• Title/Summary/Keyword: Data De-Identification

Search Result 120, Processing Time 0.022 seconds

Research on the Use of Pseudonym Data - Focusing on Technical Processing Methods and Corporate Utilization Directions - (가명 데이터 활용연구 - 기술적 처리방법 및 기업의 활용방향을 중심으로 -)

  • Kim, Jung-Sun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.2
    • /
    • pp.253-261
    • /
    • 2020
  • This study examines the technologies and application processes related to the use of pseudonym data of companies after the passage of the Data 3 Act to activate the data economy in earnest, and what companies should prepare to use pseudonym data and what will happen in the process It was intended to contribute to the elimination of uncertainty. In the future, companies will need to extend the information security management system from the perspective of the existing IT system to manage and control data privacy protection and management from a third party provisioning perspective. In addition, proper pseudonym data use control should be implemented even in the data use environment utilized by internal users. The economic effect of market change and heterogeneous data combination due to the use of pseudonymized data will be very large, and standards for appropriate non-identification measures and risk assessment criteria for data utilization and transaction activation should be prepared in a short time.

Anomaly Detection in Medical Wireless Sensor Networks

  • Salem, Osman;Liu, Yaning;Mehaoua, Ahmed
    • Journal of Computing Science and Engineering
    • /
    • v.7 no.4
    • /
    • pp.272-284
    • /
    • 2013
  • In this paper, we propose a new framework for anomaly detection in medical wireless sensor networks, which are used for remote monitoring of patient vital signs. The proposed framework performs sequential data analysis on a mini gateway used as a base station to detect abnormal changes and to cope with unreliable measurements in collected data without prior knowledge of anomalous events or normal data patterns. The proposed approach is based on the Mahalanobis distance for spatial analysis, and a kernel density estimator for the identification of abnormal temporal patterns. Our main objective is to distinguish between faulty measurements and clinical emergencies in order to reduce false alarms triggered by faulty measurements or ill-behaved sensors. Our experimental results on both real and synthetic medical datasets show that the proposed approach can achieve good detection accuracy with a low false alarm rate (less than 5.5%).

Identification and Characterization of a Conserved Baculoviral Structural Protein ODVP-6E/ODV-E56 from Choristoneura fumiferana Granulovirus

  • Rashidan, Kianoush Khajeh;Nassoury, Nasha;Giannopoulos, Paresa N.;Guertin, Claude
    • BMB Reports
    • /
    • v.35 no.6
    • /
    • pp.595-603
    • /
    • 2002
  • A gene that encodes a homologue to baculoviral ODVP-6E/ODV-E56, a baculoviral envelope-associated viral structural protein, has been identified and sequenced on the genome of Choristoneura fumiferana granulovirus (ChfuGV). The ChfuGV odvp-6e/odv-e56 gene was located on an 11-kb BamHI subgenomic fragment using different sets of degenerated primers, which were designed using the results of the protein sequencing of a major 39 kDa structural protein that is associated with the occlusion-derived virus (ODV). The gene has a 1062 nucleotide (nt) open-reading frame (ORF) that encodes a protein with 353 amino acids with a predicated molecular mass of 38.5 kDa. The amino acid sequence data that was derived from the nucleotide sequence in ChfuGV was compared to those of other baculoviruses. ChfuGV ODVP-6E/ODV-E56, along with othe baculoviral ODVP-6E/ODV-E56 proteins, all contained two putative transmembrane domains at their C-terminus. Several putative N-and O-glycosylation, N-myristoylation, and phosphorylation sites were detected in the ChfuGV ODVP-6E/ODV-E56 protein. A similar pattern was detected when a hydrophobicity-plots comparison was performed on ChfuGV ODVP-6E/ODV-E56 with other baculoviral homologue proteins. At the nucleotide level, a late promoter motif (GTAAG) was located at -14 nt upstream to the start codon of the GhfuGV odvp-6e/odv-e56 gene. a slight variant of the polyadenylation signal, AATAAT, was detected at the position +10 nt that is downstream from the termination signal. A phylogenetic tree for baculoviral ODVP-6E/ODV-E56 was constructed using a maximum parsimony analysis. The phylogenetic estimation demonstrated that ChfuGV ODVP-6E/ODV-E56 is most closely related to those of Cydia pomonella granulovirus (CpGV) and Plutella xylostella granulovirus (PxGV).

Identification and Characterization of a Putative Baculoviral Transcriptional Factor IE-1 from Choristoneura fumiferana Granulovirus

  • Rashidan, Kianoush Khajeh;Nassoury, Nasha;Merzouki, Abderrazzak;Guertin, Claude
    • BMB Reports
    • /
    • v.35 no.6
    • /
    • pp.553-561
    • /
    • 2002
  • A gene that encodes a protein homologue to baculoviral IE-1 was identified and sequenced in the genome of the Choristoneura fumiferana granulovirus (ChfuGV). The gene has an 1278 nucleotide (nt) open-reading frame (ORF) that encodes 426 amino acids with an estimated molecular weight of 50.33 kDa. At the nucleotide level, several cis-acting regulatory elements were detected within the promoter region of the ie-1 gene of ChfuGV along with other studied granuloviruses (GVs). Two putative CCAAT elements were detected within the noncoding leader region of this gene; one was located on the opposite strand at -92 and the other at -420 nt from the putative start triplet. Two baculoviral late promoter motifs (TAAG) were also detected within the promoter region of the ie-1 gene of ChfuGV. A single polyadenylation signal, AATAAA, was located 18nt downstream of the putative translational stop codon of ie-1 from ChfuGV. At the protein level, the amino acid sequence data that was derived from the nucleotide sequence in ChfuGV IE-1 was compared to those of the Cydia pomonella granulovirus (CpGV), Xestia c-nigrum granulovirus (XcGV) and Plutella xylostella granulovirus (PxGV). The C-terminal regions of the granuloviral IE-1 sequences appeared to be more conserved when compared to the N-terminal regions. A domain, similar to the basic helix-loop-helix like (bHLH-like) domain in NPVs, was detected at the C-terminal region of IE-1 from ChfuGV (residues 387 to 414). A phylogenetic tree for baculoviral IE-1 was constructed using a maximum parsimony analysis. A phylogenetic estimation demonstrates that ChfuGV IE-1 is most closely related to that of CpGV.

Identification, Characterization and Phylogenic Analysis of Conserved Genes within the odvp-6e/odv-e56 Gene Region of Choristoneura fumiferana Granulovirus

  • Rashidan, Kianoush Khajeh;Nassoury, Nasha;Giannopoulos, Paresa N.;Mauffette, Yves;Guertin, Claude
    • BMB Reports
    • /
    • v.37 no.2
    • /
    • pp.206-212
    • /
    • 2004
  • The genes that are located within the odvp-6e/odv-e56 region of the Choristoneura fumiferana granulovirus (ChfuGV) were identified by sequencing the 11 kb BamHI restriction fragment on the ChfuGV genome. The global GC content that was calculated from the data obtained from this genomic region was 34.96%. The open-reading frames (ORFs), located within the odvp-6e/odv-e56 region, are presented and compared to the equivalent ORFs that are located at the same region in other GVs. This region is composed of 14 ORFs, including three ORFs that are unique to ChfuGV with no obvious homologues in other baculoviruses as well as eleven ORFs with homologues to granuloviral ORFs, such as granulin, CfORF2, pk-1, ie-1, odv-e18, p49, and odvp-6e/odv-e56. In this study, the conceptual products of seven major conserved ORFs (granulin, CfORF2, IE-1, ODV-E18, p49 and ODVP-6E/ODV-E56) were used in order to construct phylogenetic trees. Our results show that granuloviruses can be grouped in 2 distinct groups as follows: Group I; Choristoneura fumiferana granulovirus (ChfuGV), Cydia pomonella granulovirus (CpGV), Phthorimaea operculella granulovirus (PhopGV), and Adoxophyes orana granulovirus (AoGV). Group II; Xestia c-nigrum granulovirus (XcGV), Plutella xylostella granulovirus (PxGV), and Trichoplusia ni granulovirus (TnGV). The ChfuGV conserved proteins are most closely related to those of CpGV, PhopGV, and AoGV. Comparative studies, performed on gene arrangements within this region of genomes, demonstrated that three GVs from group I maintain similar gene arrangements.

Improving Legislation on the use of Healthcare Data for Research Purposes (보건의료 빅데이터의 연구목적 사용에 대한 법제 개선방안)

  • Park, Dae Woong;Jeong, Hyun Hak;Jeong, Myung Jin;Ryoo, Hwa Shin
    • The Korean Society of Law and Medicine
    • /
    • v.17 no.2
    • /
    • pp.315-346
    • /
    • 2016
  • With the development of big data processing technology, the potential value of healthcare big data has attracted much attention. In order to realize these potential values, various research using the healthcare big data are essential. However, the big data regulatory system centered on the Personal Information Protection Act does not take into account the aspect of big data as an economic material and causes many obstacles to utilize it as a research purpose. The regulatory system of healthcare information, centered on the primary purpose of patient treatment, should be improved in a way that is compatible with the development of technology and easy to use for public interest. To this end, it is necessary to examine the trends of overseas legal system reflecting the concerns about the balance of protection and utilization of personal information. Based on the implications of the overseas legal system, we can derive improvement points in the following directions from our legal system. First, a legal system that specializes in healthcare information and encompasses protection and utilization is needed. De-identification, which is an exception to the Privacy Act, should also clearly define its level. It is necessary to establish a legal basis for linking healthcare big data to create synergy effects in research. It is also necessary to examine the introduction of the opt-out system on the basis of the discussion on the foreign debate and social consensus. But most importantly, it is the people's trust in these systems.

  • PDF

A Statistical Methodology Study for Measuring Privacy Disclosure Riskin Open Data Environment (오픈 데이터 환경에서 개인정보 노출 위험 측정을 위한 통계적 방법론 연구)

  • Sieun Kim;Ieck-chae Euom
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.2
    • /
    • pp.323-333
    • /
    • 2024
  • Recently, Syntheic data has been in the spotlight as a technology that can protect personal information while maintaining the patterns and characteristics of actual data. Accordingly, technical and institutional research on synthetic data is actively being conducted, but it is difficult to actively use synthetic data due to the lack of clear standards and guidelines. This study is a preliminary study for quantifying the disclosure risk of synthetic data, and derives a privacy disclosure risk index through statistical methodology and suggests specific application measures to comply with the General Data Protection Regulation(GDPR). It is expected that the disclosure risk and the balance of data utility can be controlled through the privacy disclosure risk index of this study in an open data environment.

Damage prediction in the vicinity of an impact on a concrete structure: a combined FEM/DEM approach

  • Rousseau, Jessica;Frangin, Emmanuel;Marin, Philippe;Daudeville, Laurent
    • Computers and Concrete
    • /
    • v.5 no.4
    • /
    • pp.343-358
    • /
    • 2008
  • This article focuses on concrete structures submitted to impact loading and is aimed at predicting local damage in the vicinity of an impact zone as well as the global response of the structure. The Discrete Element Method (DEM) seems particularly well suited in this context for modeling fractures. An identification process of DEM material parameters from macroscopic data (Young's modulus, compressive and tensile strength, fracture energy, etc.) will first be presented for the purpose of enhancing reproducibility and reliability of the simulation results with DE samples of various sizes. The modeling of a large structure by means of DEM may lead to prohibitive computation times. A refined discretization becomes required in the vicinity of the impact, while the structure may be modeled using a coarse FE mesh further from the impact area, where the material behaves elastically. A coupled discrete-finite element approach is thus proposed: the impact zone is modeled by means of DE and elastic FE are used on the rest of the structure. The proposed approach is then applied to a rock impact on a concrete slab in order to validate the coupled method and compare computation times.

A Study on the Processing Method of pseudonym information considering the scope of data usage

  • Min, Youn-A
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.5
    • /
    • pp.17-22
    • /
    • 2021
  • With the application of the Data 3 method, the scope of the use of pseudonym information has expanded. In the case of pseudonym information, a specific individual can be identified by linking and combining with various data, and personal information may be leaked due to incorrect use of the pseudonym information. In this paper, we propose the scope of use of data is subdivided and a differentiated pseudonym information processing method according to the scope. For the study, the formula was modified by using zero-knowledge proof among the pseudonym information processing methods, and when the proposed formula was applied, it was confirmed that the performance improved by an average of 10% in terms of verification time compared to the case of applying the formula of the existing zero-knowledge proof.

Proteome-based Identification of Proteins Regulated by Aldosterone in Rat Kidney Cortex (프로테오믹스 기술을 통한 쥐의 신장 피질에서 알도스테론(Aldosterone)에 의해 조절되는 단백질 동정)

  • Song, Mi-Na;Jeon, Hong-Bae;Choi, Hyo-Jung;Kwon, Tae-Hwan;Baek, Moon-Chang
    • YAKHAK HOEJI
    • /
    • v.54 no.3
    • /
    • pp.180-186
    • /
    • 2010
  • Aldosterone, mineralocorticoid hormone, has important functions related to the regulation of blood pressure and balance of fluids and electrolytes in the distal region of the nephron. By genomic and non-genomic action of aldosterone, the physiological kidney functions are modulated. However, many of them except several kind of sodium channel have not been identified and analyzed yet. In this study, proteomic technologies with two-dimensional gel electrophoresis (2-DE) gel using aldosterone rat model were applied to analyze and identify the aldosterone dependently expressed proteins in rat kidney cortex. As a result, the established aldosterone rat model exhibited the normal physiological responses to aldosterone and modulated proteins were identified, which included 15 increased and 3 decreased proteins on 2-DE analysis. Among them, 11 proteins were identified as changed proteins by LC-MS/MS analysis. These proteins identified as aldosterone induced proteins were involved in several cellular pathways such as cytoskeleton remodeling, energy metabolism, amino acid metabolism, and chaperone process. In conclusion, our data could provide the insights into the new mechanism underlying regulation of kidney functions by aldosterone.