• Title/Summary/Keyword: Privacy by design

Search Result 267, Processing Time 0.028 seconds

Design and Estimation of a Session Key based Access Control Scheme for Secure Communications in IoT Environments (IoT 환경에서 안전한 통신을 위한 세션 키 기반 접근 제어 기법의 설계 및 평가)

  • Jin, Byungwook;Jung, Dongwoog;Cha, Siho;Jun, Moonseog
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.12 no.1
    • /
    • pp.35-41
    • /
    • 2016
  • Internet of Things (IoT) services are widely used in appliances of daily life and industries. IoT services also provide various conveniences to users and are expected to affect value added of all industries and national competitiveness. However, a variety of security threats are increased in IoT environments and lowers reliability of IoT devices and services that make some obstacles for commercialization. The attacks arising in IoT environments are making industrial and normal life accidents unlike existing information leak and monetary damages, and can expand damage scale of leakage of personal information and privacy more than existing them. To solve these problems, we design a session key based access control scheme for secure communications in IoT environments. The proposed scheme reinforces message security by generating session key between device and access control network system. We analyzed the stability of the proposed access scheme in terms of data forgery and corruption, unauthorized access, information disclosure, privacy violations, and denial of service attacks. And we also evaluated the proposed scheme in terms of permission settings, privacy indemnity, data confidentiality and integrity, authentication, and access control.

Consumer shopping perceptions of an Internet of Things environment (사물인터넷 환경에서의 소비자 쇼핑 인식)

  • Lee, Minsun;Lee, Hyun-Hwa
    • The Research Journal of the Costume Culture
    • /
    • v.29 no.1
    • /
    • pp.1-15
    • /
    • 2021
  • The Internet of Things (IoT) has gained enormous popularity in various fields of industry. An IoT shopping environment is considered an effective tool for convenient use by consumers. Perceived values (including convenience and privacy risks) of IoT shopping can be the main factors that influence consumers' shopping intentions. The current study proposed a research model based on a value-based adoption model, which integrated perceived benefit and sacrifice, shopping attitude, and shopping intention in an IoT shopping environment. As potential customers, participants in their 20s and 30s were recruited through a marketing research firm. Responses collected via an online questionnaire validated the proposed research model and hypothesis. The results confirmed significant, positive relationships between perceived benefit, including both remote control and access convenience, and consumers' positive attitudes toward IoT shopping. The association between perceived privacy risk and consumers' shopping attitudes was not significant. The indirect effects of two benefits of IoT shopping on shopping intention were also significant and positive. From a practical perspective, this study can help marketers and service providers manage their IoT shopping platforms or applications more effectively to attract consumers. The implications and limitations of this study are discussed. Directions for future research and development of IoT shopping environment are suggested.

Dynamic ID randomization for user privacy in mobile network

  • Arijet Sarker;SangHyun Byun;Manohar Raavi;Jinoh Kim;Jonghyun Kim;Sang-Yoon Chang
    • ETRI Journal
    • /
    • v.44 no.6
    • /
    • pp.903-914
    • /
    • 2022
  • Mobile and telecommunication networking uses temporary and random identifiers (IDs) to protect user privacy. For greater intelligence and security o the communications between the core network and the mobile user, we design and build a dynamic randomization scheme for the temporary IDs for mobile networking, including 5G and 6G. Our work for ID randomization (ID-RZ) advances the existing state-of-the-art ID re-allocation approach in 5G in the following ways. First, ID-RZ for ID updates is based on computing, as opposed to incurring networking for the re-allocation-based updates, and is designed for lightweight and low-latency mobile systems. Second, ID-RZ changes IDs proactively (as opposed to updating based on explicit networking event triggers) and provides stronger security (by increasing the randomness and frequency of ID updates). We build on the standard cryptographic primitives for security (e.g., hash) and implement our dynamic randomization scheme in the 5G networking protocol to validate its design purposes, which include time efficiency (two to four orders of magnitude quicker than the re-allocation approach) and appropriateness for mobile applications.

A Study on the Spatial Characteristics for Adolescents-friendly in the Apartments Design - Focused on the Design Competition of Suwon A District - (청소년 친화적인 공동주택 공간특성에 관한 연구 - 수원 A지역 현상설계안을 중심으로 -)

  • Kim, Nam-Hyo;Bang, Seon-Joo
    • Journal of the Korean housing association
    • /
    • v.20 no.3
    • /
    • pp.37-45
    • /
    • 2009
  • For the young period, privacy is a crucial factor in establishing one's own identities, values and relationships. The capacity of residential environment to protect individual's privacy takes considerable part in influencing psychological and physiological development of adolescents. This study analyzed adolescents residential values and the elements of spatial plans for the passage and outdoor in Apartment Design Competition of Suwon A district in 2008. One hundred and ten middle and high school students living in Metropolitan area were selected and questionnaire was conducted during February 7 to February 15 in 2009. The data was analyzed by SPSS 11.0 program using one-way ANOVA and crosstab. The study results were summarized as follows; First, the adolescents valued 'safety' the most, regardless of their age and gender and the safety of adolescents commuting should be considered. Second, protecting their own private territories was next important element among other elements. Privacy can be protected by using movable walls, changing the doorway, dividing parents' and adolescents independent territory. Third, in terms of convenience, choosing location of children's room and walking way should be considered. Forth, from the survey, demand for indoors leisure activity was highly valued and required for aesthetic point of view. Considering the sculptures and facilities must satisfy the aesthetics and practicality. Fifth, in terms of social needs, 61.6% of people answered positively to the community facilities for social relationship. Residential environment affects enormous part of adolescents emotional and academic development. Therefore, designing residential areas for adolescents friendly should reflect the demands for safety, territory, convenience, aesthetic and social life.

A Secure Technique Design for Privacy Protection in RFID System (RFID 시스템에서 프라이버시 보호를 위한 보안기법 설계)

  • Oh, Gi-Oug;Park, Mi-Og
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.8
    • /
    • pp.107-115
    • /
    • 2010
  • RFID (Radio Frequency IDentification) technology, automatic identification and data capture technologies in ubiquitous computing is an essential skill. Low-cost Radio Frequency Identification tags using memory and no physical contact due to the ease of use and maintenance of excellence are going to use expanded. However, it is possible to the illegal acquisition of the information between RFID tags and readers because RFID uses the RF signal, and the obtained information can be used for the purpose of location tracking and invasion of privacy. In this paper, we proposed the security scheme to protect against the illegal user location tracking and invasion of privacy. The security scheme proposed in this paper, using Gray Code and reduced the capacity of the calculation of the actual tags, However, it is impossible for the malicious attacker to track information because tag information transmitted from the reader is not fixed. Therefore, even if the tags information is obtained by a malicious way, our scheme provides more simple and safe user privacy than any other protection methods to protect user privacy, because not actual information but encrypted information is becoming exposed.

Life Satisfaction Depending on Digital Utilization Divide within People with Disabilities (스마트 도시(Smart City)의 데이터 경제 구현을 위한 개인정보보호 적용설계(PbD)의 도입 필요성 분석)

  • Jin, Sang-Ki
    • Informatization Policy
    • /
    • v.26 no.3
    • /
    • pp.69-89
    • /
    • 2019
  • In order to implement smart cities that will become living spaces in the fourth industrial revolution era, detailed privacy information such as residents' living information, buildings and facilities information must be collected and processed in real time. While city functions and convenience for individuals are being facilitated, threats to personal information exposure and leakage are also likely to increase at the same time. Therefore, the design concept for personal information protection should be considered and accordingly reflected from the stages of smart city design, technology development and operation planning of intelligent information (AI) facilities. The results of the analysis show that for activation of smart cities and operation of data-driven cities, the concept of Privacy by Design (PbD) has already been introduced in the institutional, industrial and technological aspects, particularly in the cases of European countries and the US. In order to strengthen the local and global competitiveness of smart cities and the country, Korea also needs to actively deploy PbD as a strategy to secure a data-driven economy, which is the core strategy for smart cities. Therefore, the study suggests policy implications focused on approaches to legislative improvement and technology development support, which reflect the basic properties of PbD as defined in the study.

Practical Concerns in Enforcing Ethereum Smart Contracts as a Rewarding Platform in Decentralized Learning (연합학습의 인센티브 플랫폼으로써 이더리움 스마트 컨트랙트를 시행하는 경우의 실무적 고려사항)

  • Rahmadika, Sandi;Firdaus, Muhammad;Jang, Seolah;Rhee, Kyung-Hyune
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.9 no.12
    • /
    • pp.321-332
    • /
    • 2020
  • Decentralized approaches are extensively researched by academia and industry in order to cover up the flaws of existing systems in terms of data privacy. Blockchain and decentralized learning are prominent representatives of a deconcentrated approach. Blockchain is secure by design since the data record is irrevocable, tamper-resistant, consensus-based decision making, and inexpensive of overall transactions. On the other hand, decentralized learning empowers a number of devices collectively in improving a deep learning model without exposing the dataset publicly. To motivate participants to use their resources in building models, a decent and proportional incentive system is a necessity. A centralized incentive mechanism is likely inconvenient to be adopted in decentralized learning since it relies on the middleman that still suffers from bottleneck issues. Therefore, we design an incentive model for decentralized learning applications by leveraging the Ethereum smart contract. The simulation results satisfy the design goals. We also outline the concerns in implementing the presented scheme for sensitive data regarding privacy and data leakage.

User Evaluation for User-Oriented Children's Hospital Design - Focused on the Mothers of Child Inpatients and the Nurses - (사용자 중심의 어린이전문병원 계획을 위한 사용자 평가 - 어린이 환자의 보호자와 간호사를 중심으로 -)

  • Ha, Ji-Min;Park, Soo-Been
    • Korean Institute of Interior Design Journal
    • /
    • v.25 no.1
    • /
    • pp.192-200
    • /
    • 2016
  • This study aims to design user-oriented children's hospital by examining the user needs, especially the mothers of child inpatients and the nurses. The subjects participated in a questionnaire survey including the user's characteristics, awareness of patient's room, the preference on ward size, demands, satisfaction and hospital environment assessment. The survey was conducted of the mothers of child inpatients and the nurses in A children's hospital, and the data were analyzed by the SPSS WIN 18.0 Version software. A total of 115 copies of the questionnaire were finally analyzed. The results and conclusions are as follows. 1) The mothers' demand on family-centered space and private spaces were higher than the nurses. 2) The mothers preferred 1-bed-room to 4-bed-room due to safety and privacy. 3) The items of hospital environment assessment was categorized into four factors; 'Aesthetics', 'Accessibility', 'Comfort', and 'Lighting'. The most positive factor was 'Aesthetics', whereas 'Comfort' was the negative factor. 4) The mother's satisfaction was lower than the nurse's. The most influential factors on the satisfaction was 'Accessibility'. To improve the satisfaction of the mothers of child inpatients and the nurses, safety, privacy, accessibility should be considered.

A Study on Privacy Influencing the Continuous Intention to Use in Closed-Type SNS: Focusing on BAND Users (폐쇄형 SNS에서 프라이버시가 지속적인 사용의도에 미치는 영향에 관한 연구: 밴드 사용자를 중심으로)

  • Lim, Byungha;Kang, Dongwon
    • Information Systems Review
    • /
    • v.16 no.3
    • /
    • pp.191-214
    • /
    • 2014
  • In this study, based on Privacy Calculus Model, we study whether users' intention of continuous use of closed-type SNS is affected by information privacy concern. In addition, we propose a model that studies if the major factors of the intention of continuous use which are trust, satisfaction and benefits could control the information privacy concern's effect on the intention of use. As a result, companies have to consider protecting the psychological privacy and information privacy of the individual when they design SNS.

Security Analysis on 'Privacy-Preserving Contact Tracing Specifications by Apple and Google' and Improvement with Verifiable Computations ('애플과 구글의 코로나 접촉 추적 사양'에 대한 보안성 평가 및 검증 가능한 연산을 이용한 개선)

  • Kim, Byeong Yeon;Kim, Huy Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.3
    • /
    • pp.291-307
    • /
    • 2021
  • There has been global efforts to prevent the further spread of the COVID-19 and get society back to normal. 'Contact tracing' is a crucial way to detect the infected person. However the contact tracing makes another concern about the privacy violation of the personal data of infected people, released by governments. Therefore Google and Apple are announcing a joint effort to enable the use of Bluetooth technology to help governments and health agencies reduce the spread of the virus, with user privacy and security central to the design. However, in order to provide the improved tracing application, it is necessary to identify potential security threats and investigate vulnerabilities for systematically. In this paper, we provide security analysis of Privacy-Preserving COVID-19 Contact Tracing App with STRIDE and LINDDUN threat models. Based on the analysis, we propose to adopt a verifiable computation scheme, Zero-knowledge Succinctness Non-interactive Arguments of Knowledges (zkSNARKs) and Public Key Infrastructure (PKI) to ensure both data integrity and privacy protection in a more practical way.