a new framework providing users with more privacy and anonymity in both the authentication process and the querying process is proposed. Unlike the designs proposed in previous works, our framework benefits from a combination of three important techniques: k-anonymity, timed fuzzy logic, and a one-way hash function. Modifying and adapting these existing schemes provides us with a simpler, less complex, yet more mature solution. During authentication, the one-way hash function provides users with more privacy by using fingerprints of users' identities. To provide anonymous authentication, the concept of confidence level is adopted with timed fuzzy logic. Regarding location privacy, spatial k-anonymity prevents the users' locations from being tracked. The experiment results and analysis show that our framework can strengthen the protection of anonymity and privacy of users by incurring a minimal implementation cost and can improve functionality.

Functional Privacy-preserving Outsourcing Scheme with Computation Verifiability in Fog Computing

  • Tang, Wenyi;Qin, Bo;Li, Yanan;Wu, Qianhong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제14권1호
    • /
    • pp.281-298
    • /
    • 2020
  • Fog computing has become a popular concept in the application of internet of things (IoT). With the superiority in better service providing, the edge cloud has become an attractive solution to IoT networks. The data outsourcing scheme of IoT devices demands privacy protection as well as computation verification since the lightweight devices not only outsource their data but also their computation. Existing solutions mainly deal with the operations over encrypted data, but cannot support the computation verification in the same time. In this paper, we propose a data outsourcing scheme based on an encrypted database system with linear computation as well as efficient query ability, and enhance the interlayer program in the original system with homomorphic message authenticators so that the system could perform computational verifying. The tools we use to construct our scheme have been proven secure and valid. With our scheme, the system could check if the cloud provides the correct service as the system asks. The experiment also shows that our scheme could be as effective as the original version, and the extra load in time is neglectable.

열매체 가열기 설비에서의 폭발위험관리에 관한 연구 (A Study on Explosion Risk Management for Hot Oil Heater)

  • 장철;권진욱;황명환
    • 대한안전경영과학회지
    • /
    • 제19권3호
    • /
    • pp.1-9
    • /
    • 2017
  • In the industrial field, various type of fuel have been used for product processing facilities. Recent for 10 years, the usage of natural gas (NG) was gradually increased. Because it has many merits; clean fuel, no transportation, storage facility and so on. There are common safety concept that strict explosion protection approaches are needed for facilities where explosive materials such as flammable liquid, vapor and gases exist. But some has an optimistic point of view that the lighter than air gases such as NG disperse rapidly, hence do not form explosion environment upon release into the atmosphere, many parts has a conventional safety point of view that those gases are also inflammable gases, hence can form explosion environment although the extent is limited and present. In this paper, the heating equipments (Hot Oil Heater) was reviewed and some risk management measures were proposed. These measures include hazardous area classification and explosion-proof provisions of electric apparatus, an early gas leak detection and isolation, ventilation system reliability, emergency response plan and training and so on. This study calculates Hazardous Area Classification using the hypothetical volume in the KS C IEC code.

A SECURITY ARCHITECTURE FOR THE INTERNET OF THINGS

  • Behrens, Reinhard;Ahmed, Ali
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제11권12호
    • /
    • pp.6092-6115
    • /
    • 2017
  • This paper demonstrates a case for an end-to-end pure Application Security Layer for reliable and confidential communications within an Internet of Things (IoT) constrained environment. To provide a secure key exchange and to setup a secure data connection, Transport Layer Security (TLS) is used, which provides native protection against replay attacks. TLS along with digital signature can be used to achieve non-repudiation within app-to-app communications. This paper studies the use of TLS over the JavaScript Object Notation (JSON) via a The Constrained Application Protocol (CoAP) RESTful service to verify the hypothesis that in this way one can provide end-to-end communication flexibility and potentially retain identity information for repudiation. As a proof of concept, a prototype has been developed to simulate an IoT software client with the capability of hosting a CoAP RESTful service. The prototype studies data requests via a network client establishing a TLS over JSON session using a hosted CoAP RESTful service. To prove reputability and integrity of TLS JSON messages, JSON messages was intercepted and verified against simulated MITM attacks. The experimental results confirm that TLS over JSON works as hypothesised.

지리정보DB의 효율적 유통관리 방안 연구 - 지적재산권 설정을 중심으로 - (Development of effective management strategy for geographical database based on the concept of intellectual property rights)

  • 양광식;이종열;이영대
    • Spatial Information Research
    • /
    • 제11권1호
    • /
    • pp.73-88
    • /
    • 2003
  • 지리정보DB는 구축하는데 많은 비용과 노력이 수반됨에도 불구하고 비교적 간편하게 복제하여 활용할 수 있기 때문에 유통관리에 있어 법적 보호체계가 마련되어야 한다. 그러나 우리나라의 저작권법은 보호기준을 소재의 선택 또는 배열에 창작성으로 규정하고 있어 소재의 선택 또는 배열에 창작성이 낮거나 없는 데이터베이스는 보호받을 수 없는 실정이다. 본 연구는 이러한 현실적인 법 체계하에서 데이터베이스 제작에 따른 자료수집과 구성에 대한 노력 그리고 유통 및 활용에 따른 관련집단간의 이해갈등을 조정하기 위한 보호방안을 마련하기 위해 시도되었다.

  • PDF

Ubi-Home에서의 지능적 멀티미디어 스트리밍을 지원하는 DRM 설계 및 구현 (Design and Implementation of the DRM Supporting Smart Multimedia Streaming in Ubi-Home)

  • 박종혁;이상진;홍인화;안태원;이덕규
    • 한국통신학회논문지
    • /
    • 제31권3C
    • /
    • pp.293-301
    • /
    • 2006
  • 본 논문에서는 Ubi-Home에서의 지능적 멀티미디어 스트리밍을 지원하는 콘텐츠 보호 및 관리 시스템(UHSMS-DRM: Ubi-Home Smart Multimedia Streaming-Digital Right Management)을 설계 및 구현하였다. 제안 시스템은 Ubi-Home에서 디지털 콘텐츠의 저작권 보호 및 관리를 위한 유연한 유통 플랫폼을 제공하며, PC, STB, PDA, Portable device 등 다양한 디바이스의 인증을 통해 정당한 사용자에게 Multimedia Steaming Service를 제공한다. 그리고, 도메인 인증개념을 적용하여 Ubi-Home의 모든 디바이스에 대한 라이센스 관리의 효율성을 높인다. 또한, Ubi-Home에서 intelligent Service를 위해 사용자의 위치를 인지하기 위한 알고리즘을 제안 및 적용한다.

Fuzzy AHP와 BSC 결합모델기반의 Green Supplier 선정 문제 (A Combined Fuzzy AHP and BSC Model based Green Supplier Selection Problem)

  • 서광규
    • 대한안전경영과학회지
    • /
    • 제13권3호
    • /
    • pp.63-69
    • /
    • 2011
  • As environmental protection is becoming more and more important, green production has become a key issue for almost every manufacturer and will determine a manufacturer can be sustainable in the long term. Therefore a performance evaluation system for green suppliers is necessary to determine the suitability of suppliers to cooperate with the company. While the works on the evaluation and/or selection of suppliers are abundant, those that concern environmental issues are rather limited. The objective of this study is to construct a combined model based on fuzzy analytic hierarchy process (FAHP) and balanced scorecard (ESC) for evaluating green suppliers in the manufacturing industry. The ESC concept is applied to define the hierarchy with four major perspectives (i.e. financial, customer, internal business process, and learning and growth), and performance indicators are selected for each perspective. FAHP is then proposed in order to tolerate vagueness and ambiguity of information. Finally, FAHP is finally constructed to facilitate the solving process. With the proposed model, manufacturers can have a better understanding of the capabilities that a green supplier must possess and can evaluate and select the most suitable green supplier for cooperation.

IDENTIFICATION OF SAFETY CONTROLS FOR ENGINEERING-SCALE PYROPROCESS FACILITY

  • MOON, SEONG-IN;SEO, SEOK-JUN;CHONG, WON-MYUNG;YOU, GIL-SUNG;KU, JEONG-HOE;KIM, HO-DONG
    • Nuclear Engineering and Technology
    • /
    • 제47권7호
    • /
    • pp.915-923
    • /
    • 2015
  • Pyroprocess technology has been considered as a fuel cycle option to solve the spent fuel accumulation problems in Korea. The Korea Atomic Energy Research Institute, Daejeon, Korea has been studying pyroprocess technology, and the conceptual design of an engineering-scale pyroprocess facility, called the Reference Engineering-scale Pyroprocess Facility, has been performed on the basis of a 10 ton heavy metal throughput per year. In this paper the concept of Reference Engineering-scale Pyroprocess Facility is introduced along with its safety requirements for the protection of facility workers, collocated workers, the off-site public, and the environment. For the identification of safety structures, systems, and components and/or administrative controls, the following activities were conducted: (1) identifying hazards associated with operations; (2) identifying potential events associated with these hazards; and (3) identifying the potential preventive and/or mitigative controls that reduce the risk associated with these accident events. This study will be used to perform a safety evaluation for accidents involving any of the hazards identified, and to establish safety design policies and propose a more definite safety design.

무형문화재 '원형규범'의 이행과 의미 고찰 (The Application of the Principle of "Preserving the Original Form" to Intangible Heritage and Its Meaning)

  • 이재필
    • 헤리티지:역사와 과학
    • /
    • 제49권1호
    • /
    • pp.146-165
    • /
    • 2016
  • 1970년 중요무형문화재 보유자 인정제도가 도입되면서 '원형규범'이 채택되었다. 규범으로 채택되기 이전에도 '원형'은 문화재 보존의 방향으로 통용되고 있었다. 법규상 원형의 개념은 형태적인 개념이다. 그러나 구전 및 실연에 의해 전승되어온 무형문화재의 특성상 과거 어느 시점에 누구에 의해 실연되는 것을 원형의 형태로 확인하거나 특정할 수 없으므로, 지정 인정행위의 시점에서 현존인이 실연하는 기 예능을 중심으로 원형을 설정하고 보유자를 인정하였다. 따라서 근원적 실체로서 '원형' 이 아닌 지정 인정 당시의 보유 기 예능이 '잠정적 원형'으로 설정되면서 '원형보존' 정책이 시행되었다. 원형보존 정책은 '원형'을 보유한 보유자의 전수교육과 전승자 양성을 통하여 시행되었으며, 보유자(보유단체)를 중심으로 한 배타적인 전승환경이 조성되기에 이른다. 그러나 이러한 원형보존 정책에도 불구하고 지정 당시의 기 예능은 사회적 환경과 수요에 맞게끔 변화가 진행되어 보존하고자 했던 형태적 의미의 '원형'은 보존되지 않았다. 그럼에도 불구하고 원형규범은 근대화, 서구화 등 외부환경으로부터 우리 전통문화를 보존하기 위한 사회적 실천의 지침 내지는 지향점을 지닌 시대적 담론이었으며, 무형문화재 보존정책의 당위적 지침으로 정책적 실효를 거두었다고 평가할 수 있다. 2016년 3월 시행될 예정인 무형법은 무형문화재의 변화적 속성을 고려하여 '원형' 대신 '전형'을 도입하였다. '전형'은 무형문화재 주변부의 변화를 인정하여 원형의 경직성을 탈피하고자 한 것이다. 그러나 법규상 '전형'에 해당하는 고유한 가치, 지식, 기법이 문화재 보존의 지침 또는 원칙에 따라 유지되어야 하므로 전형은 원형과의 단절보다는 관련성과 연장선에서 볼 수도 있다.

생존성 강화를 위한 침입감내 시스템의 분류와 통합 프레임워크 제안 (Classification of the Intrusion Tolerant Systems and Integrated Framework for Survivability Enhancement)

  • 김기한;최명렬;이경환
    • 정보처리학회논문지C
    • /
    • 제10C권3호
    • /
    • pp.295-304
    • /
    • 2003
  • 기존의 보안관점은 악의적인 사용자의 공격이나 우발적인 사고로부터 프로그램과 데이터의 보호를 강조한다. 이를 위한 방화벽, 침입탐지시스템의 연구개발은 성숙 단계에 접어들었다. 최근들어 새롭게 대두되고 있는 침입감내 개념은 정보 생존성을 위한 마지막 방어선으로 공격이 성공하더라도 임무 수행에 필수적인 시스템의 중요 서비스를 계속 제공하기 위해 가용성과 무결성을 강조하는 개념이다. 본 논문에서는 침입감내 시스템을 프로그램 보호와 데이터 보호관점에서 분류하고 프로그램과 데이터의 침입감내 특성을 모두 지원하는 통합된 침입감내 프레임워크를 제안한다.