• 제목/요약/키워드: Personal Information Management System

Search Result 757, Processing Time 0.029 seconds

A Study on IAM-Based Personal Data Protection Techniques in BaaS (BaaS에서 IAM을 이용한 개인정보 보호 기법에 관한 연구)

  • Mi-Hui Kim;Myung-Joe Kang
    • Journal of IKEEE
    • /
    • v.27 no.4
    • /
    • pp.548-555
    • /
    • 2023
  • With the advancement of the internet, the use of personal information in online interactions has increased, underscoring the significance of data protection. Breaches of personal data due to unauthorized access can result in psychological and financial damage to individuals, and may even enable wide-ranging societal attacks aimed at those associated with the victims. In response to such threats, there is active research into security measures using blockchain to safeguard personal information. This study proposes a system that uses middleware and IAM (Identity and Access Management) services to protect personal information in a BaaS (Blockchain as a Service) environment where blockchain is provided via the Internet. The middleware operates on servers where IAM roles and policies are applied, authenticates users, and performs access control to allow only legitimate users to access blockchain data existing in the cloud. Additionally, to understand the impact of the proposed personal information protection method on the system, we measure the response time according to the time taken and the number of users under three assumed scenarios, and compare the proposed method and research related to personal information protection using blockchain in terms of security characteristics such as idea, type of blockchain, authentication, and confidentiality.

The Improvement Plan for Indicator System of Personal Information Management Level Diagnosis in the Era of the 4th Industrial Revolution: Focusing on Application of Personal Information Protection Standards linked to specific IT technologies (제4차 산업시대의 개인정보 관리수준 진단지표체계 개선방안: 특정 IT기술연계 개인정보보호기준 적용을 중심으로)

  • Shin, Young-Jin
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.12
    • /
    • pp.1-13
    • /
    • 2021
  • This study tried to suggest ways to improve the indicator system to strengthen the personal information protection. For this purpose, the components of indicator system are derived through domestic and foreign literature, and it was selected as main the diagnostic indicators through FGI/Delphi analysis for personal information protection experts and a survey for personal information protection officers of public institutions. As like this, this study was intended to derive an inspection standard that can be reflected as a separate index system for personal information protection, by classifying the specific IT technologies of the 4th industrial revolution, such as big data, cloud, Internet of Things, and artificial intelligence. As a result, from the planning and design stage of specific technologies, the check items for applying the PbD principle, pseudonymous information processing and de-identification measures were selected as 2 common indicators. And the checklists were consisted 2 items related Big data, 5 items related Cloud service, 5 items related IoT, and 4 items related AI. Accordingly, this study expects to be an institutional device to respond to new technological changes for the continuous development of the personal information management level diagnosis system in the future.

Effective Management of Personal Information & Information Security Management System(ISMS-P) Authentication systems (정보보호 및 개인정보보호 관리체계(ISMS-P) 인증제도의 효과적인 운영방안)

  • Hong, Sung Wook;Park, Jae-Pyo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.1
    • /
    • pp.634-640
    • /
    • 2020
  • The information security management system (ISMS) and the personal information management system (PIMS) have been integrated into a personal information & information security management system (ISMS-P) certification scheme in response to requests to reduce the time and cost to prepare certification schemes. Integration of the certification system has made it possible for the system operator to gain the advantage of easy management of the ISMS-P certification system, and the certification target organization can enjoy the advantage of easy acquisition and maintenance of certification. However, ambiguity in the application criteria of the target organization, and ambiguity in the certification criteria control items require the target organization to operate an excessive management system, and the legal basis to be applied to the certification target organization is ambiguous. In order to improve these problems, this paper uses case studies to identify the types of certification bodies that apply the certification criteria, and to change the control items applied during certification audits based on the types of certification bodies. Institutions that wish to obtain only ISMS certification have proposed three solutions, excluding controls covered by the ISMS-P. This paper suggests ways to operate an efficient certification system, and can be used as a basis for improving problems in the ISMS-P certification system.

Traceability Enhancement Technique for Dependency Relations of Software Artifacts based on the Integration of Software Configuration Management System and Personal Workspace (소프트웨어 형상관리 시스템과 개인 작업공간 통합 기반 산출물 의존 관계 추적성 개선 기법)

  • Kim, Dae-Yeob;Youn, Cheong
    • The KIPS Transactions:PartD
    • /
    • v.18D no.6
    • /
    • pp.451-460
    • /
    • 2011
  • The ability to trace change history and dependency relations of software artifacts which are continuously changed has been recognized as an important factor that support quality management activities such as verification, validation, and testing in software system development process. General software configuration management systems provide tracing information for artifacts only within the configuration management system, and it does not go further to changes that occur within personal workspace. This paper provides a solution that helps tracing down not only changes of configuration items but also change history of artifacts existent in personal workspace through the integration of configuration management system and personal workspace. Furthermore, in cases of artifacts which are included in a configuration item, this paper provides a solution that support tracing dependency relations between the artifacts by identifying their version links. For the integration of configuration management system and personal workspace, a revision of configuration item is connected to the artifact's version of the workspace by the tagging mechanism, and traceability for change history and dependency relations of artifacts can be managed more effectively through integrated change process.

A Design of Electronic Health Records Partial Encryption Method for Protecting Patient's Information on the U-Healthcare Environment (U-Healthcare 환경에서 환자정보보호를 위한 전자차트 부분 암호화 기법 설계)

  • Shin, Seon Hee;Kim, Hyun Chul;Park, Chan Kil;Jeon, Moon Seog
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.6 no.3
    • /
    • pp.91-101
    • /
    • 2010
  • By using the U-Healthcare environment, it is possible to receive the health care services anywhere anytime. However, since the user's personal information can be easily exposed in the U-Healthcare environment, it is necessary to strengthen the security system. This thesis proposes the technique which can be used to protect the personal medical records at hospital safely, in order to avoid the exposure of the user's personal information which can occur due to the frequent usage of the electronic chart according to the computerization process of medical records. In the proposed system, the following two strategies are used: i) In order to reduce the amount of the system load, it is necessary to apply the partial encryption process for electronic charts. ii) Regarding the user's authentication process for each patient, the authentication number for each electronic chart, which is in the encrypted form, is transmitted through the patient's mobile device by the National Health Insurance Corporation, when the patient register his or her application at hospital. Regarding the modern health care services, it is important to protect the user's personal information. The proposed technique will be an important method of protecting the user's information.

An Extended Product Data Management System Supporting Personal Manufacturing Based on Connected Consumer 3D Printing Services (3D 프린팅 서비스 기반 개인제조를 지원하는 확장 제품자료관리 시스템)

  • Do, Namchul
    • Korean Journal of Computational Design and Engineering
    • /
    • v.21 no.3
    • /
    • pp.215-223
    • /
    • 2016
  • The low price around 1000 USD makes consumer 3D printers as a new additive manufacturing platform for the personal manufacturing where consumers can make and sell their own products. To allow the consumers to design and manufacture their products, not only economic 3D printers but also supporting information systems for their design and manufacturing are essential. This study suggests an extended product data management (PDM) system that can support both the design and manufacturing of personal products with consumer 3D printing services. This extended PDM system helps consumer designers use advanced PDM technologies for their design and connected 3D printing services with Internet of Things (IoT) technology for realization of their products. As a result, the proposed system supports the consumer designers a seamless integrated product development and manufacturing environment supported by PDM and consumer 3D printing services.

A Conceptual Understanding of the PDL in Knowledge-based Society (지식기반사회에서 PDL의 등장과 개념적 이해)

  • 김경곤
    • Journal of Korean Library and Information Science Society
    • /
    • v.33 no.3
    • /
    • pp.193-214
    • /
    • 2002
  • This study examines the background of the PDL(Personal Digital Library) as well as a conceptual understanding of the PDL in knowledge-based society. Recent case studies are also included. The chief concepts of the PDL are Systems(Digital Library, Knowledge Management System, Internet Portal Site), Models of knowledge, and personalization. The findings in this study are as follows. \circled1 We must find the meaning in the change of a society environment in which the personalization happens. \circled2 The contents must not be restricted. \circled3 The system is to satisfy requirements of the individual. \circled4 The GNU General Public License is a system development method for the PDL.

  • PDF

A Linkage Analysis of ISMS-P and GDPR; Focused on Personal Information Protection (ISMS-P와 GDPR의 개인정보보호 부문 연계 분석)

  • Park, Minjung;Yu, Jieun;Chai, Sangmi
    • Journal of Information Technology Services
    • /
    • v.18 no.2
    • /
    • pp.55-73
    • /
    • 2019
  • The importance of the personal information has been increased, there have been a lot of efforts to establish a new policy, certification or law for administrating personal information more effectively and safely. Korean government has operated ISMS and PIMS certification system to assess whether an organization has established and managed appropriate information security system or not. However, it has been addressed the needs for revising and modifying of PIMS and ISMS. It is evaluated there are a few overlapped criteria to assess information management system in both ISMS and PIMS. ISMS-P certification, combining with ISMS and PIMS, is, finally, suggested, in the recent. GDPR is established having an aim of primarily to give control to individuals over their personal data and to simplify the regulatory environment for international business by unifying the regulation within the EU. This study compares GDPR and ISMS-P, focusing on "personal information". It can be expected to contribute as followings. This study can be a criterion for self-evaluation of possibility to violate of GDPR of a firm in preparation for ISMS-P. Second, this study also aims to increase the understanding of the role of ISMS-P and GDPR, among various certifications with the purpose of assessment of the information security management system, by reducing the costs required to obtain the unnecessary certification and alleviating the burden. Third, it contributes to diffusion of ISMS-P newly implemented in Korea.

Opportunities for construction site monitoring by adopting first personal view (FPV) of a drone

  • Kim, Seungho;Kim, Sangyong
    • Smart Structures and Systems
    • /
    • v.21 no.2
    • /
    • pp.139-149
    • /
    • 2018
  • Understanding the current status of a construction project is necessary to achieve successful on-site management. Real-time information delivery is a major concern for construction industry practitioners in order to expedite decisions and discussions. We propose the use of a first personal view (FPV) system of a quadcopter drone as a tool for monitoring on-site status and communicating between construction participants. The most important function of the drone FPV system is its ability to visually monitor construction site situations in real time. An on-site management system process is developed, verified, and applied to several construction work tasks after determining factors that affect efficient construction management. The proposed system is expected to assist the construction manager in achieving high efficiency.

The Development of Merchant-PIMS Integrated CMS Based on Distributed Content (분산 콘텐츠 기반의 머천트-개인정보 통합콘텐츠관리시스템 개발)

  • Shin Dong-Suk
    • The Journal of the Korea Contents Association
    • /
    • v.6 no.5
    • /
    • pp.113-121
    • /
    • 2006
  • As Internet evolves, web sites are becoming more and more complex, and it costs a lot of time and money to update web sites. The explosive growth of a large amount of content has resulted in an excessive server load and high network traffic, and thus it decreases the quality of service. In this research, we designed and implemented an integrated content management system which can be constructed and managed the content easily, and which is combined a merchant system with a personal information system based on the distributed content gathering and searching in order to optimize the utilization of the content itself.

  • PDF