• 제목/요약/키워드: Privacy Protection

검색결과 885건 처리시간 0.03초

Hybrid Recommendation Algorithm for User Satisfaction-oriented Privacy Model

  • Sun, Yinggang;Zhang, Hongguo;Zhang, Luogang;Ma, Chao;Huang, Hai;Zhan, Dongyang;Qu, Jiaxing
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제16권10호
    • /
    • pp.3419-3437
    • /
    • 2022
  • Anonymization technology is an important technology for privacy protection in the process of data release. Usually, before publishing data, the data publisher needs to use anonymization technology to anonymize the original data, and then publish the anonymized data. However, for data publishers who do not have or have less anonymized technical knowledge background, how to configure appropriate parameters for data with different characteristics has become a more difficult problem. In response to this problem, this paper adds a historical configuration scheme resource pool on the basis of the traditional anonymization process, and configuration parameters can be automatically recommended through the historical configuration scheme resource pool. On this basis, a privacy model hybrid recommendation algorithm for user satisfaction is formed. The algorithm includes a forward recommendation process and a reverse recommendation process, which can respectively perform data anonymization processing for users with different anonymization technical knowledge backgrounds. The privacy model hybrid recommendation algorithm for user satisfaction described in this paper is suitable for a wider population, providing a simpler, more efficient and automated solution for data anonymization, reducing data processing time and improving the quality of anonymized data, which enhances data protection capabilities.

전자정부서비스에 대한 개인정보제공의 영향요인 (Factors Influencing the Provision of Personal Information in Electronic Government Services)

  • 박정애;손달호
    • 한국정보시스템학회지:정보시스템연구
    • /
    • 제26권1호
    • /
    • pp.53-73
    • /
    • 2017
  • Frequent outbreak of intrusion of private information is occurring recently not only at portal sites but also in electronic information service of public agencies. Due to these intrusions, it is observed that the citizens tend to avoid providing their private information even to the service for public agencies. Therefore, the object of this research can be explained as demonstrating the influence of the intention of provision for private information to foster the selectronic information ervice of the public agencies. In order to achieve this, this research intends to demonstrate how the experience of the intrusion of the private information affects the concern about the privacy and how the information factor from the public electronic information service has influence on the reliability toward the public. The results showed that the experience of intrusion of privacy, awareness of the danger of privacy, and the sense protection of the information from the manager at public agencies have direct influence on the concern of privacy. Meanwhile, it has been verified that the awareness of information protection of a manager, the systemicity of information protection, and the surveillance and punishment of information protection have influence on the reliability of public agencies.

프라이버시 보호를 위한 V2V 통신 인증 서비스의 간략화 (The Simplified V2V Communication Authentication Service for Privacy Protection)

  • 박승수;한근희;김기천
    • 사물인터넷융복합논문지
    • /
    • 제2권1호
    • /
    • pp.35-40
    • /
    • 2016
  • 차세대 자동차 기술 중의 하나인 V2V 통신은 차량 간에 통신할 때 사용되는 기법으로 차세대 ITS의 핵심기술이다. 기존 V2V 통신 인증 서비스 구조를 살펴보면 프라이버시 보호에 대한 보안 요구사항을 충족시키기 위해 가명 인증서를 사용한다. 가명 인증서를 사용하기 위해 발급 및 관리하는 기관이 필요하고 한번 발급할 때 여러 개의 인증서를 발급하기 때문에 시간이 많이 소요된다. 본 논문에서는 가명 인증서를 사용하지 않고 프라이버시 보호에 대한 보안 요구사항을 충족시키기 위해 차량 ID를 활용한 기법을 제시하고자 한다.

전자상거래에 있어서 소비자 프라이버시 보호에 관한 연구 -인터넷 전자상거래업체의 온라인모니터링조사를 중심으로- (Protection of Consumer Privacy in Electronic Commerce -Focused on On-line Monitoring Survey of Electronic Commerce Firms-)

  • 김혜선;서민교;전정기
    • 통상정보연구
    • /
    • 제6권2호
    • /
    • pp.219-242
    • /
    • 2004
  • This study is conducted to find out whether companies which use electronic commerce for their business are collecting the least personal information. of consumers that are necessary for providing electronic commerce services to consumers. Investigators visited website of 799 electronic commerce companies, and checked out the personal informations of consumers that were asked when they join the site as a member. The collected data were analyzed with frequency, percentage, and cross-tab analysis using SPSS program. Generally most electronic commerces required more personal information of consumers than necessary for providing their services to consumers. These phenomena are partly due to the fact that regulations regarding consumer privacy in electronic commerce are advisory rather than mandatory at present. Therefore, it is suggested that mandatory regulation which makes companies poot their identification within a certain area of their web page has to enforced for the protection of consumer privacy in electronic commerce. And it would be more efficient if consumers are consistently educated about self protection guideline regarding personal information in using electronic commerce in addition to a mandatory regulation.

  • PDF

The privacy protection algorithm of ciphertext nearest neighbor query based on the single Hilbert curve

  • Tan, Delin;Wang, Huajun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제16권9호
    • /
    • pp.3087-3103
    • /
    • 2022
  • Nearest neighbor query in location-based services has become a popular application. Aiming at the shortcomings of the privacy protection algorithms of traditional ciphertext nearest neighbor query having the high system overhead because of the usage of the double Hilbert curves and having the inaccurate query results in some special circumstances, a privacy protection algorithm of ciphertext nearest neighbor query which is based on the single Hilbert curve has been proposed. This algorithm uses a single Hilbert curve to transform the two-dimensional coordinates of the points of interest into Hilbert values, and then encrypts them by the order preserving encryption scheme to obtain the one-dimensional ciphertext data which can be compared in numerical size. Then stores the points of interest as elements composed of index value and the ciphertext of the other information about the points of interest on the server-side database. When the user needs to use the nearest neighbor query, firstly calls the approximate nearest neighbor query algorithm proposed in this paper to query on the server-side database, and then obtains the approximate nearest neighbor query results. After that, the accurate nearest neighbor query result can be obtained by calling the precision processing algorithm proposed in this paper. The experimental results show that this privacy protection algorithm of ciphertext nearest neighbor query which is based on the single Hilbert curve is not only feasible, but also optimizes the system overhead and the accuracy of ciphertext nearest neighbor query result.

Multi-Obfuscation Approach for Preserving Privacy in Smart Transportation

  • Sami S. Albouq;Adnan Ani Sen;Nabile Almoshfi;Mohammad Bin Sedeq;Nour Bahbouth
    • International Journal of Computer Science & Network Security
    • /
    • 제23권4호
    • /
    • pp.139-145
    • /
    • 2023
  • These days, protecting location privacy has become essential and really challenging, especially protecting it from smart applications and services that rely on Location-Based Services (LBS). As the technology and the services that are based on it are developed, the capability and the experience of the attackers are increased. Therefore, the traditional protection ways cannot be enough and are unable to fully ensure and preserve privacy. Previously, a hybrid approach to privacy has been introduced. It used an obfuscation technique, called Double-Obfuscation Approach (DOA), to improve the privacy level. However, this approach has some weaknesses. The most important ones are the fog nodes that have been overloaded due to the number of communications. It is also unable to prevent the Tracking and Identification attacks in the Mix-Zone technique. For these reasons, this paper introduces a developed and enhanced approach, called Multi-Obfuscation Approach (MOA that mainly depends on the communication between neighboring fog nodes to overcome the drawbacks of the previous approach. As a result, this will increase the resistance to new kinds of attacks and enhance processing. Meanwhile, this approach will increase the level of the users' privacy and their locations protection. To do so, a big enough memory is needed on the users' sides, which already is available these days on their devices. The simulation and the comparison prove that the new approach (MOA) exceeds the DOA in many Standards for privacy protection approaches.

How do multilevel privacy controls affect utility-privacy trade-offs when used in mobile applications?

  • Kim, Seung-Hyun;Ko, In-Young
    • ETRI Journal
    • /
    • 제40권6호
    • /
    • pp.813-823
    • /
    • 2018
  • In existing mobile computing environments, users need to choose between their privacy and the services that they can receive from an application. However, existing mobile platforms do not allow users to perform such trade-offs in a fine-grained manner. In this study, we investigate whether users can effectively make utility-privacy trade-offs when they are provided with a multilevel privacy control method that allows them to recognize the different quality of service that they will receive from an application by limiting the disclosure of their private information in multiple levels. We designed a research model to observe users' utility-privacy trade-offs in accordance with the privacy control methods and other factors such as the trustworthiness of an application, quality level of private information, and users' privacy preferences. We conducted a user survey with 516 participants and found that, compared with the existing binary privacy controls, both the service utility and the privacy protection levels were significantly increased when the users used the multilevel privacy control method.

국가별 개인정보보호법 및 의료정보보호법의 비교연구 (A Comparative Study of Regional Medical Information Protection Act and Privacy Act)

  • 방윤희;이현실;이일현
    • 한국콘텐츠학회논문지
    • /
    • 제14권11호
    • /
    • pp.164-174
    • /
    • 2014
  • 본 연구는 현재 국내의 의료기관에서 개인정보 및 의료정보보호에 적용되고 있는 적용법 간의 서로 상충되는 많은 문제점을 해결할 방안을 모색하고자 외국의 개인정보보호법과 의료정보보호법을 비교 분석하였다. 개인정보의 국제 표준 지침인 OECD와 EU의 가이드라인 분석과 개인정보보호법 및 의료정보보호법이 잘 정비되어 있는 미국, 캐나다, 프랑스를 선정하여 개인정보보호법제 및 의료정보보호법의 특징과 내용을 조사하여 비교하였으며, 현재 국내의 개인정보보호법 가이드라인과 의료정보보호 관련 법률 및 주요 내용을 항목별로 비교하였다. 분석결과 유럽의 여러 나라 중 특징적으로 프랑스가 의료정보보호를 위한 공공보건법을 제정하여 실행해오고 있었고, 미국과 캐나다가 독립된 의료정보보호법이 제정 실행되고 있었으며, 환자의 기록의 발생부터 관리 및 법을 이행하지 못했을 경우의 처벌조항까지 상당히 체계적인 법으로 규정하고 있고 기록의 작성자인 의사와 의료기록의 주체인 환자 간의 기밀 유지와 사생활 보호에 대해 중점적으로 보호책을 법에 규정하고 있음을 알 수 있다. 이는 한국도 환자에 관련된 모든 기록을 체계적으로 보호할 수 있는 독립된 의료정보보호법의 제정이 필요함을 알려준다.

유비쿼터스 센싱 네트워크 환경 하에서 정보 프라이버시의 보호 기술과 영역에 관한 연구 (상황인식시스템과 개인정보를 중심으로) (A study on protection technology and scope about information Privacy in ubiquitous Sensing Network Environment (A focus on context awareness system and personal information))

  • 강장묵;방기천
    • 디지털콘텐츠학회 논문지
    • /
    • 제7권4호
    • /
    • pp.301-308
    • /
    • 2006
  • 유비쿼터스 시대를 앞당길 기술로는 USN, RFID, Homenetwork 등이 있다. 이와 같은 기술들은 상황인식 시스템을 구현하게 된다. 상황을 인식한다는 것은 사람, 사물, 환경이 실시간으로 정보를 유선 및 무선으로 제공할 수 있는 환경을 뜻한다. 따라서 개인정보, 정보 프라이버시, 광의의 프라이버시가 심각한 위협에 직면할 것이다. 본 연구는 USN 환경 하에서 상황 인식 시스템이 가지고 있는 개인정보의 위협을 분석하고 이를 보호할 수 있는 기술들을 제시하였다. 각 기술들은 보호의 영역들을 세분화 시킨 정보 프라이버시에 적용할 수 있는 기술들이다. 본 연구를 통하여 정보 프라이버시의 개념적 재해석과 기술적 제시를 통한 통찰력과 종합적 해결 방안을 기대해본다.

  • PDF

Privacy Level Indicating Data Leakage Prevention System

  • Kim, Jinhyung;Park, Choonsik;Hwang, Jun;Kim, Hyung-Jong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제7권3호
    • /
    • pp.558-575
    • /
    • 2013
  • The purpose of a data leakage prevention system is to protect corporate information assets. The system monitors the packet exchanges between internal systems and the Internet, filters packets according to the data security policy defined by each company, or discretionarily deletes important data included in packets in order to prevent leakage of corporate information. However, the problem arises that the system may monitor employees' personal information, thus allowing their privacy to be violated. Therefore, it is necessary to find not only a solution for detecting leakage of significant information, but also a way to minimize the leakage of internal users' personal information. In this paper, we propose two models for representing the level of personal information disclosure during data leakage detection. One model measures only the disclosure frequencies of keywords that are defined as personal data. These frequencies are used to indicate the privacy violation level. The other model represents the context of privacy violation using a private data matrix. Each row of the matrix represents the disclosure counts for personal data keywords in a given time period, and each column represents the disclosure count of a certain keyword during the entire observation interval. Using the suggested matrix model, we can represent an abstracted context of the privacy violation situation. Experiments on the privacy violation situation to demonstrate the usability of the suggested models are also presented.