• Title/Summary/Keyword: Confidentiality Protection

Search Result 93, Processing Time 0.266 seconds

Multi-watermarking method for copyright protection and confidentiality for digital image (디지털 영상의 저작권 보호와 기밀성을 위한 다중워터마킹 방법)

  • 이성우;이형욱;신재호
    • Proceedings of the IEEK Conference
    • /
    • 1999.06a
    • /
    • pp.1071-1074
    • /
    • 1999
  • In this paper, we present a multi-watermarking method for a copyright protection and confidentiality for an original digital image. One watermark is used for a copyright protection and another for a copyright protection and another for a confidentiality and a detection of unauthorized copies.

  • PDF

The Principle of Confidentiality in Arbitration: A Necessary Crisis

  • Cremades, Bernardo M.;Cortes, Rodrigo
    • Journal of Arbitration Studies
    • /
    • v.23 no.3
    • /
    • pp.25-38
    • /
    • 2013
  • Confidentiality has always been considered one of the most important aspects of arbitral proceedings and until recently a principle that could never be ignored. However, under the shadow of the increasing number of arbitral cases in which States are involved, there has recently been a tendency towards publicity, not only in investment protection arbitrations but also in commercial arbitrations. That said, many questions arise: in the event of a conflict between confidentiality and publicity, which should prevail? What role does the arbitrator play in this conflict? Does confidentiality provide more benefits than harm.

  • PDF

An Information Flow Security Based on Protected Area in eCommerce (전자 거래에서 보호 영역을 기반으로 하는 정보 흐름 보안 방법)

  • Seo, Yang-Jin;Han, Sang-Yong
    • The Journal of Society for e-Business Studies
    • /
    • v.15 no.1
    • /
    • pp.1-16
    • /
    • 2010
  • Confidentiality is one of the most important requirements of information protection systems. The access control technique has been used to provide confidentiality, but it has fundamental problems in that it cannot prevent violations of confidentiality committed by authorized users. Information flow control is a technique introduced to resolve such problems, and many approaches based on programming languages have been proposed. However, it is not easy for a programmer to implement the technique at the source code level. Furthermore, the practicality of information flow control is difficult to demonstrate because it does not provide control over programs that have already been developed. This paper proposes a method that enables a practical information flow control through using a protected area, a separate part of computer system storage. Case studies are given to show its usefulness.

An Individual Privacy Protection Design for Smart Tourism Service based on Location (위치 기반 스마트 관광 서비스를 위한 개인 프라이버시 보호 설계)

  • Cho, Cook-Chin;Jeong, Eun-Hee
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.9 no.5
    • /
    • pp.439-444
    • /
    • 2016
  • This paper proposes the technique to protect the privacy of those who uses Smart Tourism Service based on location. The proposed privacy protection technique (1) generates a shared private key, OTK(One Time Key) without information exchanging Users with a Tourism Server and provides Users and a Tourism Server with message confidentiality by encrypting data with the key, (2) concatenates users' ID, login time(timestamp), and randomly-generated nonce, generates OTK by hashing with a hash function, encrypts users' location information and query by using the operation of OTK and XOR and provides Users and a Tourism Server with message confidentiality by sending the encrypted result. (3) protects a message replay attack by adding OTK and timestamp. Therefore, this paper not only provides data confidentiality and users' privacy protection but also guarantees the safety of location information and behavior pattern data.

An Analysis of Linguistic Characteristics of Information Protection Policies to Improve the Effectiveness of Information Protection in Cloud Computing Services (클라우드 컴퓨팅 서비스의 정보보호 실효성 증진을 위한 정보보호 정책의 언어적 특성 분석)

  • Jeong, Eun-Han;Kim, Kyung-Ihl
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.10
    • /
    • pp.15-23
    • /
    • 2020
  • It is a reality that users do not know well what kind of information protection policy the cloud service provider presents to consumers. The purpose of this study is to find a way to improve the effectiveness of information protection by analyzing the content and linguistic characteristics of information protection policies provided by cloud service providers. In order to achieve the purpose of this study, we investigate the contents of information protection policies of 47 companies that provide cloud services and analyze the influence of linguistic characteristics to come up with a plan to increase the efficiency of cloud services. The research results showed that low readability due to comprehensive expression of technical processing methods, etc., could lead to legal disputes and to hinder the spread of cloud services. The research results can increase the effectiveness of information protection by suggesting items to be provided to users.ing, Privacy, confidentiality, linguistic characteristics, Accounting Information.

UTrustDisk: An Efficient Data Protection Scheme for Building Trusted USB Flash Disk

  • Cheng, Yong;Ma, Jun;Ren, Jiangchun;Mei, Songzhu;Wang, Zhiying
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.4
    • /
    • pp.2276-2291
    • /
    • 2017
  • Data protection of removable storage devices is an important issue in information security. Unfortunately, most existing data protection mechanisms are aimed at protecting computer platform which is not suitable for ultra-low-power devices. To protect the flash disk appropriately and efficiently, we propose a trust based USB flash disk, named UTrustDisk. The data protection technologies in UTrustDisk include data authentication protocol, data confidentiality protection and data leakage prevention. Usually, the data integrity protection scheme is the bottleneck in the whole system and we accelerate it by WH universal hash function and speculative caching. The speculative caching will cache the potential hot chunks for reducing the memory bandwidth pollution. We adopt the symmetric encryption algorithm to protect data confidentiality. Before mounting the UTrustDisk, we will run a trusted virtual domain based lightweight virtual machine for preventing information leakage. Besides, we prove formally that UTrustDisk can prevent sensitive data from leaking out. Experimental results show that our scheme's average writing throughput is 44.8% higher than that of NH scheme, and 316% higher than that of SHA-1 scheme. And the success rate of speculative caching mechanism is up to 94.5% since the access pattern is usually sequential.

Ethical considerations in publication of medical papers (의학논문 출판윤리)

  • Bae, Chong-Woo
    • Clinical and Experimental Pediatrics
    • /
    • v.51 no.5
    • /
    • pp.447-451
    • /
    • 2008
  • It is fair to say that there are many ethical issues concerning the publication of medical papers. To define the best practice in the ethics of scientific publishing and a proper understanding of appropriate reporting in medical papers, this review should be useful for authors dealing with ethical issues which involve the protection of human and animal rights, the protection of confidentiality and informed consent, fabrication, falsification, plagiarism, author and authorship, copy right transfer, duplicate publication, conflict of interest, and dealing with misconduct cases.

An Efficient Selective Encryption of Fingerprint Images for Embedded Processors

  • Moon, Dae-Sung;Chung, Yong-Wha;Pan, Sung-Bum;Moon, Ki-Young;Chung, Kyo-Il
    • ETRI Journal
    • /
    • v.28 no.4
    • /
    • pp.444-452
    • /
    • 2006
  • Biometric-based authentication can provide a strong security guarantee of the identity of users. However, the security of biometric data is particularly important as any compromise of the biometric data will be permanent. In this paper, we propose a secure and efficient protocol to transmit fingerprint images from a fingerprint sensor to a client by exploiting the characteristics of the fingerprint images. Because the fingerprint sensor is computationally limited, a standard encryption algorithm may not be applied to the full fingerprint images in real-time to guarantee the integrity and confidentiality of the fingerprint images transmitted. To reduce the computational workload on the resource-constrained sensor, we apply the encryption algorithm to a nonce for integrity and to a specific bitplane of each pixel of the fingerprint image for confidentiality. Experimental results show that the integrity and confidentiality of the fingerprint images can be guaranteed without any leakage of the fingerprint ridge information and can be completed in real-time on embedded processors.

  • PDF

A Study on the Protection of User Data in the Cloud System (클라우드 시스템에서의 사용자 데이터 보호에 관한 연구)

  • Lee, Ae-Ri;Cho, Do-Eun;Lee, Jae-Young
    • Journal of Digital Convergence
    • /
    • v.10 no.11
    • /
    • pp.389-394
    • /
    • 2012
  • The cloud computing is a system that provides IT resources service by using internet technologies, which grabs lots of attention today. Though cloud storage services provide service users with convenience, there is a problem in which data confidentiality is not guaranteed because it is hard for data owners to control the access to the data. This article suggested the technique by applying Public-Key Cryptosystem only to a block after dividing users' data into blocks in order to protect users' data in cloud system. Thus confidentiality and integrity are given to users' data stored in cloud storage server.

Design and Implementation of a Copyright Protection System base on the Program on-line Registration System (프로그램 온라인 등록 시스템기반의 저작권 보호시스템 설계 및 구현)

  • Jang Jae-Hyeok;Lee Jong-Sup;Choi Yong-Rak
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.2 s.40
    • /
    • pp.275-283
    • /
    • 2006
  • Writers enroll their outcome to Program Deliberation & Mediation Committee and get the copyright preserved for the protection of IPR. The program registration is conducted through off-line and on-line methods, and especially on-line registration provides program registrants convenience along with the safety of property from external copyright invaders. However, it is a shortcoming that the integrity and confidentiality of the enrolled program cannot be guaranteed in case of internal factors such as system errors, administrator's illegal access and revision. This paper proposes the reliable system, ensuring programs and offering convenience of Digital signature management from the system errors and intruding factors by internal administrator, using the security of confidentiality, integrity and Multi-Signature Scheme for program.

  • PDF