• Title/Summary/Keyword: Data Privacy

Search Result 1,256, Processing Time 0.038 seconds

Secure Authentication Protocol based on a Chameleon Hash Function for Ambient Living Assisted-Systems (전천 후 생활보조 시스템을 위한 카멜레온 해시 함수 기반의 안전한 인증 프로토콜)

  • Yi, Myung-Kyu;Choi, Hyunchul;Whangbo, Taeg-Keun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.20 no.4
    • /
    • pp.73-79
    • /
    • 2020
  • Due to the rapidly ageing population and low birth rates, most countries have faced with the problems of an ageing population. As a result, research into aging and the means to support an aging population has therefore become a priority for many governments around the world. Ambient Assisted Living(AAL) approach is the way to guarantee better life conditions for the aged and for monitoring their health conditions by the development of innovative technologies and services. AAL technologies can provide more safety for the elderly, offering emergency response mechanisms and fall detection solutions. Since the information transmitted in AAL systems is very personal, however, the security and privacy of such data are becoming important issues that must be dealt with. In this paper, we propose a Chameleon hash-based secure authentication protocol for AAL systems. The proposed authentication protocol not only supports several important security requirements needed by the AAL systems, but can also withstand various types of attacks. In addition, the security analysis results show that the proposed authentication protocol is more efficient and secure than the existing authentication protocols.

Research on the Actual State of Facilities and Behavior of the Sanitary zones in Collective and Detached Houses in Jeju City (제주시 공동주택과 단독주택에서 생리ㆍ위생공간의 설비ㆍ기구 실태 및 행태에 관한 연구)

  • Kim Bong-Ae;Lee Jeong-Lim
    • Journal of the Korean Home Economics Association
    • /
    • v.42 no.9
    • /
    • pp.99-109
    • /
    • 2004
  • In residential spaces, sanitary zones are where the most basic needs of human beings are met and are used by all members of the family. A high level of privacy is therefore required in their use. This research studies the current state of sanitary zones in collective houses and in detached houses from a comparative perspective first, and then analyses the satisfaction and dissatisfaction requirement levels of dwellers of each house in comparison so as to provide data to formulate a new design for sanitary zones that is suitable for each dwelling house. The results of this research are as follows. (1) The questionnaire respondents were mostly in their 30s and 40s (99.1% in total), and lived in a nuclear family system (87.7%). (2) The number of sanitary zones was found to be more than 2 in 62% of collective houses and in 60.7% of detached houses, which leads us to conclude that non-dwelling spaces are increasing in both types of houses. (3) Of the housing facilities,13% of collective houses and 9% of detached houses were equipped with a bidet. Both percentages are very low but it needs to be noted that the percentage is relatively high in collective houses. In safety facilities, the ratio of houses furnished with safety handlers for the aged was very low in both types of houses. (4) The residents of collective houses showed high levels of dissatisfaction with regard to the problems of storage space and steam production, while residents of detached houses expressed high levels of dissatisfaction with regard to the heating system, colors of finishing materials, size, dampness, steam production, and storage space.

Efficient ID-Based Authentication and Key Exchange Protocol (효율적인 ID 기반 인증 및 키 교환 프로토콜)

  • Eom, Jieun;Seo, Minhye;Park, Jong Hwan;Lee, Dong Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.6
    • /
    • pp.1387-1399
    • /
    • 2016
  • In a hyper-connected society realized through IoT-enabled technology, a large amount of data is collected by various devices and is processed to provide new services to users. While communicating through a network, it is essential for devices to execute mutual authentication since users' privacy can be infringed by malicious attackers. ID-based signature enables authentication and key exchange with a unique ID of a device. However, most of the previous ID-based signature schemes based on RSA require an additional step to share parameters for key exchange so that they are not suitable for resource-constrained devices in terms of efficiency. In this paper, we design an efficient ID-based signature and thereby propose an efficient ID-based authentication and key exchange protocol in which sessions for both an authentication and a key exchange are executed simultaneously. In addition, we prove the security of our scheme under the RSA onewayness problem and analyze the efficiency by comparing with the previous schemes.

A Malicious Comments Detection Technique on the Internet using Sentiment Analysis and SVM (감성분석과 SVM을 이용한 인터넷 악성댓글 탐지 기법)

  • Hong, Jinju;Kim, Sehan;Park, Jeawon;Choi, Jaehyun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.2
    • /
    • pp.260-267
    • /
    • 2016
  • The Internet has brought lots of changes to us sharing information mutually. However, as all social symptom have double-sided character, it has serious social problem. Vicious users have been taking advantage of anonymity on the Internet, stating comments aggressively for defamation, personal attacks, privacy violation and more. Malicious comments on the Internet are creating the biggest problem regarding unlawful acts and insults which occur on the Internet. In order to solve the issues, several studies have been done to efficiently manage the comments. However, there are limitations to recognize modified malicious vocabulary in previous research. So, in this paper, we propose a malicious comments detection technique by improving limitation of previous studies. The experimental result has shown accuracy of 87.8% providing higher accuracy as compared to previous studies done.

Session Key Agreement Protocol for IoT Home Devices using Shadow Passwords (그림자 패스워드를 사용한 IoT 홈 디바이스 사이의 세션키 공유 프로토콜)

  • Jung, Seok Won
    • Journal of Internet of Things and Convergence
    • /
    • v.6 no.2
    • /
    • pp.93-100
    • /
    • 2020
  • Although various home services are developed as increasing the number of home devices with wire and wireless connection, privacy infringement and private information leakage are occurred by unauthorized remote connection. It is almost caused by without of device authentication and protection of transmission data. In this paper, the devices' secret value are stored in a safe memory of a smartphone. A smartphone processes device authentication. In order to prevent leakage of a device's password, a shadow password multiplied a password by the private key is stored in a device. It is proposed mutual authentication between a smartphone and a device, and session key agreement for devices using recovered passwords on SRP. The proposed protocol is resistant to eavesdropping, a reply attack, impersonation attack.

Factors Affecting Intentions to Use Internet-Only Bank in South Korea: Implications of Service Convenience and Social Influence (인터넷전문은행의 이용의도에 미치는 영향 요인: 편리성과 사회적 영향의 함의)

  • Joo, Jaehun
    • Journal of Service Research and Studies
    • /
    • v.8 no.2
    • /
    • pp.77-94
    • /
    • 2018
  • Internet-only bank is one of the promising areas of Fintech industry. Kbank and Kakaobank launched services since 2017 in Korea. Experts estimated the younger generation including undergraduate students as target customers in the initial stage of the Internet-only bank in Korea. Thus, it is necessary to investigate factors influencing intention to use the Internet-only bank. Data were collected from undergraduate students studying in Seoul, Pusan, and Gyeongbuk province. The empirical study showed the evidence that four factors such as convenience, social influence, perceived privacy, and unverified risk had a significant influence on intention to use the Internet-only bank. However, economic benefit has no significantly influence on the intention. The present study focused on the influence of convenience and social influence and discussed the issues regarding convenience and social influence in more detail.

TRMA: Two-Round RFID Mutual Authentication Protocol (TRMA: 2-라운드 RFID 상호 인증 프로토콜)

  • Ahn, Hae-Soon;Bu, Ki-Dong;Yoon, Eun-Jun;Nam, In-Gil
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.46 no.5
    • /
    • pp.71-78
    • /
    • 2009
  • In RFID system, the communicated data can be easily eavesdropped and tampered with by an attacker because the communication between the reader and the tag is performed in an insecure channel. Therefore, authentication is an important role in RFID applications for providing security and privacy. In 2006, Lee, Asano and Kim proposed an RFID mutual authentication protocol (the LAK protocol) which utilizes a hash function and synchronized secret information. However, Cao and Shen showed that the LAK protocol is vulnerable to replay attack, and therefore an adversary can impersonate the tag. This paper proposes a new simple two-round RFID mutual authentication (TRMA) protocol based on secure one-way hash function. As a result, the proposed TRMA protocol not only can prevent various attacks and but also provides communication efficiency since they mutually authenticate by performing two-round between RFID tag and RFID reader.

Integrity proof Method research in Mobile Forensic (모바일 포렌식 에서의 무결성 입증방안 연구)

  • Kim, Ki-Hwan;Shin, Young-Tae;Park, Dea-Woo
    • KSCI Review
    • /
    • v.15 no.1
    • /
    • pp.37-46
    • /
    • 2007
  • Lately, is trend that diffusion of Mobile information appliance that do various function by development of IT technology is increasing much. There is function that do more convenient and efficient life and business using portable phone that is Daepyo?? of Mobile information appliance, but dysfunction that is utilized by Beopjoe of pointed end engineering data leakage, individual's privacy infringement, threat and threat etc. relationship means to use Mobile Phone is appeared and problems were appeared much. However, legal research of statute unpreparedness and so on need research and effort to prove delete, copy, integrity of digital evidence that transfer secures special quality of easy digital evidence to objective evidence in investigation vantage Point is lacking about crime who use this portable phone. It is known that this digital Forensic field is Mobile Forensic. Is purposeful to verify actually about acquisition way of digital evidence that can happen in this treatise through portable phone that is Mobile Forensic's representative standing and present way to prove integrity of digital evidence using Hash Function.

  • PDF

A Study on Emergency Medical Information Management Methods for Elderly Patients using QR code and Finger-print Recognition (QR 코드와 지문인식을 이용한 고령 환자의 응급 의료정보 관리 방법에 대한 연구)

  • Lee, Jung-hyun;Cho, Myeon-gyun
    • Journal of Convergence for Information Technology
    • /
    • v.7 no.6
    • /
    • pp.135-141
    • /
    • 2017
  • Recently, as elderly people suffering from chronic diseases have increased and disasters such as traffic accidents have increased, urgent rescue workers and doctors need to respond effectively to such emergencies. For elderly people, the difficulty in communicating their condition especially the health condition during disaster is one of the problems in which delay on immediate handling by rescue team can cause death. Providing a solution for this problem is one of the main issues in our research. In this paper, we use the QR code to communicate the minimum personal information and medical history needed for emergency medical treatment to emergency medical personnel, and to transmit the medical history and treatment data to the doctors of the hospital through QR code and fingerprint recognition, respectively. Especially, by using both QR code of smart phone and fingerprint of individual, we can protects personal information and strengthens privacy and security of medical information by allowing only authorized physicians to check medical records of the old patient.

Revaluation of the Modernization in the Korean Housing Culture Since 1980s′ (1980년대 이후 한국 주거문화에 나타난 근대화의 재평가)

  • 은난순
    • Journal of Families and Better Life
    • /
    • v.22 no.5
    • /
    • pp.59-73
    • /
    • 2004
  • Since 1980s' Korea had a great change on the housing culture by the supply of multi-family housing stock both on the macro-social and micro-social aspects. The purpose of this study was to examine the changes and the characteristics of housing environments which were estimated its modernization, and to examine the personal life under the change of housing environments. So I would like to revaluation the characteristics of modernization between the 1980s' and 1990s'. Therefore references were made to various papers, reports, the statistical data, newspaper reports, advertisements and magazines during that period. As a result, this paper came to the remarks as follows: 1. The success of modernization on the housing environments since 1980s' was the Quantitative growth of housing supply by multi-family housing. In spite of this, the Quantitative growth of housing supply and the improvement in Quality like housing space per person had the characters which was 'out of valence on the division'. 2. The Qualitative improvement of modem housing life by the development of housing industries could be said the improvement owing to develop of facilities and equipments. The introduction of up-to-date facilities and equipments realized the convenience and the rationality of living in the house. Although the improvement on the physical things deteriorated the modernized spaces to uniform things by commercial strategies. 3. The life in the multi-family housing which gives protection to personal privacy was settle down on the extremely individualized life without common things within the neighbors. Multi-family housing which was a production of process of modernization came true the growth in an appearance and the variety in the inside, but for the aspect of residents' everyday life in the multi-family housing, the Korean traditional relationship was collapsed and a sense of incompatibility within the residents was created.