• Title/Summary/Keyword: Personal Information Sharing

Search Result 250, Processing Time 0.03 seconds

Multifactor Authentication Using a QR Code and a One-Time Password

  • Malik, Jyoti;Girdhar, Dhiraj;Dahiya, Ratna;Sainarayanan, G.
    • Journal of Information Processing Systems
    • /
    • v.10 no.3
    • /
    • pp.483-490
    • /
    • 2014
  • In today's world, communication, the sharing of information, and money transactions are all possible to conduct via the Internet, but it is important that it these things are done by the actual person. It is possible via several means that an intruder can access user information. As such, several precautionary measures have to be taken to avoid such instances. The purpose of this paper is to introduce the idea of a one-time password (OTP), which makes unauthorized access difficult for unauthorized users. A OTP can be implemented using smart cards, time-based tokens, and short message service, but hardware based methodologies require maintenance costs and can be misplaced Therefore, the quick response code technique and personal assurance message has been added along with the OTP authentication.

A Study on the Effect of Blockchain on Personal Information Protection

  • Kim, Seong-Kyu (Steve)
    • Journal of Multimedia Information System
    • /
    • v.6 no.3
    • /
    • pp.125-130
    • /
    • 2019
  • In this paper, Blockchain is mentioned as the next-generation core IT technology. As an immature technology, there are not many practical use cases, but it is expected to be widely applied in various industries such as cryptocurrency, finance, public, etc. to increase efficiency and enable new services that did not exist in the past. Nevertheless, the generalization of blockchain technology is still difficult. In particular, from the viewpoint of personal information protection, GDPR of Europe, etc., is becoming stronger. Considering that the core of the blockchain is the change of information sharing and processing method, it is very important how the blockchain can affect, especially from the viewpoint of privacy, and how the Privacy Act can be applied to the blockchain. However, the discussion on this part also seems to be insufficient. Therefore, in this paper, blockchain By analyzing the implications and implications of technologies and services using them from the perspective of the Privacy Act, we will discuss how the blockchain will be used to prevent leakage of privacy.

A Secure Social Networking Site based on OAuth Implementation

  • Brian, Otieno Mark;Rhee, Kyung-Hyune
    • Journal of Korea Multimedia Society
    • /
    • v.19 no.2
    • /
    • pp.308-315
    • /
    • 2016
  • With the advancement in the area of cloud storage services as well as a tremendous growth of social networking sites, permission for one web service to act on the behalf of another has become increasingly vital as social Internet services such as blogs, photo sharing, and social networks. With this increased cross-site media sharing, there is a upscale of security implications and hence the need to formulate security protocols and considerations. Recently, OAuth, a new protocol for establishing identity management standards across services, is provided as an alternative way to share the user names and passwords, and expose personal information to attacks against on-line data and identities. Moreover, OwnCloud provides an enterprise file synchronizing and sharing that is hosted on user's data center, on user's servers, using user's storage. We propose a secure Social Networking Site (SSN) access based on OAuth implementation by combining two novel concepts of OAuth and OwnCloud. Security analysis and performance evaluation are given to validate the proposed scheme.

Utilizing Block chain in the Internet of Things for an Effective Security Sharing Scheme

  • Sathish C;Yesubai Rubavathi, C
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.6
    • /
    • pp.1600-1619
    • /
    • 2023
  • Organizations and other institutions have recently started using cloud service providers to store and share information in light of the Internet of Things (IoT). The major issues with this storage are preventing unauthorized access and data theft from outside parties. The Block chain based Security Sharing scheme with Data Access Control (BSSDAC) was implemented to improve access control and secure data transaction operations. The goal of this research is to strengthen Data Access Control (DAC) and security in IoT applications. To improve the security of personal data, cypher text-Policy Attribute-Based Encryption (CP-ABE) can be developed. The Aquila Optimization Algorithm (AOA) generates keys in the CP-ABE. DAC based on a block chain can be created to maintain the owner's security. The block chain based CP-ABE was developed to maintain secures data storage to sharing. With block chain technology, the data owner is enhancing data security and access management. Finally, a block chain-based solution can be used to secure data and restrict who has access to it. Performance of the suggested method is evaluated after it has been implemented in MATLAB. To compare the proposed method with current practices, Rivest-Shamir-Adleman (RSA) and Elliptic Curve Cryptography (ECC) are both used.

Multiuser Detection of Electric Scooter Using Tilt and Pressure Sensors (기울기 센서와 압력 센서를 이용한 전동 킥보드용 다인승 감지 방안)

  • Moonjeong Ahn;Jia Kim;Jihoon Lee
    • Journal of the Semiconductor & Display Technology
    • /
    • v.23 no.2
    • /
    • pp.28-32
    • /
    • 2024
  • The personal mobility Sharing service is currently active. Especially, electric scooters are widely utilized because they can move comfortably at a high speed over a short distance with a simple driving method. Its driving method is easy, but there is no protection device to protect the bare body. So, there is a greater accident than other means of transportation, and if two people are on board, there is higher accident probability. However, since there is no specific ways to prevent multi-person boarding yet, we propose a multi-person boarding detection model using tilt and pressure sensor. The proposed method measures the tilt degree and direction by using a tilt sensor installed in the center of the board plate and detects multi-people riding.

  • PDF

A Reasonable Model in the Industry Organization of Personal Computer (개인형 컴퓨터 산업구조의 바람직한 모형에 관한 연구)

  • 조석환
    • The Journal of Information Technology
    • /
    • v.2 no.2
    • /
    • pp.23-34
    • /
    • 1999
  • The computer industry has come to the generation of personal computer. The organization of the existing industry has the distinct boundary among companies in vertically integrated companies, produce whole assembled system, and compete in the part of hardware, operating system, and its related software based on theirselves design. Then according to keep the distinct monopolized architecture of industry, the enterprises only centralized on developing the monopolistic market and sharing the static market rather than competition and compatibility with other system. The horizontal distribution in small part industry is occurring, by the times of personal computer, and the companies of personal computer have coming into free competition with parts standardization and the open architecture of system. This paper suggests a reasonable model of industry under horizontal structure with analyzing the above phenomenon.

  • PDF

The Effect of Information Quality and Self-efficacy on Car-sharing Usage Intention (정보품질과 자기효능감이 카셰어링 재이용의도에 미치는 영향)

  • Liu, Bo;Byun, Sookeun
    • Journal of Service Research and Studies
    • /
    • v.13 no.3
    • /
    • pp.20-38
    • /
    • 2023
  • Recently, car sharing has shown the most remarkable growth among sharing economy services. In the process of analyzing the intention to reuse the car sharing service, this study tried to reflect the unique characteristics of the service, which consists of non-face-to-face self-service, such as reservation, approval, handover, inspection, and return of the vehicle. Specifically, in addition to the perceived benefits and the perceived risks, we considered 'information quality' as a platform characteristic and 'self-efficacy' as a personal characteristic. To collect data, an online survey was conducted on adults with experience in car sharing, and a total of 320 responses were used for analysis. As a result of analyzing the structural equation model, it was found that information quality and self-efficacy increased the perceived benefits of services, and the higher the information quality, the higher the self-efficacy. On the other hand, the role of information quality and self-efficacy in lowering perceived risks was insignificant, and the intention to reuse services was more affected by perceived benefits than perceived risks. As a result of further analysis using Process Macro, it was found that the effect of self-efficacy on reuse intention was mediated by perceived benefits. It was analyzed that the indirect effects of information quality on reuse intention through perceived benefits or self-efficacy were all significant. These results suggest that providing timely, sufficient, and easy-to-understand information required by users on the platform improves self-efficacy and increases service reuse intention. In order to increase the number of service users, it is important for service providers not only to provide promotional activities such as offering attractive prices, but also to provide high-quality information so that users can use it more easily.

Sharing a clipboard between a personal computer and a smartphone for data transfer (PC와 스마트폰 사이의 데이터 전송을 위한 클립보드 공유)

  • Yeo, Se-Hwan;Kim, Jung-Sun
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2011.06d
    • /
    • pp.79-81
    • /
    • 2011
  • 최신 스마트폰 사용자가 급격하게 늘어남에 따라 PC와 스마트폰을 동시에 사용하는 이용자도 많아지고 있다. 이러한 경우에 글이나 그림을 PC와 스마트폰 data를 주고 받아야 하는 상황이 자주 발생한다. 하지만 데이터를 전송하는 방법이 불편하고 오래 걸린다. 따라서 본 논문에서는 Pc와 스마트폰의 서로의 클립보드를 공유하는 애플리케이션을 설치하여 dat를 쉽고 빠르게 보내는 방법을 제안하고자 한다.

Analysis of Interference Effects Caused by LR-WPAN in the Frequency Band of 900MHz (900MHz 대역의 LR-WPAN에 의한 간섭영향 분석)

  • Kang, Sang-Gee
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.2
    • /
    • pp.215-220
    • /
    • 2009
  • LR-WPAN(Low-Rate Wireless Personal Area Network) hewn as IEEE 802.15.4 is considered as one of the most suitable specifications published until now to accomplish USN(Ubiquitous Sensor Network). In this paper we simulate interference effects to other systems if LR-WPAN will be used in 900MHz. In considering the current usage situation of 900MHz frequency band, we can think LR-WPAN shares the frequency band of $908.5{\sim}914MHz$ assigned for RFID/USN. The simulation results of the case of LR-WPAN and RFID/USN sharing the frequency band show that the probability of interference of LR-WPAN to CT1 and RFID is 2.5% and 2.1%, respectively. In order to avoid interference effects to public communications, simulations results show that the protection distance of about loom is needed.

A Study on the Standardization of Categorizing and Sub-categorizing Railway Information in Web-based Information Provision Service (웹기반 철도지식정보 분류체계 수립에 관한 연구)

  • Yang, Hoe-Sung;Lee, Sang-Ho;Choi, Si-Haeng;Park, Yong-Gul
    • Proceedings of the KSR Conference
    • /
    • 2009.05a
    • /
    • pp.581-588
    • /
    • 2009
  • With the development of IT industry and formation of web-based knowledge sharing platform, a variety of railway-related information services on the web have emerged, ranging from personal blogs to dedicated portal sites, as in the other sectors. These services are contributing to advancing railway industry after all. As far as it is concerned with specific areas such as railway sector, the internet users are hardly expected to avail satisfactory results in acquiring customized information from the access, as the information served varies on the intension of the web site operator or relevant agency, and indexing categories and sub-categories is not easy to work out in a straight manner. This study will review on the feasibility of standardizing categories and sub-categories for railway industry information on the web, and present optimum categorization and sub-categorization approach for the most satisfactory results when searched, ultimately aiming at laying a foundation to satisfy the wide spectrum of users' need for railway information.

  • PDF