• Title/Summary/Keyword: Privacy Data

Search Result 1,309, Processing Time 0.037 seconds

Ethics for Artificial Intelligence: Focus on the Use of Radiology Images (인공지능 의료윤리: 영상의학 영상데이터 활용 관점의 고찰)

  • Seong Ho Park
    • Journal of the Korean Society of Radiology
    • /
    • v.83 no.4
    • /
    • pp.759-770
    • /
    • 2022
  • The importance of ethics in research and the use of artificial intelligence (AI) is increasingly recognized not only in the field of healthcare but throughout society. This article intends to provide domestic readers with practical points regarding the ethical issues of using radiological images for AI research, focusing on data security and privacy protection and the right to data. Therefore, this article refers to related domestic laws and government policies. Data security and privacy protection is a key ethical principle for AI, in which proper de-identification of data is crucial. Sharing healthcare data to develop AI in a way that minimizes business interests is another ethical point to be highlighted. The need for data sharing makes the data security and privacy protection even more important as data sharing increases the risk of data breach.

Responsible usage of digital technologies to manage SARS-CoV-2 pandemic (코로나19 대응을 위한 책임 있는 디지털 기술의 활용 방안)

  • Kim, Hongjun;Eom, Jung Ho
    • Convergence Security Journal
    • /
    • v.20 no.3
    • /
    • pp.99-108
    • /
    • 2020
  • The COVID-19 pandemic have been spreading continuously across the world, hence it is difficult to expect coming to an end in a short period of time. The use of digital technology has shown tangible results in suppressing COVID-19, but raised privacy and data-protection concerns. In the context of the global efforts to deal with the coronavirus pandemic, various digital technologies are taking on a role in surveillance, monitoring, and forecasting. Also the Korea government manages Corona crisis based on legal basis. In this paper, Korea and each country's response to the Corona 19 pandemic are shown, and suggests ways to protect personal information while using digital tools. Large-scale data collection and processing is essential for the suppression of pandemic, but it should be limited to the level and scope required privacy. Also international cooperation, temporary and transparent use of personal information, the corresponding legal basis are necessary. As the use of data and algorithms is expected to continue to increase, technical and institutional efforts to reinforce privacy protection must continue.

Privacy-preserving and Communication-efficient Convolutional Neural Network Prediction Framework in Mobile Cloud Computing

  • Bai, Yanan;Feng, Yong;Wu, Wenyuan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.12
    • /
    • pp.4345-4363
    • /
    • 2021
  • Deep Learning as a Service (DLaaS), utilizing the cloud-based deep neural network models to provide customer prediction services, has been widely deployed on mobile cloud computing (MCC). Such services raise privacy concerns since customers need to send private data to untrusted service providers. In this paper, we devote ourselves to building an efficient protocol to classify users' images using the convolutional neural network (CNN) model trained and held by the server, while keeping both parties' data secure. Most previous solutions commonly employ homomorphic encryption schemes based on Ring Learning with Errors (RLWE) hardness or two-party secure computation protocols to achieve it. However, they have limitations on large communication overheads and costs in MCC. To address this issue, we present LeHE4SCNN, a scalable privacy-preserving and communication-efficient framework for CNN-based DLaaS. Firstly, we design a novel low-expansion rate homomorphic encryption scheme with packing and unpacking methods (LeHE). It supports fast homomorphic operations such as vector-matrix multiplication and addition. Then we propose a secure prediction framework for CNN. It employs the LeHE scheme to compute linear layers while exploiting the data shuffling technique to perform non-linear operations. Finally, we implement and evaluate LeHE4SCNN with various CNN models on a real-world dataset. Experimental results demonstrate the effectiveness and superiority of the LeHE4SCNN framework in terms of response time, usage cost, and communication overhead compared to the state-of-the-art methods in the mobile cloud computing environment.

Hippocratic XML Databases: A Model and Access Control Mechanism (히포크라테스 XML 데이터베이스: 모델 및 액세스 통제 방법)

  • Lee Jae-Gil;Han Wook-Shin;Whang Kyu-Young
    • Journal of KIISE:Databases
    • /
    • v.31 no.6
    • /
    • pp.684-698
    • /
    • 2004
  • The Hippocratic database model recently proposed by Agrawal et al. incorporates privacy protection capabilities into relational databases. Since the Hippocratic database is based on the relational database, it needs extensions to be adapted for XML databases. In this paper, we propose the Hippocratic XML database model, an extension of the Hippocratic database model for XML databases and present an efficient access control mechanism under this model. In contrast to relational data, XML data have tree-like hierarchies. Thus, in order to manage these hierarchies of XML data, we extend and formally define such concepts presented in the Hippocratic database model as privacy preferences, privacy policies, privacy authorizations, and usage purposes of data records. Next, we present a new mechanism, which we call the authorization index, that is used in the access control mechanism. This authorization index, which is Implemented using a multi-dimensional index, allows us to efficiently search authorizations implied by the authorization granted on the nearest ancestor using the nearest neighbor search technique. Using synthetic and real data, we have performed extensive experiments comparing query processing time with those of existing access control mechanisms. The results show that the proposed access control mechanism improves the wall clock time by up to 13.6 times over the top-down access control strategy and by up to 20.3 times over the bottom-up access control strategy The major contributions of our paper are 1) extending the Hippocratic database model into the Hippocratic XML database model and 2) proposing an efficient across control mechanism that uses the authorization index and nearest neighbor search technique under this model.

An Indexing Method to Prevent Attacks based on Frequency in Database as a Service (서비스로의 데이터베이스에서 빈도수 기반의 추론공격 방지를 위한 인덱싱 기법)

  • Jung, Kang-Soo;Park, Seog
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.16 no.8
    • /
    • pp.878-882
    • /
    • 2010
  • DaaS model that surrogates their data has a problem of privacy leakage by service provider. In this paper, we analyze inference attack that can occur on encrypted data that consist of multiple column through index, and we suggest b-anonymity to protect data against inference attack. We use R+-tree technique to minimize false-positive that can happen when we use an index for efficiency of data processing.

An Improved Multi-Keyword Search Protocol to Protect the Privacy of Outsourced Cloud Data (아웃소싱된 클라우드 데이터의 프라이버시를 보호하기 위한 멀티 키워드 검색 프로토콜의 개선)

  • Kim, Tae-Yeon;Cho, Ki-Hwan;Lee, Young-Lok
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.6 no.10
    • /
    • pp.429-436
    • /
    • 2017
  • There is a growing tendency to outsource sensitive or important data in cloud computing recently. However, it is very important to protect the privacy of outsourced data. So far, a variety of secure and efficient multi-keyword search schemes have been proposed in cloud computing environment composed of a single data owner and multiple data users. Zhang et. al recently proposed a search protocol based on multi-keyword in cloud computing composed of multiple data owners and data users but their protocol has two problems. One is that the cloud server can illegally infer the relevance between data files by going through the keyword index and user's trapdoor, and the other is that the response for the user's request is delayed because the cloud server has to execute complicated operations as many times as the size of the keyword index. In this paper, we propose an improved multi-keyword based search protocol which protects the privacy of outsourced data under the assumption that the cloud server is completely unreliable. And our experiments show that the proposed protocol is more secure in terms of relevance inference between the data files and has higher efficiency in terms of processing time than Zhang's one.

A Study on Structural Relationship between Privacy Concern and Post-Adoption Behavior in SNS (SNS 이용자의 프라이버시 염려도와 수용후 행동 간의 구조적 관계에 관한 연구)

  • Jung, Chul-Ho;Namn, Su-Hyeon
    • Management & Information Systems Review
    • /
    • v.30 no.3
    • /
    • pp.85-105
    • /
    • 2011
  • The primary purpose of this study is to examine the effects of privacy concern on user's satisfaction and continuance intention in SNS. Based on relevant literature reviews, this study posits five characteristics, that is, privacy concern, perceived usefulness, perceived enjoyment, satisfaction, and continuance intention as key factors. And then we structured a research model and hypotheses about relationship between these variables. A total 298 usable survey responses of SNS users have been employed in the analysis. The major findings from the data analyses are as follows. Firstly, privacy concern had a significant influence upon perceived usefulness and enjoyment, however, privacy concern had not a significant influence upon satisfaction Secondly, perceived usefulness and enjoyment had a positive influence upon satisfaction. Lastly, user's perceived usefulness, perceived enjoyment, and satisfaction had significantly related to continuance intention in SNS. From this study, we expect to suggest practical and managerial implications to SNS providers.

  • PDF

Design of Framework for Ubiquitous Privacy-Aware Web Services (유비쿼터스 Privacy-Aware Web Services Framework 설계)

  • Song, You-Jin;Lee, Dong-Hyeok
    • The Journal of Society for e-Business Studies
    • /
    • v.11 no.2
    • /
    • pp.13-30
    • /
    • 2006
  • Web services are independent on a platform and are suitable in the Ubiquitous environment which an interaction for each device. Ubiquitous web services can use various applied service in any network neighborhood or terminal. Main characteristic of Ubiquitous is context-awareness. Therefore, Ubiquitous web services must include context-aware control process and protect user privacy because context-aware environment collects privacy data. But current web services standard is not specially designed in respect of context-communication. Therefore, the framework which can add flexibility in transmission of context is required. Our Framework can give extension for context and can communicate flexibly Context information for every session. Therefore, Our Framework can solve overhead problem of context in SOAP message and protect user's privacy according to user preference.

  • PDF

A Study on the Degree of Preference to the Psychological Environment of Supporting Facilities in Department Stores - Focused on the Privacy and Sociality about Office Space and Rest Space - (백화점 지원시설의 심리적 환경에 관한 선호도 연구 - 업무공간과 휴게공간에 대한 독립성과 사회성을 중심으로 -)

  • Park, Eui-Jeong;Seo, Ji-Eun;Seo, Hee-Sook
    • Korean Institute of Interior Design Journal
    • /
    • v.19 no.4
    • /
    • pp.66-73
    • /
    • 2010
  • The purpose of this study is to develop the basis data for methods of the plan to make the office space of the psychological environment by survey of preference to users in Department Store. The results are as follows : First, we could know that the space plan has to be considered the privacy and sociality for the psychological environment in office space. Second, we could know that there are efficient methods of space plan to use the cutoff division by partitions, the psychological division by furniture and the sensitive division by material for privacy in office and resting space. For sociality, there are efficient arrangement methods to plan by division type in office space and by opening type in resting space. And it is good method to use by color that is one in esthetical elements. Third, if we considered users, it is good method to use partitions to cutoff from the floor to the ceiling for privacy in office space and to use movable furnitures to cutoff for privacy in resting space. Forth, we could know that there is the difference in methods of space plan to be preferred by user's variables for privacy and sociality in office and resting spaces. Thus, i think that we have to study considering user's variables and types of department store.

A Secure Technique Design for Privacy Protection in RFID System (RFID 시스템에서 프라이버시 보호를 위한 보안기법 설계)

  • Oh, Gi-Oug;Park, Mi-Og
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.8
    • /
    • pp.107-115
    • /
    • 2010
  • RFID (Radio Frequency IDentification) technology, automatic identification and data capture technologies in ubiquitous computing is an essential skill. Low-cost Radio Frequency Identification tags using memory and no physical contact due to the ease of use and maintenance of excellence are going to use expanded. However, it is possible to the illegal acquisition of the information between RFID tags and readers because RFID uses the RF signal, and the obtained information can be used for the purpose of location tracking and invasion of privacy. In this paper, we proposed the security scheme to protect against the illegal user location tracking and invasion of privacy. The security scheme proposed in this paper, using Gray Code and reduced the capacity of the calculation of the actual tags, However, it is impossible for the malicious attacker to track information because tag information transmitted from the reader is not fixed. Therefore, even if the tags information is obtained by a malicious way, our scheme provides more simple and safe user privacy than any other protection methods to protect user privacy, because not actual information but encrypted information is becoming exposed.