• Title/Summary/Keyword: Data leakage protection

Search Result 114, Processing Time 0.029 seconds

Weakness and Improvement of Cloud Shredder (Cloud Shredder에 대한 취약점 분석 및 개선 방안에 관한 연구)

  • Park, Minsu;Kang, Sunghoon;Kim, Seungjoo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38B no.5
    • /
    • pp.401-409
    • /
    • 2013
  • Recently, almost all data has stored and managed in the shape of digital as development of IT infrastructure. Digital data is able to store the huge data in very small space. but if the disk should be stolen or lost, it would have many secure problems such as data leakage. Currently, digital data is protected by encryption method to prevent data leakage. However, the encryption method is not enough to protect data because the performance of attack system is higher and the attack methods is various. Therefore, there is a need for a new advanced data protection method. To solve secure problems, many research has been progressed like Cloud Shredder, which distributes data and then store. In this paper, We found out the problem of the Cloud Shredder and proposed an advanced method of digital data protection to solve those problem.

The Effectiveness Analysis of the Resistive Leakage Current Monitoring by Analyzing the Phase of the Body Current (인체 통전전류 위상 분석을 통한 저항성 누설전류 감시의 유효성 분석)

  • Kim, Jae-Hyun;Lim, Young-Bea;Lee, Sang-Ick;Kim, Dong-Woo
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.27 no.9
    • /
    • pp.90-99
    • /
    • 2013
  • To analyze the effectiveness of the resistive leakage current monitoring as a technology preventing electrical accidents, in this paper, we have estimated the phase of the body impedance by using the body impedance model and the body impedance data from IEC. We also have analyzed the phase of the electric body current in the case of 60Hz/220V. From these results, we concluded that deliberate researches about the phase of the electrical body current and related regulations must be carried out before the resistive leakage current monitoring unit is used to protect electric shock. And we concluded that the resistive leakage current monitoring unit can be utilized to prevent electrical fires caused by electric leakage current without unwanted circuit break due to capacitive leakage current flowing from line filter capacitors to the earth.

A study on frame transition of personal information leakage, 1984-2014: social network analysis approach (사회연결망 분석을 활용한 개인정보 유출 프레임 변화에 관한 연구: 1984년-2014년을 중심으로)

  • Jeong, Seo Hwa;Cho, Hyun Suk
    • Journal of Digital Convergence
    • /
    • v.12 no.5
    • /
    • pp.57-68
    • /
    • 2014
  • This article analyses frame transition of personal information leakage in Korea from 1984 to 2014. In order to investigate the transition, we have collected newspaper article's titles. This study adopts classification, text network analysis(by co-occurrence symmetric matrix), and clustering techniques as part of social network analysis. Moreover, we apply definition of centrality in network in order to reveal the main frame formed in each of four periods. As a result, accessibility of personal information is extended from public sector to private sector. The boundary of personal information leakage is expanded to overseas. Therefore it is urgent to institutionalize the protection of personal information from a global perspective.

A Study of Network 2-Factor Access Control Model for Prevention the Medical-Data Leakage (의료 정보유출 방지를 위한 네트워크 이중 접근통제 모델 연구)

  • Choi, Kyong-Ho;Kang, Sung-Kwan;Chung, Kyung-Yong;Lee, Jung-Hyun
    • Journal of Digital Convergence
    • /
    • v.10 no.6
    • /
    • pp.341-347
    • /
    • 2012
  • Network Access Control system of medical asset protection solutions that installation and operation on system and network to provide a process that to access internal network after verifying the safety of information communication devices. However, there are still the internal medical-data leakage threats due to spoof of authorized devices and unauthorized using of users are away hours. In this paper, Network 2-Factor Access Control Model proposed for prevention the medical-data leakage by improving the current Network Access Control system. The proposed Network 2-Factor Access Control Model allowed to access the internal network only actual users located in specific place within the organization and used authorized devices. Therefore, the proposed model to provide a safety medical asset environment that protecting medical-data by blocking unauthorized access to the internal network and unnecessary internet access of authorized users and devices.

Prohibiting internal data leakage to mass storage device in mobile device (모바일 단말에서 외부 저장 매체로의 불법 데이터 유출 방지 기법)

  • Chung, Bo-Heung;Kim, Jung-Nyu
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.1
    • /
    • pp.125-133
    • /
    • 2011
  • According to proliferation of mobile devices, security threats have been continuously increased such as illegal or unintentional file transmission of important data to an external mass-storage device. Therefore, we propose a protection method to prohibit an illegal outflow to this device and implement this method. This method extracts signatures from random locations of important file and uses them to detect and block illegal file transmission. To get signatures, a target file is divided by extracting window size and more than one signatures are extracted in this area. To effective signature sampling, various extraction ways such as full, binomial distribution-based and dynamic sampling are implemented and evaluated. The proposed method has some advantages. The one is that an attacker cannot easily predict the signature and its extraction location. The other is that it doesn't need to modify original data to protect it. With the help of these advantages, we can say that this method can increase efficiency of easy-to-use and it is a proper way leakage prevention in a mobile device.

Development of Intelligent Lightning Protection Management System (지능형 뇌보호 설비 관리 시스템 개발)

  • Lee, Tae-Hyung;Cho, Sung-Chul;Eom, Ju-Hong
    • Proceedings of the KIEE Conference
    • /
    • 2008.07a
    • /
    • pp.1336-1337
    • /
    • 2008
  • This study developed a ILPMS (intelligent lightning protection management system) to manage and mend SPD module effectively, intelligence style bonding terminal box for transmitting SPD state data, RTU(remote terminal unit) having wireless transmission facility, so that a man in service can confirm SPD state throughout its leakage current level in a central management system.

  • PDF

A Study on Strengthening Domestic Personal Information Impact Assessment(PIA)

  • Young-Bok Cho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.29 no.6
    • /
    • pp.61-67
    • /
    • 2024
  • In this paper, we presented a strengthening plan to prevent personal information leakage incidents by securing legal compliance for personal information impact assessment and suggesting measures to strengthen privacy during personal information impact assessment. Recently, as various services based on big data have been created, efforts are being made to protect personal information, focusing on the EU's GDPR and Korea's Personal Information Protection Act. In this society, companies entrust processing of personal information to provide customized services based on the latest technology, but at this time, the problem of personal information leakage through consignees is seriously occurring. Therefore, the use of personal information by trustees.

The TRS Terminal for Wireless Remote Corrosion Monitoring System (무선 원격 부식모니터링용 TRS 단말기)

  • Ha, Tae-Hyeon;Bae, Jeong-Hyo;Lee, Hyeon-Gu;Ha, Yun-Cheol;Kim, Dae-Gyeong
    • Proceedings of the KIEE Conference
    • /
    • 2003.11c
    • /
    • pp.544-547
    • /
    • 2003
  • The owner of water pipeline has a burden of responsibility for the protection of corrosion and the prevention against leakage of water. So, they have been installed a CP(Cathodic Protection) System in odor to protect corrosion. And they also have been measured and analyzed the data about P/S(Pipe to Soil) potential of water pipeline. The P/S potential is basic data of evaluation for water pipeline corrosion. They need remote automatic corrosion monitoring system for easy maintenance. In this paper, The communication method was studied mainly. And the specifications of proposed TRS (Truncked Radio System ) terminal for corrosion monitoring are introduced briefly.

  • PDF

The Remote Wireless Corrosion Monitoring System for Water Pipeline (상수도 배관용 무선 원격 부식모니터링 시스템)

  • Ha, Tae-Hyeon;Bae, Jeong-Hyo;Lee, Hyeon-Gu;Ha, Yun-Cheol;Kim, Dae-Gyeong
    • Proceedings of the KIEE Conference
    • /
    • 2003.11c
    • /
    • pp.637-640
    • /
    • 2003
  • The owner of water pipeline has a burden of responsibility for the protection of corrosion and the prevention against leakage of water. So, they have been installed a CP(Cathodic Protection) System in oder to protect corrosion. And they also have been measured and analyzed the data about P/S(Pipe to Soil) potential of water pipeline. The P/S potential is basic data of evaluation for water pipeline corrosion. In this paper, results of development about remote wireless corrosion monitoring system for water pipe line are presented briefly.

  • PDF

A Cache Privacy Protection Mechanism based on Dynamic Address Mapping in Named Data Networking

  • Zhu, Yi;Kang, Haohao;Huang, Ruhui
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.12
    • /
    • pp.6123-6138
    • /
    • 2018
  • Named data networking (NDN) is a new network architecture designed for next generation Internet. Router-side content caching is one of the key features in NDN, which can reduce redundant transmission, accelerate content distribution and alleviate congestion. However, several security problems are introduced as well. One important security risk is cache privacy leakage. By measuring the content retrieve time, adversary can infer its neighbor users' hobby for privacy content. Focusing on this problem, we propose a cache privacy protection mechanism (named as CPPM-DAM) to identify legitimate user and adversary using Bloom filter. An optimization for storage cost is further provided to make this mechanism more practical. The simulation results of ndnSIM show that CPPM-DAM can effectively protect cache privacy.