• Title/Summary/Keyword: Data protection

Search Result 3,396, Processing Time 0.032 seconds

A Study for Implementation of System for protecting Privacy data from IoT Things (IoT 장치의 개인정보 데이터 보호 시스템 구현에 관한 연구)

  • Kim, Seon Uk;Hong, Seong Eun;Bang, Jun Il;Kim, Hwa Jong
    • Smart Media Journal
    • /
    • v.10 no.2
    • /
    • pp.84-91
    • /
    • 2021
  • In the EU GDPR, when collecting personal information, the right of the information subject(user) to consent or refuse is given the highest priority. Therefore, the information subject must be able to withdraw consent and be forgotten and claim the right at any time. Especially, restricted IoT devices(Constrained Node) implement the function of consent of the data subject regarding the collection and processing of privacy data, and it is very difficult to post the utilization content of the collected information. In this paper, we designed and implemented a management system that allows data subjects to monitor data collected and processed from IoT devices, recognize information leakage problems, connect, and control devices. Taking into account the common information of the standard OCF(Open Connectivity Foundation) of IoT devices and AllJoyn, a device connection framework, 10 meta-data for information protection were defined, and this was named DPD (Data Protection Descriptor). we developed DPM (Data Protection Manager), a software that allows information subjects to manage information based on DPD.

Priority-based Unequal Error Protection Scheme of Data partitioned H.264 video with Hierarchical QAM

  • Chen, Rui;Wu, Minghu;Yang, Jie;Rui, Xiongli
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.11
    • /
    • pp.4189-4202
    • /
    • 2014
  • In this paper, we propose a priority-based unequal error protection scheme of data partitioned H.264/AVC video with hierarchical quadrature amplitude modulation. In order to map data with higher priority onto the most significant bits of QAM constellation points, a priority sorting method categorizes different data partitions according to the unequal importance factor of encoded video data in one group of pictures by evaluated the average distortion. Then we propose a hierarchical quadrature amplitude modulation arrangement with adaptive constellation distances, which takes into account the unequal importance of encoded video data and the channel status. Simulation results show that the proposed scheme improves the received video quality by about 2 dB in PSNR comparing with the state-of-the-art unequal error protection scheme, and outperforms EEP scheme by up to 5 dB when the average channel SNR is low.

Analysis of Personal Information Protection Circumstances based on Collecting and Storing Data in Privacy Policies (개인정보처리방침의 데이터를 활용한 개인정보보호 현황 분석)

  • Lee, Jae-Geun;Kang, Sang-Ug;Youm, Heung-Youl
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.4
    • /
    • pp.767-779
    • /
    • 2013
  • A field of privacy protection lacks statistical information about the current status, compared to other fields. On top of that, since it has not been classified as a concrete separate field, the related survey is only conducted as a part of such concrete areas. Furthermore, this trend of being regarded as a part of fields such as informatization, information protection and law will continue in the near future. In this paper, a novel and practical way for collecting and storing a big amout of data from 110,000 privacy policies by data controller is proposed and the real analysis results is also shown. The proposed method can save time and cost compared with the traditional survey-based method while maintaining or even advancing the accuracy of results and speediness of process. The collected big personal data can be used to set up various kinds of statistical models and they will play an important role as a breakthrough of observing the present status of privacy information protection policy. The big data concept is incorporated into the privacy protection and we can observe the method and some results throughout the paper.

Protection of a Multicast Connection Request in an Elastic Optical Network Using Shared Protection

  • BODJRE, Aka Hugues Felix;ADEPO, Joel;COULIBALY, Adama;BABRI, Michel
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.1
    • /
    • pp.119-124
    • /
    • 2021
  • Elastic Optical Networks (EONs) allow to solve the high demand for bandwidth due to the increase in the number of internet users and the explosion of multicast applications. To support multicast applications, network operator computes a tree-shaped path, which is a set of optical channels. Generally, the demand for bandwidth on an optical channel is enormous so that, if there is a single fiber failure, it could cause a serious interruption in data transmission and a huge loss of data. To avoid serious interruption in data transmission, the tree-shaped path of a multicast connection may be protected. Several works have been proposed methods to do this. But these works may cause the duplication of some resources after recovery due to a link failure. Therefore, this duplication can lead to inefficient use of network resources. Our work consists to propose a method of protection that eliminates the link that causes duplication so that, the final backup path structure after link failure is a tree. Evaluations and analyses have shown that our method uses less backup resources than methods for protection of a multicast connection.

Keywords Analysis on the Personal Information Protection Act: Focusing on South Korea, the European Union and the United States

  • Park, Sung-Uk;Park, Moon-Soo;Park, Soo-Hyun;Yun, Young-Mi
    • Asian Journal of Innovation and Policy
    • /
    • v.9 no.3
    • /
    • pp.339-359
    • /
    • 2020
  • The policy change in the Data 3 Act is one of the issues that should be noted at a time when non-face-to-face business strategies become important after COVID-19. The Data 3 Act was implemented in South Korea on August 5, 2020, calling 'Big Data 3 Act' and 'Data Economy 3 Act,' and so personal information that was not able to identify a particular individual could be utilized without the consent of the individual. With the implementation of the Data 3 Act, it is possible to establish a fair economic ecosystem by ensuring fair access to data and various uses. In this paper, the law on the protection of personal information, which is the core of the Data 3 Act, was compared around Korea, the European Union and the United States, and the implications were derived through network analysis of keywords.

Development of Data-driven Thermal Protection Algorithm for Protecting Overheating of Motor in the Sunroof System (선루프 모터 과열 방지를 위한 데이터 기반 열 차폐 알고리즘 개발)

  • Kim, Hyun-Hee;Park, Seong-U;Lee, Kyung-Chang;Hwang, Yeong-Yeun
    • Journal of the Korean Society of Industry Convergence
    • /
    • v.19 no.4
    • /
    • pp.223-230
    • /
    • 2016
  • This paper presents data-driven thermal protection algorithm for preventing overheating of automotive sunroof motor. When a sunroof motor operates abnormally, its coil is overheated and it is failed. Besides, drivers and passengers are damaged. Hence, the sunroof motor observes its temperature and will be stoped when its temperature reach a predefined level. In order to implement low-cost thermal protection function, we drew a knowledge-based temperature increasing and decreasing curve from the result of experimental test. And then, we implemented data-driven thermal protection algorithm which prevents motor's On/Off operation according to motor operating voltage and motor speed. Finally, we implemented experimental test bed and evaluated its feasibility.

Design of AOD System for MP3 Copyright Protection (MP3 저작권 보호를 위한 AOD 시스템의 설계)

  • Kim, Yeong-Jun;Kim, Tae-Yun
    • The KIPS Transactions:PartD
    • /
    • v.9D no.2
    • /
    • pp.323-328
    • /
    • 2002
  • In recent years, e-Commerce is very active on the Internet, especially the World Wide Web alone: with the popularization of Internet using high-speed networks. Especially, Circulation of Multimedia Contents like MP3 data if widely being focused as one of the popular researches. However, the existing models of AOD (Audio On Demand) System lack substantial illegal copy protection or copyright protection. In this paper, we propose an AOD System that guarantees substantial illegal copy protection and copyright protection based on the PKI (Public Key Infrastructure). As transmitting MP3 data using the user's public key, the proposed .method prevents the attack of dropper during transmitting data. Also, it guarantees the right of users and distributors by prohibiting illegal users from using MP3 data.

A Study for the Designing and Efficiency Measuring Methods of Integrated Multi-level Network Security Domain Architecture (Multi-level 네트워크의 보안 도메인을 위한 통합 아키텍쳐 설계 및 효율성 측정방법 연구)

  • Na, Sang Yeob;Noh, Si Choon
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.5 no.4
    • /
    • pp.87-97
    • /
    • 2009
  • Internet network routing system is used to prevent spread and distribution of malicious data traffic. This study is based on analysis of diagnostic weakness structure in the network security domain. We propose an improved integrated multi-level protection domain for in the internal route of groupware. This paper's protection domain is designed to handle the malicious data traffic in the groupware and finally leads to lighten the load of data traffic and improve network security in the groupware. Infrastructure of protection domain is transformed into five-stage blocking domain from two or three-stage blocking. Filtering and protections are executed for the entire server at the gateway level and internet traffic route ensures differentiated protection by dividing into five-stage. Five-stage multi-level network security domain's malicious data traffic protection performance is better than former one. In this paper, we use a trust evaluation metric for measuring the security domain's performance and suggested algorithm.

Estimating the Failure Rate of Protection System Using a Discrete Markov Model (이산 마코프 모델을 이용한 보호 시스템의 고장 비율 추정)

  • Shin, Jung-Jin;Lee, Hee-Tae;Kim, Jae-Chul
    • Proceedings of the KIEE Conference
    • /
    • 2008.11a
    • /
    • pp.385-387
    • /
    • 2008
  • When a fault occurs in the distribution system, it is detected by protection system, then protection system is opened and de-energises the feeder where the fault exists. in this paper, the failure rate of protection system will estimate that using a discrete markov approach with failure data of protection system in order to improve the reliability of protection system.

  • PDF

A Novel Procedure for Protection Setting in an HVDC System Based on Fault Quantities

  • Gao, Benfeng;Zhang, Ruixue;Zhang, Xuewei
    • Journal of Electrical Engineering and Technology
    • /
    • v.12 no.2
    • /
    • pp.513-521
    • /
    • 2017
  • HVDC protection setting is difficult to be calculated analytically because of its strong nonlinearity. The currently used setting method is based on the empirical setting of previous projects and then verified by digital simulation. It entails a huge workload and low efficiency. To facilitate protection setting, this paper systematically summarizes the HVDC protection characteristics and then presents a classification of HVDC protections according to the protection principles. On the basis of the fault quantities, a novel setting procedure suitable for travelling wave protection, derivative and level protection, and differential protection is proposed. The proposed procedure is illustrated and verified in detail with the example of travelling wave protection. An HVDC protection setting system that has the functions of automatic protection setting and data management is developed utilizing the C# programming language.