• 제목/요약/키워드: Data protection

검색결과 3,396건 처리시간 0.04초

사물인터넷(IoT) 환경에서 개인정보보호 강화를 위한 제도 개선 방안 (Improving Personal Data Protection in IoT Environments)

  • 이애리;손수민;김현진;김범수
    • 정보보호학회논문지
    • /
    • 제26권4호
    • /
    • pp.995-1012
    • /
    • 2016
  • IoT 환경에서는 사람들이 인지할 수 없는 다수의 사물들이 자율적으로 데이터를 수집하고 수집된 데이터들은 네트워크를 통해 서로 결합되고 공유될 수 있다. 이로 인해 IoT 상에서는 개인정보보호 측면에서 기존의 IT 환경 대비 새로운 도전 과제들이 존재하게 된다. 본 연구는 IoT 환경에서 발생 가능한 개인정보보호 관련 이슈를 파악하고 이에 대한 대응 방안을 제안하는 것을 목적으로 한다. 본 연구에서는 IoT에서의 다양한 개인정보처리자의 유형들을 분석하고, 개인정보처리자 측면과 정보주체 권리 및 개인정보보호 측면에서의 주요 이슈를 도출하였다. 분석된 이슈를 바탕으로 필요한 제도적 개선 방안(사용자 친화적 고지방안 및 탄력적 동의제도 마련, 개인정보 재식별 위험 모니터링 체계 정립, 국외이전 개인정보보호 표준계약제도 수립, 이용자 교육 강화 등)을 제안하고, 개선안들에 대한 시급성과 중요도를 검토하여 우선적으로 추진해야 할 개선과제가 무엇인지 제시하였다.

UTrustDisk: An Efficient Data Protection Scheme for Building Trusted USB Flash Disk

  • Cheng, Yong;Ma, Jun;Ren, Jiangchun;Mei, Songzhu;Wang, Zhiying
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제11권4호
    • /
    • pp.2276-2291
    • /
    • 2017
  • Data protection of removable storage devices is an important issue in information security. Unfortunately, most existing data protection mechanisms are aimed at protecting computer platform which is not suitable for ultra-low-power devices. To protect the flash disk appropriately and efficiently, we propose a trust based USB flash disk, named UTrustDisk. The data protection technologies in UTrustDisk include data authentication protocol, data confidentiality protection and data leakage prevention. Usually, the data integrity protection scheme is the bottleneck in the whole system and we accelerate it by WH universal hash function and speculative caching. The speculative caching will cache the potential hot chunks for reducing the memory bandwidth pollution. We adopt the symmetric encryption algorithm to protect data confidentiality. Before mounting the UTrustDisk, we will run a trusted virtual domain based lightweight virtual machine for preventing information leakage. Besides, we prove formally that UTrustDisk can prevent sensitive data from leaking out. Experimental results show that our scheme's average writing throughput is 44.8% higher than that of NH scheme, and 316% higher than that of SHA-1 scheme. And the success rate of speculative caching mechanism is up to 94.5% since the access pattern is usually sequential.

수술실 간호사의 방사선 방어에 대한 지식과 방사선 방어행위에 대한 인식도 및 수행도 (Knowledge of Radiation Protection and the Recognition and Performance of Radiation Protection Behavior among Perioperative Nurses)

  • 강성금;이은남
    • 근관절건강학회지
    • /
    • 제20권3호
    • /
    • pp.247-257
    • /
    • 2013
  • Purpose: The purpose of this descriptive study was to investigate the knowledge of radiation protection and the recognition and performance of radiation protection behaviors among perioperative nurses. This study was intended to yield basic data for the development of nursing interventions aimed at improving the nurses' radiation protection behaviors. Methods: One hundred and thirty-seven nurses working in the operating room participated in a survey from September 1 to 30, 2011. The data was analyzed using t-test, ANOVA, and Pearson's correlation with the SPSS/WIN 19.0 program. Results: The average score of radiation protection knowledge was $7.57{\pm}3.45$ out of 16. The average score for the recognition and performance of radiation protection behaviors was $4.32{\pm}0.23$. The knowledge of radiation protection was significantly correlated with the recognition and performance of radiation protection behaviors. Conclusion: Expanding the knowledge of radiation protection could lead to the increase of the recognition and performance of radiation protection behaviors. Therefore, promoting the performance of radiation protection behaviors by improving perioperative nurses' knowledge of radiation protection through reinforcing radiation-related education hereafter could be an important part of nursing.

전자상거래 계약에 따른 개인정보보호에 있어 법적 문제점에 관한 연구 (A Legal Problems on the Protection of Personal Data and Privacy in the Electronic Commercial Transaction)

  • 이학승
    • 통상정보연구
    • /
    • 제1권2호
    • /
    • pp.249-271
    • /
    • 1999
  • This article deals with concept and theory of privacy and personal data on the basis of understanding of this matter, Especially concerns the infringement and protection of privacy and personal data that is violated by new media and electronic commercial transaction through case study and research of literature. The article seek to find out the resolution of legal problems on the protection of privacy and personal data. The resolution is in other words, that privacy and personal data protection law shall be established as a part of efforts to protect personal data and to activate electronic commercial transactions.

  • PDF

보건의료정보의 법적 보호와 열람.교부 (A Study on Legal Protection, Inspection and Delivery of the Copies of Health & Medical Data)

  • 정용엽
    • 의료법학
    • /
    • 제13권1호
    • /
    • pp.359-395
    • /
    • 2012
  • In a broad term, health and medical data means all patient information that has been generated or circulated in government health and medical policies, such as medical research and public health, and all sorts of health and medical fields as well as patients' personal data, referred as medical data (filled out as medical record forms) by medical institutions. The kinds of health and medical data in medical records are prescribed by Articles on required medical data and the terms of recordkeeping in the Enforcement Decree of the Medical Service Act. As EMR, OCS, LIS, telemedicine and u-health emerges, sharing and protecting digital health and medical data is at issue in these days. At medical institutions, health and medical data, such as medical records, is classified as "sensitive information" and thus is protected strictly. However, due to the circulative property of information, health and medical data can be public as well as being private. The legal grounds of health and medical data as such are based on the right to informational self-determination, which is one of the fundamental rights derived from the Constitution. In there, patients' rights to refuse the collection of information, to control recordkeeping (to demand access, correction or deletion) and to control using and sharing of information are rooted. In any processing of health and medical data, such as generating, recording, storing, using or disposing, privacy can be violated in many ways, including the leakage, forgery, falsification or abuse of information. That is why laws, such as the Medical Service Act and the Personal Data Protection Law, and the Guideline for Protection of Personal Data at Medical Institutions (by the Ministry of Health and Welfare) provide for technical, physical, administrative and legal safeguards on those who handle personal data (health and medical information-processing personnel and medical institutions). The Personal Data Protection Law provides for the collection, use and sharing of personal data, and the regulation thereon, the disposal of information, the means of receiving consent, and the regulation of processing of personal data. On the contrary, health and medical data can be inspected or delivered of the copies, based on the principle of restriction on fundamental rights prescribed by the Constitution. For instance, Article 21(Access to Record) of the Medical Service Act, and the Personal Data Protection Law prescribe self-disclosure, the release of information by family members or by laws, the exchange of medical data due to patient transfer, the secondary use of medical data, such as medical research, and the release of information and the release of information required by the Personal Data Protection Law.

  • PDF

345kV 계통 모델링 데이터를 활용한 과여자 보호계전기법 (Over-Excitation Protection Relaying using the 345kV Power System Modeling Data)

  • 박철원;반우현
    • 전기학회논문지P
    • /
    • 제60권4호
    • /
    • pp.175-180
    • /
    • 2011
  • A large AC generator is an important component of the power system. It is a need for research of AC generator protection relay for the next-generation ECMS and an efficient operation of protection control system. However, most of protection and control systems used in power plants have been still imported as turn-key and operated in domestic. This may cause the lack of the correct understanding on the protection systems and methods, and thus have difficulties in optimal operation. In this paper, over-excitation protection relaying is one of the protective factors in generator protection IED was presented. The cause and protection principles were dealt and, DFT-based gain compensation algorithm was adopted for the frequency measurement. The Republic of Korea 345kV modeling data by EMTP-RV was used for performance evaluation.

공개키 암호방식을 이용한 파일전송 모델의 연구 (A Study of Model on File Transfer Using Public-key Cryptography)

  • 최진탁;송영재
    • 한국통신학회논문지
    • /
    • 제15권7호
    • /
    • pp.545-552
    • /
    • 1990
  • 본 논문은 화일전송 시스템에서 데이터 보호방법에 대하여 연구 하였다. 기존의 화일전송 시스템에서는 보호기법으로 시스템 사용 권한통제(password) 및 파일 접근통제방법(ACL)이 사용되고 있지만 데이터 자체 보호는 하지 못하고 다만 허가되지 않은자의 접근을 통제하여 준다. 이러한 보호기법을 컴퓨터 침입자로 하여금 많은 위협을 받고 있다. 제안된 시스템 구성은 높은 수준의 비밀유지보호(데이터 자체보호, 송신자 인증 등)를 위하여 화일전송에서 공개키 방법 중 RSA 암호방식을 사용하여 최상의 비밀유지를 이룩할 수 있고 또한 이방법을 데이타 베이스에서 처럼 여러가지 문서취급에 쉽게 적용할 수 있는 새로운 대체 시스템에 대하여 연구 하였다.

  • PDF

유럽연합과 미국의 개인정보 이전 협약 (프라이버시 쉴드)과 국내 정책 방향 (EU-US Privacy Shield Agreement and Domestic Policy Direction)

  • 윤재석
    • 정보보호학회논문지
    • /
    • 제26권5호
    • /
    • pp.1269-1277
    • /
    • 2016
  • 유럽연합은 미국과 개인정보 이전을 위해 맺은 세이프 하버를 유럽사법재판소의 결정에 따라 새로운 협약인 프라이버시 쉴드로 최근 대체하였다. 동(同) 협약은 보다 강화된 개인정보보호 준수 의무, 강력한 법집행, 명확한 보호 요건 및 투명성의 의무, 유럽연합 시민의 권리보호를 위한 효과적인 구제 수단 강구 등을 제시함으로써 이전보다 개선된 것으로 평가받고 있다. 본 논문에서는 유럽연합과 미국의 개인정보 이전을 위한 논의 경과와 현황을 살펴보고 국외이전 관련 제도 정비, 개인정보 국제 협력 활동과 관련한 국내 정책방향을 제시하였다.

ACCESS CONTROL MODEL FOR DATA STORED ON CLOUD COMPUTING

  • Mateen, Ahmed;Zhu, Qingsheng;Afsar, Salman;Rehan, Akmal;Mumtaz, Imran;Ahmad, Wasi
    • International Journal of Advanced Culture Technology
    • /
    • 제7권4호
    • /
    • pp.208-221
    • /
    • 2019
  • The inference for this research was concentrated on client's data protection in cloud computing i.e. data storages protection problems and how to limit unauthenticated access to info by developing access control model then accessible preparations were introduce after that an access control model was recommend. Cloud computing might refer as technology base on internet, having share, adaptable authority that might be utilized as organization by clients. Compositely cloud computing is software's and hardware's are conveying by internet as a service. It is a remarkable technology get well known because of minimal efforts, adaptability and versatility according to client's necessity. Regardless its prevalence large administration, propositions are reluctant to proceed onward cloud computing because of protection problems, particularly client's info protection. Management have communicated worries overs info protection as their classified and delicate info should be put away by specialist management at any areas all around. Several access models were accessible, yet those models do not satisfy the protection obligations as per services producers and cloud is always under assaults of hackers and data integrity, accessibility and protection were traded off. This research presented a model keep in aspect the requirement of services producers that upgrading the info protection in items of integrity, accessibility and security. The developed model helped the reluctant clients to effectively choosing to move on cloud while considerate the uncertainty related with cloud computing.

DEVELOPMENT OF POINT KERNEL SHIELDING ANALYSIS COMPUTER PROGRAM IMPLEMENTING RECENT NUCLEAR DATA AND GRAPHIC USER INTERFACES

  • Kang, Sang-Ho;Lee, Seung-Gi;Chung, Chan-Young;Lee, Choon-Sik;Lee, Jai-Ki
    • Journal of Radiation Protection and Research
    • /
    • 제26권3호
    • /
    • pp.215-224
    • /
    • 2001
  • In order to comply with revised national regulationson radiological protection and to implement recent nuclear data and dose conversion factors, KOPEC developed a new point kernel gamma and beta ray shielding analysis computer program. This new code, named VisualShield, adopted mass attenuation coefficient and buildup factors from recent ANSI/ANS standards and flux-to-dose conversion factors from the International Commission on Radiological Protection (ICRP) Publication 74 for estimation of effective/equivalent dose recommended in ICRP 60. VisualShieid utilizes graphical user interfaces and 3-D visualization of the geometric configuration for preparing input data sets and analyzing results, which leads users to error free processing with visual effects. Code validation and data analysis were performed by comparing the results of various calculations to the data outputs of previous programs such as MCNP 4B, ISOSHLD-II, QAD-CGGP, etc.

  • PDF