• 제목/요약/키워드: Privacy Evaluation

검색결과 163건 처리시간 0.026초

Concealment of iris features based on artificial noises

  • Jiao, Wenming;Zhang, Heng;Zang, Qiyan;Xu, Weiwei;Zhang, Shuaiwei;Zhang, Jian;Li, Hongran
    • ETRI Journal
    • /
    • 제41권5호
    • /
    • pp.599-607
    • /
    • 2019
  • Although iris recognition verification is considered to be the safest method of biometric verification, studies have shown that iris features may be illegally used. To protect iris features and further improve the security of iris recognition and verification, this study applies the Gaussian and Laplacian mechanisms and to hide iris features by differentiating privacy. The efficiency of the algorithm and evaluation of the image quality by the image hashing algorithm are selected as indicators to evaluate these mechanisms. The experimental results indicate that the security of an iris image can be significantly improved using differential privacy protection.

위치기반 서비스에서 위치 프라이버시를 보호하기 위한 효율적인 더미 생성 (Efficient dummy generation for protecting location privacy in location based services)

  • 채천원;윤지혜;송두희;박광진
    • 인터넷정보학회논문지
    • /
    • 제18권5호
    • /
    • pp.23-30
    • /
    • 2017
  • 사용자가 위치기반 서비스(Location based service: 이하 LBS)를 제공 받기 위해서 LBS 서버에게 사용자의 위치와 질의 내용을 공개해야만 한다. 따라서 사용자의 신분, 위치 등이 노출될 수 있다. 최근 사용자의 프라이버시를 보호하기 위하여 더미를 이용한 기법들이 연구되고 있다. 그러나 더미를 생성하기 위하여 고려해야 할 사항들이 다수 존재한다. 예를 들어 더미 생성 시 장애물과 더미간의 거리 등을 고려해야만 프라이버시 보호를 증가시킬 수 있다. 따라서 본 논문에서 우리는 사용자의 프라이버시 보호를 증가시킬 수 있는 효율적인 더미 생성 기법을 제안한다. 실험 결과를 통해 최근 기법보다 성능이 우수함을 증명하였다.

Internet of Things (IoT) Framework for Granting Trust among Objects

  • Suryani, Vera;Sulistyo, Selo;Widyawan, Widyawan
    • Journal of Information Processing Systems
    • /
    • 제13권6호
    • /
    • pp.1613-1627
    • /
    • 2017
  • The concept of the Internet of Things (IoT) enables physical objects or things to be virtually accessible for both consuming and providing services. Undue access from irresponsible activities becomes an interesting issue to address. Maintenance of data integrity and privacy of objects is important from the perspective of security. Privacy can be achieved through various techniques: password authentication, cryptography, and the use of mathematical models to assess the level of security of other objects. Individual methods like these are less effective in increasing the security aspect. Comprehensive security schemes such as the use of frameworks are considered better, regardless of the framework model used, whether centralized, semi-centralized, or distributed ones. In this paper, we propose a new semi-centralized security framework that aims to improve privacy in IoT using the parameters of trust and reputation. A new algorithm to elect a reputation coordinator, i.e., ConTrust Manager is proposed in this framework. This framework allows each object to determine other objects that are considered trusted before the communication process is implemented. Evaluation of the proposed framework was done through simulation, which shows that the framework can be used as an alternative solution for improving security in the IoT.

A Secure Healthcare System Using Holochain in a Distributed Environment

  • Jong-Sub Lee;Seok-Jae Moon
    • International Journal of Internet, Broadcasting and Communication
    • /
    • 제15권4호
    • /
    • pp.261-269
    • /
    • 2023
  • We propose to design a Holochain-based security and privacy protection system for resource-constrained IoT healthcare systems. Through analysis and performance evaluation, the proposed system confirmed that these characteristics operate effectively in the IoT healthcare environment. The system proposed in this paper consists of four main layers aimed at secure collection, transmission, storage, and processing of important medical data in IoT healthcare environments. The first PERCEPTION layer consists of various IoT devices, such as wearable devices, sensors, and other medical devices. These devices collect patient health data and pass it on to the network layer. The second network connectivity layer assigns an IP address to the collected data and ensures that the data is transmitted reliably over the network. Transmission takes place via standardized protocols, which ensures data reliability and availability. The third distributed cloud layer is a distributed data storage based on Holochain that stores important medical information collected from resource-limited IoT devices. This layer manages data integrity and access control, and allows users to share data securely. Finally, the fourth application layer provides useful information and services to end users, patients and healthcare professionals. The structuring and presentation of data and interaction between applications are managed at this layer. This structure aims to provide security, privacy, and resource efficiency suitable for IoT healthcare systems, in contrast to traditional centralized or blockchain-based systems. We design and propose a Holochain-based security and privacy protection system through a better IoT healthcare system.

교무업무시스템에서의 개인정보보호를 위한 역할기반 접근 제어 확장 (Extending Role-based Access Control for Privacy Preservation in Academic Affairs System)

  • 김보선;홍의경
    • 한국정보과학회논문지:컴퓨팅의 실제 및 레터
    • /
    • 제14권2호
    • /
    • pp.171-179
    • /
    • 2008
  • 사용자가 많은 대규모 기업 조직 시스템이나 전자정부시스템에서 사용자의 정보 객체에 대한전근을 제한하는 효과적인 방법으로 역할기반 접근 제어(RBAC: Role based Access Control)를 들 수 있다. 이는 사용자에게 정보 객체의 접근권한을 직접 부여하는 것이 아니라 조직에서 정의된 역할을 부여함으로써 정보 객체에 접근한다는 개념이다. RBAC는 개인정보에 대한 접근 제어는 가능하나 법제도적으로 규정하고 있는 자기정보결정권 및 조직의 개인정보에 대한 관리감독 규제의 개념은 반영되어 있지 않다. 본 논문에서는 교무업무시스템에 저장되어 있는 학생자료에 대한 접근 제어 및 개인정보보호 수단으로 RBAC 확장모델을 제시하고자 한다. RBAC 시스템에 개인정보 접근권 및 참여권을 반영하기 위하여 자료권한과 자료권한 배정 구성요소를 추가하고, 이를 통해 개인정보의 흐름 및 관리 감독체제의 구축이 가능하도록 설계한다. 또한 RBAC 구성요소별 개인정보보호 개념을 추가하고, 확장된 모델을 바탕으로 시스템 구현 사례와 기존 RBAC와의 비교 평가를 통해 시스템의 중요성과 차별성을 제시한다.

유료 경매사이트 이용의사에 관한 연구 (A Study on Propensity for Commission Paid Auction Site)

  • 한수진
    • 가족자원경영과 정책
    • /
    • 제11권2호
    • /
    • pp.133-154
    • /
    • 2007
  • This research investigated consumer's usage of, evaluation on and satisfaction of the Auction Site, with a view to analyze the key factors influencing a commission paid Auction Site. The findings of results from the analysis are summarized as follows. First of all, the consumer group at the age equal to and less than 20 years old showed the highest purchasing frequency, and the consumer group with a household income less than 2,500,000 won showed the highest number of hours on the site. Secondly, the evaluation index showed that consumers think highly of the complaint resolution process, and, especially, the aged consumer group respected the Auction Site's level of confidentiality of transaction and privacy. Thirdly, among consumers' satisfaction, subdivided by types, price satisfaction was the highest followed by quality satisfaction, settlement satisfaction, delivery satisfaction, information satisfaction and AS satisfaction, in that order. Fourthly, in the event consumers used the commission paid Auction Site, the number of times it has been used, evaluations related to information provision and evaluations on confidentiality of transactions and privacy are influential parameters.

  • PDF

온라인 상에 공개된 부분 익명화된 빅데이터의 프라이버시 침해 가능성 분석 (Analysis of Privacy Violation Possibility of Partially Anonymized Big Data)

  • 정강수;박석;최대선
    • 정보보호학회논문지
    • /
    • 제28권3호
    • /
    • pp.665-679
    • /
    • 2018
  • 정보통신의 발전, 특히 무선인터넷 기술과 스마트폰의 보급에 따라 디지털 데이터가 증가하면서, 온라인 빅데이터 개인정보 문제 즉, 개인 민감정보의 온라인 노출과 이로 인한 프라이버시 침해에 대한 우려 역시 높아지고 있다. 본 논문은 포털 서비스를 중심으로 국내 인터넷 환경에 공개된 온라인 빅데이터의 개인정보 침해 현황에 대한 분석을 수행하고 프라이버시 침해 가능성을 평가하기 위한 척도를 제시하였다. 이를 위하여 본 연구팀은 포털 사이트에서 제공하는 서비스 컨텐츠 중 약 5천만건의 사용자 게시글을 수집하여 개인정보에 해당하는 정보를 추출하고, 추출된 개인 정보를 기반으로 각 사용자의 ID가 부분 익명화 되었음에도 개인을 특정할 수 있는 신상 정보가 노출될 수 있음을 확인하였다. 또한 부분 익명화된 ID를 사용하여 서비스간 개인 정보의 연결 가능성과 개인 신상 정보 노출 수준을 반영한 위험도 측정 척도를 제안하였다.

그래디언트 기반 재복원공격을 활용한 배치상황에서의 연합학습 프라이버시 침해연구 (Federated Learning Privacy Invasion Study in Batch Situation Using Gradient-Based Restoration Attack)

  • 장진혁;류권상;최대선
    • 정보보호학회논문지
    • /
    • 제31권5호
    • /
    • pp.987-999
    • /
    • 2021
  • 최근 데이터로 인한 개인정보 침해로 인해 연합학습이 이슈화되고 있다. 연합학습은 학습데이터를 요구하지 않기 때문에 프라이버시 침해로부터 안전하다. 이로 인해 분산된 디바이스, 데이터를 활용하여 효율을 내기 위한 응용 방법에 대한 연구들이 진행되고 있다. 그러나 연합학습과정에서 전송되는 그래디언트로부터 학습데이터를 복원하는 재복원공격에 대한 연구가 진행됨에 따라 더는 연합학습도 안전하다고 볼 수 없다. 본 논문은 다양한 데이터 상황에서 데이터 복원 공격이 얼마나 잘되는지 수치적, 시각적으로 확인하는 것이다. 데이터가 1개만 존재할 때부터 크게는 클래스 안에 데이터가 여러 개 분포해 있을 때로 나누어 재복원공격이 얼마나 되는지 확인을 위해 MSE, LOSS, PSNR, SSIM인 평가지표로 MNIST 데이터를 활용해 수치로 확인한다. 알게 된 사실로 클래스와 데이터가 많아질수록 MSE, LOSS,이 높아지고 PSNR, SSIM이 낮아져 복원성능이 떨어지지만 몇 개의 복원된 이미지로 충분히 프라이버시 침해가 가능하다는 것을 확인할 수 있다.

클라우드 환경에서 관리자 역할을 강화한 사용자 프라이버시 보호 모델 (User privacy protection model through enhancing the administrator role in the cloud environment)

  • 정윤수;연용호
    • 융합정보논문지
    • /
    • 제8권3호
    • /
    • pp.79-84
    • /
    • 2018
  • 클라우드 서비스는 다양한 매체를 통해 손쉽게 사용할 수 있어 많은 사용자로부터 많은 각광을 받고 있다. 그러나, 클라우드 서비스를 사용하는 사용자의 프라이버시를 악용하는 다양한 보안 피해가 증가하고 있어 이를 예방할 수 있는 기술들이 부족한 상황이다. 본 논문에서는 클라우드 환경에서 사용자의 프라이버시를 제3자가 불법적으로 악용하지 않도록 사용자의 프라이버시를 안전하게 보호하기 위한 보호 모델을 제안한다. 제안 모델은 중간 관리자와 클라우드 서버의 역할을 강화하기 위해서 사용자의 서명을 랜덤하게 분할 관리하고 있다. 제안 모델에서 사용자의 프라이버시 정보는 보안함수와 사용자 서명을 통해 클라우드 서버가 사용자에게 제공하고 있기 때문에 제3자에게 불법적으로 유출되는 것을 막고 있다. 또한, 사용자의 프라이버시 보호에 곱셈군의 랜덤수와 일방행 해쉬 함수를 해쉬체인으로 묶음으로써 사용자의 서명을 안전하게 사용할 수 있다. 성능평가 결과, 제안 모델은 기존 모델보다 데이터의 처리시간이 평균 24.5% 향상된 결과를 얻었고, 사용자의 프라이버시 정보를 그룹 관리하기 때문에 기존 모델보다 효율성이 13.7% 향상되었다.

Information Privacy Concern in Context-Aware Personalized Services: Results of a Delphi Study

  • Lee, Yon-Nim;Kwon, Oh-Byung
    • Asia pacific journal of information systems
    • /
    • 제20권2호
    • /
    • pp.63-86
    • /
    • 2010
  • Personalized services directly and indirectly acquire personal data, in part, to provide customers with higher-value services that are specifically context-relevant (such as place and time). Information technologies continue to mature and develop, providing greatly improved performance. Sensory networks and intelligent software can now obtain context data, and that is the cornerstone for providing personalized, context-specific services. Yet, the danger of overflowing personal information is increasing because the data retrieved by the sensors usually contains privacy information. Various technical characteristics of context-aware applications have more troubling implications for information privacy. In parallel with increasing use of context for service personalization, information privacy concerns have also increased such as an unrestricted availability of context information. Those privacy concerns are consistently regarded as a critical issue facing context-aware personalized service success. The entire field of information privacy is growing as an important area of research, with many new definitions and terminologies, because of a need for a better understanding of information privacy concepts. Especially, it requires that the factors of information privacy should be revised according to the characteristics of new technologies. However, previous information privacy factors of context-aware applications have at least two shortcomings. First, there has been little overview of the technology characteristics of context-aware computing. Existing studies have only focused on a small subset of the technical characteristics of context-aware computing. Therefore, there has not been a mutually exclusive set of factors that uniquely and completely describe information privacy on context-aware applications. Second, user survey has been widely used to identify factors of information privacy in most studies despite the limitation of users' knowledge and experiences about context-aware computing technology. To date, since context-aware services have not been widely deployed on a commercial scale yet, only very few people have prior experiences with context-aware personalized services. It is difficult to build users' knowledge about context-aware technology even by increasing their understanding in various ways: scenarios, pictures, flash animation, etc. Nevertheless, conducting a survey, assuming that the participants have sufficient experience or understanding about the technologies shown in the survey, may not be absolutely valid. Moreover, some surveys are based solely on simplifying and hence unrealistic assumptions (e.g., they only consider location information as a context data). A better understanding of information privacy concern in context-aware personalized services is highly needed. Hence, the purpose of this paper is to identify a generic set of factors for elemental information privacy concern in context-aware personalized services and to develop a rank-order list of information privacy concern factors. We consider overall technology characteristics to establish a mutually exclusive set of factors. A Delphi survey, a rigorous data collection method, was deployed to obtain a reliable opinion from the experts and to produce a rank-order list. It, therefore, lends itself well to obtaining a set of universal factors of information privacy concern and its priority. An international panel of researchers and practitioners who have the expertise in privacy and context-aware system fields were involved in our research. Delphi rounds formatting will faithfully follow the procedure for the Delphi study proposed by Okoli and Pawlowski. This will involve three general rounds: (1) brainstorming for important factors; (2) narrowing down the original list to the most important ones; and (3) ranking the list of important factors. For this round only, experts were treated as individuals, not panels. Adapted from Okoli and Pawlowski, we outlined the process of administrating the study. We performed three rounds. In the first and second rounds of the Delphi questionnaire, we gathered a set of exclusive factors for information privacy concern in context-aware personalized services. The respondents were asked to provide at least five main factors for the most appropriate understanding of the information privacy concern in the first round. To do so, some of the main factors found in the literature were presented to the participants. The second round of the questionnaire discussed the main factor provided in the first round, fleshed out with relevant sub-factors. Respondents were then requested to evaluate each sub factor's suitability against the corresponding main factors to determine the final sub-factors from the candidate factors. The sub-factors were found from the literature survey. Final factors selected by over 50% of experts. In the third round, a list of factors with corresponding questions was provided, and the respondents were requested to assess the importance of each main factor and its corresponding sub factors. Finally, we calculated the mean rank of each item to make a final result. While analyzing the data, we focused on group consensus rather than individual insistence. To do so, a concordance analysis, which measures the consistency of the experts' responses over successive rounds of the Delphi, was adopted during the survey process. As a result, experts reported that context data collection and high identifiable level of identical data are the most important factor in the main factors and sub factors, respectively. Additional important sub-factors included diverse types of context data collected, tracking and recording functionalities, and embedded and disappeared sensor devices. The average score of each factor is very useful for future context-aware personalized service development in the view of the information privacy. The final factors have the following differences comparing to those proposed in other studies. First, the concern factors differ from existing studies, which are based on privacy issues that may occur during the lifecycle of acquired user information. However, our study helped to clarify these sometimes vague issues by determining which privacy concern issues are viable based on specific technical characteristics in context-aware personalized services. Since a context-aware service differs in its technical characteristics compared to other services, we selected specific characteristics that had a higher potential to increase user's privacy concerns. Secondly, this study considered privacy issues in terms of service delivery and display that were almost overlooked in existing studies by introducing IPOS as the factor division. Lastly, in each factor, it correlated the level of importance with professionals' opinions as to what extent users have privacy concerns. The reason that it did not select the traditional method questionnaire at that time is that context-aware personalized service considered the absolute lack in understanding and experience of users with new technology. For understanding users' privacy concerns, professionals in the Delphi questionnaire process selected context data collection, tracking and recording, and sensory network as the most important factors among technological characteristics of context-aware personalized services. In the creation of a context-aware personalized services, this study demonstrates the importance and relevance of determining an optimal methodology, and which technologies and in what sequence are needed, to acquire what types of users' context information. Most studies focus on which services and systems should be provided and developed by utilizing context information on the supposition, along with the development of context-aware technology. However, the results in this study show that, in terms of users' privacy, it is necessary to pay greater attention to the activities that acquire context information. To inspect the results in the evaluation of sub factor, additional studies would be necessary for approaches on reducing users' privacy concerns toward technological characteristics such as highly identifiable level of identical data, diverse types of context data collected, tracking and recording functionality, embedded and disappearing sensor devices. The factor ranked the next highest level of importance after input is a context-aware service delivery that is related to output. The results show that delivery and display showing services to users in a context-aware personalized services toward the anywhere-anytime-any device concept have been regarded as even more important than in previous computing environment. Considering the concern factors to develop context aware personalized services will help to increase service success rate and hopefully user acceptance for those services. Our future work will be to adopt these factors for qualifying context aware service development projects such as u-city development projects in terms of service quality and hence user acceptance.