• Title/Summary/Keyword: Identity Privacy

Search Result 156, Processing Time 0.022 seconds

Analysis of Al-Saggaf et al's Three-factor User Authentication Scheme for TMIS

  • Park, Mi-Og
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.9
    • /
    • pp.89-96
    • /
    • 2021
  • In this paper, we analyzed that the user authentication scheme for TMIS(Telecare Medicine Information System) proposed by Al-Saggaf et al. In 2019, Al-Saggaf et al. proposed authentication scheme using biometric information, Al-Saggaf et al. claimed that their authentication scheme provides high security against various attacks along with very low computational cost. However in this paper after analyzing Al-Saggaf et al's authentication scheme, the Al-Saggaf et al's one are missing random number s from the DB to calculate the identity of the user from the server, and there is a design error in the authentication scheme due to the lack of delivery method. Al-Saggaf et al also claimed that their authentication scheme were safe against a variety of attacks, but were vulnerable to password guessing attack using login request messages and smart cards, session key exposure and insider attack. An attacker could also use a password to decrypt the stored user's biometric information by encrypting the DB with a password. Exposure of biometric information is a very serious breach of the user's privacy, which could allow an attacker to succeed in the user impersonation. Furthermore, Al-Saggaf et al's authentication schemes are vulnerable to identity guessing attack, which, unlike what they claimed, do not provide significant user anonymity in TMIS.

Comparison of Korean Speech De-identification Performance of Speech De-identification Model and Broadcast Voice Modulation (음성 비식별화 모델과 방송 음성 변조의 한국어 음성 비식별화 성능 비교)

  • Seung Min Kim;Dae Eol Park;Dae Seon Choi
    • Smart Media Journal
    • /
    • v.12 no.2
    • /
    • pp.56-65
    • /
    • 2023
  • In broadcasts such as news and coverage programs, voice is modulated to protect the identity of the informant. Adjusting the pitch is commonly used voice modulation method, which allows easy voice restoration to the original voice by adjusting the pitch. Therefore, since broadcast voice modulation methods cannot properly protect the identity of the speaker and are vulnerable to security, a new voice modulation method is needed to replace them. In this paper, using the Lightweight speech de-identification model as the evaluation target model, we compare speech de-identification performance with broadcast voice modulation method using pitch modulation. Among the six modulation methods in the Lightweight speech de-identification model, we experimented on the de-identification performance of Korean speech as a human test and EER(Equal Error Rate) test compared with broadcast voice modulation using three modulation methods: McAdams, Resampling, and Vocal Tract Length Normalization(VTLN). Experimental results show VTLN modulation methods performed higher de-identification performance in both human tests and EER tests. As a result, the modulation methods of the Lightweight model for Korean speech has sufficient de-identification performance and will be able to replace the security-weak broadcast voice modulation.

A Study on the Composition and Design Characteristic in the Lobby of the Special Hospital - Focused on the Woman Special Hospital - (전문병원 로비공간의 구성요소 및 디자인적 특성에 관한 연구 - 여성전문병원을 중심으로 -)

  • Lee, Eun-Jeong;Lee, Sang-Ho
    • Korean Institute of Interior Design Journal
    • /
    • v.15 no.5 s.58
    • /
    • pp.193-201
    • /
    • 2006
  • In according as the social action of women is active, the average life span is longer than male, not only woman's social position is higher, but also the construction of the more professional woman special hospital Is increased. In occasion to the recent woman special hospital, give medical treatment about pediatrics and the breast surgery as well, and the sphere is increasing as compose the variety network, from the health medical center to check the woman's physical to the postpartum care center. The trend of the lobby is arranged the more service area as the concept of the woman hospital is changed, the sphere is increasing. Accordingly, this study research and analyze the service zone and design elements on the focus the lobby of the internal woman special hospital, have an intention of guideline about the interior design of the after woman hospital. As the subject of study, selected the hospital that lobby serves to show the identity of total space, and the woman special hospital that is introduced to the relation journal with architecture or interior design, is opened after 2000 years, below the 100 bed. As the study method, understand the composition of lobby space through floor analysis, examination by the visit, analyzed the arrangement constituent, the design trend. The direction of lobby space mentioned in the study result is that secure the publicness, guarantee the privacy zone, and is important that the adequate arrangement of commercial space contribute to client's mental stability, desire that inflected as the more positive communication place.

A study of RMT buyer detection for the collapse of GFG in MMORPG (MMORPG에서 GFG 쇠퇴를 위한 현금거래 구매자 탐지 방안에 관한 연구)

  • Kang, Sung Wook;Lee, Jin;Lee, Jaehyuk;Kim, Huy Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.4
    • /
    • pp.849-861
    • /
    • 2015
  • As the rise in popularity of online games, the users start exchanging rare items for real money. As RMT (Real Money Trade) is prevalent, GFG (Gold Farming Group) who abuse RMT shows up. GFG causes social problems such as identity theft, privacy leaks. Because they needs many bot characters to gather game items. In addition, GFG induce RMT that makes in-game problems such as a destroying game economy, account hacking. Therefore, It is very important work to collapse GFG at the perspective of social and in-game. In this paper, we proposed a fundamental method for detecting RMT buyers for the collapse of GFG at the perspective of buyer by Law of Demand and Supply. We found two type of RMT by analyzing actual game data and detected RMT buyers with high recall ratio of 98% by ruled-based detection.

Study of Security Requirement of Smart Home Hub through Threat Modeling Analysis and Common Criteria (위협 모델링 분석 및 국제공통평가기준을 통한 스마트홈 허브의 보안요구사항에 관한 연구)

  • Park, Jae-Hyeon;Kang, Soo-young;Kim, Seung-joo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.2
    • /
    • pp.513-528
    • /
    • 2018
  • In a smart home environment that integrates IoT technology into a residential environment, the smart home hub provides convenience functions to users by connecting various IoT devices to the network. The smart home hub plays a role as a gateway to and from various data in the process of connecting and using IoT devices. This data can be abused as personal information because it is closely related to the living environment of the user. Such abuse of personal information may cause damage such as exposure of the user's identity. Therefore, this thesis analyzed the threat by using LINDDUN, which is a threat modeling technique for personal information protection which was not used in domestic for Smart Home Hub. We present evaluation criteria for smart home hubs using the Common Criteria, which is an international standard, against threats analyzed and corresponding security requirements.

Discussion on Sustaining "Olle" without Losing Integrity of Local Identity - Focused on downtown area called Mu-geun-sung at Jeju city - (올래의 지속가능한 재생방식에 관한 연구 - 제주시 무근성 지역을 중심으로 -)

  • Yi, Yong Kyu;Yi, Yun Kyu;Jing, Li-Yuan
    • Journal of the Korean Institute of Rural Architecture
    • /
    • v.20 no.3
    • /
    • pp.19-26
    • /
    • 2018
  • There are still a number of "olles" existing with traditional alley characteristics in the inner city of Jeju. As a matter of fact, the renovation of old buildings and the protection of alley space are facing a dilemma due to the existence of less than 4m-width-roads in the area of "Mu-geun-sung". This study examines the current status of alley space in "Mu-geun-sung" area; and puts forward to the potential possibility and limitation of alley space regeneration via exploring the applicable scheme of building agreement. In the field survey, a number of regions in inner city of Jeju witnesses the existing majority of invaluable, conventional olles. So as to grasp the feasibility in "Mu-geun-sung" area, we designs a simulating experiment to carry out the Building Agreement; and compares with the current development model in this area. Building Agreement implies to establish gradually a separation of land ownership under the existing unified development of landowners and users, thus to explore a variety of land exploitation systems by separating land ownership and right to use land. As a result, the deterioration of the street landscape results from the increase of building storey numbers. The damages to the surrounding environment brought by the newly built buildings will be minimized as well as keeping the maximum building volume rate. Obviously, these measures will alleviate infringement to the traditional residential sunlight and privacy space effectively, and reduce the pressure from high-rise buildings to the alley space, so that the landscape of the alley will enhance to form a more comfortable alley environment.

Three-Stage Strati ed Randomize Response Model (3단계 층화확률화응답모형)

  • Kim, Jong-Min;Chae, Seong-S.
    • The Korean Journal of Applied Statistics
    • /
    • v.23 no.3
    • /
    • pp.533-543
    • /
    • 2010
  • Asking sensitive questions by a direct survey method causes non-response bias and response bias. Non-response bias arises from interviewees refusal to respond and response bias arises from giving incorrect responses. To rectify these biases, Warner (1965) introduced a randomized response model which is an alternative survey method for socially undesirable or incriminating behavior questions. The randomized response model is a procedure for collecting the information on sensitive characteristics without exposing the identity of the respondent. Many survey researchers have proposed diverse variants of the Warner randomized response model and applied their model to collect the information of sensitive questions. Using an optimal allocation, we proposed three-stage stratified randomized response technique which is an extension of the Kim and Elam (2005) two-stage stratified randomized response technique. In this study, we showed that the estimator based on the proposed response model is more efficient than Kim and Elam (2005). But by adding one more survey step to the Kim and Elam (2005), our proposed model may have relatively less privacy protection compared to the Kim and Elam (2005) model.

A Study on Anonymous Electronic Prescription based on RSA Cryptosystem (RSA 기반의 익명 전자처방전에 관한 연구)

  • Chung, Chan-Joo;Yun, Jung-Mee;Won, Dong-Ho
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.47 no.4
    • /
    • pp.51-62
    • /
    • 2010
  • This paper proposes RSA cryptosystem based anonymous electronic prescription which is issued from university and local hospitals by authorized medical professionals. Electronic prescription is now being used in domestic hospitals where sharing medical records and images are prevailing, facilitated by digitalizing medical information and building network infrastructure between the institutes. Proposed RSA based anonymous electronic prescription makes use of PKI protects the identity exposure of doctors and privacy of patients. While traditional prescription fails to protect identities to mandates party or to health insurance, the proposed RSA based prescription opens the contents of the prescription to health insurance authority only after its prescribing function is finished. The proposed approach along with soon to be deployed electronic ID card will help national health insurance corporation to increase the transparency of national prescription system.

New gTLD Program: Uniform Rapid Suspension System and Trademark Clearinghouse (신규 일반 최상위 도메인의 도입과 통일신속정지제도(URS)에 대한 연구)

  • Park, Yu-Sun
    • Journal of Arbitration Studies
    • /
    • v.21 no.2
    • /
    • pp.113-131
    • /
    • 2011
  • Recently, the Internet Corporation for Assigned Names and Numbers (ICANN) announced the expansion of the number of generic top-level domains (gTLDs) beyond the current 22 gTLDs, and the gTLD Applicant Guidebook for ICANN's new gTLD program is now under consideration for approval. ICANN also introduces a "Trademark Clearinghouse" and the "Uniform Rapid Suspension (URS)" procedure to protect trademarks and expedite dispute resolution and save costs. The Trademark Clearinghouse is a central repository for information to be authenticated, stored and disseminated, pertaining to the rights of the trademark holders. Trademark holders would voluntarily provide data of their trademarks from all over the world, and it would assist a trademark watch service provided by the new gTLD registry for trademark holders and potential domain name registrants. The URS is a part of the new gTLD dispute resolution mechanisms created by ICANN to resolve cybersquatting disputes. A complainant in a URS proceeding must establish three elements that are very similar to the existing UDRP to succeed, but supposedly more expedited and cost efficient. Since the URS provides that it only protects court validated and registered trademarks, it is not clear whether unregistered marks used in commerce are protected under the URS. The URS escalates the complainant's burden of proof from a preponderance of evidence standard under the UDRP to a clear and convincing evidence standard. The notices to a respondent shall be sufficient if the URS Provider sends the notice of Complaint to the addresses listed in the Whois contact information. As registrants who wish to conceal their true identity often subscribe to the privacy/proxy service and the complainant's high rate of success in the UDRP proceeding is relevant to the respondents' default rate, the URS's simple notice requirement would deprive respondents of a fair opportunity to assert their rights over the disputed domain names.

  • PDF

Pseudonym-based Anonymous PKI with Short Group Signature (Short Group Signature를 이용한 가명 기반 PKI)

  • Lee, Sok-Joon;Han, Seung-Wan;Lee, Yun-Kyung;Chung, Byung-Ho
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.10a
    • /
    • pp.703-707
    • /
    • 2008
  • Nowadays, Internet becomes an essential element in our life. We can make use of numerous on-line services through Internet such as information search, on-line shopping, e-mail service, etc. But, while getting the benefits of Internet service, invasion of our privacy frequently occurs because on-line service providers tend to request excessive or unnecessary personal information. So, there have been some researches on anonymous authentication, which means that user can authenticate herself, not revealing her identity or personal information. But, most of the researches are not somewhat applicable to current authentication infrastructure. In this paper, we propose a pseudonym-based anonymous PKI with short group signature. Using our proposed scheme, we can provide anonymity with conditional traceability to current PKI.

  • PDF