• 제목/요약/키워드: K-anonymity

검색결과 227건 처리시간 0.021초

Coordination of Anti-Spoofing Mechanisms in Partial Deployments

  • An, Hyok;Lee, Heejo;Perrig, Adrian
    • Journal of Communications and Networks
    • /
    • 제18권6호
    • /
    • pp.948-961
    • /
    • 2016
  • Internet protocol (IP) spoofing is a serious problem on the Internet. It is an attractive technique for adversaries who wish to amplify their network attacks and retain anonymity. Many approaches have been proposed to prevent IP spoofing attacks; however, they do not address a significant deployment issue, i.e., filtering inefficiency caused by a lack of deployment incentives for adopters. To defeat attacks effectively, one mechanism must be widely deployed on the network; however, the majority of the anti-spoofing mechanisms are unsuitable to solve the deployment issue by themselves. Each mechanism can work separately; however, their defensive power is considerably weak when insufficiently deployed. If we coordinate partially deployed mechanisms such that they work together, they demonstrate considerably superior performance by creating a synergy effect that overcomes their limited deployment. Therefore, we propose a universal anti-spoofing (UAS) mechanism that incorporates existing mechanisms to thwart IP spoofing attacks. In the proposed mechanism, intermediate routers utilize any existing anti-spoofing mechanism that can ascertain if a packet is spoofed and records this decision in the packet header. The edge routers of a victim network can estimate the forgery of a packet based on this information sent by the upstream routers. The results of experiments conducted with real Internet topologies indicate that UAS reduces false alarms up to 84.5% compared to the case where each mechanism operates individually.

Robust Conditional Privacy-Preserving Authentication based on Pseudonym Root with Cuckoo Filter in Vehicular Ad Hoc Networks

  • Alazzawi, Murtadha A.;Lu, Hongwei;Yassin, Ali A.;Chen, Kai
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제13권12호
    • /
    • pp.6121-6144
    • /
    • 2019
  • Numerous privacy-preserving authentication schemes have been proposed but vehicular ad hoc networks (VANETs) still suffer from security and privacy issues as well as computation and communication overheads. In this paper, we proposed a robust conditional privacy-preserving authentication scheme based on pseudonym root with cuckoo filter to meet security and privacy requirements and reduce computation and communication overheads. In our proposed scheme, we used a new idea to generate pseudonyms for vehicles where each on-board unit (OBU) saves one pseudonym, named as "pseudonym root," and generates all pseudonyms from the same pseudonym. Therefore, OBU does not need to enlarge its storage. In addition, the scheme does not use bilinear pairing operation that causes computation overhead and has no certification revocation list that leads to computation and communication overheads. The proposed scheme has lightweight mutual authentication among all parties and just for once. Moreover, it provides strong anonymity to preserve privacy and resists ordinary attacks. We analyzed our proposed scheme and showed that it meets security and privacy requirements of VANETs and is more efficient than traditional schemes. The communication and computation overheads were also discussed to show the cost-effectiveness of the proposed scheme.

양자 암호를 이용한 유헬스케어 환경의 키 분배 모델 설계 (Quantum cryptography-used Key Distribution Model Design of U-healthcare environment)

  • 정윤수;한군희
    • 디지털융복합연구
    • /
    • 제11권11호
    • /
    • pp.389-395
    • /
    • 2013
  • IT 기술과 의료기술이 융합되면서 환자의 체내에 의료장비를 부착한 환자의 수가 증가하고 있다. 그러나 환자의 생체정보를 제 3자가 악의적으로 도청 및 변경하는 문제점이 발생하고 있다. 본 논문에서는 환자와 병원관계자 사이에서 환자의 생체정보를 제3자가 도청하거나 변조없이 키를 공유하도록 양자 암호 기반의 키 분배 모델을 제안한다. 제안 모델의 양자 정보는 메시지 직접전달보다는 임의의 비트들을 전달하여 키를 공유하는 one-time pad 키를 사용한다. 또한, 제안 모델은 체내삽입장치의 생체정보가 제3자에게 불필요하게 노출되지 않아 환자의 익명성을 보장받는다.

All rants and no substance?: A new framework for studying the rationality of cyberspace

  • Soon, Carol;How, Tan Tarn
    • Journal of Contemporary Eastern Asia
    • /
    • 제16권2호
    • /
    • pp.20-43
    • /
    • 2017
  • While the Internet has been used to galvanise people for the collective good, many have voiced concerns over the noise and vitriol present online and polarisation. In Singapore where the government regulates traditional mainstream media such as print and broadcast, the online space has been described as a "Wild Wild West" rife with rumours, untruths and misinformation. Such developments do not only exert a potential negative effect on the deliberative nature of public discourse but also skew bias towards the online space, affecting the ability of online users to communicate with authority and power. This study seeks to examine the rationality of the cyberspace through using a new "rationality" framework to analyse political discourse online. Comprising objectivity, emotionality and partisanship, the rationality framework was applied to a content analysis of 197 blogs with political content in 2014. The analysis indicated that the online political space was not the Wild Wild West that it was touted to be with significant levels of objectivity and non-partisanship. There was a stark absence of emotional discourse, and relationships were observed between bloggers' anonymity and rationality. Cognisant of academia's and policymakers' interest on the quality and effects of online discourse, the proposed analytical framework and the study findings hold implications for both developed and developing countries.

코사인 유사도 기반의 인터넷 댓글 상 이상 행위 분석 방법 (Measures of Abnormal User Activities in Online Comments Based on Cosine Similarity)

  • 김민재;이상진
    • 정보보호학회논문지
    • /
    • 제24권2호
    • /
    • pp.335-343
    • /
    • 2014
  • 인터넷의 발달로 대중의 여론에 영향을 주는 인터넷 매체의 신뢰성이 중요해지는 반면 최근의 익명성을 이용한 리뷰 조작 등의 사례는 대중들에게 막연한 의구심을 들게 한다. 본 연구에서는 이러한 사이버 여론 조작과 관련된 현상이 인터넷 게시판 등 웹사이트에도 존재하는지 여부를 수치적으로 살펴보기 위하여 댓글의 요소를 분석하고 내용을 코사인 유사도를 이용하여 비교하였다. 분석 결과 첫째, 댓글 내용의 유사성은 댓글 순위에 의한 게시글의 랭킹과 상관관계가 있었으며 분석 대상 2개 웹사이트에 대해서는 14.1%와 2.6%가 유사한 댓글로 구성되어 있었다. 둘째, 사이버 여론 조작에 일반적으로 이용되는 기법인 과다한 중복 게시 행위와 실제로는 동일인이지만 여러 명으로 위장한 것으로 추정되는 사용자를 파악 할 수 있었다.

eBay: Smart Entry Strategy into the Korean Market Through M&A and its Post-Merger Integration

  • Park, Young-Eun;Allui, Alawiya
    • 유통과학연구
    • /
    • 제17권1호
    • /
    • pp.47-56
    • /
    • 2019
  • Purpose - This case study illustrates the story of eBay Korea, which owns two most leading Korean open market companies, AUCTION and Gmarket. The main concerns are to take over the Korean top domestic companies one by one, then, emerge these two giants through its well-developed post-merger Integration by eBay, an American multinational corporation. Research design, data, and methodology - This case explores various secondary resources such as periodicals, annual reviews, magazine, news articles, commentaries, even some interview materials related to 'eBay Korea' and industry source on condition of anonymity based on the critical reviewing of existing studies on these topics as well. Results - The findings of this study show the merger and acquisition of two market leaders in Korea is the only successful case in Asian Markets. The eBay's choice of entry mode is appropriate considering the timing, synergy and efficiency by sharing their resources. Conclusions - This study examines the successful entry and settlement process of foreign, multinational company through mergers and acquisitions in the Korean market. This would be a valuable in the studies of International Business and Global entry or distribution strategy in the e-commerce and open market dealing with M&A and its post-merger integration.

보호용 기능성 마스크를 응용한 패션 마스크 분석 (An Analysis on the Application of Functional Mask for Protection in Fashion Mask)

  • 최정화
    • 한국의류산업학회지
    • /
    • 제15권6호
    • /
    • pp.851-861
    • /
    • 2013
  • This study analyzed the fashionable characteristics of functional fashion mask types. This study reviewed the literature on masks and analyzed fashion photos found in fashion books, fashion collections and on internet fashion sites. The results were categorized into four characteristics. Integration of structure and function showed mask designs that connected to the hood and portable items. It represented the reflection of nomadic life, liberation, obscurity and the consciousness of discomfort. Signs of playfulness showed mask hybrids and animal images, the mask hybrids and humanoid images, the printing of animal characters, body parts and unusual material hybrids. It represented the liberation from a fixed identity, the loss of seriousness, the reduction of tension and the pursuit of pleasure and freedom. The duplicity of aggression and protection showed a futuristic or aggressive helmet facemask, an enclosed mask of intensive color, and the morphological hybrid of a disgusting or aggressive motif. It represented the end of human weakness, the desire of new self-expression and the longing of superhuman power. Fanciful decoration showed masks with glittery decoration, sunglasses with luxury decoration material, a medical facemask made of lace material and fanciful printing. It showed one facet of extreme consumption, the creation of new personality and value, the pursuit of high quality and a mutual coexistence of status and anonymity.

김종성 건축에서의 기술 개념에 관한 연구 (A Study on the Idea of the Technology in Jong Soung Kimm's Architecture)

  • 정인하
    • 건축역사연구
    • /
    • 제10권2호
    • /
    • pp.85-99
    • /
    • 2001
  • Jong Soung Kim is a rare architect in Korea who has consistently done research on the idea of the architectural technology for a long time. Therefore in order to understand Kimm's architecture, it is essential to examine his idea on the technology, which reveals the complicated relationship between divers architectural discourses. It is concerned with tectonics which was the most important theoretical movements in German architecture from the nineteenth century, the Mies van der Rohe's idea of the technology which provided the most powerful basis of modern architecture, Miesians' technological discourses which was at the height of prosperity in seventies in America, and High-tech architecture in eighties. Kimm's idea on the technology is defined as follow; 1) Kimm believe that although architecture begins in construction and materiality, it must culminate in artistic form. It's legacy of German tectonics. 2) He accepts Mies' three ideas on the technology. 'Architecture is the spatially apprehended will of the epoch.' 'Technology reveals the true nature of the will of the epoch.' 'We can attain a new beauty with the help of a new technology' 3) He takes a double attitude toward the idea on the technology of Mies followers. He accepts their architectural achievement according to technological progress, but criticize their technology-oriented attitude, deprived of spiritual enrichment. 4) Kimm's idea on the technology is distinguished from that of High-tech architect. The principal criteria exist in their different attitude toward the anonymity and the ethics of technology.

  • PDF

제주도 지역 간호인력 현황 분석 (A Study on the Current Status of Nursing Personnel in Cheju Island)

  • 함은옥
    • 한국농촌간호학회지
    • /
    • 제5권1호
    • /
    • pp.25-32
    • /
    • 2010
  • Purpose: The purpose of this study was to provide a fundamental data for improving nurses' working environment and securing quality of nursing care. Method: It was consisted of analyzing education system and employment status of nursing personnel, and focus group interviews in Cheju Island. Results: Total graduates were 4,139 by 2006 from two nursing schools in Cheju. Difficulties in working conditions from focal group interviews were classified into four categories; Lack of anonymity of nurses, the burden from performing nontraditional nursing roles due to shortage of physicians, irregularity of working schedule and too many night shifts for taking care of female colleague's condition related with pregnancy, and poor support for implementing and developing professional nursing. Conclusion: A survey revealing working condition of nursing personnel of all health care institutions in Cheju Island will provide the comparison between Cheju Island and other areas. It needs to cultivate the public opinion about the importance of quality of nursing care proceeded by the broad support for improving nurses' working environment. It is essential to support continuing education to bring professional nurses and establishing the system to utilize them to overcome the shortage of physicians in Cheju Island.

Privacy Protection Method for Sensitive Weighted Edges in Social Networks

  • Gong, Weihua;Jin, Rong;Li, Yanjun;Yang, Lianghuai;Mei, Jianping
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제15권2호
    • /
    • pp.540-557
    • /
    • 2021
  • Privacy vulnerability of social networks is one of the major concerns for social science research and business analysis. Most existing studies which mainly focus on un-weighted network graph, have designed various privacy models similar to k-anonymity to prevent data disclosure of vertex attributes or relationships, but they may be suffered from serious problems of huge information loss and significant modification of key properties of the network structure. Furthermore, there still lacks further considerations of privacy protection for important sensitive edges in weighted social networks. To address this problem, this paper proposes a privacy preserving method to protect sensitive weighted edges. Firstly, the sensitive edges are differentiated from weighted edges according to the edge betweenness centrality, which evaluates the importance of entities in social network. Then, the perturbation operations are used to preserve the privacy of weighted social network by adding some pseudo-edges or modifying specific edge weights, so that the bottleneck problem of information flow can be well resolved in key area of the social network. Experimental results show that the proposed method can not only effectively preserve the sensitive edges with lower computation cost, but also maintain the stability of the network structures. Further, the capability of defending against malicious attacks to important sensitive edges has been greatly improved.