• Title/Summary/Keyword: Personal Cloud

Search Result 191, Processing Time 0.025 seconds

Legal Issues in the Introduction of Compelled Decryption According to Device Unlock Limits

  • Chohee Bae;Sojung Oh;Sohyun Joo;Jiyeon Joo;KyungLyul Lee
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.2
    • /
    • pp.591-608
    • /
    • 2023
  • With the emergence of advanced encryption technologies such as Quantum Cryptography and Full Disk Encryption, an era of strengthening information security has begun. Users respond positively to the advancement of privacy-enhancing technology, on the other hand, investigative agencies have difficulty unveiling the actual truth as they fail to decrypt devices. In particular, unlike past ciphers, encryption methods using biometric information such as fingerprints, iris, and faces have become common and have faced technical limitations in collecting digital evidence. Accordingly, normative solutions have emerged as a major issue. The United States enacted the CLOUD Act with the legal mechanism of 'Contempt of court' and in 2016, the United Kingdom substantiated the Compelled Decryption through the Investigatory Powers Act (IPA). However, it is difficult to enforce Compelled Decryption on individuals in Korea because Korean is highly sensitive to personal information. Therefore, in this paper, we sought a method of introducing a Compelled Decryption that does not contradict the people's legal sentiment through a perception survey of 95 people on the Compelled Decryption. We tried to compare and review the Budapest Convention with major overseas laws such as the United States and the United Kingdom, and to suggest a direction of legislation acceptable to the people in ways to minimize infringement of privacy. We hope that this study will be an effective legal response plan for law enforcement agencies that can normatively overcome the technical limitations of decoding.

Effects of Information Overload to Information Privacy Protective Response in Internet of Things(Iot) (사물인터넷 시대의 개인정보과잉이 정보프라이버시 보호반응에 미치는 영향)

  • So, Won-Geun;Kim, Ha-Kyun
    • Management & Information Systems Review
    • /
    • v.36 no.1
    • /
    • pp.81-94
    • /
    • 2017
  • In the age of information overload such as Internet of Things(IoT), big data, and cloud computing, Data and informations are collected to processed regardless of the individual's will. The purpose of this paper presents a model related to personal information overlord, information privacy risk, information privacy concern (collection, control, awareness) and personal information privacy protective response. The results of this study is summarized as follows. First, personal information overload significantly affects information privacy risk. Second, personal information overload significantly affects information privacy concern(collection, control, awareness) Third, information privacy risk significantly affects collection and awareness among information privacy concern, but control does not significantly affects. This results shows that users are cognitively aware the information risk through collection and awareness of information. Users can not control information by self, control of information does not affects. Last, information privacy concern(collection and awareness significantly affect information privacy protective response, but information privacy concern (control) does not affect. Personal information users are concerned about information infringement due to excessive personal information, ability to protect private information became strong.

  • PDF

Security Framework for Intelligent Predictive Surveillance Systems (지능형 예측감시 시스템을 위한 보안 프레임워크)

  • Park, Jeonghun;Park, Namje
    • Journal of the Korea Convergence Society
    • /
    • v.11 no.3
    • /
    • pp.77-83
    • /
    • 2020
  • Recently, intelligent predictive surveillance system has emerged. It is a system that can probabilistically predict the future situation and event based on the existing data beyond the scope of the current object or object motion and situation recognition. Since such intelligent predictive monitoring system has a high possibility of handling personal information, security consideration is essential for protecting personal information. The existing video surveillance framework has limitations in terms of privacy. In this paper, we proposed a security framework for intelligent predictive surveillance system. In the proposed method, detailed components for each unit are specified by dividing them into terminals, transmission, monitoring, and monitoring layers. In particular, it supports active personal information protection in the video surveillance process by supporting detailed access control and de-identification.

Designing Coherent User Interfaces of N-Screen Services Reflecting Users' Task Knowledge

  • Park, Hwan-Su;Lee, Dong-Seok
    • Journal of the Ergonomics Society of Korea
    • /
    • v.31 no.1
    • /
    • pp.41-48
    • /
    • 2012
  • Objective: Companies want to expand their business by providing their services at other devices and new services based upon existing services. Therefore, they look for building brand identity by providing same experience throughout devices and services. Background: Many services are available to use at multiple devices including mobile phones, tablet, personal computers, and televisions, thanks to proliferation of n-screen and cloud technology. Method: It was discussed that consistency, which emphasizes the regularity and has been one of essential aspects of user interface design, seems not effective to be applied to n-screen services, owing to different screen size, input and output peripherals, usage environment and users' attitude. Results: A new definition of same experience among different devices and services, called coherence, was introduced and abstraction levels of user interfaces were proposed as the denominator of defining coherence. Then types of users' task knowledge at each abstraction level were discussed with examples. Conclusion: This paper concluded by discussing design requirements for designing coherent user interfaces among devices and services.

Low-Power Encryption Algorithm Block Cipher in JavaScript

  • Seo, Hwajeong;Kim, Howon
    • Journal of information and communication convergence engineering
    • /
    • v.12 no.4
    • /
    • pp.252-256
    • /
    • 2014
  • Traditional block cipher Advanced Encryption Standard (AES) is widely used in the field of network security, but it has high overhead on each operation. In the 15th international workshop on information security applications, a novel lightweight and low-power encryption algorithm named low-power encryption algorithm (LEA) was released. This algorithm has certain useful features for hardware and software implementations, that is, simple addition, rotation, exclusive-or (ARX) operations, non-Substitute-BOX architecture, and 32-bit word size. In this study, we further improve the LEA encryptions for cloud computing. The Web-based implementations include JavaScript and assembly codes. Unlike normal implementation, JavaScript does not support unsigned integer and rotation operations; therefore, we present several techniques for resolving this issue. Furthermore, the proposed method yields a speed-optimized result and shows high performance enhancements. Each implementation is tested using various Web browsers, such as Google Chrome, Internet Explorer, and Mozilla Firefox, and on various devices including personal computers and mobile devices. These results extend the use of LEA encryption to any circumstance.

Multi-dimensional Trust Building Process to Explain Customer Satisfaction on e-Commerce

  • Choi, Jae-Won;Sohn, Chang-Soo;Lee, Hong-Joo
    • 한국경영정보학회:학술대회논문집
    • /
    • 2007.11a
    • /
    • pp.571-576
    • /
    • 2007
  • Advanced online environment and communication technology have made the e-commerce environments evolved rapidly. In the e-commerce area, one of the most important concepts regarding the relationship between seller and buyer is the "trust." Considering the purpose of purchase and satisfaction of website, the users may face problems such as consumer's transaction security or personal information sharing when they make transactions over web sites. It could be difficult to pursue the goal for the users to purchase product or service over online if the seller or service provider cannot establish trust to the customers. In this paper, through multi-dimensional viewpoints of trust, satisfaction can be accounted for by cue-based trust and experienced trust. The purchase intention mediates the experienced trust when online users purchase products or use online service.

  • PDF

A Personalized Movie Recommendation System using Collaborative Filtering and Personal Sentiment in Cloud Computing Service (클라우드 컴퓨팅에서 협업 필터링과 개인의 감정을 이용한 개인화 영화 추천 시스템)

  • Sim, Dae-Soo;Kim, Min-Ki;Park, Doo-Soon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2016.10a
    • /
    • pp.393-396
    • /
    • 2016
  • 정보화 시대에 들어오며 수많은 정보들의 폭발적인 증가로 인해 사용자들은 원하는 정보를 빠른 시간에 얻는 것이 어려워졌다. 그중 영화는 수없이 많은 정보를 누적해왔고 개인에 따라 선호하는 영화가 서로 다르기 때문에 각 개인에 맞는 영화를 찾는 것은 쉽지 않다. 본 논문에서는 협업 필터링과 개인의 감정을 이용하고 AWS(Amazon Web Service)를 통한 클라우드 컴퓨팅 시스템을 사용하여 각 개인에 더 적합한 영화 추천 시스템을 제안 한다.

A Personalized Novel Recommendation System based on Collaborative Filtering and Personal Propensity in Cloud Computing Environment (클라우드 컴퓨팅 환경에서 협업필터링과 개인 성향을 이용한 개인화 소설 추천 시스템)

  • Jang, Tae-Hoon;Kim, Han-Yi;Park, Doo-Soon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2016.10a
    • /
    • pp.406-407
    • /
    • 2016
  • 최근 바쁜 일상 속에서 개인의 삶의 질과 활력을 높이기 위해 여가활동에 대한 관심이 증가하고 있고 그 중에서 독서는 꾸준한 사랑을 받고 있는 여가 활동이다. 그 중 소설의 출판량은 다른 타 장르에 비해 가히 압도적이다. 하지만 소설은 개인의 취향에 영향을 많이 받는다는 특징이 있어 사용자에게 적합한 소설을 추천하기란 기존의 시스템으로는 한계가 있다. 따라서 본 논문에서는 클라우드 컴퓨팅 시스템인 AWS(Amazon Web Service)를 이용하며 사용자의 개인 성향과 협업 필터링 방법을 이용하여 각각의 개인 성향에 적합한 소설을 추천하는 시스템을 제안한다.

Design and Implementation of Cloud Computing Storage System using the Personal Computer (개인 컴퓨터를 활용한 클라우드 스토리지 시스템의 설계 및 구현)

  • Kim, Chul-Hun;Shin, Jung-Hoon;Lee, Sang-Jun
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2011.06c
    • /
    • pp.53-55
    • /
    • 2011
  • 웹의 미래라고 주목받아 온 클라우드 컴퓨팅은 IT 트랜드의 하나로 IT 기업뿐만 아니라 일반기업까지 많은 관심을 받고 있다. 클라우드 컴퓨팅 서비스의 한 분야인 클라우드 스토리지 서비스는 가장 큰 관심을 받고 있는 분야 중 하나이다. 클라우드 스토리지 서비스는 파일을 스토리지 공간에 저장한 뒤 인터넷이 연결되는 컴퓨터 혹은 모바일기기를 사용하여 원하는 자신의 파일에 접근해 내용을 읽거나 그 자리에서 편집할 수 있는 기능을 가진다. 현재 시중에 제공되는 클라우드 스토리지 서비스는 5GB~20GB 정도의 한정된 저장 공간을 무료로 제공하지만, 추가적인 서비스를 받기 위해서는 비용을 지급해야 한다. 이런 한정된 저장 공간과 서비스 비용을 극복하고자 개인 PC를 활용하여 무한정에 가까운 저장 공간을 확보할 수 있고 무료로 사용할 수 있는 개인용클라우드 스토리지 시스템을 제안한다.

A Development of Android based Personal Cloud System (안드로이드 기반의 개인 클라우드 시스템 개발)

  • Kim, Sung-Hee;Han, Sang-Wook;Lee, HwaMin
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2015.04a
    • /
    • pp.297-299
    • /
    • 2015
  • 스마트폰의 기능이 점차 발전함에 따라 스마트폰으로 할 수 있는 일들이 많아지고 있다. 하지만 스마트폰에는 용량이 제한적이기 때문에 한정된 용량의 데이터를 저장할 수밖에 없다. 이러한 문제점을 보완하기 위해 대형포털사이트나 전문 스토리지 서비스 기업에서 클라우드 서비스를 시행하고 있지만 개인사용자 입장에서 클라우드 서비스는 적은 용량, 별도의 요금, 업로드의 불편함 등의 문제점을 가지고 있다. 본 논문에서는 이 세 가지 문제점을 사용자의 PC를 활용함으로써 보완하여 스마트폰의 용량의 제한을 줄여줄 안드로이드 기반의 개인 클라우드 어플리케이션 시스템을 설계하고 구현한다.