• Title/Summary/Keyword: Personal Data Protection

Search Result 466, Processing Time 0.032 seconds

Secure Distributed Data Management Architecture for Consumer Protection of Smart Grid (스마트 그리드의 소비자 보호를 위한 안전한 분산 데이터 관리 구조)

  • Park, Nam-Je;Song, You-Jin;Park, Kwang-Yong
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.9
    • /
    • pp.57-67
    • /
    • 2010
  • Smart grid technology can expand energy efficiency into the home by monitoring consumer energy usage in real time and communicating with household devices that respond to demands to shut off during periods of non-use, allowing individual consumers to control their electricity usage more effectively. But, the information collected on a smart grid will form a library of personal information, the mishandling of which could be highly invasive of consumer privacy. There will be major concerns if consumer-focused principles of transparency and control are not treated as essential design principles from beginning to end. In this paper, using. All-Or-Nothing Transform encryption mode for providing smart grid security, we propose efficient distributed data Management based on XOR operation. The contribution of this paper is to provide a secure algorithm that manages efficiently distributed data in the field of private data in smart grid environment.

Hilbert-curve based Multi-dimensional Indexing Key Generation Scheme and Query Processing Algorithm for Encrypted Databases (암호화 데이터를 위한 힐버트 커브 기반 다차원 색인 키 생성 및 질의처리 알고리즘)

  • Kim, Taehoon;Jang, Miyoung;Chang, Jae-Woo
    • Journal of Korea Multimedia Society
    • /
    • v.17 no.10
    • /
    • pp.1182-1188
    • /
    • 2014
  • Recently, the research on database outsourcing has been actively done with the popularity of cloud computing. However, because users' data may contain sensitive personal information, such as health, financial and location information, the data encryption methods have attracted much interest. Existing data encryption schemes process a query without decrypting the encrypted databases in order to support user privacy protection. On the other hand, to efficiently handle the large amount of data in cloud computing, it is necessary to study the distributed index structure. However, existing index structure and query processing algorithms have a limitation that they only consider single-column query processing. In this paper, we propose a grid-based multi column indexing scheme and an encrypted query processing algorithm. In order to support multi-column query processing, the multi-dimensional index keys are generated by using a space decomposition method, i.e. grid index. To support encrypted query processing over encrypted data, we adopt the Hilbert curve when generating a index key. Finally, we prove that the proposed scheme is more efficient than existing scheme for processing the exact and range query.

Application Method of Information Technology for Local Culture Sharing and Environmental Protection (지역문화 공유 및 환경보호를 위한 정보기술 적용 방안)

  • Kim, Ho Jin;Kim, Chang Soo;Jung, Gun Ju;Kim, Jin Soo;Kim, Tae Gyu
    • Journal of the Society of Disaster Information
    • /
    • v.16 no.2
    • /
    • pp.364-373
    • /
    • 2020
  • Purpose: Each local government has a variety of cultural spaces. However, users do not know exactly about cultural information or location. Therefore, information technology application methods are needed to effectively communicate the necessary information to local residents as well as to outsiders. In this paper, we studied the voluntary production of information for the sharing of local culture, and the methods for protecting the environment of the users themselves. Method: For this, information technology such as QR code, big data analysis, and interactive homepage based on SNS was used. Result: As a result, we derived a method of community creation by users, and the personal information protection from such activities. Conclusion: This research will contribute to the development of local culture by encouraging users to understand the local culture more and to participate in autonomous environmental improvement.

Reversible Watermarking For Relational Databases using DE (Difference Expansion) Algorithm (DE 알고리즘을 사용한 관계형 데이터베이스를 위한 가역 워터마킹)

  • Kim, Cheonshik
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.3
    • /
    • pp.7-13
    • /
    • 2015
  • Generally, watermarking can be used copyright for contents such as audios, videos, images, and texts. With the development of Internet, many malicious attackers illegally copy relational databases synchronized applications Therefore, it is needed for the protection of databases copyright, because databases involve various sensitive information such as personal information, information industry, and secret national intelligence. Thus, the protection of relational databases is a major research field in the databases research topics. In this paper, we will review previous researches related the protection of relational databases and propose new method for relational data. Especially, we propose watermarking scheme for databases using reversible method in this paper. As an experimental result, the proposed scheme is very strong to malicious attacks. In addition, we proved our proposed scheme is to apply real application.

Appropriate Technology, Responding to the COVID-19 Pandemic - Redefined Roles in a Public Health Crisis (Part I) (COVID-19 대유행에 대응하는 적정기술 : 보건 위기에서 재정의된 역할 - 파트 1)

  • Lee, Sungwoo;Suh, Jungwoo;Kim, Jaeeun;Jang, Dongyoon;Pyun, Nayoon;Shin, Kwanwoo
    • Journal of Appropriate Technology
    • /
    • v.6 no.2
    • /
    • pp.238-255
    • /
    • 2020
  • As COVID-19, which occurred at the end of 2019, has become a global pandemic, it has emerged as an unprecedented event that quickly destroys a nation's medical and healthcare system in both developed and developing countries. In the 21st century, most of the civil society that aimed for hyperconnected society is facing a new crisis that has not been experienced so far. Indeed, lack of personal protective equipment, isolation of clustered communities, disruption of medical systems necessary for diagnosis and treatment, and disruption of educational and economic activities due to social isolation are emerging. Since the COVID-19 has occurred, many of the difficulties that have occurred in the past six months indicate the basic infrastructure a society should have particularly in a pandemic. These include personal protective equipment (PPE), decontamination and quarantine tools essential for effective response, rapid and precise large-scale diagnosis, medical devices required for patient care, and identification and fast and wide on-line networks that can be used in social isolation. In this first part, we would like to introduce some representative examples of 1) personal protective equipment, 2) prevention of personal and community health, 3) social response through big data and networks within the framework of appropriate technology.

Intellectual Property Rights Analysis of 3D Avatars for Ubiquitous Fashion Business (유비쿼터스 패션 비즈니스를 위한 3차원 Avatar의 지적재산권 분석)

  • Park, Ha-Jin;Chang, Sue-Hyun;Park, Chang-Kyu
    • Journal of Fashion Business
    • /
    • v.13 no.4
    • /
    • pp.37-50
    • /
    • 2009
  • Recently, as individual 3D avatars are rapidly generalized in internet sites, its commercial applications for fashion business are being tried in ubiquitous fashion shopping era. In this research, we have investigated and analyzed patent problems of 3D avatar including personal body data to activate the fashion business using 3D avatars. Here, considering the patents for 3D face and body generation methods are already published, this research is focused on whole 3D body avatar obtained from individual body information. Firstly, definition of 3D avatar and its application cases have been investigated and then it has been researched whether or not legal protections by patent law, copyright law, computer program protection law, design protection law and fair competition laws are feasible in view of the subjects to be protected in each law and requirements for such protections. It was revealed that patent law may provide legal protections for 3D avatar and domestic and foreign patents related to 3D avatar have been researched.

Effect of a restaurant hygienic grade certificate program on consumer choices

  • Kim, Jae-il;Choi, Jinkyung
    • Nutrition Research and Practice
    • /
    • v.15 no.sup1
    • /
    • pp.70-78
    • /
    • 2021
  • BACKGROUND/OBJECTIVES: The recent coronavirus disease 2019 pandemic has brought to light issues regarding personal and environmental cleanliness. Individuals may have concerns about cleanliness at food service establishments when they consume food prepared at a restaurant. In Korea, a new restaurant hygienic certificate system was implemented in 2017. The effect of this new system has not been evaluated. SUBJECTS/METHODS: This study investigated consumers' perceptions of these new certificates using the protection motivation theory (PMT). An online survey was conducted to collect data and then exploratory factor analysis, analysis of variance, and multiple regression tests were run. RESULTS: The results of this study indicate that 3 different certificates had significant differences in threat (P < 0.001) and benefit (P < 0.001) perception. However, experience with a foodborne illness from a restaurant did not effect on the PMT variables. In addition, the 3-tier certificate did not motivate consumers to protect themselves against foodborne illnesses, while previous experiences of foodborne illness (P < 0.05), coping (P < 0.001), and benefits (P < 0.01) affected this protection motivation. CONCLUSIONS: This study suggests that consumers were not influenced by different certificate levels regarding their motivation to protect themselves from foodborne illnesses. Therefore, an improved plan should be initiated to clarify the meaning of these certificates. The results of this study can help the application and development of a new system for future adaptations.

Legal Regulation Of Digital Rights In Ukraine

  • Bilenko, Marianna;Ilchenko, Hanna;Herych, Anatolii;Solodka, Olena;Podolyak, Svitlana
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.9
    • /
    • pp.59-62
    • /
    • 2022
  • In the scientific research, the object of research is a complex of legal relations, which are formed by the use of modern digital technologies. The subject of this work is the novelties of Ukrainian and foreign legislation, norms of international law aimed at regulating social relations in the field of digital rights, as well as doctrinal provisions and materials of law enforcement practice. Within the framework of this work, two types of digital rights are distinguished, those that exist in the law of Ukraine, and the issues of law that apply to legal relations, regarding the turnover of each of them, are considered. Examples of law applied in foreign countries are given for comparison. On the basis of a comprehensive study of the legal framework and positions of scientists, the prospects for the development of legal regulation of digital rights were noted.

Design and Analysis of Data File Protection based on the Stream Cipher (데이터파일의 보호를 위한 스트림 암호방식 설계와 해석)

  • 이경원;이중한;김정호;오창석
    • The Journal of the Korea Contents Association
    • /
    • v.4 no.1
    • /
    • pp.55-66
    • /
    • 2004
  • Recently, as the personal computers are supplied rapidly, they formed the nucleus of the computer system. But, because of the easiness that anyone uses them to go near easily, it is the fact that the security of personal computer is weakness. So, in the paper, 1 propose the technical method that minimizes the loss and leakage of important data. This paper implemented a crypto system for security of data file on personal computer and assistance storage medium. The way of encryption/decryption is applied by complexity method which mixed Diffie-Hellman key exchange protocol, a typical RC4(Rivest Cipher version 4) algorithm of stream cipher and a typical MD5(Message Digest version 5) of Hash Function. For valuation implemented crypto system, three criteria is presented, which are crypto complexity, processing time and pattern matching. And according to analysis the three criteria the crypto system is verified the security, efficiency and usefulness. The crypto system is programmed with Visual C++ language of Microsoft. And so, as this is software system, we shall have a technical security system at a minimum cost for all personal computer.

  • PDF

Detection of High Impedance Fault Using Adaptive Neuro-Fuzzy Inference System (적응 뉴로 퍼지 추론 시스템을 이용한 고임피던스 고장검출)

  • 유창완
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.9 no.4
    • /
    • pp.426-435
    • /
    • 1999
  • A high impedance fault(HIF) is one of the serious problems facing the electric utility industry today. Because of the high impedance of a downed conductor under some conditions these faults are not easily detected by over-current based protection devices and can cause fires and personal hazard. In this paper a new method for detection of HIF which uses adaptive neuro-fuzzy inference system (ANFIS) is proposed. Since arcing fault current shows different changes during high and low voltage portion of conductor voltage waveform we firstly divided one cycle of fault current into equal spanned four data windows according to the mangnitude of conductor voltage. Fast fourier transform(FFT) is applied to each data window and the frequency spectrum of current waveform are chosen asinputs of ANFIS after input selection method is preprocessed. Using staged fault and normal data ANFIS is trained to discriminate between normal and HIF status by hybrid learning algorithm. This algorithm adapted gradient descent and least square method and shows rapid convergence speed and improved convergence error. The proposed method represent good performance when applied to staged fault data and HIFLL(high impedance like load)such as arc-welder.

  • PDF