• Title/Summary/Keyword: Privacy by design

Search Result 267, Processing Time 0.142 seconds

Privacy-preserving and Communication-efficient Convolutional Neural Network Prediction Framework in Mobile Cloud Computing

  • Bai, Yanan;Feng, Yong;Wu, Wenyuan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.12
    • /
    • pp.4345-4363
    • /
    • 2021
  • Deep Learning as a Service (DLaaS), utilizing the cloud-based deep neural network models to provide customer prediction services, has been widely deployed on mobile cloud computing (MCC). Such services raise privacy concerns since customers need to send private data to untrusted service providers. In this paper, we devote ourselves to building an efficient protocol to classify users' images using the convolutional neural network (CNN) model trained and held by the server, while keeping both parties' data secure. Most previous solutions commonly employ homomorphic encryption schemes based on Ring Learning with Errors (RLWE) hardness or two-party secure computation protocols to achieve it. However, they have limitations on large communication overheads and costs in MCC. To address this issue, we present LeHE4SCNN, a scalable privacy-preserving and communication-efficient framework for CNN-based DLaaS. Firstly, we design a novel low-expansion rate homomorphic encryption scheme with packing and unpacking methods (LeHE). It supports fast homomorphic operations such as vector-matrix multiplication and addition. Then we propose a secure prediction framework for CNN. It employs the LeHE scheme to compute linear layers while exploiting the data shuffling technique to perform non-linear operations. Finally, we implement and evaluate LeHE4SCNN with various CNN models on a real-world dataset. Experimental results demonstrate the effectiveness and superiority of the LeHE4SCNN framework in terms of response time, usage cost, and communication overhead compared to the state-of-the-art methods in the mobile cloud computing environment.

A Study on the Space Analysis of Residential House Plans in Rural New-Town Development Area Using the Space Syntax (공간구문론을 이용한 농어촌 뉴타운 시범사업 지구내의 주택 평면 공간 분석)

  • Hwang, Yong-Woon
    • Korean Institute of Interior Design Journal
    • /
    • v.22 no.5
    • /
    • pp.241-249
    • /
    • 2013
  • The remarkable growth of city population and rate of urbanization are increasing every year rapidly in Korea. On the other hand young people are decreasing and old people are increasing in rural areas. So in 2009, the five Rural New-Town Development Areas were selected by the Ministry for Food, Agriculture Forestry and Fisheries. To provide data necessary for housing types and floor planning and development suitable for rural new-town development to be implemented constantly in rural areas all over the country later, this study used a space syntax program to analyze housing types and space structures within houses in five new-town development areas. After analyzing 33 floor plans for the five areas, there were few houses with separation of communal (integration space) and personal living spaces (segregation space). In particular, 82% had personal living spaces requiring protection of privacy, such as bedrooms and the toilet, classified into communal living spaces. Residential houses for rural new-town development targeting the young population valuing personal life and privacy, which failed to reflect city people's life properly, were expected to decrease residential satisfaction after occupancy.

Massive Surveillance by US-UK intelligence services : Crisis of the Internet and the Rule of Law (미국/영국 정보기관의 무차별 정보수집행위: 인터넷과 법치주의의 위기)

  • Kim, Keechang
    • Review of Korean Society for Internet Information
    • /
    • v.14 no.3
    • /
    • pp.78-85
    • /
    • 2013
  • The revelations made possible by Edward Snowden, a contractor of the US intelligence service NSA, are a sobering reminder that the Internet is not an 'anonymous' means of communication. In fact, the Internet has never been conceived with anonymity in mind. If anything, the Internet and networking technologies provide far more detailed and traceable information about where, when, with whom we communicate. The content of the communication can also be made available to third parties who obtain encryption keys or have the means of exploiting vulnerabilities (either by design or by oversight) of encryption software. Irrebuttable evidence has emerged that the US and the UK intelligence services have had an indiscriminate access to the meta-data of communications and, in some cases, the content of the communications in the name of security and protection of the public. The conventional means of judicial scrutiny of such an access turned out to be ineffectual. The most alarming attitude of the public and some politicians is "If you have nothing to hide, you need not be concerned." Where individuals have nothing to hide, intelligence services have no business in the first place to have a peek. If the public espouses the groundless assumption that State organs are benevolent "( they will have a look only to find out whether there are probable grounds to form a reasonable suspicion"), then the achievements of several hundred years of struggle to have the constitutional guarantees against invasion into privacy and liberty will quickly evaporate. This is an opportune moment to review some of the basic points about the protection of privacy and freedom of individuals. First, if one should hold a view that security can override liberty, one is most likely to lose both liberty and security. Civilized societies have developed the rule of law as the least damaging and most practicable arrangement to strike a balance between security and liberty. Whether we wish to give up the rule of law in the name of security requires a thorough scrutiny and an informed decision of the body politic. It is not a decision which can secretly be made in a closed chamber. Second, protection of privacy has always depended on human being's compliance with the rules rather than technical guarantees or robustness of technical means. It is easy to tear apart an envelope and have a look inside. It was, and still is, the normative prohibition (and our compliance) which provided us with protection of privacy. The same applies to electronic communications. With sufficient resources, surreptitiously undermining technical means of protecting privacy (such as encryption) is certainly 'possible'. But that does not mean that it is permissible. Third, although the Internet is clearly not an 'anonymous' means of communication, many users have a 'false sense of anonymity' which make them more vulnerable to prying eyes. More effort should be made to educate the general public about the technical nature of the Internet and encourage them to adopt user behaviour which is mindful of the possibilities of unwanted surveillance. Fourth, the US and the UK intelligence services have demonstrated that an international cooperation is possible and worked well in running the mechanism of massive surveillance and infiltration into data which travels globally. If that is possible, it should equally be possible to put in place a global mechanism of judicial scrutiny over a global attempt at surveillance.

  • PDF

Interior Design Research for The Elderly in Three Generation Apartment (삼대가족형 아파트의 노인실 실내계획에 관한 연구)

  • 김정근
    • Korean Institute of Interior Design Journal
    • /
    • no.3
    • /
    • pp.18-25
    • /
    • 1994
  • Interior design is an inerdisciplinary field that is in the early stages of theory development, it is necessary to build theoretical frame work for the research. The purpose of this study is to present interior design and guidelines in a three generation family apartment for the elderly, and to develop a theoretical framework on the basis of the human ecosystem approach for analysis of relations between elderly and environment. Analysis and investigations are done by literature review about residential environmental characteristics of the elderly based on the findings of the conceptual analysis. Environmenta elements of interor design related to elderly in a three generation family apartment are as follow ; First, Natural environmental element is orientation, site, temperature, local weather. Second, human behavioral element is privacy , interior design requirement based on physical and psychological effect, housing policy, behavior. Third, Human constructed environmental element is size of apartment space, interior design component, human dimension, aesthetic condition.

  • PDF

VANET Privacy Assurance Architecture Design (VANET 프라이버시 보장 아키텍처 설계)

  • Park, Su-min;Hong, Man-pyo;Shon, Tae-shik;Kwak, Jin
    • Journal of Internet Computing and Services
    • /
    • v.17 no.6
    • /
    • pp.81-91
    • /
    • 2016
  • VANET is one of the most developed technologies many people have considered a technology for the next generation. It basically utilizes the wireless technology and it can be used for measuring the speed of the vehicle, the location and even traffic control. With sharing those information, VANET can offer Cooperative ITS which can make a solution for a variety of traffic issues. In this way, safety for drivers, efficiency and mobility can be increased with VANET but data between vehicles or between vehicle and infrastructure are included with private information. Therefore alternatives are necessary to secure privacy. If there is no alternative for privacy, it can not only cause some problems about identification information but also it allows attackers to get location tracking and makes a target. Besides, people's lives or property can be dangerous because of sending wrong information or forgery. In addition to this, it is possible to be information stealing by attacker's impersonation or private information exposure through eavesdropping in communication environment. Therefore, in this paper we propose Privacy Assurance Architecture for VANET to ensure privacy from these threats.

A Study onthe Residential Space by Richard Meier (리챠드 마이어의 주거공간에 관한 연구)

  • 김용립
    • Korean Institute of Interior Design Journal
    • /
    • no.13
    • /
    • pp.78-88
    • /
    • 1997
  • The objective of this study is to analyze the residential space as designed by Richard Meier thereby grasping its main characteristics and historical development. Richard Meier has developed his own peculiar architecture based on Modernism. He has solved problems of modern architecture by combining the form elements of Le Corbusier with Mies van der Rohe's architecture which pursued the beauty of structure and proportiov. Meier's houses, sculpture-like in forms, are characterized by clear distinction and variations of the interior spaces. The clear separation between a large, two-story high living room and a tiny, cozy bedroom securing the privacy, endows the interions with variation and vitality, while simple white walls reveal the good shape of the space. The houses also unfold the diverse spaces one after another as one steps into inside. His interiors, shaped by simple walls and settled functionally, has inherited the rationality in modern architecture. Richard Meier has established his independent working world by applying his own design method and languages based on the rationality in Modernism.

  • PDF

Data Access Control Scheme Based on Blockchain and Outsourced Verifiable Attribute-Based Encryption in Edge Computing

  • Chao Ma;Xiaojun Jin;Song Luo;Yifei Wei;Xiaojun Wang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.7
    • /
    • pp.1935-1950
    • /
    • 2023
  • The arrival of the Internet of Things and 5G technology enables users to rely on edge computing platforms to process massive data. Data sharing based on edge computing refines the efficiency of data collection and analysis, saves the communication cost of data transmission back and forth, but also causes the privacy leakage of a lot of user data. Based on attribute-based encryption and blockchain technology, we design a fine-grained access control scheme for data in edge computing, which has the characteristics of verifiability, support for outsourcing decryption and user attribute revocation. User attributes are authorized by multi-attribute authorization, and the calculation of outsourcing decryption in attribute encryption is completed by edge server, which reduces the computing cost of end users. Meanwhile, We implemented the user's attribute revocation process through the dual encryption process of attribute authority and blockchain. Compared with other schemes, our scheme can manage users' attributes more flexibly. Blockchain technology also ensures the verifiability in the process of outsourcing decryption, which reduces the space occupied by ciphertext compared with other schemes. Meanwhile, the user attribute revocation scheme realizes the dynamic management of user attribute and protects the privacy of user attribute.

The Importance of Anonymity and Confidentiality for Conducting Survey Research

  • Eungoo KANG;Hee-Joong HWANG
    • Journal of Research and Publication Ethics
    • /
    • v.4 no.1
    • /
    • pp.1-7
    • /
    • 2023
  • Purpose: Poor anonymity and confidential strategies by a researcher not only develop unprecedented and precedented harm to participants but also impacts the overall critical appraisal of the research outcomes. Therefore, understanding and applying anonymity and confidentiality in research is key for credible research. As such, this research expansively presents the importance of anonymity and confidentiality for research surveys through critical literature reviews of past works. Research design, data and methodology: This research has selected the literature content approach to obtain proper literature dataset which was proven by high degree of validity and reliability using only books and peer-reviewed research articles. The current authors have conducted screening procedure thoroughly to collect better fitted resources. Results: Research findings consistently mentioned the confidentiality and anonymity principles are preserved and implemented as a means of protecting the privacy of all individuals, establishing trust and rapport between researchers and study participants, as a way of critically upholding research ethical standards, and preserving the integrity of research processes. Conclusions: Confidentiality and anonymity are research ethical principles that help in providing informed consent to participants assuring subjects of the privacy of their personal data. As provided by research bodies and organizations, every research process has to incorporate the principles to meet credibility.

A Study on Characteristics of Spatial Composition of Japanese Contemporary Detached House - Focused on Family Composition - (가족형태에 따른 일본단독주택 공간구성의 특징 - 일본건축학회 작품선집(作品選集)(건축잡지(建築雜誌) 증간(增刊): 2006-2010)에 수록된 주택을 중심으로 -)

  • Lee, Jeong-Mee
    • Journal of the Korean housing association
    • /
    • v.23 no.6
    • /
    • pp.39-47
    • /
    • 2012
  • In this study, it was analyzed that, the way of securing publicity and privacy in family and type of public space of the Japanese contemporary detached house, by the composition type of family from one person home to four generation family home. Mostly the living room is made as open plan of LDK type. Mostly, the entrance hall is separate with living room. Even if the case of the entrance hall is connected with living room, it is planned to be recognized as entrance hall, by making entrance poach or connecting it with stair hall. In many case, the public space is designed as traditional Japanese style, such as wellhole style space (吹拔け), courtyard, and Japanese style room (和室). The Japanese style room is adjacent to living room, and used as the space of receiving guests. The wellhole style space and courtyard are recognized as the center of the house, and used as buffer space for ensuring privacy of each generation. The most different point between bachelor house and multi generation family house is another LDK space, living room or kitchen for parents' generation is made separately. Particularly there are many case of making separate small kitchen space, therefore it can be known that, the separation of kitchen space is recognized more importantly than that of living room. And there are many case of making separate entrance hall, two houses under one roof. The spatial composition like this can said as rational method of ensuring the privacy of each generation, and using the public space together as necessary.

Development of Android App to Record and Manage Travel Routes for Location Information Protection (위치정보 보호를 위한 이동 경로 기록 및 관리 서비스 앱 개발)

  • Seoyeon Kim;Ah Young Kim;Minjung Oh;Saem Oh;Sungwook Kim
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.12 no.10
    • /
    • pp.437-444
    • /
    • 2023
  • Location-based services play a vital role in our daily lives. While these services enhance user convenience, user's privacy is at risk because they lead to a rapid surge in collecting and utilizing location information for a user. In this paper, we design and implement an application that securely records and manages user location information. We enhance the privacy protection aspect concerning location information by providing some features. Utilizing Room DB, we store collected personal location information in the user's local database instead of the server of the location-based service provider. Furthermore, user can initiate and terminate recording at their discretion, thereby enhancing the protection of personal information related to location data. User's unease regarding their movement paths is reduced by empowering them to have control over their own location information.