• Title/Summary/Keyword: CyberIdentity

Search Result 98, Processing Time 0.023 seconds

Factors Influencing on the Field Education Outcomes and Professional Identity of Social Welfare in Cyber University and Ordinary University Students (사이버대학생과 일반대학생의 사회복지 현장실습성과 및 전문직 정체성에 영향을 미치는 요인)

  • Choi, Eun-Hee
    • The Journal of the Korea Contents Association
    • /
    • v.11 no.12
    • /
    • pp.475-485
    • /
    • 2011
  • The purpose of this study is to find intervention strategies of university and social welfare agency through analysis of factors influencing on field education outcomes and professional identity of social welfare in cyber university and ordinary university students. The major findings are as follows. First, the degree of field education outcome in cyber university students is higher than ordinary university ones. Second, supervision and university element are meaningful factors to constituent variables of field education outcomes in participants, but major satisfaction is only important for ordinary university students. Third, professional identity is related to major satisfaction, supervision, and university element in cyber university students. But university element hasn't influence on professional identity in ordinary university students. Therefore, supervisors have to give systematic instruction and do clear role model. Universities make an effort to improve major satisfaction and the quality as a pre-social worker.

Secure and Efficient Privacy-Preserving Identity-Based Batch Public Auditing with Proxy Processing

  • Zhao, Jining;Xu, Chunxiang;Chen, Kefei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.2
    • /
    • pp.1043-1063
    • /
    • 2019
  • With delegating proxy to process data before outsourcing, data owners in restricted access could enjoy flexible and powerful cloud storage service for productivity, but still confront with data integrity breach. Identity-based data auditing as a critical technology, could address this security concern efficiently and eliminate complicated owners' public key certificates management issue. Recently, Yu et al. proposed an Identity-Based Public Auditing for Dynamic Outsourced Data with Proxy Processing (https://doi.org/10.3837/tiis.2017.10.019). It aims to offer identity-based, privacy-preserving and batch auditing for multiple owners' data on different clouds, while allowing proxy processing. In this article, we first demonstrate this scheme is insecure in the sense that malicious cloud could pass integrity auditing without original data. Additionally, clouds and owners are able to recover proxy's private key and thus impersonate it to forge tags for any data. Secondly, we propose an improved scheme with provable security in the random oracle model, to achieve desirable secure identity based privacy-preserving batch public auditing with proxy processing. Thirdly, based on theoretical analysis and performance simulation, our scheme shows better efficiency over existing identity-based auditing scheme with proxy processing on single owner and single cloud effort, which will benefit secure big data storage if extrapolating in real application.

Constructing Strong Identity-Based Designated Verifier Signatures with Self-Unverifiability

  • Ki, Ju-Hee;Hwang, Jung-Yeon;Nyang, Dae-Hun;Chang, Beom-Hwan;Lee, Dong-Hoon;Lim, Jong-In
    • ETRI Journal
    • /
    • v.34 no.2
    • /
    • pp.235-244
    • /
    • 2012
  • An identity-based strong designated verifier signature scheme provides restricted verifiability only for a verifier designated by a signer and proper privacy for the signer. In this paper, we show that strong designated verifier signature schemes do not satisfy the self-unverifiability requirement in the sense that not only exposure of the verifier's secret key but also of the signer's secret key enables an attacker to verify signatures, which should have been the exclusive right of the verifier. We also present a generic method to construct a strong identity-based designated verifier signature scheme with self-unverifiability from identity-based key encapsulation and identity-based key sharing schemes. We prove that a scheme constructed from our method achieves unforgeability, non-transferability, and self-unverifiability if the two underlying components are secure. To show the advantage of our method, we present an example that outputs short signatures and we analyze its performance.

Digital Camera Consumers' Self-Expression and Communication in Cyberspace Using Ethnographic Interviews (가상공간에서의 디지털 카메라 소비자의 자기표현과 의사소통 :문화기술적 방법을 이용하여)

  • Lee, Mee-Hye;Yoon, Jung-Hai
    • Journal of Families and Better Life
    • /
    • v.25 no.2 s.86
    • /
    • pp.71-87
    • /
    • 2007
  • It is necessary to understand a self-expression and communication in cyberspace using digital photography We have studied the digital camera consumer's self-expression and communication skills and strategy through ethnographic interviews. In this study, we have used ethnographic interviews of 7 informants who had personal web site and are using digital cameras. As a result, It has turned out that informants expressed their self taking pictures of their daily life, friends, and family. Also they imply meaning and feeling in the pictures that had been taken to express their lives. The communication in cyberspace has turned out that informants communicate with other people with digital pictures to show their life. They communicated each other and give information. It means that they made information by themselves to give and share with other people as prosumer. Digital photography to express themselves and communicate in cyberspace enhanced human relationship that had made in cyber space. And it helps to form their self identity. They express their cyber identity with digital photography and it is similar to their self identity that expresses in real life.

Digital Identity Trend for Digital Trust Society (디지털 신뢰 사회 실현을 위한 디지털 아이덴티티 동향)

  • Kwon, D.S.;Lee, H.;Park, J.D.
    • Electronics and Telecommunications Trends
    • /
    • v.34 no.3
    • /
    • pp.114-124
    • /
    • 2019
  • The Internet was designed for machines, not humans, and hence, nobody owns a digital identity. Instead, a digital identity is rented from a website and an application. This lack of unique and secure digital identities has resulted in confusion in the online/cyber world. Digital identities pose one of the oldest and most difficult problems with regard to the Internet. There is still no way to use digital credentials to prove, own, and control an online identity, namely a self-sovereign identity, in the same manner we do in the offline world, particularly without a trusted third party. This article discusses the current open standards for digital identities, proposes solutions pertaining to digital identities in the future, and introduces the concept of a blockchain-based self-sovereign digital identity without the need of trusted third parties.

A Study of Cyberfeminism in fashion in the digital era -Focused on cybersubculture style (Part I)- (디지털시대 패션에 나타난 사이버페미니즘 연구(제1보) -사이버하위문화 스타일을 중심으로-)

  • 김현수;양숙희
    • Journal of the Korean Society of Clothing and Textiles
    • /
    • v.27 no.11
    • /
    • pp.1229-1240
    • /
    • 2003
  • The purpose of this study was to review such results of the scientific and technological development as women's changed status, sexual identity and their views of physique in the cyber space based on cyber feminists' theories, and thereby, examine the concept of space during the medieval age, and then, the fundamental spiritual concept involving the fetishism of women's body as sexual objects in the materialistic space of the digital age in terms of the consciousness of trend or supra-sensual perceptions, and thereby, review the effect of the cyber terrorism and violence on the fashion in sub-cultural terms. Some researchers distinguish psychedelic styles from cyberdelic ones to assume such psychiatric visions as psychedelic fashion characterized by resistance and delinquency-cyber punk fashion, cyber hippie fashion, cyborg fashion- and then, define them all as cyber resistant culture fashion or as a sub-cultural style of the cyber culture. As a result, it was found that human bodies are being encoded with the networks, various cyber characters or avatars are emerging, while human bodies are being distorted or exaggerated with human beings and machines being imploded.

Association Between the Addiction of SNS and Ego-Identity of Youth's in Both Reality and Cyber Space (청소년의 SNS중독과 현실공간 및 가상공간에서의 자아정체감의 관계)

  • Shin, Hye-Sun;Yun, Seok-Hee
    • Journal of Digital Convergence
    • /
    • v.15 no.8
    • /
    • pp.225-234
    • /
    • 2017
  • This study was conducted with male/female teenagers to examine the interaction between their attachment to social media and their self-identity in both real space and cyberspace. Among the subjects, male teenagers tended to use social media more than female teenagers. Also, the more friends/followers they have, the more they would use the service itself. In the subordinate correlation of the subjects' self-identity in both cyberspace and real space, most areas showed positive correlation. And each subregion of the areas of real-space ego-identity and social media addiction showed positive correlation with them as well. On the other hand, in areas of social media addiction and cyberspace ego-identity, all areas showed negative correlation except the area of dominance. Through this experiment, it was proven apparent that there needs to be proper management of teenagers that are overusing and are addicted to social media, and that programs should be developed to mediate the subjects in regards to each subregion of real space and cyberspace ego-identity.

An Efficient Broadcast Authentication Scheme with Batch Verification for ADS-B Messages

  • Yang, Haomiao;Kim, Hyunsung;Li, Hongwei;Yoon, Eunjun;Wang, Xiaofen;Ding, Xuefeng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.10
    • /
    • pp.2544-2560
    • /
    • 2013
  • As a cornerstone of the next generation air traffic management (ATM), automatic dependent surveillance-broadcast (ADS-B) system can provide continual broadcast of aircraft position, identity, velocity and other messages over unencrypted data links to generate a common situational awareness picture for ATM. However, since ADS-B messages are unauthenticated, it is easy to insert fake aircrafts into the system via spoofing or insertion of false messages. Unfortunately, the authentication for ADS-B messages has not yet been well studied. In this paper, we propose an efficient broadcast authentication scheme with batch verification for ADS-B messages which employs an identity-based signature (IBS). Security analysis indicates that our scheme can achieve integrity and authenticity of ADS-B messages, batch verification, and resilience to key leakage. Performance evaluation demonstrates that our scheme is computationally efficient for the typical avionics devices with limited resources, and it has low communication overhead well suitable for low-bandwidth ADS-B data link.