• Title/Summary/Keyword: Privacy Invasion

Search Result 158, Processing Time 0.03 seconds

Application Plan of U.S Aviation Profiling for Prevention of Air Terrorism in Korea (항공테러 예방을 위한 미국 항공프로파일링 기법의 국내 활용방안)

  • Yang, Seung-Don;Yang, Young-Mo
    • Korean Security Journal
    • /
    • no.38
    • /
    • pp.33-56
    • /
    • 2014
  • This study is aim to make use of prevention of air terrorism and strengthen of air security in Korea. To achieve it. searching main feature in U.S aviation profiling. Aviation profiling in U.S used to Secure Flight, Screening Passengers by Observation Technique, Registered Travel Program. Through U.S Aviation Profiling, Prevention of air terrorism in Korea are as in the following. First, Through U.S Aviation Profiling, Information of terrorism constructed in advance and unification of constructed information. Second, Identifiying that institution exclusively for prevention of air terrorism. Third, Identifiying that human rights and privacy invasion to a minimun plan anout U.S aviation profiling. Finally, Identifiying that the spread of research development for prevention of air terrorism and strengthen of air security in Korea.

  • PDF

Pseudonym-based Anonymous PKI with Short Group Signature (Short Group Signature를 이용한 가명 기반 PKI)

  • Lee, Sok-Joon;Han, Seung-Wan;Lee, Yun-Kyung;Chung, Byung-Ho
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.10a
    • /
    • pp.703-707
    • /
    • 2008
  • Nowadays, Internet becomes an essential element in our life. We can make use of numerous on-line services through Internet such as information search, on-line shopping, e-mail service, etc. But, while getting the benefits of Internet service, invasion of our privacy frequently occurs because on-line service providers tend to request excessive or unnecessary personal information. So, there have been some researches on anonymous authentication, which means that user can authenticate herself, not revealing her identity or personal information. But, most of the researches are not somewhat applicable to current authentication infrastructure. In this paper, we propose a pseudonym-based anonymous PKI with short group signature. Using our proposed scheme, we can provide anonymity with conditional traceability to current PKI.

  • PDF

Verification of a Function-based Security Authentication Protocol for Implantable Medical Devices (함수 기반의 체내 삽입장치용 보안 인증프로토콜 검증)

  • Bae, WooSik;Han, KunHee
    • Journal of Digital Convergence
    • /
    • v.12 no.5
    • /
    • pp.249-254
    • /
    • 2014
  • Recent advancement of USN technology has lent itself to the evolving communication technology for implantable devices in the field of medical service. The wireless transmission section for communication between implantable medical devices and patients is a cause of concern over invasion of privacy, resulting from external attackers' hacking and thus leakage of private medical information. In addition, any attempt to manipulate patients' medical information could end up in serious medical issues. The present study proposes an authentication protocol safe against intruders' attacks when RFID/USN technology is applied to implantable medical devices. Being safe against spoofing, information exposure and eavesdropping attacks, the proposed protocol is based on hash-function operation and adopts session keys and random numbers to prevent re-encryption. This paper verifies the security of the proposed protocol using the formal verification tool, Casper/FDR.

Factors Influencing on User Satisfaction and Recommendation Intention in Location Based Service of Smartphone (스마트폰의 위치기반 서비스가 사용자 만족과 추천의도에 미치는 영향)

  • Nam, Soo-tai;Kim, Do-goan;Jin, Chan-yong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.10a
    • /
    • pp.207-210
    • /
    • 2013
  • Recently, rapid innovation of Smartphone is changing the paradigm of our daily life. Smartphone users, opinion experts more than 99 percent of the economically active population is using, it has reached the saturation past the early stages of formation. Smartphone is equipped with a general purpose OS possible the implementation of high performance environment similar level as a personal computer. Also, it is a mobile communication terminal scalable which can be removed or installed various applications. Such extensibility, it is possible to use different applications through the Apps store. In addition, it is also possible various services which are location based service. However, these services also benefit many but it also has a disadvantage of invasion of privacy and disclosure of personal information. In this research, we aim to analyze factors influencing on perceived value and risk in location based service of Smartphone. In addition, we aim to analyze the causal relationship with perceived value and risk in satisfaction and recommendation intention. This study suggests practical and theoretical implications based on the results.

  • PDF

A Study on the Customized Security Policy for Effective Information Protection System (실효적인 정보보호관리 통제를 위한 맞춤형 보안정책 연구)

  • Son, Young-hwan;Kim, In-seok
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.3
    • /
    • pp.705-715
    • /
    • 2017
  • Today, the world is evolving into a huge community that can communicate with real-time information sharing and communication based on the rapid advancement of scientific technology and information. Behind this information, the adverse effects of information assets, such as hacking, viruses, information assets, and unauthorized disclosure of information assets, are continually increasing as a serious social problem. Each time an infringement of the invasion and personal information leaks occur, many regulatory policies have been announced, including stricter regulations for protecting the privacy of the government and establishing comprehensive countermeasures. Also, companies are making various efforts to increase awareness of the importance of information security. Nevertheless, information security accidents like the leaks of industrial secrets are continuously occurring and the frequency is not lessening. In this thesis, I proposed a customized security policy methodology that supports users with various business circumstances and service and also enables them to respond to the security threats more confidently and effectively through not a monotonous and technical but user-centered security policy.

A study on a target-tracking and noncontact type biosignal measurment system Using IR-Radar and Pan-Tilt system (원격 비접촉식 목표 추적형 생체신호측정시스템에 관한 연구)

  • Choi, Kwang-Wook;Kim, Cheol-Sung;Yang, Chul-Seung;Lee, Jeong-Gi
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.9
    • /
    • pp.2237-2242
    • /
    • 2014
  • As Single households increases for reason of communication development, extending human life, there are many problems occuring all over the world. In order to solve this problem with an invasion of privacy and manintain a healthy life, this paper suggest non-contact type bio-signal measurement system using IR-Radar, displacement sensor and Pan-Tilt system. The proposed system can increse the distance of measured respiration from 1m to over 8m, which is comprised of two IR-Radar for location tracking, one displacement sensor for non-contact type bio-signal measurement and one stepping motor drive system. The proposed system is verified through experiments and were confirmed the possibility.

Dynamic Remote User Trust Evaluation Scheme for Social Network Service (소셜 네트워크에서 원거리 노드를 고려한 동적 사용자 신뢰도 평가 스킴)

  • Kim, Youngwoong;Choi, Younsung;Kwon, Keun;Jeon, Woongryul;Won, Dongho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.2
    • /
    • pp.373-384
    • /
    • 2014
  • The social network service is the bidirectional media that many users can build relations not only friends but also other people. However, a process to approach in the social network is so simple that untrustable information, which malignant users make, is spreaded rapidly in many the social network uses. This causes many users to suffer material or psychological damages. Because of openness in the social network, there will be higher risk of the privacy invasion. Therefore, sensitive information should be transferred or provided only to reliable users. In general, because many users exchange among one hops, many researches have focused on one hop's trust evaluation. However, exchanges between users happen not only one joint bridege but also far nodes more than two nodes on account of dense network and openness. In this paper we propose the efficient scheme combining transitivity and composability for remote users.

Bias & Hate Speech Detection Using Deep Learning: Multi-channel CNN Modeling with Attention (딥러닝 기술을 활용한 차별 및 혐오 표현 탐지 : 어텐션 기반 다중 채널 CNN 모델링)

  • Lee, Wonseok;Lee, Hyunsang
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.12
    • /
    • pp.1595-1603
    • /
    • 2020
  • Online defamation incidents such as Internet news comments on portal sites, SNS, and community sites are increasing in recent years. Bias and hate expressions threaten online service users in various forms, such as invasion of privacy and personal attacks, and defamation issues. In the past few years, academia and industry have been approaching in various ways to solve this problem The purpose of this study is to build a dataset and experiment with deep learning classification modeling for detecting various bias expressions as well as hate expressions. The dataset was annotated 7 labels that 10 personnel cross-checked. In this study, each of the 7 classes in a dataset of about 137,111 Korean internet news comments is binary classified and analyzed through deep learning techniques. The Proposed technique used in this study is multi-channel CNN model with attention. As a result of the experiment, the weighted average f1 score was 70.32% of performance.

SE-PKI Key Recovery system with multiple escrow agents (다수의 위탁 기관 참여가 가능한 SE-PKI 키 복구 시스템)

  • 유희종;최희봉;오수현;원동호
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.11 no.1
    • /
    • pp.25-33
    • /
    • 2001
  • In 1998, A. Young and M. Yung introduced the concept of ARC that conjugates functionalities of a typical PKI with the ability to escrow privte keys of the system users. Also in 1999, P. Paillier and M. Yung proposed a new notion - called SE-PKI -which presents other additional advantages beyond ARC. But SE-PKI system uses only one escrow agent. The storage of users secret information at a single agent can make it significant point of attack and arouse controversy about invasion of privacy. This paper presents SE-PKI key recovery system that multiple escrow agents can participate in it. Also, in our system, escrow agents can\`t recover user\`s ciphertext.

Hash chain based Group Key Management Mechanism for Smart Grid Environments (스마트그리드 환경에 적용 가능한 해쉬체인 기반의 그룹키 관리 메커니즘)

  • Eun, Sun-Ki;Oh, Soo-Hyun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.4
    • /
    • pp.149-160
    • /
    • 2011
  • Smart Grid is the next-generation intelligent power grid that maximizes energy efficiency with the convergence of IT technologies and the existing power grid. It enables consumers to check power rates in real time for active power consumption. It also enables suppliers to measure their expected power generation load, which stabilizes the operation of the power system. However, there are high possibility that various kinds of security threats such as data exposure, data theft, and privacy invasion may occur in interactive communication with intelligent devices. Therefore, to establish a secure environment for responding to such security threat with the smart grid, the key management technique, which is the core of the development of a security mechanism, is required. Using a hash chain, this paper suggests a group key management mechanism that is efficiently applicable to the smart grid environment with its hierarchical structure, and analyzes the security and efficiency of the suggested group key management mechanism.