• 제목/요약/키워드: Privacy Evaluation

검색결과 162건 처리시간 0.026초

ShareSafe: An Improved Version of SecGraph

  • Tang, Kaiyu;Han, Meng;Gu, Qinchen;Zhou, Anni;Beyah, Raheem;Ji, Shouling
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제13권11호
    • /
    • pp.5731-5754
    • /
    • 2019
  • In this paper, we redesign, implement, and evaluate ShareSafe (Based on SecGraph), an open-source secure graph data sharing/publishing platform. Within ShareSafe, we propose De-anonymization Quantification Module and Recommendation Module. Besides, we model the attackers' background knowledge and evaluate the relation between graph data privacy and the structure of the graph. To the best of our knowledge, ShareSafe is the first platform that enables users to perform data perturbation, utility evaluation, De-A evaluation, and Privacy Quantification. Leveraging ShareSafe, we conduct a more comprehensive and advanced utility and privacy evaluation. The results demonstrate that (1) The risk of privacy leakage of anonymized graph increases with the attackers' background knowledge. (2) For a successful de-anonymization attack, the seed mapping, even relatively small, plays a much more important role than the auxiliary graph. (3) The structure of graph has a fundamental and significant effect on the utility and privacy of the graph. (4) There is no optimal anonymization/de-anonymization algorithm. For different environment, the performance of each algorithm varies from each other.

KTX 의자 설계에 따른 객실 Speech Privacy 평가 (Evaluation of Speech Privacy on the Seat-design in High-speed Train Passenger Cars)

  • 장형석;김재현;전진용
    • 한국소음진동공학회논문집
    • /
    • 제24권2호
    • /
    • pp.146-153
    • /
    • 2014
  • This study investigates the effects of seat-design elements such as seating arrangement, shape, and height on speech privacy in high-speed trains. For the evaluation of speech privacy, acoustic simulation software was used to reproduce room acoustical conditions in passenger cars on the basis of in-situ measurement data. The influences of speech source directivity and source height on privacy distance ($r_P$) were investigated, and it was found that $r_P$ determined using an omni-directional source was relatively shorter than that determined using a directional source. It was also found that $r_P$ decreased when the source height was lower than the height of the seat-back because the seat-back blocked the propagation of speech from the sound source. The effect of seating arrangement was not significant when comparing the vis-a-vis seating and one-side seating arrangements. In addition, among the alternative seat-designs, the seats that block the space between the seats and cover the space near the ear were found to show significantly enhanced speech privacy in high-speed train passenger cars.

A Framework for measuring query privacy in Location-based Service

  • Zhang, Xuejun;Gui, Xiaolin;Tian, Feng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제9권5호
    • /
    • pp.1717-1732
    • /
    • 2015
  • The widespread use of location-based services (LBSs), which allows untrusted service provider to collect large number of user request records, leads to serious privacy concerns. In response to these issues, a number of LBS privacy protection mechanisms (LPPMs) have been recently proposed. However, the evaluation of these LPPMs usually disregards the background knowledge that the adversary may possess about users' contextual information, which runs the risk of wrongly evaluating users' query privacy. In this paper, we address these issues by proposing a generic formal quantification framework,which comprehensively contemplate the various elements that influence the query privacy of users and explicitly states the knowledge that an adversary might have in the context of query privacy. Moreover, a way to model the adversary's attack on query privacy is proposed, which allows us to show the insufficiency of the existing query privacy metrics, e.g., k-anonymity. Thus we propose two new metrics: entropy anonymity and mutual information anonymity. Lastly, we run a set of experiments on datasets generated by network based generator of moving objects proposed by Thomas Brinkhoff. The results show the effectiveness and efficient of our framework to measure the LPPM.

무선 센서 네트워크에서의 통신 근원지 및 도착지 은닉(제2부) : 프로토콜 평가 (Concealing Communication Source and Destination in Wireless Sensor Networks (Part I) : Protocol Evaluation)

  • 차영환
    • 한국전자통신학회논문지
    • /
    • 제8권3호
    • /
    • pp.379-387
    • /
    • 2013
  • 대규모 무선 센서 네트워크에 있어서 광역도청에 대응하여 통신 근원지와 도착지의 위치기밀을 유지하기 위해서는 흔히 과다한 더미패킷들이 발생된다. 앞서의 연구에서는 데이터패킷 전송 동안에 근원지와 도착지를 포함하는 일정 범위 내의 노드들만이 빈 타임-슬롯마다 더미패킷을 발생하도록 하는 위치보안 라우팅 프로토콜 ELPR(End-node Location Privacy Routing)을 제안하였다. 이 논문에서는 고정된 보안성을 갖는 PCM(Periodic Collection Method)에 비해 ELPR은 다양한 위치보안 수준을 제공함을 보였다. 시뮬레이션을 통해 ELPR은 노드들의 수나 데이터패킷들이 많은 경우, PCM보다 발생 패킷 수에 있어서 경제성 있는 위치보안이 가능함을 확인하였다.

A Survey of System Architectures, Privacy Preservation, and Main Research Challenges on Location-Based Services

  • Tefera, Mulugeta K.;Yang, Xiaolong;Sun, Qifu Tyler
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제13권6호
    • /
    • pp.3199-3218
    • /
    • 2019
  • Location-based services (LBSs) have become popular in recent years due to the ever-increasing usage of smart mobile devices and mobile applications through networks. Although LBS application provides great benefits to mobile users, it also raises a sever privacy concern of users due to the untrusted service providers. In the lack of privacy enhancing mechanisms, most applications of the LBS may discourage the user's acceptance of location services in general, and endanger the user's privacy in particular. Therefore, it is a great interest to discuss on the recent privacy-preserving mechanisms in LBSs. Many existing location-privacy protection-mechanisms (LPPMs) make great efforts to increase the attacker's uncertainty on the user's actual whereabouts by generating a multiple of fake-locations together with user's actual positions. In this survey, we present a study and analysis of existing LPPMs and the state-of-art privacy measures in service quality aware LBS applications. We first study the general architecture of privacy qualification system for LBSs by surveying the existing framework and outlining its main feature components. We then give an overview of the basic privacy requirements to be considered in the design and evaluation of LPPMs. Furthermore, we discuss the classification and countermeasure solutions of existing LPPMs for mitigating the current LBS privacy protection challenges. These classifications include anonymization, obfuscation, and an encryption-based technique, as well as the combination of them is called a hybrid mechanism. Finally, we discuss several open issues and research challenges based on the latest progresses for on-going LBS and location privacy research.

안전한 자동차용 SUMS 구축을 위한 보안성 평가기준 도출 (A Study on Security Evaluation for Secure Software Update Management System in Automotive)

  • 서재완;곽지원;홍바울;조광수;김승주
    • 정보보호학회논문지
    • /
    • 제32권6호
    • /
    • pp.1151-1163
    • /
    • 2022
  • 차량에 무선 통신 기능이 탑재되기 시작하면서 무선 통신 기능의 취약점을 악용한 차량의 사이버 공격이 증가하고 있다. 이에 대응하기 위해 UNECE는 차량 제조사가 무선 통신 기능을 활용하여 차량에 탑재되는 소프트웨어를 안전하게 배포할 수 있도록 UN R156 규정을 제정하였다. 해당 규정은 차량의 소프트웨어를 안전하게 배포하는데 필요한 보안 요구사항을 명시하고 있으나 해당 요구사항을 개발 및 구현하는데 필요한 구성요소와 세부 기능에 대한 정보가 생략된 채 추상적인 요구사항만이 제시되어 있다. 따라서 본 논문에서는 체계적으로 보안 위협을 분석하는 방법인 위협모델링을 활용하여 안전한 SUMS를 구축하는데 필요한 상세 보안 요구사항을 도출한다. 이후 해당 요구사항을 바탕으로 SUMS에 대한 보안성 평가기준을 제안한다.

Semantics-aware Obfuscation for Location Privacy

  • Damiani, Maria Luisa;Silvestri, Claudio;Bertino, Elisa
    • Journal of Computing Science and Engineering
    • /
    • 제2권2호
    • /
    • pp.137-160
    • /
    • 2008
  • The increasing availability of personal location data pushed by the widespread use of location-sensing technologies raises concerns with respect to the safeguard of location privacy. To address such concerns location privacy-preserving techniques are being investigated. An important area of application for such techniques is represented by Location Based Services (LBS). Many privacy-preserving techniques designed for LBS are based on the idea of forwarding to the LBS provider obfuscated locations, namely position information at low spatial resolution, in place of actual users' positions. Obfuscation techniques are generally based on the use of geometric methods. In this paper, we argue that such methods can lead to the disclosure of sensitive location information and thus to privacy leaks. We thus propose a novel method which takes into account the semantic context in which users are located. The original contribution of the paper is the introduction of a comprehensive framework consisting of a semantic-aware obfuscation model, a novel algorithm for the generation of obfuscated spaces for which we report results from an experimental evaluation and reference architecture.

여성전문병원 병동부의 치유환경요소 평가에 대한 연구 (A Study on the Evaluation of the Healing Environments of the Wards in Women's Hospitals)

  • 황연숙;김유연;장윤정
    • 한국실내디자인학회논문집
    • /
    • 제15권5호
    • /
    • pp.221-229
    • /
    • 2006
  • The purpose of this study is to analyze the characteristics of healing environments of the wards in women's hospitals. A evaluation checklist of the healing environment was applied to seven women's hospitals that have constructed or remodeled since 2000. The findings indicate that the comfort was well considered in most spaces, while the privacy and the nature-friendliness were insufficient. The lacks of balconies, terraces, landscapes, and water spaces for the nature-friendliness were also problematic. Among the patients' room, corridor, and patients' lounge, the lounge was the most negative in terms of healing environments. In order to improve the patients' privacy, soundproofing materials and buffer zones in the lounge should be considered. The future study needs to develop advanced survey and interview methodologies in order to support the relevant results.