• Title/Summary/Keyword: Privacy Protection

Search Result 894, Processing Time 0.029 seconds

A Study on Establishment of Connecting Information Conversion Criteria for Mobile Electronic Notification Service of Private Institutions (민간기관 모바일 전자고지서비스를 위한 연계정보 변환기준 수립에 대한 연구)

  • Kim, JongBae
    • The Journal of the Convergence on Culture Technology
    • /
    • v.7 no.4
    • /
    • pp.735-743
    • /
    • 2021
  • The mobile electronic notice service (MENS) is a service that delivers a mobile electronic notice to a smartphone in the person's name through an authorized electronic document intermediary instead of a bill that was delivered by mail using paper. In order to provide the MENS, information is needed to identify the same user between the sending agency and the authorized electronic document relay. In this paper, we propose a standard for safe conversion and utilization of Connecting Information (CI) used as user identification information for MENS. In the proposed method, it is necessary for the requesting institution to send the electronic notice to provide the resident registration number to the identity verification institution and convert it into the CI. In this case, a safe and efficient MENS will be possible by proposing a review standard and processing method to verify the appropriateness of the conversion of CI. By applying the proposed method to the MENS, it can contribute to service activation and reinforcement of user privacy protection.

Travel mode classification method based on travel track information

  • Kim, Hye-jin
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.12
    • /
    • pp.133-142
    • /
    • 2021
  • Travel pattern recognition is widely used in many aspects such as user trajectory query, user behavior prediction, interest recommendation based on user location, user privacy protection and municipal transportation planning. Because the current recognition accuracy cannot meet the application requirements, the study of travel pattern recognition is the focus of trajectory data research. With the popularization of GPS navigation technology and intelligent mobile devices, a large amount of user mobile data information can be obtained from it, and many meaningful researches can be carried out based on this information. In the current travel pattern research method, the feature extraction of trajectory is limited to the basic attributes of trajectory (speed, angle, acceleration, etc.). In this paper, permutation entropy was used as an eigenvalue of trajectory to participate in the research of trajectory classification, and also used as an attribute to measure the complexity of time series. Velocity permutation entropy and angle permutation entropy were used as characteristics of trajectory to participate in the classification of travel patterns, and the accuracy of attribute classification based on permutation entropy used in this paper reached 81.47%.

Comparison of encryption algorithm performance between low-spec IoT devices (저 사양 IoT 장치간의 암호화 알고리즘 성능 비교)

  • Park, Jung Kyu;Kim, Jaeho
    • Journal of Internet of Things and Convergence
    • /
    • v.8 no.1
    • /
    • pp.79-85
    • /
    • 2022
  • Internet of Things (IoT) connects devices with various platforms, computing power, and functions. Due to the diversity of networks and the ubiquity of IoT devices, demands for security and privacy are increasing. Therefore, cryptographic mechanisms must be strong enough to meet these increased requirements, while at the same time effective enough to be implemented in devices with long-range specifications. In this paper, we present the performance and memory limitations of modern cryptographic primitives and schemes for different types of devices that can be used in IoT. In addition, detailed performance evaluation of the performance of the most commonly used encryption algorithms in low-spec devices frequently used in IoT networks is performed. To provide data protection, the binary ring uses encryption asymmetric fully homomorphic encryption and symmetric encryption AES 128-bit. As a result of the experiment, it can be seen that the IoT device had sufficient performance to implement a symmetric encryption, but the performance deteriorated in the asymmetric encryption implementation.

Combination Key Generation Scheme Robust to Updates of Personal Information (결합키 생성항목의 갱신에 강건한 결합키 생성 기법)

  • Jang, Hobin;Noh, Geontae;Jeong, Ik Rae;Chun, Ji Young
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.5
    • /
    • pp.915-932
    • /
    • 2022
  • According to the Personal Information Protection Act and Pseudonymization Guidelines, the mapping is processed to the hash value of the combination key generation items including Salt value when different combination applicants wish to combine. Example of combination key generation items may include personal information like name, phone number, date of birth, address, and so on. Also, due to the properties of the hash functions, when different applicants store their items in exactly the same form, the combination can proceed without any problems. However, this method is vulnerable to combination in scenarios such as address changing and renaming, which occur due to different database update times of combination applicants. Therefore, we propose a privacy preserving combination key generation scheme robust to updates of items used to generate combination key even in scenarios such as address changing and renaming, based on the thresholds through probabilistic record linkage, and it can contribute to the development of domestic Big Data and Artificial Intelligence business.

Vulnerability analysis for AppLock Application (AppLock 정보 은닉 앱에 대한 취약점 분석)

  • Hong, Pyo-gil;Kim, Dohyun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.5
    • /
    • pp.845-853
    • /
    • 2022
  • As the memory capacity of smartphone increases, the type and amount of privacy stored in the smartphone is also increasing. but recently there is an increasing possibility that various personal information such as photos and videos of smartphones may be leaked due to malicious apps by malicious attackers or other people such as repair technicians. This paper analyzed and studied the security and vulnerability of these vault apps by analyzing the cryptography algorithm and data protection function. We analyzed 5.3.7(June 13, 2022) and 3.3.2(December 30, 2020) versions of AppLock, the most downloaded information-hidding apps registered with Google Play, and found various vulnerabilities. In the case of access control, there was a vulnerability in that values for encrypting patterns entered by users were hardcoded into plain text in the source code, and encrypted pattern values were stored in xml files. In addition, in the case of the vault function, there was a vulnerability in that the files and log files for storing in the vault were not encrypted.

A Study on the Ward Design Guideline Abroad for Architectural Planning of Acute Psychiatric Ward (정신건강의학과 급성기 병동 공간계획을 위한 국외 가이드라인에 관한 연구)

  • Jee, Soo In;Park, Kyeong Hyeon;Chai, Choul Gyun
    • Journal of The Korea Institute of Healthcare Architecture
    • /
    • v.29 no.1
    • /
    • pp.53-62
    • /
    • 2023
  • Purpose: Recently, the number of severely mentally ill patients has been increasing rapidly in Korea, but there are no design guidelines for spatial planning of Korea's acute psychiatric wards. The study aims to clarify the areas and required rooms in Korea's acute psychiatric wards which are important in establishing the design guidelines for Korea's acute psychiatric wards. Methods: This study proposed a structural framework based on the results of investigating and analyzing the acute psychiatric ward guidelines in the UK, Australia, and the U.S. and the areas and the required rooms of the wards stipulated in the basic data for establishing acute psychiatric ward design guidelines in Korea. The design guidelines for overseas acute psychiatric wards are 'Adult Acute Mental Health' in the UK, 'Adult Acute Mental Health Inpatient Unit' in the Australia, and 'Specific Requirements for Mental Health Hospitals' in the United States. Results: As a result of investigating and analyzing the design guidelines for overseas acute psychiatric wards, the areas of wards applicable to acute wards in domestic psychiatric wards were access, patient, treatment, support, and employee areas. In addition, the required rooms for each area were defined around major considerations such as visibility, convenience, comfort, security, safety, patient observation, barrier-free design, and privacy protection. Implications: The results of the study will be presented as a structural framework and basic data for establishing design guidelines for Korea's acute psychiatric wards, which is still absent.

Smart Radar System for Life Pattern Recognition (생활패턴 인지가 가능한 스마트 레이더 시스템)

  • Sang-Joong Jung
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.23 no.2
    • /
    • pp.91-96
    • /
    • 2022
  • At the current camera-based technology level, sensor-based basic life pattern recognition technology has to suffer inconvenience to obtain accurate data, and commercial band products are difficult to collect accurate data, and cannot take into account the motive, cause, and psychological effect of behavior. the current situation. In this paper, radar technology for life pattern recognition is a technology that measures the distance, speed, and angle with an object by transmitting a waveform designed to detect nearby people or objects in daily life and processing the reflected received signal. It was designed to supplement issues such as privacy protection in the existing image-based service by applying it. For the implementation of the proposed system, based on TI IWR1642 chip, RF chipset control for 60GHz band millimeter wave FMCW transmission/reception, module development for distance/speed/angle detection, and technology including signal processing software were implemented. It is expected that analysis of individual life patterns will be possible by calculating self-management and behavior sequences by extracting personalized life patterns through quantitative analysis of life patterns as meta-analysis of living information in security and safe guards application.

Securing Sensitive Data in Cloud Storage (클라우드 스토리지에서의 중요데이터 보호)

  • Lee, Shir-Ly;Lee, Hoon-Jae
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2011.04a
    • /
    • pp.871-874
    • /
    • 2011
  • The fast emerging of network technology and the high demand of computing resources have prompted many organizations to outsource their storage and computing needs. Cloud based storage services such as Microsoft's Azure and Amazon's S3 allow customers to store and retrieve any amount of data, at anytime from anywhere via internet. The scalable and dynamic of the cloud storage services help their customer to reduce IT administration and maintenance costs. No doubt, cloud based storage services brought a lot of benefits to its customer by significantly reducing cost through optimization increased operating and economic efficiencies. However without appropriate security and privacy solution in place, it could become major issues to the organization. As data get produced, transferred and stored at off premise and multi tenant cloud based storage, it becomes vulnerable to unauthorized disclosure and unauthorized modification. An attacker able to change or modify data while data inflight or when data is stored on disk, so it is very important to secure data during its entire life-cycle. The traditional cryptography primitives for the purpose of data security protection cannot be directly adopted due to user's lose control of data under off premises cloud server. Secondly cloud based storage is not just a third party data warehouse, the data stored in cloud are frequently update by the users and lastly cloud computing is running in a simultaneous, cooperated and distributed manner. In our proposed mechanism we protect the integrity, authentication and confidentiality of cloud based data with the encrypt- then-upload concept. We modified and applied proxy re-encryption protocol in our proposed scheme. The whole process does not reveal the clear data to any third party including the cloud provider at any stage, this helps to make sure only the authorized user who own corresponding token able to access the data as well as preventing data from being shared without any permission from data owner. Besides, preventing the cloud storage providers from unauthorized access and making illegal authorization to access the data, our scheme also protect the data integrity by using hash function.

A Study on China's Intention to Switching to Shared Bike Platforms: Mechanisms of Trust and Distrust

  • Wenlong Lu;Yung Ho Suh;Sae Bom Lee
    • Journal of the Korea Society of Computer and Information
    • /
    • v.28 no.7
    • /
    • pp.179-187
    • /
    • 2023
  • Consumer trust plays a crucial role in the development of the sharing economy. This study primarily focuses on the factors influencing consumer trust and examines the case of ofo, a former leader in China's bike-sharing industry. This paper analyzes the decline in consumer trust in ofo, which can be attributed to internal management issues and the near-bankruptcy situation. The "difficulty in refunds" issue faced by ofo since December 2018 has been growing continuously, and this study explores the factors influencing trust and distrust in this context. By considering product factors (quality), platform factors (payment security, privacy protection, reputation), and social factors (social norms, government regulation) as independent variables, the study analyzes the factors affecting consumer trust. The analysis results revealed that as consumers' distrust towards shared bikes increases, their switching intention also increases. The company's reputation and social norms were found to influence both trust and distrust, while government regulation was found to influence trust. The research findings provide insights relevant to sharing economy platforms and offer guidance for future studies.

A Research on the Transference of Trust from Service Provider to MyData Banking Service (서비스 제공 기업에 대한 신뢰가 금융 마이데이터 서비스에 전이되는 현상에 관한 연구)

  • Ah Ro Kum;Jung Hoon Lee;Yun A Yeo
    • Journal of Information Technology Services
    • /
    • v.23 no.1
    • /
    • pp.97-121
    • /
    • 2024
  • As data usage grows in importance, ensuring individual control over personal information becomes critical. The emergence of the 'MyData' concept addresses this, particularly in financial services. Although the institutional and technological framework for financial MyData services is in place, there's a need to establish consumer understanding and perception of its usefulness and safety for successful activation. This study focuses on investigating the impact of trust on the intention to use the new mobile banking service, financial MyData. This study has three objectives. Firstly, to analyze whether trust in financial MyData services and trust in financial MyData service providers affect the intention to use financial MyData services. Secondly, to analyze the process of forming trust in financial MyData services based on the phenomenon of transferring trust in service providers to trust in services. Thirdly, to identify the process by which trust transfer occurs between service providers and financial MyData services. Ultimately, the goal of this study is to promote the intention to use financial MyData services based on the concept of trust and to activate these services. In summary, this study emphasizes the significance of trust in financial MyData services, exploring its impact on user intention and the transfer of trust from providers to services. By promoting consumer trust, the research aims to contribute to the activation of financial MyData services.