• 제목/요약/키워드: Privacy Protection

검색결과 871건 처리시간 0.029초

Zero-knowledge proof algorithm for Data Privacy

  • Min, Youn-A
    • International Journal of Internet, Broadcasting and Communication
    • /
    • 제13권2호
    • /
    • pp.67-75
    • /
    • 2021
  • As pass the three revised bills, the Personal Information Protection Act was revised to have a larger application for personal information. For an industrial development through an efficient and secure usage of personal information, there is a need to revise the existing anonymity processing method. This paper modifies the Zero Knowledge Proofs algorithm among the anonymity processing methods to modify the anonymity process calculations by taking into account the reliability of the used service company. More detail, the formula of ZKP (Zero Knowledge Proof) used by ZK-SNAKE is used to modify the personal information for pseudonymization processing. The core function of the proposed algorithm is the addition of user variables and adjustment of the difficulty level according to the reliability of the data user organization and the scope of use. Through Setup_p, the additional variable γ can be selectively applied according to the reliability of the user institution, and the degree of agreement of Witness is adjusted according to the reliability of the institution entered through Prove_p. The difficulty of the verification process is adjusted by considering the reliability of the institution entered through Verify_p. SimProve, a simulator, also refers to the scope of use and the reliability of the input authority. With this suggestion, it is possible to increase reliability and security of anonymity processing and distribution of personal information.

An Improved Lightweight Two-Factor Authentication and Key Agreement Protocol with Dynamic Identity Based on Elliptic Curve Cryptography

  • Qiu, Shuming;Xu, Guosheng;Ahmad, Haseeb;Xu, Guoai;Qiu, Xinping;Xu, Hong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제13권2호
    • /
    • pp.978-1002
    • /
    • 2019
  • With the rapid development of the Internet of Things, the problem of privacy protection has been paid great attention. Recently, Nikooghadam et al. pointed out that Kumari et al.'s protocol can neither resist off-line guessing attack nor preserve user anonymity. Moreover, the authors also proposed an authentication supportive session initial protocol, claiming to resist various vulnerability attacks. Unfortunately, this paper proves that the authentication protocols of Kumari et al. and Nikooghadam et al. have neither the ability to preserve perfect forward secrecy nor the ability to resist key-compromise impersonation attack. In order to remedy such flaws in their protocols, we design a lightweight authentication protocol using elliptic curve cryptography. By way of informal security analysis, it is shown that the proposed protocol can both resist a variety of attacks and provide more security. Afterward, it is also proved that the protocol is resistant against active and passive attacks under Dolev-Yao model by means of Burrows-Abadi-Needham logic (BAN-Logic), and fulfills mutual authentication using Automated Validation of Internet Security Protocols and Applications (AVISPA) software. Subsequently, we compare the protocol with the related scheme in terms of computational complexity and security. The comparative analytics witness that the proposed protocol is more suitable for practical application scenarios.

EMR System에 대한 익명성 기반 프라이버시 보호기법 연구 (A Research about Anonymity Based Privacy Protection Scheme for EMR System)

  • 최은석;은하수;;오희국
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2013년도 추계학술발표대회
    • /
    • pp.868-870
    • /
    • 2013
  • 전자의무기록(Electronic Medical Record, EMR) 시스템은 기존에 수기로 작성하던 의무기록을 디지털화 한 것이다. 이는 다양한 장점이 있지만 의료인이 관리 도메인을 통해 환자의 정보를 세밀하게 수집할 수 있는 환자 개인의 프라이버시 침해 문제가 발생하게 된다. 즉, 관계자에 의해 의도적인 유출이 발생하거나 의료정보의 거래, 복제 등 위험성이 존재한다. 특히 일부 의료정보는 고용 차별이나 사회적 차별 등 환자에게 정신적 고통을 안겨줄 수 있다. 이러한 프라이버시 침해는 유전성 질환 유전자를 가진 사람에게 유전적 요인에 근거하는 고용 차별이 발생할 수 있다. 관련연구에서는 환자의 임상적(Clinical) 또는 유전적(Genomic) 정보가 자신의 신원과 연계되어 있다면 프라이버시 침해가 발생할 수 있음을 나타낸다. 이러한 프라이버시 문제로 인해 EMR 시스템에 기반을 둔 전자건강기록(Electronic Health Record, EHR) 시스템 또한 개인 프라이버시 침해의 위험이 존재하게 된다. 따라서 의료정보의 프라이버시 보호를 위해 부당한 고용 차별 보험 차별 사회적 차별로 연결될 수 있는 개인 의료정보의 유출방지, 타인에게 알려지고 싶지 않은 개인 의료정보가 무단으로 거래되지 않는 것을 보장해야 한다. 이를 위해 본 논문에서는 의무기록의 익명화를 통해 환자와 의무기록 간의 관계를 제거하는 여러 방법들을 소개한다.

보안성과 유연성을 갖춘 Peer-to-Peer 데이터 공유 기법의 설계 및 구현 (Design and Implementation of a Peer-to-Peer Data Sharing Scheme for Closed User Group with Security and Flexibility)

  • 이구연;이용;김화종;정충교;이동은
    • 정보보호학회논문지
    • /
    • 제15권4호
    • /
    • pp.61-70
    • /
    • 2005
  • We propose and implement a flexible secure peer-to-peer(P2P) file sharing scheme which can be used for data sharing among closed user group (CUG) members. When a member wants to share data, notification messages are sent to the members with whom the member wants to share data. Each notification message includes one-time password encrypted with the receiver's public key. A member who received the notification message can download the data by using the one-time password. The proposed scheme provides selective sharing, download confirmation and efficient storage management. In terms of security, the proposed scheme supports authentication, entity privacy, replay attack protection and disguise prevention. We also implement the proposed system and find that the system is very useful among P2P service of closed user groups.

Safe clinical photography: best practice guidelines for risk management and mitigation

  • Chandawarkar, Rajiv;Nadkarni, Prakash
    • Archives of Plastic Surgery
    • /
    • 제48권3호
    • /
    • pp.295-304
    • /
    • 2021
  • Clinical photography is an essential component of patient care in plastic surgery. The use of unsecured smartphone cameras, digital cameras, social media, instant messaging, and commercially available cloud-based storage devices threatens patients' data safety. This paper Identifies potential risks of clinical photography and heightens awareness of safe clinical photography. Specifically, we evaluated existing risk-mitigation strategies globally, comparing them to industry standards in similar settings, and formulated a framework for developing a risk-mitigation plan for avoiding data breaches by identifying the safest methods of picture taking, transfer to storage, retrieval, and use, both within and outside the organization. Since threats evolve constantly, the framework must evolve too. Based on a literature search of both PubMed and the web (via Google) with key phrases and child terms (for PubMed), the risks and consequences of data breaches in individual processes in clinical photography are identified. Current clinical-photography practices are described. Lastly, we evaluate current risk mitigation strategies for clinical photography by examining guidelines from professional organizations, governmental agencies, and non-healthcare industries. Combining lessons learned from the steps above into a comprehensive framework that could contribute to national/international guidelines on safe clinical photography, we provide recommendations for best practice guidelines. It is imperative that best practice guidelines for the simple, safe, and secure capture, transfer, storage, and retrieval of clinical photographs be co-developed through cooperative efforts between providers, hospital administrators, clinical informaticians, IT governance structures, and national professional organizations. This would significantly safeguard patient data security and provide the privacy that patients deserve and expect.

초거대 인공지능 정책 변동과정에 관한 연구 : 옹호연합모형을 중심으로 (A Study on the Process of Policy Change of Hyper-scale Artificial Intelligence: Focusing on the ACF)

  • 최석원;이주연
    • 시스템엔지니어링학술지
    • /
    • 제18권2호
    • /
    • pp.11-23
    • /
    • 2022
  • Although artificial intelligence(AI) is a key technology in the digital transformation among the emerging technologies, there are concerns about the use of AI, so many countries have been trying to set up a proper regulation system. This study analyzes the cases of the regulation policies on AI in USA, EU and Korea with the aim to set up and improve proper AI policies and strategies in Korea. In USA, the establishment of the code of ethics for the use of AI is led by private sector. On the other side, Europe is strengthening competitiveness in the AI industry by consolidating regulations that are dispersed by EU members. Korea has also prepared and promoted policies for AI ethics, copyright and privacy protection at the national level and trying to change to a negative regulation system and improve regulations to close the gap between the leading countries and Korea in AI. Moreover, this study analyzed the course of policy changes of AI regulation policy centered on ACF(Advocacy Coalition Framework) model of Sabatier. Through this study, it proposes hyper-scale AI regulation policy recommendations for improving competitiveness and commercialization in Korea. This study is significant in that it can contribute to increasing the predictability of policy makers who have difficulties due to uncertainty and ambiguity in establishing regulatory policies caused by the emergence of hyper-scale artificial intelligence.

Exploring Considerations for Developing Metaverse Ethical Guidelines

  • HoSung WOO;Yong KIM
    • 연구윤리
    • /
    • 제4권2호
    • /
    • pp.1-5
    • /
    • 2023
  • Purpose: There are already hundreds of millions of users of the Metaverse platform, and within a few years, it is expected to develop into a stage for new economic activities with huge industrial ripple effects due to the size of users. The purpose of this study is to derive considerations for the development of metaverse ethical guidelines. Research design, data, and methodology: The concept of the metaverse was examined through various opinions of industry and experts on the metaverse, and literature related to metaverse ethics was analyzed in the Korean journal database. Results: Six issues were identified through the existing research. (1) Establishing a unified definition of metaverse (2) Necessity of establishing ethical principles considering the operator (3) Personal information protection and privacy (4) Expression in a virtual environment (5) Copyright and intellectual property rights of creations (6) Virtual economy and fairness of trade. Conclusions: Metaverse ethics will be developed and implemented in a form and method different from the real world, but basically, continuous discussions on ethical rationality are needed in the process. In addition, since the ethical judgment in the metaverse environment accompanies cultural differences and epochal changes, it is necessary to focus on metaverse ethics cases.

A PERFORMANCE IMPROVEMENT OF ANEL SCHEME THROUGH MESSAGE MAPPING AND ELLIPTIC CURVE CRYPTOGRAPHY

  • Benyamina Ahmed;Benyamina Zakarya
    • International Journal of Computer Science & Network Security
    • /
    • 제23권3호
    • /
    • pp.169-176
    • /
    • 2023
  • The vehicular ad hoc network (VANET) is currently an important approach to improve personal safety and driving comfort. ANEL is a MAC-based authentication scheme that offers all the advantages of MAC-based authentication schemes and overcomes all their limitations at the same time. In addition, the given scheme, ANEL, can achieve the security objectives such as authentication, privacy preservation, non-repudiation, etc. In addition, our scheme provides effective bio-password login, system key update, bio-password update, and other security services. Additionally, in the proposed scheme, the Trusted Authority (TA) can disclose the source driver and vehicle of each malicious message. The heavy traffic congestion increases the number of messages transmitted, some of which need to be secretly transmitted between vehicles. Therefore, ANEL requires lightweight mechanisms to overcome security challenges. To ensure security in our ANEL scheme we can use cryptographic techniques such as elliptic curve technique, session key technique, shared key technique and message authentication code technique. This article proposes a new efficient and light authentication scheme (ANEL) which consists in the protection of texts transmitted between vehicles in order not to allow a third party to know the context of the information. A detail of the mapping from text passing to elliptic curve cryptography (ECC) to the inverse mapping operation is covered in detail. Finally, an example of application of the proposed steps with an illustration

차량 통신에서 MAC Security 기반의 사용자 프라이버시 보호기법 (Privacy Protection Mechanism using MAC Security in VANET)

  • 임헌정;이준원;김태경;정태명
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2011년도 춘계학술발표대회
    • /
    • pp.812-815
    • /
    • 2011
  • 통신기술이 발달하면서 차량 통신에 대한 연구가 활발히 진행되고 있다. 주 연구 분야로 라우팅 및 위치정보 기반의 주소 설정과 통신, 보안 문제 해결 등이 있다. 차량은 지극히 개인적인 공간이므로 운전자의 위치 및 식별정보에 대한 보호가 필요하다. 이러한 연구는 운전자 프라이버시 보호 측면에서 보안기능과는 별도로 연구가 진행되고 있다. 기존의 프라이버시 보호 기술들은 각 계층별 프라이버시 보호는 만족하고 있지만, 계층별 정보들의 연결을 통해 프라이버시를 공격하는 연관 공격(Relation Attack)에 대하여서는 취약함을 보이고 있다. 따라서 본 논문에서는 MAC Security 기술을 이용하여 운전자의 프라이버시를 보호하는 기법을 제안하려 한다. 제안하는 기법은 네트워크 접속 계층 주소를 제외한 나머지 정보를 암호화 하기 때문에 물리 주소로 인한 프라이버시가 침해가 발생 하더라도 다른 계층의 정보를 알 수 없으므로 네트워크 계층의 위치 정보 및 응용계층의 사용자의 식별 정보 등을 보호 함으로 상관 공격에 안전하다. 물리 주소 역시 해당 도메인에서 유일한 식별 정보 이므로 멀티 도메인 통신이 이루어 지는 인터넷 상에서는 운전자의 프라이버시를 보호 할 수 있다.

TAP-GAN: 어텐션 메커니즘이 적용된 ACGAN 기반의 경로 프라이버시 강화 (TAP-GAN: Enhanced Trajectory Privacy Based on ACGAN with Attention Mechanism)

  • 신지환;송예지;안진현;이태휘;임동혁
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2023년도 춘계학술발표대회
    • /
    • pp.522-524
    • /
    • 2023
  • 위치 기반 서비스(LBS)의 확산으로 다양한 분야에서 활용할 수 있는 많은 양의 경로 데이터가 생성되고 있다. 하지만 공격자가 경로 데이터를 통해 잠재적으로 사용자의 개인정보를 유추할 수 있다는 문제점이 존재한다. 따라서 경로 데이터의 프라이버시를 보존하며 유용성을 유지할 수 있는 GAN(Generative Adversarial Network)을 사용한 많은 연구가 진행되고 있다. 그러나 GAN은 생성된 결과물을 제어하지 못한다는 한계점을 가지고 있다. 본 논문에서는 ACGAN(Auxiliary classifier GAN)을 통해 생성된 결과물을 제어함으로써 경로 데이터의 민감한 정점을 숨기고, Attention mechanism을 결합하여 높은 유용성과 익명성을 제공하는 합성 경로 생성 모델인 TAP-GAN(Trajectory attention and protection-GAN)을 제안한다. 또한 모델의 성능을 입증하기 위해 유용성 및 익명성 실험을 진행하고, 선행 연구 모델과의 비교를 통해 TAP-GAN이 경로 데이터의 유용성을 보장하면서 사용자의 프라이버시를 효과적으로 보호할 수 있음을 확인하였다.