• Title/Summary/Keyword: Privacy Evaluation

Search Result 163, Processing Time 0.023 seconds

Identity-Based Ring Signature Schemes for Multiple Domains

  • Ki, JuHee;Hwang, Jung Yeon;Lee, Dong Hoon
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.10
    • /
    • pp.2692-2707
    • /
    • 2012
  • A separable identity-based ring signature scheme has been constructed as a fundamental cryptographic primitive for protecting user privacy. Using the separability property, ring members can be selected from arbitrary domains, thereby, giving a signer a wide range of ways to control privacy. In this paper we propose a generic method to construct efficient identity-based ring signature schemes with various levels of separability. We first describe a method to efficiently construct an identity-based ring signature scheme for a single domain, in which a signer can select ring identities by choosing from identities defined only for the domain. Next, we present a generic method for linking ring signatures constructed for a single domain. Using this method, an identity-based ring signature scheme with a compact structure, supporting multiple arbitrary domains can be designed. We show that our method outperforms the best known schemes in terms of signature size and computational costs, and that the security model based on the separability of identity-based ring signatures, presented in this paper, is highly refined and effective by demonstrating the security of all of the proposed schemes, using a model with random oracles.

A Study on the Evaluation of Personal and Common Work Environment of Offices -Based on Survey of Office Workers in Seoul (오피스의 개인 및 공동 업무환경 평가연구-서울시 오피스 사용자를 대상으로-)

  • 제해성;하미경
    • Korean Institute of Interior Design Journal
    • /
    • no.7
    • /
    • pp.3-11
    • /
    • 1996
  • This study intents to provide useful information of effective office works by evaluating existing office work environment. It focuses on evaluating the quality of personal and common work spaces, comparing responses for user groups to their work environment, and identifying factors which affect the satisfaction of work environment . The study is based on the survey which has been answered by 193 respondents from 24 companies (mainly from large corporate companies) in Seoul. This study finds out that noise is the most serious problem in common work space and that environmental comfort and the size of common space are not satisfactory in their effective work. It identifies that open space work environment, which has been expansively provided for a long time, causes noise problem and deprives office workers of privacy and personalization opportunities. The respondents reply that meeting spaces are not enough in number and size and lack of privacy and its adequate quality . They respond that privacy , chair comfortness and storage spaces are important factors for personal work spaces. In order to improve the quality and efficiency of work, this study proposes that companies should provide convenient office facilities which considering human ergonomic and should educate professional facility managers.

  • PDF

Advanced approach to information security management system utilizing maturity models in critical infrastructure

  • You, Youngin;Oh, Junhyoung;Kim, Sooheon;Lee, Kyungho
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.10
    • /
    • pp.4995-5014
    • /
    • 2018
  • As the area covered by the CPS grows wider, agencies such as public institutions and critical infrastructure are collectively measuring and evaluating information security capabilities. Currently, these methods of measuring information security are a concrete method of recommendation in related standards. However, the security controls used in these methods are lacking in connectivity, causing silo effect. In order to solve this problem, there has been an attempt to study the information security management system in terms of maturity. However, to the best of our knowledge, no research has considered the specific definitions of each level that measures organizational security maturity or specific methods and criteria for constructing such levels. This study developed an information security maturity model that can measure and manage the information security capability of critical infrastructure based on information provided by an expert critical infrastructure information protection group. The proposed model is simulated using the thermal power sector in critical infrastructure of the Republic of Korea to confirm the possibility of its application to the field and derive core security processes and goals that constitute infrastructure security maturity. The findings will be useful for future research or practical application of infrastructure ISMSs.

An Efficient Encryption Technique for Cloud-Computing in Mobile Environments (모바일환경에서 클라우드 컴퓨팅 보안을 위한 효율적인 암호화기술)

  • Hwang, Jae-Young;Choi, Dong-Wook;Chung, Yeon-Ho
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.12 no.4
    • /
    • pp.298-302
    • /
    • 2011
  • In this paper, we propose an efficient encryption algorithm for ensuring data privacy and security for cloud computing in mobile environments. As part of the evaluation of the proposed algorithm, we have implemented the algorithm in a PC environment and compared with the well-known encryption algorithm of the Data Encryption Standard (DES). The conventional DES algorithm is hard to maintain privacy, due to the fact that its initial and final permutation are known to the network To prevent this critical weakness, a triple DES algorithm has been reported, but it has a disadvantage of long encryption time. In this study, we propose random interleaving algorithm that uses the permutation table for improving privacy further. The proposed algorithm is found to run faster than the triple DES algorithm and also offers improved security in a wireless communication system.

A Comprehensive Analyses of Intrusion Detection System for IoT Environment

  • Sicato, Jose Costa Sapalo;Singh, Sushil Kumar;Rathore, Shailendra;Park, Jong Hyuk
    • Journal of Information Processing Systems
    • /
    • v.16 no.4
    • /
    • pp.975-990
    • /
    • 2020
  • Nowadays, the Internet of Things (IoT) network, is increasingly becoming a ubiquitous connectivity between different advanced applications such as smart cities, smart homes, smart grids, and many others. The emerging network of smart devices and objects enables people to make smart decisions through machine to machine (M2M) communication. Most real-world security and IoT-related challenges are vulnerable to various attacks that pose numerous security and privacy challenges. Therefore, IoT offers efficient and effective solutions. intrusion detection system (IDS) is a solution to address security and privacy challenges with detecting different IoT attacks. To develop an attack detection and a stable network, this paper's main objective is to provide a comprehensive overview of existing intrusion detections system for IoT environment, cyber-security threats challenges, and transparent problems and concerns are analyzed and discussed. In this paper, we propose software-defined IDS based distributed cloud architecture, that provides a secure IoT environment. Experimental evaluation of proposed architecture shows that it has better detection and accuracy than traditional methods.

User Evaluation for User-Oriented Children's Hospital Design - Focused on the Mothers of Child Inpatients and the Nurses - (사용자 중심의 어린이전문병원 계획을 위한 사용자 평가 - 어린이 환자의 보호자와 간호사를 중심으로 -)

  • Ha, Ji-Min;Park, Soo-Been
    • Korean Institute of Interior Design Journal
    • /
    • v.25 no.1
    • /
    • pp.192-200
    • /
    • 2016
  • This study aims to design user-oriented children's hospital by examining the user needs, especially the mothers of child inpatients and the nurses. The subjects participated in a questionnaire survey including the user's characteristics, awareness of patient's room, the preference on ward size, demands, satisfaction and hospital environment assessment. The survey was conducted of the mothers of child inpatients and the nurses in A children's hospital, and the data were analyzed by the SPSS WIN 18.0 Version software. A total of 115 copies of the questionnaire were finally analyzed. The results and conclusions are as follows. 1) The mothers' demand on family-centered space and private spaces were higher than the nurses. 2) The mothers preferred 1-bed-room to 4-bed-room due to safety and privacy. 3) The items of hospital environment assessment was categorized into four factors; 'Aesthetics', 'Accessibility', 'Comfort', and 'Lighting'. The most positive factor was 'Aesthetics', whereas 'Comfort' was the negative factor. 4) The mother's satisfaction was lower than the nurse's. The most influential factors on the satisfaction was 'Accessibility'. To improve the satisfaction of the mothers of child inpatients and the nurses, safety, privacy, accessibility should be considered.

A Platform for RFID Security and Privacy Administration

  • Rieback, Melanie R.;Gaydadjiev, Georgi N.;Crispo, Bruno;Hofman, Rutger F.H.;Tanenbaum, Andrew S.
    • 한국정보컨버전스학회:학술대회논문집
    • /
    • 2008.06a
    • /
    • pp.75-86
    • /
    • 2008
  • This paper presents the design, implementation, and evaluation of the RFID Guardian, the first-ever unified platform for RFID security and privacy administration. The RFID Guardian resembles an "RFID firewall", enabling individuals to monitor and control access to their RFID tags by combining a standard-issue RFID reader with unique RFID tag emulation capabilities. Our system provides a platform for coordinated usage of RFID security mechanisms, offering fine-grained control over RFID-based auditing, key management, access control, and authentication capabilities. We have prototyped the RFID Guardian using off-the-shelf components, and our experience has shown that active mobile devices are a valuable tool for managing the security of RFID tags in a variety of applications, including protecting low-cost tags that are unable to regulate their own usage.

  • PDF

Private Blockchain-Based Secure Access Control for Smart Home Systems

  • Xue, Jingting;Xu, Chunxiang;Zhang, Yuan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.12
    • /
    • pp.6057-6078
    • /
    • 2018
  • Smart home systems provide a safe, comfortable, and convenient living environment for users, whereby users enjoy featured home services supported by the data collected and generated by smart devices in smart home systems. However, existing smart devices lack sufficient protection in terms of data security and privacy, and challenging security and privacy issues inevitably emerge when using these data. This article aims to address these challenging issues by proposing a private blockchain-based access control (PBAC) scheme. PBAC involves employing a private blockchain to provide an unforgeable and auditable foundation for smart home systems, that can thwart illegal data access, and ensure the accuracy, integrity, and timeliness of access records. A detailed security analysis shows that PBAC could preserve data security against various attacks. In addition, we conduct a comprehensive performance evaluation to demonstrate that PBAC is feasible and efficient.

Dynamic User Reliability Evaluation Scheme for Social Network Service (소셜 네트워크 서비스에서의 동적 사용자 신뢰도 평가 스킴)

  • Lee, Changhoon;Jung, Youngman;Jung, Jaewook;Won, Dongho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.2
    • /
    • pp.157-168
    • /
    • 2013
  • The social network service is the bidirectional media that all of the users are be able to directly produce, process, and distribute the information without distinction of the producer and consumer. Over increasing the users rapidly, the users are be able to obtain and share the various information, but the problems occur due to the spread of unreliable information on the service. Moreover, it is spreading the problems violating the privacy and decreasing the reliability of the users by exploiting the open environment. Therefore, sensitive information can be delivered only to users which information producer can trust, and the users should get the information from the trustworthy users. Due to this necessity, it needs the efficient method can evaluates the reliability of the users. In this paper, we define the reliability in the service, make the trust parameter by using the function of the service, and propose the dynamic user reliability evaluation scheme evaluating the reliability of users. We draw the trust range on the reliability of users by analyzing the proposed reliability evaluation scheme.

Measurement and evaluation of speech privacy in university office rooms (대학 내 사무실의 스피치 프라이버시 측정 및 평가)

  • Lim, Jae-Seop;Choi, Young-Ji
    • The Journal of the Acoustical Society of Korea
    • /
    • v.38 no.4
    • /
    • pp.396-405
    • /
    • 2019
  • The speech privacy of closed office rooms located in a university campus was measured and assessed in terms of SPC (Speech Privacy Class) values. The measurements of two quantities, the LD (Level Difference) between a source and a receiving room, and the background noise level ($L_b$) at the receiving room were carried out in 5 rooms located in 3 different buildings in the university campus. Each of the 5 rooms was adjacent to both offices and corridors through walls. The TL (Transmission Loss) between the source and the receiver room was also measured to compare the difference of two standard methods, ASTM E2836-10 and KS F 2809. The present results show that the speech privacy of the 5 office rooms is not met the requirement for a minimum SPC values of 70. A minimum LD value of 41 dB between the source and the receiver room should be achieved for having a SPC value of 70 when the mean measured value of $L_b$ at the receiving room is 29.2 dB. That is, the TL(avg) value averaged over the octave bands from 160 Hz to 5000 Hz between the source and the receiver room should be or greater than 40 dB. The most important architectural factor influencing the LD value is the presence of openings, such as doors, and windows, on the adjacent walls between the source and receiving room. Therefore, if the opening of the adjacent wall is replaced by an opening with high sound insulation, the appropriate SPC value of the research and office rooms can be achieved.