• Title/Summary/Keyword: Privacy Data

Search Result 1,309, Processing Time 0.025 seconds

Attacks, Vulnerabilities and Security Requirements in Smart Metering Networks

  • Hafiz Abdullah, Muhammad Daniel;Hanapi, Zurina Mohd;Zukarnain, Zuriati Ahmad;Mohamed, Mohamad Afendee
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.4
    • /
    • pp.1493-1515
    • /
    • 2015
  • A smart meter is one of the core components in Advanced Metering Infrastructure (AMI) that is responsible for providing effective control and monitor of electrical energy consumptions. The multifunction tasks that a smart meter carries out such as facilitating two-way communication between utility providers and consumers, managing metering data, delivering anomalies reports, analyzing fault and power quality, simply show that there are huge amount of data exchange in smart metering networks (SMNs). These data are prone to security threats due to high dependability of SMNs on Internet-based communication, which is highly insecure. Therefore, there is a need to identify all possible security threats over this network and propose suitable countermeasures for securing the communication between smart meters and utility provider office. This paper studies the architecture of the smart grid communication networks, focuses on smart metering networks and discusses how such networks can be vulnerable to security attacks. This paper also presents current mechanisms that have been used to secure the smart metering networks from specific type of attacks in SMNs. Moreover, we highlight several open issues related to the security and privacy of SMNs which we anticipate could serve as baseline for future research directions.

On Concealing Data-Path Against Eavesdropping in Wireless Networks (무선망에서의 신호도청에 대응하는 데이터 경로 은닉에 관한 연구)

  • Tscha, Yeong-Hwan
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.15 no.3
    • /
    • pp.433-438
    • /
    • 2020
  • Nodes on a data communication path in a wireless network emit electro-magnetic waves whenever they transmit packets; thus, the path can be exposed and identified with capturing and analyzing a sequence of the signals emitted there. One of countermeasures against a malicious eavesdropper is to let certain nodes mimic the nodes on the data path in sending dummy packets. In this paper we propose a packet transfer protocol which establishes the shortest path between source-destination pair a time and restricts heavy generation of dummy packets. We verify the location-privacy of a node on the communication paths through simulation.

A Study on the Providing the Integrity of Digital Evidence while Deleting the irrelevant File (디지털 이미지 증거에서 사건과 무관한 파일 삭제시 무결성 제공 방안 연구)

  • Kim, TaeKyung
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.15 no.4
    • /
    • pp.111-116
    • /
    • 2019
  • The digital forensic analysis ensures the integrity of confiscated data by calculating hash values for seizure and search of digital evidence and receiving confirmation and signature from participants. However, evidence that is irrelevant to the alleged offense needs to be deleted even after seizure from the point of view of privacy. But the hash value is altered by deleting the irrelevant data from the image file, one will not be able to prove that the file is in the initial state when it was seized. Therefore, in this paper, a study was conducted to support the integrity of the digital evidence, even if some of the seized digital evidence was deleted or damaged during the seizure search. The hash value of each data is calculated and hash value of the combination of hash values are also calculated. Even if the unrelated evidence is deleted from the seized evidence regardless of file system such as FAT or NTFS, the suggested method presented a way to provide the integrity that proves there is no change in the evidence file.

The effect of security factors on the continuance of Internet banking usage among Malaysians

  • Normalini, M.K.
    • Asia-Pacific Journal of Business
    • /
    • v.6 no.1
    • /
    • pp.27-43
    • /
    • 2015
  • The objective of the present study is to identify the security factors that influence customer trust towards intention to continue using Internet banking in Malaysia. The participants are individual Internet banking users in Peninsular Malaysia. Data was collected through self-administered questionnaires distributed using the drop-off and pick-up (DOPU) technique to bank branch managers who then passed the questionnaires to their customers. A total of 413 respondents completed the questionnaires. The SPSS statistical analysis software package and Partial Least Squares statistical method were used for data analysis and hypothesis testing. The results show that authentication, confidentiality, data integrity and non-repudiation are significant factors that influence customer trust towards intention to continue using Internet banking. Trust plays a critical role in influencing the intention to continue using Internet banking in Malaysia while perceived privacy does not. An understanding of the factors identified in this study will enable Internet banking providers to effectively and efficiently enhance the security of services and thereby promote continued usage of Internet banking among customers. The findings of this study are thus expected to be of great use to Internet banking providers as improvements in Internet banking security will increase business in the long run.

  • PDF

A Study of Model on File Transfer Using Public-key Cryptography (공개키 암호방식을 이용한 파일전송 모델의 연구)

  • 최진탁;송영재
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.15 no.7
    • /
    • pp.545-552
    • /
    • 1990
  • This paper is concerned with the file protection in the file transfer systems. In the existing file transfer systems, passwords are used in the protection but do not provide any data protection and can only provide some protection against unauthorized access. Even provided with this protection, we cannot be free form computer hackers. In order to achieve higher standards of protection for our privacy (protection for data themselves, authentication of senders...) analternative technical system should be developed in using of pulic key cryptography by choosing the public key method (RSA public key) in the file transfer. A new system suggested in the paper can achieve some higher standards of protection for our privacy. We a result thie system will be easily applied to various document handling systems as in the data base.

  • PDF

A Spread Random Interleaver based Efficient DES Algorithm for Personal Cloud Computing Environments (개인 클라우드 컴퓨팅 환경을 위한 스프레드 랜덤 인터리버 기반의 효율적인 DES 알고리즘)

  • Chung, Yeon Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.1
    • /
    • pp.41-48
    • /
    • 2013
  • An efficient encryption algorithm based on the Data Encryption Standard (DES) for personal cloud computing environments is presented. The proposed algorithm improves data privacy, security and also encryption speed, compared with the triple DES. The improvement of the proposed algorithm stems from enhanced privacy inherent from the use of spread random interleaver in the place of the known substitution table for initial and final permutations in the DES algorithm. The simulation results demonstrate that the interleaver based DES (I-DES) is found to run faster than the triple DES algorithm and also offer improved security. The proposed algorithm also offers encryption for variable-length data using the Cipher Block Chaining (CBC).

A Grounded Theory Approach to the Procedure of Customized Service Experiences (온라인 맞춤형 서비스 경험 과정에 관한 근거이론적 연구)

  • Kim, Chae Ri;Lee, Jung Hoon;Kwon, Won Jin
    • Journal of Information Technology Applications and Management
    • /
    • v.26 no.1
    • /
    • pp.39-51
    • /
    • 2019
  • As data grows rapidly, the provision of appropriate information needed by individuals has become an area of new services, and customized services which is enabling the analysis of optimal services through collecting, storing, and analyzing personal data are emerging in many fields. However, due to the characteristics of customized services based on various information collected by customers during the use of the service, the problem of privacy infringement is raised at the same time, and many studies are being actively conducted to solve this problem. This study seeks to explore how the customer's in-depth and customized services has an impact on their customers, which has not been derived from quantitative research using the grounded theory methodology. Through this, 84 concepts, 33 subcategories, 13 Categories and paradigm models were derived. In addition, 'Understanding and acceptance of online behavioral advertising (OBA)' was derived as a core category, and finally, acceptance types of OBA were classified into 'positive acceptance type', 'indifferent type', 'calculating type', and 'active resistance type' based on the key categories. This study divides the acceptance types of online behavioral advertising through the emotions and behaviors of the consumers throughout the procedure of online behavioral advertising experiences. In addition to the statistical and quantitative information currently used for providing behavioral advertising, it provides new criteria to reflect the refinement of behavioral advertising and personal tendencies or characteristics.

An ID-based Broadcast Encryption Scheme for Cloud-network Integration in Smart Grid

  • Niu, Shufen;Fang, Lizhi;Song, Mi;Yu, Fei;Han, Song
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.9
    • /
    • pp.3365-3383
    • /
    • 2021
  • The rapid growth of data has successfully promoted the development of modern information and communication technologies, which are used to process data generated by public urban departments and citizens in modern cities. In specific application areas where the ciphertext of messages generated by different users' needs to be transmitted, the concept of broadcast encryption is important. It can not only improve the transmission efficiency but also reduce the cost. However, the existing schemes cannot entirely ensure the privacy of receivers and dynamically adjust the user authorization. To mitigate these deficiencies, we propose an efficient, secure identity-based broadcast encryption scheme that achieves direct revocation and receiver anonymity, along with the analysis of smart grid solutions. Moreover, we constructed a security model to ensure wireless data transmission under cloud computing and internet of things integrated devices. The achieved results reveal that the proposed scheme is semantically secure in the random oracle model. The performance of the proposed scheme is evaluated through theoretical analysis and numerical experiments.

Ethical Issues in Business Marketing Researches

  • HWANG, Hee-Joong
    • Journal of Research and Publication Ethics
    • /
    • v.3 no.2
    • /
    • pp.1-5
    • /
    • 2022
  • Purpose: Various ethical issues arise in different stages of management and business marketing research. The current study aims to take look at practices that ensure informed consent, privacy and confidentiality, deception, and legal aspect in data management in procedures involved in marketing research. Research design, data and methodology: Literature content analysis was conducted for this research and the current author has investigated journal articles mostly to guarantee a high degree of content validity and to keep the advantages of qualitative content approach. The current study explores manifest topics regarding the ethical issues of business marketing research. Results: The current study found that ethical consideration needs to be similarly significant and learning from the previous researchers' approach to handling this issue is helpful for future research and is essential to have additional guidelines. Also, four findings (Lack of Informed Consent, Deception, Invasion of Privacy and Confidentiality, and Legal Data Management) indicate that marketing researchers need to consider before undertaking any project. Conclusions: Overall, the study presents practical suggestions though unexhausted. By raising these ethical marketing issues, consumer behavior disciplines will continue to expand and contribute positively towards attaining thoughts, feelings, and decisions that positively contribute to marketing research as the foundation for effective marking practices.

Intension to Use Mobile Banking: An Integration of Theory of Planned Behaviour (TPB) and Technology Acceptance Model (TAM)

  • Amrutha Sasidharan;Santhi Venkatakrishnan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.18 no.4
    • /
    • pp.1059-1074
    • /
    • 2024
  • The paper is an attempt to study the individual's intention to use mobile banking. In light of the results obtained from the study, the proposed model offers a better fit with the data and explains the intention of individuals to use mobile banking services. Government support, trust, and compatibility significantly contribute to the Perceived behavioral control of a bank customer to use mobile banking while Perceived ease of use, Perceived usefulness, Security and privacy, and risk have a significant positive impact on the attitude of the individuals to utilize mobile banking service. The study uses primary data and the final instrument was administered to 950 respondents, across the country of which 904 data were used for the analysis after editing to accommodate the missing values. The study has adopted structural equation modeling approach to analyze the relationships between the variables in the study. The proposed framework in this study can be utilized to identify the factors that promote the adoption of mobile banking practices and the study also has the potential to provide updated and comprehensive literature on mobile banking, which can accelerate future research in this field.