• 제목/요약/키워드: Personal Sensitive Information

검색결과 181건 처리시간 0.026초

Implementation of Quality Management System for Wild-Simulated Ginseng Using Blockchain

  • Sung, Youngjun;Won, Yoojae
    • Journal of Information Processing Systems
    • /
    • 제18권2호
    • /
    • pp.173-187
    • /
    • 2022
  • A special government agency has been charged with implementing quality management to guarantee the quality of wild-simulated ginseng. However, these processes are carried out by use of documents, and this has resulted in information omission and high document management costs. To solve this problem, this study analyzed the existing quality management process by using a smart contract for the existing offline form and proposed a new quality management system for storing and managing all log data in the blockchain. This system reduced documentation management costs about quality management and recorded information in the previous step through the quality management steps, thus forming a step-by-step record chain. Experiments were conducted by implementing this system, which improved data integrity and reliability. Additionally, sensitive information, such as personal information, was included in the system by use of the off-chain technology.

Big Data Key Challenges

  • Alotaibi, Sultan
    • International Journal of Computer Science & Network Security
    • /
    • 제22권4호
    • /
    • pp.340-350
    • /
    • 2022
  • The big data term refers to the great volume of data and complicated data structure with difficulties in collecting, storing, processing, and analyzing these data. Big data analytics refers to the operation of disclosing hidden patterns through big data. This information and data set cloud to be useful and provide advanced services. However, analyzing and processing this information could cause revealing and disclosing some sensitive and personal information when the information is contained in applications that are correlated to users such as location-based services, but concerns are diminished if the applications are correlated to general information such as scientific results. In this work, a survey has been done over security and privacy challenges and approaches in big data. The challenges included here are in each of the following areas: privacy, access control, encryption, and authentication in big data. Likewise, the approaches presented here are privacy-preserving approaches in big data, access control approaches in big data, encryption approaches in big data, and authentication approaches in big data.

개인정보보호를 위한 다중 유형 객체 탐지 기반 비식별화 기법 (Multi-type object detection-based de-identification technique for personal information protection)

  • 길예슬;이효진;류정화;이일구
    • 융합보안논문지
    • /
    • 제22권5호
    • /
    • pp.11-20
    • /
    • 2022
  • 인터넷과 웹 기술이 모바일 장치 중심으로 발전하면서 이미지 데이터는 사람, 텍스트, 공간 등 다양한 유형의 민감정보를 담고 있다. 이러한 특성과 더불어 SNS 사용이 증가하면서 온라인 상의 개인정보가 노출되고 악용되는 피해 규모가 커지고 있다. 그러나 개인정보보호를 위한 다중 유형 객체 탐지 기반의 비식별화 기술에 관한 연구는 미흡한 상황이다. 이에 본 논문은 기존의 단일 유형 객체 탐지 모델을 병렬적으로 이용하여 다중 유형의 객체를 탐지 및 비식별화하는 인공지능 모델을 제안한다. Cutmix 기법을 통해 사람과 텍스트 객체가 함께 존재하는 이미지를 생성하여 학습 데이터로 구성하고, 사람과 텍스트라는 다른 특징을 가진 객체에 대한 탐지 및 비식별화를 수행하였다. 제안하는 모델은 두 가지 객체가 동시에 존재할 때 0.724의 precision과 0.745의 mAP@.5 를 달성한다. 또한, 비식별화 수행 후 전체 객체에 대해 mAP@.5 가 0.224로, 0.4 이상의 감소폭을 보였다.

The Recommendation of Controls for Hospital Information System Using CRAMM: Case Studies of Two Korean Hospitals

  • Moon, Song-Chul;Han, In-Goo;Lee, Sang-Jae
    • 경영과학
    • /
    • 제17권1호
    • /
    • pp.145-158
    • /
    • 2000
  • The medical records of diagnostic and testing information include sensitive personal information that reveals some of the most intimate aspects of an individual's life. The hospital information system (HIS) operates in a state of high risk which may lead to the possible loss to the IS resources caused by various threats. This research addresses twofold : (1) to perform asset identification ad valuation and (2) to recommend countermeasures for secure HIS network using case studies This paper applied a risk management tool CRAMM (Central Computer and Tele-communications Agency's Risk Analysis and Management Method) to assess asset values and suggest countermeasures for the security of computerized medical information of two large hospitals in Korea. CRAMM countermeasures are recommended at the reference sites from the network security requirements of system utilized for the diagnosis and treatment of patients. The results of the study will enhance the awareness of IS risk management by IS managers.

  • PDF

LR-WPAN에서 충돌을 줄이기 위한 제한경쟁 기법 (Limited Contention Scheme(LCS) to Reduce Collision in LR-WPAN)

  • 고수환;이정규
    • 한국통신학회논문지
    • /
    • 제33권5B호
    • /
    • pp.310-317
    • /
    • 2008
  • LR-WPAN(Low Rate Wireless Personal Area Network)에서 데이터 충돌은 재전송의 원인이 되며 이로 인한 에너지 소비는 전체 네트워크의 수명을 감소시킨다. 또한 LR-WPAN은 상대적으로 적은 backoff 재시도 횟수를 가지고 있기 때문에 충돌에 대해 민감하다. 본 논문에서 제안하는 LCS(Limited Contention Scheme)는 전체 노드를 일정한 수의 그룹으로 나누어 데이터를 전송하는 방식으로써 경쟁을 하는 노드의 수를 줄여 데이터의 충돌 발생 확률과 재전송을 감소시킨다. 그 결과 데이터의 처리율과 전체 네트워크의 수명은 증가하게 된다. 향후 LR-WPAN의 설계 시 LCS를 이용한다면 배터리의 수명은 늘어나게 되어 저전력 소모를 필요로 하는 응용분야에 유용하게 사용될 수 있을 것이다.

프라이버시를 보호하는 동적 데이터의 재배포 기법 (Privacy Preserving Data Publication of Dynamic Datasets)

  • 이주창;안성준;원동호;김응모
    • 정보보호학회논문지
    • /
    • 제18권6A호
    • /
    • pp.139-149
    • /
    • 2008
  • 조직이나 기관에서 수집한 개인정보를 통계 분석, 공공 의료 연구 등을 목적으로 배포할 때는 데이터에 포함된 개인의 민감한 정보가 노출되지 않도록 보호해야 한다. 한편, 배포되는 데이터는 가능한 정확한 통계 정보를 제공해야 한다. k-anonymity와 l-diversity 모델은 이러한 프라이버시 침해 문제 해결을 위해 제안되었다. 그러나 두 모델은 데이터에 삽입과 삭제가 발생하지 않는 정적인 데이터를 단 한번 배포하는 상황을 가정하기 때문에 삽입과 삭제가 발생하는 동적인 데이터에 그대로 적용할 수 없다. 동적인 데이터의 프라이버시 보호 문제를 해결하기 위해 최근 m-invariance 모델이 제안되었다. 그러나 m-invariant 일반화 기법은 일반화로 인해 통계 정보로써 데이터의 품질을 저하시킨다는 단점이 있고, 배포된 데이터 중 일부 개인의 민감한 속성이 노출되었을 경우에 그 영향이 다른 부분으로 전이된다. 본 논문에서는 일반화를 사용하지 않으면서 간단한 삽입과 삭제 연산을 지원하는 동적 데이터의 배포 기법을 제안한다. 제안 기법은 데이터의 품질을 높이면서 m-invariance와 동등한 수준의 프라이버시 보호 정도를 제공한다.

A Trusted Sharing Model for Patient Records based on Permissioned Blockchain

  • Kim, Kyoung-jin;Hong, Seng-phil
    • 인터넷정보학회논문지
    • /
    • 제18권6호
    • /
    • pp.75-84
    • /
    • 2017
  • As there has been growing interests in PHR-based personalized health management project, various institutions recently explore safe methods of recording personal medical and health information. In particular, innovative medical solution can be realized when medical researchers and medical service institutes can generally get access to patient data. As EMR data is extremely sensitive, there has been no progress in clinical information exchange. Moreover, patients cannot get access to their own health data and exchange it with researchers or service institutions. It can be operated in terms of technology, yet policy environment are affected by state laws as well as Privacy and Security Policy. Blockchain technology-independent, in transaction, and under test-is introduced in the medical industry in order to settle these problems. In other words, medical organizations can grant preliminary approval on patient information exchange by using the safely encrypted and distributed Blockchain ledger and can be managed independently and completely by individuals. More apparently, medical researchers can gain access to information, thereby contributing to the scientific advance in rare diseases or minor groups in the world. In this paper, we focused on how to manage personal medical information and its protective use and proposes medical treatment exchange system for patients based on a permissioned Blockchain network for the safe PHR operation. Trusted Model for Sharing Medical Data (TMSMD), that is proposed model, is based on exchanging information as patients rely on hospitals as well as among hospitals. And introduce medical treatment exchange system for patients based on a permissioned Blockchain network. This system is a model that encrypts and records patients' medical information by using this permissioned Blockchain and further enhances the security due to its restricted counterfeit. This provides service to share medical information uploaded on the permissioned Blockchain to approved users through role-based access control. In addition, this paper presents methods with smart contracts if medical institutions request patient information complying with domestic laws by using the distributed Blockchain ledger and eventually granting preliminary approval for sharing information. This service will provide an independent information transaction and the Blockchain technology under test will be adopted in the medical industry.

Semantics-aware Obfuscation for Location Privacy

  • Damiani, Maria Luisa;Silvestri, Claudio;Bertino, Elisa
    • Journal of Computing Science and Engineering
    • /
    • 제2권2호
    • /
    • pp.137-160
    • /
    • 2008
  • The increasing availability of personal location data pushed by the widespread use of location-sensing technologies raises concerns with respect to the safeguard of location privacy. To address such concerns location privacy-preserving techniques are being investigated. An important area of application for such techniques is represented by Location Based Services (LBS). Many privacy-preserving techniques designed for LBS are based on the idea of forwarding to the LBS provider obfuscated locations, namely position information at low spatial resolution, in place of actual users' positions. Obfuscation techniques are generally based on the use of geometric methods. In this paper, we argue that such methods can lead to the disclosure of sensitive location information and thus to privacy leaks. We thus propose a novel method which takes into account the semantic context in which users are located. The original contribution of the paper is the introduction of a comprehensive framework consisting of a semantic-aware obfuscation model, a novel algorithm for the generation of obfuscated spaces for which we report results from an experimental evaluation and reference architecture.

소셜네트워크서비스에서 집합적 효능감이 이용자들의 자기노출에 미치는 영향 (Effect of Collective Efficacy on Self-Disclosure in Social Network Services)

  • 채성욱
    • 지식경영연구
    • /
    • 제19권1호
    • /
    • pp.19-39
    • /
    • 2018
  • With the development of information technology, social network services (SNS) such as Facebook and Twitter became popular and many users disclose their personal and sensitive information like private story, photographs and location information through posting and sharing. Despite the privacy concerns in SNSs, individuals continue to disclose their identity online. This phenomenon is called 'privacy paradox'. The purpose of this study is to examine the role of collective efficacy on self-disclosure in SNS context and to explain privacy paradox phenomenon. Drawing upon the communication privacy management theory, research model was developed and empirically tested with cross-sectional data from 306 individuals. Results revealed that collective efficacy has a direct positive effect on self-disclosure while privacy risk is negatively related to self-disclosure. However, privacy concern is not directly related to self-disclosure. The relationship between privacy concern and self-disclosure was moderated by collective efficacy.

하둡 분산 환경 기반 프라이버시 보호 빅 데이터 배포 시스템 개발 (Development of a Privacy-Preserving Big Data Publishing System in Hadoop Distributed Computing Environments)

  • 김대호;김종욱
    • 한국멀티미디어학회논문지
    • /
    • 제20권11호
    • /
    • pp.1785-1792
    • /
    • 2017
  • Generally, big data contains sensitive information about individuals, and thus directly releasing it for public use may violate existing privacy requirements. Therefore, privacy-preserving data publishing (PPDP) has been actively researched to share big data containing personal information for public use, while protecting the privacy of individuals with minimal data modification. Recently, with increasing demand for big data sharing in various area, there is also a growing interest in the development of software which supports a privacy-preserving data publishing. Thus, in this paper, we develops the system which aims to effectively and efficiently support privacy-preserving data publishing. In particular, the system developed in this paper enables data owners to select the appropriate anonymization level by providing them the information loss matrix. Furthermore, the developed system is able to achieve a high performance in data anonymization by using distributed Hadoop clusters.