• Title/Summary/Keyword: K-Anonymity

Search Result 227, Processing Time 0.029 seconds

Privacy Model Recommendation System Based on Data Feature Analysis

  • Seung Hwan Ryu;Yongki Hong;Gihyuk Ko;Heedong Yang;Jong Wan Kim
    • Journal of the Korea Society of Computer and Information
    • /
    • v.28 no.9
    • /
    • pp.81-92
    • /
    • 2023
  • A privacy model is a technique that quantitatively restricts the possibility and degree of privacy breaches through privacy attacks. Representative models include k-anonymity, l-diversity, t-closeness, and differential privacy. While many privacy models have been studied, research on selecting the most suitable model for a given dataset has been relatively limited. In this study, we develop a system for recommending the suitable privacy model to prevent privacy breaches. To achieve this, we analyze the data features that need to be considered when selecting a model, such as data type, distribution, frequency, and range. Based on privacy model background knowledge that includes information about the relationships between data features and models, we recommend the most appropriate model. Finally, we validate the feasibility and usefulness by implementing a recommendation prototype system.

Study on Robust Differential Privacy Using Secret Sharing Scheme (비밀 분산 기법을 이용한 강건한 디퍼렌셜 프라이버시 개선 방안에 관한 연구)

  • Kim, Cheoljung;Yeo, Kwangsoo;Kim, Soonseok
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.7 no.2
    • /
    • pp.311-319
    • /
    • 2017
  • Recently invasion of privacy problem in medical information have been issued following the interest in secondary use of large medical information. These large medical information is very useful information that can be used in various fields such as disease research and prevention. However, due to the privacy laws such as Privacy Act and Medical Law, these informations including patients or health professionals' personal information are difficult to utilize secondary. Accordingly, various methods such as k-anonymity, l-diversity and differential-privacy that can be utilized while protecting privacy have been developed and utilized in this field. In this paper, we study differential privacy processing procedure, one of various methods, and find out about the differential privacy problem using Laplace noise. Finally, we propose a new method using the Shamir's secret sharing method and symemetric key encryption algorithm such as AES for this problem.

Improved Flyweight RFID Authentication Protocol

  • Vallent, Thokozani Felix;Yoon, Eun-Jun;Kim, Hyunsung
    • IEIE Transactions on Smart Processing and Computing
    • /
    • v.1 no.2
    • /
    • pp.95-105
    • /
    • 2012
  • The widespread implementation of RFID in ubiquitous computing is constrained considerably by privacy and security unreliability of the wireless communication channel. This failure to satisfy the basic, security needs of the technology has a direct impact of the limited computational capability of the tags, which are essential for the implementation of RFID. Because the universal application of RFID means the use of low cost tags, their security is limited to lightweight cryptographic primitives. Therefore, EPCGen2, which is a class of low cost tags, has the enabling properties to support their communication protocols. This means that satisfying the security needs of EPCGen2 could ensure low cost security because EPCGen2 is a class of low cost, passive tags. In that way, a solution to the hindrance of low cost tags lies in the security of EPCGen2. To this effect, many lightweight authentication protocols have been proposed to improve the privacy and security of communication protocols suitable for low cost tags. Although many EPCgen2 compliant protocols have been proposed to ensure the security of low cost tags, the optimum security has not been guaranteed because many protocols are prone to well-known attacks or fall short of acceptable computational load. This paper proposes a remedy protocol to the flyweight RFID authentication protocol proposed by Burmester and Munilla against a desynchronization attack. Based on shared pseudorandom number generator, this protocol provides mutual authentication, anonymity, session unlinkability and forward security in addition to security against a desynchronization attack. The desirable features of this protocol are efficiency and security.

  • PDF

Weaknesses and Improvement of User Authentication Scheme against Smart-Card Loss Attack (스마트 카드 분실 공격에 안전한 사용자 인증 스킴의 취약점 및 개선방안)

  • Choi, Younsung
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.6
    • /
    • pp.95-101
    • /
    • 2016
  • With the rapid development of Internet and communication network technology, various studies had proceeded to develop the technology of wireless sensor networks. Authentication schemes for user and sensor are critical and important security issue to use wireless sensors legally. First, Das introduce a user authentication scheme using smart card and password for wireless sensor networks, various studies had proceeded. Chem et al. suggested a secure user authentication scheme against smart card loss attack but Chen et al. scheme does not still resolve some security vulnerability such as perfect forward secrecy, session key exposure by gateway node, anonymity, and the password check. To resolve the problems, this paper proposes a security enhanced user authentication using the fuzzy extraction, elliptic curves cryptography and dynamic ID and analyzes the security.

Motivators and Demotivators of Chat Reference Service (채팅을 통한 정보봉사 서비스의 이용자 동기화 및 비동기화 요인)

  • Lee, Seong-Sin
    • Journal of the Korean Society for information Management
    • /
    • v.25 no.2
    • /
    • pp.115-125
    • /
    • 2008
  • The Purpose of this study was to discover the factors which motivate academic library users to use chat reference service and which demotivate academic library users to use chat reference service. To achieve the study purposes, this study conducted interview with the selected participants (Information Studies graduate students at Florida State University(FSU)) through email in April and May 2007. This study found that 1) convenience, 2) anonymity, and 3) inexpensiveness of the service served as incentives(motivators) for chat reference service consumers to use the service. On the other hand, chat reference service consumers mentioned the following factors as obstacles (demotivators) for using the service: 1) waiting time, 2) accessibility, 3) interface design, and 4) difficulties with expressing themselves in a virtual space.

An Anonymous Fingerprinting Scheme with a Robust Asymmetry

  • Park, Jae-Gwi;Park, Ji-Hwan;Kouichi Sakurai
    • Journal of Korea Multimedia Society
    • /
    • v.6 no.4
    • /
    • pp.620-629
    • /
    • 2003
  • Fingerprinting schemes are techniques applied to protect the copyright on digital goods. These enable the merchants to identify the source of illegal redistribution. Let us assume the following situations connectedly happen: As a beginning, buyer who bought digital goods illegally distributed it, next the merchant who found it revealed identity of the buyer/traitor, then the goods is illegally distributed again. After this, we describe it as“The second illegal redistribution”. In most of anonymous fingerprinting, upon finding a redistributed copy, a merchant extracts the buyer's secret information from the copy and identifies a traitor using it. Thus the merchant can know the traitor's secret information (digital fingerprints) after identification step. The problem of the second illegal distribution is that there is a possibility of the merchant's fraud and the buyer's abuse: that is a dishonest employee of the merchant might just as well have redistributed the copy as by the buyer, or the merchant as such may want to gain money by wrongly claiming that the buyer illegally distributed it once more. The buyer also can illegally redistribute the copy again. Thus if the copy turns up, one cannot really assign responsibility to one of them. In this paper, we suggest solution of this problem using two-level fingerprinting. As a result, our scheme protects the buyer and the merchant under any conditions in sense that (1) the merchant can obtain means to prove to a third party that the buyer redistributed the copy. (2) the buyer cannot worry about being branded with infamy as a traitor again later if he never distribute it.

  • PDF

The Smart Contract based Voting Model for Internet Community Election (인터넷 커뮤니티 선거에 적합한 스마트계약 기반 투표 모델)

  • Yun, Sunghyun
    • Journal of Internet of Things and Convergence
    • /
    • v.5 no.2
    • /
    • pp.67-72
    • /
    • 2019
  • As Internet voting can take place regardless of a voter's location, the participation rate of the voters would be increased and economic costs will be reduced. But the drawback of it is that all participants have to trust the election management server. If the server colludes with the specific candidate, the other candidates cannot prove rigged election. In addition, majority of researches on Internet voting are mainly focused on the voting restricted by the region and the country. Thus, it's not appropriate for the election in Internet community such as YouTube channels. As the Internet community is composed of members from all around the world, the new type of voting model is needed. In this study, we propose the smart contract based Internet voting model applicable on the blockchain network. The proposed smart contract model consists of candidate registration, voter registration, voting and counting stages. In the proposed model, anonymity of the voter is assured in the voter registration and voting stages, and all candidates can confirm the fairness of the election in the counting stage.

A Study on Improving Support for Victims of Cyber-Violence (사이버 폭력의 피해자 지원에 대한 개선방안)

  • Park, Jong-Ryeol
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.1
    • /
    • pp.227-233
    • /
    • 2012
  • Recently, violence in cyberspace has been increasing and it causes not only severe emotional distress to the victims but also hampers a healthy cyber culture. This paper aims to find out about characteristics and the actual state of Cyber-Violence, and Evaluate the measures concerning it. Cyber crime is characterized as non face to face, anonymity, non-limitary, difficulties in attracting evidence, the Cyber Violence of these cyber crimes was shown in the form of cyber-insult, cyber-defamation, cyber-stalking, circulation of cyber-pornography, and that is the reality there are lack of practical measures. As a measure for protection the establishment of positive laws are needed on the cyber-contempt, adopting the Internet real-name system, strengthening the ISP's responsibility and legislation for criminal penalties. As a more fundamental measure, a greater effort of netizen's self-purification and systematic training and promotion for the prevention of damage is necessary.

Study on Establishment of Internet ethics expressed through Language convert in computer games (컴퓨터 게임에서의 언어 표현변화를 통한 인터넷 윤리 확립에 관한 연구)

  • Park, Koo Rack
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.11
    • /
    • pp.47-52
    • /
    • 2012
  • Today the Internet is being used in all areas. However, part of everyday life, the lack of ethics on the Internet, the Internet lies in state. Especially the youth, should exploit the anonymity. As a result, has caused many problems. Fps online game from young people enjoy the use of profanity and slang, and increasing the damage of cyber violence has also increased. The damage type of cyber violence, abusive and slang, and the age, the lower the investigation was to increase the damage. Lot of publicity and public service advertising is in progress in order to prevent problems, but its expected effects is lacking. In addition, using abusive and slang words, This is a fundamental and provide a service to handle deleted or blinds, but if you can not see the solution. In this paper suggests the language convert that can be applied to Fps online games. Language the conversion process, if applicable to the game, the abusive and slang language, helps to purify. Proposed language the conversion process is expected to reduce cyber violence used abusive and slang.

The Regulations by Criminal Law against any Libel in Cyberspace (사이버명예훼손행위와 형사법적 대응방안)

  • Yoo, In-Chang
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.5
    • /
    • pp.177-183
    • /
    • 2012
  • There occur various crimes in cyber space hiding behind anonymity to avoid punishment by criminal law. One of the most serious crimes committed in cyber space is defamation against others under the cloak of freedom of expression. The infringements by defamations in cyber space are made all of a certain and widespread that the victims have no time to react, and for that reason, the shocks by the defamation are much serious and severe compared with that committed in off line. However, press and publication shouldn't infringe on other's honors, right, public order or social ethics in liberal democrat society which values much the human dignities and values as stipulated in Article 21 section 4 of the Constitution. Protection of personal honor is also the basic rights guaranteed by the Constitution as much as the freedom of expression, and by extension, such harmful behaviour shouldn't be included in the freedom of expression area. In this way, slander can be considered as the minimum limitation of the freedom of expression.