• Title/Summary/Keyword: Information disclosure

Search Result 631, Processing Time 0.028 seconds

Securing Sensitive Data in Cloud Storage (클라우드 스토리지에서의 중요데이터 보호)

  • Lee, Shir-Ly;Lee, Hoon-Jae
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2011.04a
    • /
    • pp.871-874
    • /
    • 2011
  • The fast emerging of network technology and the high demand of computing resources have prompted many organizations to outsource their storage and computing needs. Cloud based storage services such as Microsoft's Azure and Amazon's S3 allow customers to store and retrieve any amount of data, at anytime from anywhere via internet. The scalable and dynamic of the cloud storage services help their customer to reduce IT administration and maintenance costs. No doubt, cloud based storage services brought a lot of benefits to its customer by significantly reducing cost through optimization increased operating and economic efficiencies. However without appropriate security and privacy solution in place, it could become major issues to the organization. As data get produced, transferred and stored at off premise and multi tenant cloud based storage, it becomes vulnerable to unauthorized disclosure and unauthorized modification. An attacker able to change or modify data while data inflight or when data is stored on disk, so it is very important to secure data during its entire life-cycle. The traditional cryptography primitives for the purpose of data security protection cannot be directly adopted due to user's lose control of data under off premises cloud server. Secondly cloud based storage is not just a third party data warehouse, the data stored in cloud are frequently update by the users and lastly cloud computing is running in a simultaneous, cooperated and distributed manner. In our proposed mechanism we protect the integrity, authentication and confidentiality of cloud based data with the encrypt- then-upload concept. We modified and applied proxy re-encryption protocol in our proposed scheme. The whole process does not reveal the clear data to any third party including the cloud provider at any stage, this helps to make sure only the authorized user who own corresponding token able to access the data as well as preventing data from being shared without any permission from data owner. Besides, preventing the cloud storage providers from unauthorized access and making illegal authorization to access the data, our scheme also protect the data integrity by using hash function.

Multimedia Technologies for Teaching Musical Art under Present-day Conditions

  • Svitlana Huralna;Nataliia Demianko;Nataliia Sulaieva;Viktoriia Irkliienko;Tetiana Horokhivska
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.5
    • /
    • pp.165-171
    • /
    • 2024
  • The processes of society's informatization and digitalization necessitate the widespread use of new pedagogical technologies. Through these technologies, comprehensive disclosure of didactic functions of new methods of educational activity and the realization of the potential and creative potential. The use of information and computer multimedia technologies in teaching music art is especially relevant in the intensification of the development of interactive technologies, the transition to mixed forms of learning, and a period of socio-economic and sociopolitical upheavals. The study aims to substantiate the theoretical and applied principles of the analysis of multimedia technology learning musical art in modern conditions and assess the status and trends in their use in conducting educational activities. The study uses general scientific and unique methods of economic analysis, in particular, analysis and synthesis, analogy and comparison, generalization and systematization, and graphic ways. Regarding the results of the study of multimedia technologies for teaching musical art in current conditions, it was found that they contribute to the development of the seeker's creative, creative, and cognitive activity, have a positive impact on learning material, and diversify the educational process. Multimedia technologies such as presentations, programs for watching a video, listening to audio, music and singing karaoke, electronic encyclopedias, and Internet resources are proven to be the most used in music education. They have several qualitative and quantitative advantages, manifested in the possibilities of audio-visual presentation of educational material and significantly higher information density. It is suggested to strengthen the use of such computer programs as Microsoft Word, Ahead Nero, Finale, Adobe Audition, Sound Forge, and Microsoft PowerPoint for musical art classes.

Design and implementation of smart card-based multi-authentication mechanism for digital contents delivery (디지털콘텐츠 유통을 위한 스마트카드기반의 다중인증처리방법설계 및 구현)

  • Kim, Yong;Lee, Tae-Young
    • Journal of the Korean Society for information Management
    • /
    • v.19 no.1
    • /
    • pp.23-46
    • /
    • 2002
  • With explosively increasing digital contents, library and Information center should have a new role between knowledge providers and knowledge users as information brokering organization. Electronic transaction system should be required for performing this brokering service since economic value is added to information and knowledge in information society. The developments and changes around library are keeping up with increasing building digital library and digitalizing printed sources. With the rapidly changing circumstances, the Internet is currently witnessing an explosive growth. By serving as a virtual information resource. the Internet can dramatically change the way business is conducted and Information is provided. However because of features o( the Internet like openness and information sharing, it has fundamental vulnerabilities in security issues. For Instance, disclosure of private information and line eavesdropping such as password, banking account, transaction data on network and so on are primary obstruction factors to activation of digital contents delivery on network. For high network security and authentication, this paper looks at smart card technologies and proposes multi-authentication protocol based on smart card on open network, implements and analyzes it.

A Practical Attack on In-Vehicle Network Using Repacked Android Applications (커넥티드 카 환경에서 안드로이드 앱 리패키징을 이용한 자동차 강제 제어 공격)

  • Lee, Jung Ho;Woo, Samuel;Lee, Se Young;Lee, Dong Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.3
    • /
    • pp.679-691
    • /
    • 2016
  • As vehicle started to contain many different communication devices, collecting external information became possible in IoT environment. In such environment, remotely controling vehicle is possible when vehicle information is obtained by looking in to vehicle network through smart device. However, android based smart device applications are vulnerable to malicious modulation and redistribution. Modulated android application can lead to vehicle information disclosure that could bring about vehicle control accident which becomes threat to drivers. furthermore, since vehicles today does not contain security methods to protect it, they are very vulnerable to security threats which can cause serious damage to users and properties. In this paper, many different vehicle management android applications that are sold in Google Play has been analyzed. With this information, possible threats that could happen in vehicle management applications are being analysed to prove the risks. the experiment is done on actual vehicle to prove the risks. Also, access control method to protect the vehicle against malicious actions that could happen through external network in IoT environment is suggested in the paper.

A Method of Utilizing ESG Evaluation by Small and Medium Enterprises: Focusing on the relationship between ESG Performance measure and Corporate Value (중소기업의 ESG 평가지표 활용 방안: ESG 평가지표와 기업가치의 관계를 중심으로)

  • Park Jae Hyun;Han Hyang Won
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.18 no.6
    • /
    • pp.87-104
    • /
    • 2023
  • Recently, concerns are growing over small and medium-sized companies holding out on debt as domestic loan interest rates have risen sharply due to the prolonged impact of COVID-19 and soaring raw material prices. In addition, loans from small and medium-sized enterprises, which are difficult in the business environment, are increasingly being rejected due to high loan interest rates and excessive submission documents and financial statements-oriented screening of loans by the financial sector. Therefore, since it is necessary to discuss ways to promote financing and investment by SMEs, this study intends to suggest ways to promote investment through the use of SMEs' ESG systems. The purpose of this study is to suggest that the use of ESG evaluation indicators used as non-financial indicators helps predict the corporate value of SMEs and the importance of SMEs actively participating in ESG information disclosure. This study suggests the necessity of introducing and practicing ESG by SMEs where financing is important, and aims to analyze as an empirical result that the use of non-financial indicators helps predict corporate value. As a result of the study, the ESG performance and corporate value of SMEs showed a positive (+) relationship. It can be seen that both the grades and corporate value of SMEs by ESG sector have a positive (+) influence relationship. The total ESG rating was confirmed to have a positive effect on corporate value, and it was confirmed that SMEs with higher ESG environment, social, and governance ratings were evaluated higher. According to the research results, it is suggested that SMEs also need to use ESG evaluation indicators, and in order to promote the growth of SMEs, it is suggested that research on ways to re-examine the corporate value of SMEs is necessary. Therefore, this study suggests that the use of ESG should be actively recommended and implemented as a way to establish a management strategy for SMEs, and that efforts to disclose ESG information can soon help SMEs solve information asymmetry. In addition, SMEs want to understand the investment mechanism that the introduction and practice of ESG can lead to the improvement of the value of SMEs and suggest the necessity of SME-type ESG policies in the future.

  • PDF

Information Security Job Skills Requirements: Text-mining to Compare Job Posting and NCS (정보보호 직무 수행을 위해 필요한 지식 및 기술: 텍스트 마이닝을 이용한 구인광고와 NCS의 비교)

  • Hyo-Jung Jun;Byeong-Jo Park;Tae-Sung Kim
    • Information Systems Review
    • /
    • v.25 no.3
    • /
    • pp.179-197
    • /
    • 2023
  • As a sufficient workforce supports the industry's growth, workforce training has also been carried out as part of the industry promotion policy. However, the market still has a shortage of skilled mid-level workers. The information security disclosure requires organizations to secure personnel responsible for information security work. Still, the division between information technology work and job areas is unclear, and the pay is not high for responsibility. This paper compares job keywords in advertisements for the information security workforce for 2014, 2019, and 2022. There is no difference in the keywords describing the job duties of information security personnel in the three years, such as implementation, operation, technical support, network, and security solution. To identify the actual needs of companies, we also analyzed and compared the contents of job advertisements posted on online recruitment sites with information security sector knowledge and skills defined by the National Competence Standards used for comprehensive vocational training. It was found that technical skills such as technology development, network, and operating system are preferred in the actual workplace. In contrast, managerial skills such as the legal system and certification systems are prioritized in vocational training.

A Study on Health Information and Medical Consulting via Internet Focusing on the Age Group of 20s (인터넷을 활용한 건강정보 및 의료상담에 관한 연구 (20대를 중심으로))

  • Rhee, Hyun-Sill;Lee, Kyung-Sook;Kim, Mi-Sun;Hwang, Seung-Hwan;Kim, Dong-Soo;Woo, Jong-Won;Mun, Dae-Hun;Ryu, Jin-Sol;Lee, Tae-Ro
    • Journal of Digital Convergence
    • /
    • v.10 no.2
    • /
    • pp.255-267
    • /
    • 2012
  • High Internet usage and the public's keen interest on health have influenced the health care system, and a potential value of the online health information and medical consultation market is immense. This study reveals results from data collected from Seoul residents in the age group of 20s in 2011. Out of 499 respondents, 75.2% answered that they used online health information; however, only 7.2% answered that they have used online medical consultation services. Findings on the purposes of using online medical consultation included treatments of symptoms(33.6%) and self-disciplines of one's health(19.5%). Mostly used Websites for health information search included search engines and blogs, but respondents preferred to use government sites and hospital sites in the future. When choosing a medical consultation, respondents preferred a certain website for different reasons including creditability of the consultant(23.7%), creditability of the organization(23.7%), rapid responses(21.2%), and more. Overall, although health information search via web is being highly utilized among people in their 20s, utilization of online medical consulting is not. Thus, promotion efforts to increase awareness and utilization of online medical consulting based on the site selection criteria, type of personal information disclosure, and other preferences are essential. Also, creating websites meeting these criteria is important.

Enhanced Grid-Based Trajectory Cloaking Method for Efficiency Search and User Information Protection in Location-Based Services (위치기반 서비스에서 효율적 검색과 사용자 정보보호를 위한 향상된 그리드 기반 궤적 클로킹 기법)

  • Youn, Ji-Hye;Song, Doo-Hee;Cai, Tian-Yuan;Park, Kwang-Jin
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.7 no.8
    • /
    • pp.195-202
    • /
    • 2018
  • With the development of location-based applications such as smart phones and GPS navigation, active research is being conducted to protect location and trajectory privacy. To receive location-related services, users must disclose their exact location to the server. However, disclosure of users' location exposes not only their locations but also their trajectory to the server, which can lead to concerns of privacy violation. Furthermore, users request from the server not only location information but also multimedia information (photographs, reviews, etc. of the location), and this increases the processing cost of the server and the information to be received by the user. To solve these problems, this study proposes the EGTC (Enhanced Grid-based Trajectory Cloaking) technique. As with the existing GTC (Grid-based Trajectory Cloaking) technique, EGTC method divides the user trajectory into grids at the user privacy level (UPL) and creates a cloaking region in which a random query sequence is determined. In the next step, the necessary information is received as index by considering the sub-grid cell corresponding to the path through which the user wishes to move as c(x,y). The proposed method ensures the trajectory privacy as with the existing GTC method while reducing the amount of information the user must listen to. The excellence of the proposed method has been proven through experimental results.

The Impacts of Managers' Earning Forecast Information on Manager Compensation. -Focused on Accounting Conservatism- (경영자의 이익예측정보가 경영자 보상에 미치는 영향 -회계보수주의를 중심으로-)

  • Jeon, MiJin;Sim, Weon-Mi
    • Journal of Digital Convergence
    • /
    • v.20 no.5
    • /
    • pp.393-400
    • /
    • 2022
  • In a situation where the company handles accounting conservatively, the management's earnings forecasting information will be more conservative, and the conservativeness of this earnings forecasting information will have a differential effect in evaluating the performance of managers and paying compensation. This study aims to examine how the level of corporate accounting conservatism affects the forecast information of managers and how this affects the compensation of managers. This study establishes a hypothesis on the effect of the level of accounting conservatism on the earnings forecasting information and compensation of managers, and examines the relationship between managerial profit forecasting information & manager compensation according of conservatism in corporate accounting that can vary depending on the manager's disposition. As a result of the analysis, conservative managers are also conservative in earnings forecasting disclosure, and when corporate managers are highly conservative, they show their ability by making earnings forecasts disclosures more frequently and more accurately than corporate managers with low conservatism. It will help reduce the forecasting errors of stakeholders. Therefore, it is expected that this will play an important role in judging the manager's ability and determining compensation. Therefore, when a company handles accounting conservatively, management's earnings forecasts are also measured conservatively, which is expected to provide useful information on the basis and form of management's compensation to stakeholders.

An Efficient-keyword-searching Technique over Encrypted data on Smartphone Database (스마트폰 데이터베이스 환경에서 암호화된 데이터에 대한 효율적인 키워드검색 기법)

  • Kim, Jong-Seok;Choi, Won-Suk;Park, Jin-Hyung;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.4
    • /
    • pp.739-751
    • /
    • 2014
  • We are using our smartphone for our business as well as ours lives. Thus, user's privacy data and a company secret are stored at smartphone. By the way, the saved data on smartphone database can be exposed to a malicous attacker when a malicous app is installed in the smartphone or a user lose his/her smartphone because all data are stored as form of plaintext in the database. To prevent this disclosure of personal information, we need a database encryption method. However, if a database is encrypted, it causes of declining the performance. For example, when we search specific data in condition with encrypted database, we should decrypt all data stored in the database or search sequentially the data we want with accompanying overhead[1]. In this paper, we propose an efficient and searchable encryption method using variable length bloom filter under limited resource circumstances(e.g., a smartphone). We compare with existing searchable symmetric encryption. Also, we implemented the proposed method in android smartphone and evaluated the performance the proposed method. As a result through the implementation, We can confirm that our method has over a 50% improvement in the search speed compared to the simple search method about encrypted database and has over a 70% space saving compared to the method of fixed length bloom filter with the same false positive rate.