• Title/Summary/Keyword: Privacy preservation

Search Result 66, Processing Time 0.024 seconds

Research on technical protection measures through risk analysis of pseudonym information for life-cycle (가명정보 Life-Cycle에 대한 위험 분석을 통한 관리적/기술적 보호조치 방안에 대한 연구)

  • Cha, Gun-Sang
    • Convergence Security Journal
    • /
    • v.20 no.5
    • /
    • pp.53-63
    • /
    • 2020
  • In accordance with the revision of the Data 3 Act, such as the Personal Information Protection Act, it is possible to process pseudonym information without the consent of the information subject for statistical creation, scientific research, and preservation of public records, and unlike personal information, it is legal for personal information leakage notification and personal information destruction There are exceptions. It is necessary to revise the pseudonym information in that the standard for the pseudonym processing differs by country and the identification guidelines and anonymization are identified in the guidelines for non-identification of personal information in Korea. In this paper, we focus on the use of personal information in accordance with the 4th Industrial Revolution, examine the concept of pseudonym information for safe use of newly introduced pseudonym information, and generate / use / provide / destroy domestic and foreign non-identification measures standards and pseudonym information. At this stage, through the review of the main contents of the law or the enforcement ordinance (draft), I would like to make suggestions on future management / technical protection measures.

Blockchain-based Smart Meter Authentication Protocol in Smart Grid Environment (스마트 그리드 환경에서 블록체인 기반 스마트 미터 인증 프로토콜)

  • Jonghyun Kim;Myeonghyun Kim;Youngho Park
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.28 no.5
    • /
    • pp.41-54
    • /
    • 2023
  • Smart grid that supports efficient energy production and management is used in various fields and industries. However, because of the environment in which services are provided through open networks, it is essential to resolve trust issues regarding security vulnerabilities and privacy preservation. In particular, the identification information of smart meter is managed by a centralized server, which makes it vulnerable to security attacks such as device stolen, data forgery, alteration, and deletion. To solve these problems, this paper proposes a blockchain based authentication protocol for a smart meter. The proposed scheme issues an unique decentralized identifiers (DIDs) for individual smart meter through blockchain and utilizes a random values based on physical unclonable function (PUF) to strengthen the integrity and reliability of data. In addition, we analyze the security of the proposed scheme using informal security analysis and AVISPA simulation, and show the efficiency of the proposed scheme by comparing with related work.

Design and Implementation of the Chronic Disease Management Platform based on Personal Health Records (개인건강기록 기반 만성질환 관리 플랫폼의 설계 및 구현)

  • Song, Je-Min;Lee, Yong-Jun;Nam, Kwang-Woo
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.17 no.1
    • /
    • pp.47-62
    • /
    • 2012
  • To propagate clinical disease management service, there should be built a ecosystem where service developers, service providers, device suppliers closely cooperate for u-Health platform. However, most u-Health platform is difficult to build an effective ecosystem due to the lack of secure and effective PHR(Personal Health Record) management, the lack of personalized and intelligent service, difficulties of N-screen service. To solve these problems we suggest the CDMP(Chronic Disease Management Platform) architecture. The CDMP is a software platform that provides the core functions to develop the chronic disease management services and performs a hub function for the link and integration rbetween various services and systems. CDMP is SOA based platform that enables a provision of reusability, expansibility and it provides open API where everybody can share information, contents and services easily. CDMP supports the multi platform system foN-screen service and the self management functions via SNS. In this paper, we design and implement the CDMP including PHR service based on hybrid data model for privacy preservation. Experiment results prove the effectiveness of hybrid model-based PHR service.

Robust DNA Watermarking based on Coding DNA Sequence (부호 영역 DNA 시퀀스 기반 강인한 DNA 워터마킹)

  • Lee, Suk-Hwan;Kwon, Seong-Geun;Kwon, Ki-Ryong
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.49 no.2
    • /
    • pp.123-133
    • /
    • 2012
  • This paper discuss about DNA watermarking using coding DNA sequence (CDS) for the authentication, the privacy protection, or the prevention of illegal copy and mutation of DNA sequence and propose a DNA watermarking scheme with the mutation robustness and the animo acid preservation. The proposed scheme selects a number of codons at the regular singularity in coding regions for the embedding target and embeds the watermark for watermarked codons and original codons to be transcribed to the same amino acids. DNA base sequence is the string of 4 characters, {A,G,C,T} ({A,G,C,U} in RNA). We design the codon coding table suitable to watermarking signal processing and transform the codon sequence to integer numerical sequence by this table and re-transform this sequence to floating numerical sequence of circular angle. A codon consists of a consecutive of three bases and 64 codons are transcribed to one from 20 amino acids. We substitute the angle of selected codon to one among the angle range with the same animo acid, which is determined by the watermark bit and the angle difference of adjacent codons. From in silico experiment by using HEXA and ANG sequences, we verified that the proposed scheme is more robust to silent and missense mutations than the conventional scheme and preserve the amino acids of the watermarked codons.

The Change of Industrial Structure and Public Interest as to the Convergence of Broadcasting and Telecommunications (방송통신 융합에 따른 산업구조의 변화와 공익성)

  • Joo, Chung-Min
    • Korean journal of communication and information
    • /
    • v.36
    • /
    • pp.109-132
    • /
    • 2006
  • It is difficult to found the concept of public interest properly, being ambiguous to distinguish media and service as to the convergence of broadcasting and telecommunications. Accordingly, it is necessary to found the concept of public interest not related to the character of media and service in the age of digital convergence. Therefore this study intended to re-found the concept of public interest, as to industrial changes in the age of convergence of broadcasting and telecommunications. The convergence of broadcasting and telecommunications causes the changes of value chain, which includes contents, platform, network, terminal. It could not help avoiding modifying the industrial structure of broadcasting and telecommunications, because of the changes of value chain. The changes of industrial structure needs the changes of ideology, regulatory policy, regulatory system, and it creates the foundation of new regulatory idea. The purpose of regulatory idea in the age of digital convergence is to practice public interest, and it is an ultimate purpose to increase consumers' welfare. Consequently, for increasing comsumer' welfare, it is necessary to achieve diversity, fairness, objectivity, the preservation of social value in the aspect of contents. Also in the aspect of platform, it is necessary to achieve the protection of privacy, consumer protection, harmful information blocking, and in the aspect of network, it is necessary to achieve the maintenance of secure network, fair competition. Finally, in the aspect of terminal, it is necessary to achieve the maintenance of compatibility, the solution for digital divide. Then regulatory policy of each value chain from a legal and institutional perspective, should be promoted to provide public interest, step by step.

  • PDF

DNA Watermarking Method based on Random Codon Circular Code (랜덤 코돈 원형 부호 기반의 DNA 워터마킹)

  • Lee, Suk-Hwan;Kwon, Seong-Geun;Kwon, Ki-Ryong
    • Journal of Korea Multimedia Society
    • /
    • v.16 no.3
    • /
    • pp.318-329
    • /
    • 2013
  • This paper proposes a DNA watermarking method for the privacy protection and the prevention of illegal copy. The proposed method allocates codons to random circular angles by using random mapping table and selects triplet codons for embedding target with the help of the Lipschitz regularity value of local modulus maxima of codon circular angles. Then the watermark is embedded into circular angles of triplet codons without changing the codes of amino acids in a DNA. The length and location of target triplet codons depend on the random mapping table for 64 codons that includes start and stop codons. This table is used as the watermark key and can be applied on any codon sequence regardless of the length of sequence. If this table is unknown, it is very difficult to detect the length and location of them for extracting the watermark. We evaluated our method and DNA-crypt watermarking of Heider method on the condition of similar capacity. From evaluation results, we verified that our method has lower base changing rate than DNA-crypt and has lower bit error rate on point mutation and insertions/deletions than DNA-crypt. Furthermore, we verified that the entropy of random mapping table and the locaton of triplet codons is high, meaning that the watermark security has high level.