• 제목/요약/키워드: K-Anonymity

검색결과 227건 처리시간 0.026초

스마트 카드를 이용한 익명성을 제공하는 방송 콘텐츠 암호화 키 교환 프로토콜 (A Key Agreement Protocol with User Anonymity for Content Transmission Using Smart Card)

  • 황병희;김범한;이동훈
    • 한국방송∙미디어공학회:학술대회논문집
    • /
    • 한국방송공학회 2008년도 동계학술대회
    • /
    • pp.47-50
    • /
    • 2008
  • 인터넷과 같이 안전하지 않은 네트워크 환경에서 도청은 손쉽게 일어난다. 또한 수신자가 누구인지 알아내기가 쉽다. 이러한 환경에서 정당한 수신자에게 방송 콘텐츠를 안전하게 제공하면서 익명성을 제공하기 위해서는 서버와 수신자 사이에 익명성을 제공하는 키 교환이 필요하다. 스마트 카드를 이용한 익명성을 제공하는 키 교환 프로토콜은 이러한 요건을 충족시킨다. 스마트 카드를 이용한 방법은 여러 가지가 존재하나 이 논문에서는 Kumar Mangipudi 가 제안한 sika프로토콜을 향상시킨 Ren-Chiun Wang의 프로토콜을 알아보고, 취약점을 분석한다. 마지막으로 취약한 점을 보완한 프로토콜을 제안하고 제안한 프로토콜의 안전성을 분석한다. 제안하는 프로토콜은 Ren-Chiun Wang의 프로토콜보다 안전성 측면에서 향상되었다.

  • PDF

Privileged-Insider 공격에 안전한 원격 사용자 인증 프로토콜 (Secure Remote User Authentication Protocol against Privileged-Insider Attack)

  • 이성엽;박요한;박영호
    • 한국멀티미디어학회논문지
    • /
    • 제20권4호
    • /
    • pp.614-628
    • /
    • 2017
  • Recently, Due to the rapid development of the internet and IT technology, users can conveniently use various services provided by the server anytime and anywhere. However, these technologies are exposed to various security threat such as tampering, eavesdropping, and exposing of user's identity and location information. In 2016, Nikooghadam et al. proposed a lightweight authentication and key agreement protocol preserving user anonymity. This paper overcomes the vulnerability of Nikooghadam's authentication protocol proposed recently. This paper suggests an enhanced remote user authentication protocol that protects user's password and provides perfect forward secrecy.

하둡 분산 환경 기반 프라이버시 보호 빅 데이터 배포 시스템 개발 (Development of a Privacy-Preserving Big Data Publishing System in Hadoop Distributed Computing Environments)

  • 김대호;김종욱
    • 한국멀티미디어학회논문지
    • /
    • 제20권11호
    • /
    • pp.1785-1792
    • /
    • 2017
  • Generally, big data contains sensitive information about individuals, and thus directly releasing it for public use may violate existing privacy requirements. Therefore, privacy-preserving data publishing (PPDP) has been actively researched to share big data containing personal information for public use, while protecting the privacy of individuals with minimal data modification. Recently, with increasing demand for big data sharing in various area, there is also a growing interest in the development of software which supports a privacy-preserving data publishing. Thus, in this paper, we develops the system which aims to effectively and efficiently support privacy-preserving data publishing. In particular, the system developed in this paper enables data owners to select the appropriate anonymization level by providing them the information loss matrix. Furthermore, the developed system is able to achieve a high performance in data anonymization by using distributed Hadoop clusters.

익명성과 프라이버시 보장을 위한 효율적인 인증 메커니즘 설계 (Design of Authentication Mechanism for Anonymity And Privacy assurance)

  • 이동명;최효민;이옥연
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2005년도 추계학술발표대회 및 정기총회
    • /
    • pp.941-944
    • /
    • 2005
  • 본 논문에서는 인터넷을 통해 다양한 컨테츠 서비스를 사용자가 편리하게 이용할 수 있도록 EAP-TLS 인증 방식과 SKKE(Symmetric-Key Key Establishment)방식을 이용하여 보다 효율적인 인증 메커니즘을 설계하였다. 제안하고 있는 메커니즘에서는 사용자가 인증서 방식을 통해 AS(AAA Server)로부터 인증을 받으면 AS 와 가맹 관계에 있는 CP(Contents Provider)에는 별도의 로그인 과정없이 서비스를 이용할 수 있는 SSO 서비스, 사용자 익명성, 프라이버시를 제공한다. 사용자가 익명성을 필요로 하는 컨텐츠 서비스를 이용할 경우 사용자의 익명성을 보장 해주고 AS 모르게 사용자와 CP 가 안전하게 서비스를 전송하기 위해 사용 할 세션키를 교환하고 CP 마다 다른 세션키를 사용함으로써 사용자의 프라이버시를 보장해 준다.

  • PDF

Efficient Identity-Based Generalized Ring Signcryption Scheme

  • Zhou, Caixue;Cui, Zongmin;Gao, Guangyong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제10권12호
    • /
    • pp.5553-5571
    • /
    • 2016
  • In this paper, we introduce a new concept called generalized ring signcryption (GRSC), which can achieve ring signature and ring signcryption functions with only one key pair and one algorithm. It is very useful for a system which has a large number of users, or has limited storage space, or whose function requirements may be changed later. We give a formal definition and a security model of GRSC and propose a concrete scheme based on bilinear pairings. In the random oracle model, the scheme's confidentiality can be proved under the GBDH assumption, and its unforgeability can be proved under GDH' assumption, and what is more, this scheme also allows unconditional anonymity. Compared with other identity-based ring signcryption schemes that use bilinear pairings as well, our scheme is a highly efficient one.

Comparison of Anonymous Authentication Protocols

  • Kim, Jongseong;Kim, Kwangjo
    • 한국정보보호학회:학술대회논문집
    • /
    • 한국정보보호학회 2002년도 종합학술발표회논문집
    • /
    • pp.369-372
    • /
    • 2002
  • An anonymous authentication scheme allows a user to identify himself as a member of a group of users in a secure and anonymous way. It seems to be crucial and indispensable components in English auction, electronic voting and open procurement, which are getting very popular business areas in E-commerce. First, we briefly describe the previous anonymous authentication protocols how to work and what cryptographic techniques adopted to increase performance and achieve anonymity. Second, we compare those protocols from the viewpoint of the communication and computation complexity and the specific cryptographic techniques used in their protocols.

  • PDF

블록체인 환경에서 Email 사용자 신뢰도 측정 (Measuring Email User Reliability in a Blockchain Environment)

  • 김대한;서경룡
    • 한국멀티미디어학회논문지
    • /
    • 제23권8호
    • /
    • pp.1030-1039
    • /
    • 2020
  • The biggest feature of the online environment is anonymity. So it is difficult to identify the sender accurately in Email. So we use PGP to enhance the security of email. PGP is an e-mail encryption program that has become the standard for email security worldwide. But PGP has a weak point in security. PGP can identify users, but it is difficult to verify reliability. In PGP, the more reliable other users guarantee that user are, the more reliable they are. In the previous study, the PGP structure was implemented by utilizing the block chain to lay the foundation, and in this paper, the structure of the previous article is applied to the e-mail environment to measure up the sender's reliability, and a system is proposed that allows users to distinguish the reliability of the message.

익명성을 제공하는 RFID 상호 인증 프로토콜에 관한 연구 (A Study on RFID Mutual Authentication Protocol with Anonymity)

  • 강수영;이임영
    • 한국정보보호학회:학술대회논문집
    • /
    • 한국정보보호학회 2006년도 하계학술대회
    • /
    • pp.723-726
    • /
    • 2006
  • 최근 인터넷의 급성장에 따라 새로운 유비쿼터스 환경을 기반으로 다양한 연구들이 수행되고 있다. 특히 유비쿼터스의 핵심기술로써 RFID는 큰 비중을 차지하고 있으며 국내뿐만 아니라 국외에서도 활발한 연구가 진행되고 있다. 그러나 RFID는 불법적인 공격자로부터 공격을 당할 경우 정보가 노출되어 사용자의 프라이버시 침해의 문제점을 가지고 있다. 따라서 본 논문에서는 태그의 가상 ID를 간단한 연산을 취하여 매번 다른 값을 출력함으로써 사용자의 익명성을 제공하며, 가변적인 값이 노출되므로 위치 추적에 안전한 방식이다. 또한 ID를 갱신하지 않고 가변적인 값을 생성하므로 동기화에 대한 문제점을 해결하여 안전하고 효율적으로 상호 인증을 제공하는 방식을 제안한다.

  • PDF

가상현실을 이용한 심리치료 기술 동향과 전망 (Trend Analysis on Treatment of Psychological Disorders Using Virtual Reality)

  • 윤현중;정성엽
    • 융복합기술연구소 논문집
    • /
    • 제2권2호
    • /
    • pp.5-12
    • /
    • 2012
  • Recently, peoples are suffering from various psychological disorders such as addiction, phobia, depression, and bipolar disorder. Moreover, children with ADD/ADHD and autism are increasing. Korean tends to regard the psychological disorders as taboo. Therefore, it is unusual case that the mental patient gets the psychological therapy. Virtual reality has come to the spotlight as a useful tool for the therapy due to its anonymity and easy accessibility. The therapy in the virtual reality is called cyber-therapy. Emotion of the patient is important for the treating process. The objective of this paper is to review the researches on the treatment of psychological disorders using the virtual reality and prospect the affective interaction technology for the cyber-therapy.

  • PDF

패션 디자이너의 페르소나 마케팅 (Persona Marketing of Fashion Designers)

  • 예민희;임은혁
    • 한국의류학회지
    • /
    • 제39권3호
    • /
    • pp.446-456
    • /
    • 2015
  • Many fashion designers now regard themselves as part of a visual medium that reveals their persona to the masses. They are willing to stay in the spotlight, which influences brand publicity. Designer-as-brand is an important marketing factor in regards to profits. This study combines a literary survey and case analysis of persona marketing as well as inquires on the persona of fashion designers drawing on the theory of persona. This study classifies the persona of fashion designers into four categories that proceed from what has been established above: freak, dandy, duo, and anonymity. The persona of fashion designers has attracted considerable attention over the past decade. This study provides useful information for the persona marketing of fashion designers.