• 제목/요약/키워드: Privacy security

검색결과 1,539건 처리시간 0.029초

Reliable blockchain-based ring signature protocol for online financial transactions

  • Jinqi Su;Lin He;Runtao Ren;Qilei Liu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제17권8호
    • /
    • pp.2083-2100
    • /
    • 2023
  • The rise of Industry 5.0 has led to a smarter and more digital way of doing business, but with it comes the issue of user privacy and security. Only when privacy and security issues are addressed, will users be able to transact online with greater peace of mind. Thus, to address the security and privacy problems associated with industry blockchain technology, we propose a privacy protection scheme for online financial transactions based on verifiable ring signatures and blockchain by comparing and combining the unconditional anonymity provided by ring signatures with the high integrity provided by blockchain technology. Firstly, we present an algorithm for verifying ring signature based on distributed key generation, which can ensure the integrity of transaction data. Secondly, by using the block chain technique, we choose the proxy node to send the plaintext message into the block chain, and guarantee the security of the asset transaction. On this basis, the designed scheme is subjected to a security analysis to verify that it is completely anonymous, verifiable and unerasable. The protection of user privacy can be achieved while enabling online transactions. Finally, it is shown that the proposed method is more effective and practical than other similar solutions in performance assessment and simulation. It is proved that the scheme is a safe and efficient online financial transaction ring signature scheme.

Analyses of Security and Privacy Issues in Ultra-weight RFID Protocol

  • Kim, Jung-Tae
    • Journal of information and communication convergence engineering
    • /
    • 제9권4호
    • /
    • pp.441-446
    • /
    • 2011
  • Radio frequency identification (RFID) tags are cheap and simple devices that can store unique identification information and perform simple computation to keep better inventory of packages. Security protocol for RFID tags is needed to ensure privacy and authentication between each tag and their reader. In order to accomplish this, in this paper, we analyzed a lightweight privacy and authentication protocol for passive RFID tags.

Robust Conditional Privacy-Preserving Authentication based on Pseudonym Root with Cuckoo Filter in Vehicular Ad Hoc Networks

  • Alazzawi, Murtadha A.;Lu, Hongwei;Yassin, Ali A.;Chen, Kai
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제13권12호
    • /
    • pp.6121-6144
    • /
    • 2019
  • Numerous privacy-preserving authentication schemes have been proposed but vehicular ad hoc networks (VANETs) still suffer from security and privacy issues as well as computation and communication overheads. In this paper, we proposed a robust conditional privacy-preserving authentication scheme based on pseudonym root with cuckoo filter to meet security and privacy requirements and reduce computation and communication overheads. In our proposed scheme, we used a new idea to generate pseudonyms for vehicles where each on-board unit (OBU) saves one pseudonym, named as "pseudonym root," and generates all pseudonyms from the same pseudonym. Therefore, OBU does not need to enlarge its storage. In addition, the scheme does not use bilinear pairing operation that causes computation overhead and has no certification revocation list that leads to computation and communication overheads. The proposed scheme has lightweight mutual authentication among all parties and just for once. Moreover, it provides strong anonymity to preserve privacy and resists ordinary attacks. We analyzed our proposed scheme and showed that it meets security and privacy requirements of VANETs and is more efficient than traditional schemes. The communication and computation overheads were also discussed to show the cost-effectiveness of the proposed scheme.

다자간 환경에서 프라이버시를 보호하는 효율적인 DBSCAN 군집화 기법 (Practical Privacy-Preserving DBSCAN Clustering Over Horizontally Partitioned Data)

  • 김기성;정익래
    • 정보보호학회논문지
    • /
    • 제20권3호
    • /
    • pp.105-111
    • /
    • 2010
  • 본 논문은 다자간 환경에서 프라이버시를 보호하는 효율적인 DBSCAN 군집화 기법을 제안한다. 기존 DBSCAN 군집화 기법에 가짜 데이터 삽입을 통한 프라이버시 보호 기법을 적용해 다자간 환경에서 프라이버시를 보호하는 기법으로 확장했다. 기존의 프라이버시를 보호하는 다자간 환경의 군집화 기법들은 비효율적이어서 실제 환경에 적용하기 힘들지만 제안한 기법은 이러한 문제를 해결한 매우 효율적인 기법이다. 본 기법은 다자간 환경뿐만 아니라 비 다자간 환경에도 적용 가능한 효율적인 기법이다.

개인정보관리자의 책임과 벌칙의 형평성 (The Legal Justice of Conferring Criminal Negligence on Chief Privacy Officers(CPO))

  • 김범수
    • 한국IT서비스학회지
    • /
    • 제10권4호
    • /
    • pp.21-32
    • /
    • 2011
  • The recently revised "Telecommunications Business Promotion and Personal Data Protection Act" is an important legal milestone in promoting the Korean telecommunications infrastructure and industry as well as protecting individuals' personal data and individuals' rights to privacy. Special characteristics of information security and privacy protection services including public goods' feature, adaptiveness, relativity, multi-dimensionality, and incompleteness, are reviewed. The responsibility of chief security/privacy officers in the IT industry, and the fairness and effectiveness of the criminal negligence in the Telecommunications Act are analyzed. An assessment of the rationale behind the act as well as a survey of related laws and cases in different countries, offers the following recommendations : i) revise the act and develop new systems for data protection, ii) grant a stay of execution or reduce the sentence given extenuating circumstances, or iii) use technical and managerial measures in data protection for exemption from criminal negligence.

A Lightweight and Privacy-Preserving Answer Collection Scheme for Mobile Crowdsourcing

  • Dai, Yingling;Weng, Jian;Yang, Anjia;Yu, Shui;Deng, Robert H.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제15권8호
    • /
    • pp.2827-2848
    • /
    • 2021
  • Mobile Crowdsourcing (MCS) has become an emerging paradigm evolved from crowdsourcing by employing advanced features of mobile devices such as smartphones to perform more complicated, especially spatial tasks. One of the key procedures in MCS is to collect answers from mobile users (workers), which may face several security issues. First, authentication is required to ensure that answers are from authorized workers. In addition, MCS tasks are usually location-dependent, so the collected answers could disclose workers' location privacy, which may discourage workers to participate in the tasks. Finally, the overhead occurred by authentication and privacy protection should be minimized since mobile devices are resource-constrained. Considering all the above concerns, in this paper, we propose a lightweight and privacy-preserving answer collection scheme for MCS. In the proposed scheme, we achieve anonymous authentication based on traceable ring signature, which provides authentication, anonymity, as well as traceability by enabling malicious workers tracing. In order to balance user location privacy and data availability, we propose a new concept named current location privacy, which means the location of the worker cannot be disclosed to anyone until a specified time. Since the leakage of current location will seriously threaten workers' personal safety, causing such as absence or presence disclosure attacks, it is necessary to pay attention to the current location privacy of workers in MCS. We encrypt the collected answers based on timed-release encryption, ensuring the secure transmission and high availability of data, as well as preserving the current location privacy of workers. Finally, we analyze the security and performance of the proposed scheme. The experimental results show that the computation costs of a worker depend on the number of ring signature members, which indicates the flexibility for a worker to choose an appropriate size of the group under considerations of privacy and efficiency.

IoBT 네트워크 환경에서 작전 영역의 보안 대응 체계 연구 (Evaluating the Operational Capabilities and Security of the IoBT Network Architecture)

  • 강해영;이제민;김유경;고명현;이경호
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2021년도 춘계학술발표대회
    • /
    • pp.140-143
    • /
    • 2021
  • IoBT시장은 2023년까지 317억 달러로 성장할 것으로 예측되며, 센서 및 웨어러블 디바이스와 같은 IoBT 장비의 수가 급격히 늘어나고 있다. IoBT 장비들로부터 수집된 생체 정보와 같은 민감한 데이터를 효율적이고 안전하게 처리하기 위해 많은 노력이 필요하다. 하지만 초경량화, 저전력화된 IoBT 장비들은 보안적인 측면에서 취약한 상황이다. 본 논문은 Fog computing을 적용하여 전장과 지휘관 사이에서 결심 및 통제에 필요한 시각화 자료를 신속하게 제공하고 IoBT 장비의 보안 사항과 공격에 따른 완화 기법을 수행할 수 있는 새로운 네트워크 아키텍처를 제공하고자 한다.

PC의 개인정보보호 취약점 분석과 정량화된 보안진단 연구 (A Study on Quantitative Security Assessment after Privacy Vulnerability Analysis of PC)

  • 서미숙;박대우
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국정보통신학회 2012년도 춘계학술대회
    • /
    • pp.456-460
    • /
    • 2012
  • 개인정보보호법이 2012년 3월 30일 시행을 하였다. 일반적으로 개인정보를 관리하는 DB서버는 보안을 강화하기 위한 보안시스템을 갖추고 있으나, PC에서는 개인정보보호를 위한 취약점 분석과 보안성 자가진단에 대한 연구가 필요하다. 본 논문에서는 PC에서 개인정보보호 관련 정보를 검색하고, 암호화하여 보안성을 강화하고 삭제대상 파일은 복구 불가능하게 삭제한다. PC에서 검색된 취약성 분석은 사용자계정점검, 공유폴더점검, 서비스 방화벽 점검, 화면보호기, 자동패치업데이트를 점검한다. 점검 후에 취약점에 관한 정량화 분석과 표현을 통해, 보안성 강화를 위한 점검리스트을 작성해서 보여주고, PC보안 관리를 반자동화하여 서버에서 관리하여 작동시킨다. 본 논문을 통해 PC개인정보보호와 PC보안강화로 국민의 경제적 피해와 고충을 줄이는데 기여할 것이다.

  • PDF

Democratic Values, Collective Security, and Privacy: Taiwan People's Response to COVID-19

  • Yang, Wan-Ying;Tsai, Chia-hung
    • Asian Journal for Public Opinion Research
    • /
    • 제8권3호
    • /
    • pp.222-245
    • /
    • 2020
  • In the pandemic crisis, many governments implemented harsh interventions that might contradict democratic values and civil liberties. In Taiwan, the debate over whether or not to reveal personal information of infected persons to limit the coronavirus's spread poses the democratic dilemma between public health and civil liberties. This study examines whether and explains how Taiwan's people respond to the choice between individual privacy and collective security. We used survey data gathered in May 2020 to show that, first, the democratic values did not deter the pursuit of collective safety at the cost of civil liberty; rather, people with higher social trust were more likely to give up their civil liberties in exchange for public safety. Second, people who support democratic values and pursue collective security tend to avoid violating privacy by opposing the release of personal information. This study proves that democratic values do not necessarily threaten collective safety and that the pursuit of common good can co-exist with personal privacy.

Privacy-Preserving NFC-Based Authentication Protocol for Mobile Payment System

  • Ali M. Allam
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제17권5호
    • /
    • pp.1471-1483
    • /
    • 2023
  • One of the fastest-growing mobile services accessible today is mobile payments. For the safety of this service, the Near Field Communication (NFC) technology is used. However, NFC standard protocol has prioritized transmission rate over authentication feature due to the proximity of communicated devices. Unfortunately, an adversary can exploit this vulnerability with an antenna that can eavesdrop or alter the exchanged messages between NFC-enabled devices. Many researchers have proposed authentication methods for NFC connections to mitigate this challenge. However, the security and privacy of payment transactions remain insufficient. We offer a privacy-preserving, anonymity-based, safe, and efficient authentication protocol to protect users from tracking and replay attacks to guarantee secure transactions. To improve transaction security and, more importantly, to make our protocol lightweight while ensuring privacy, the proposed protocol employs a secure offline session key generation mechanism. Formal security verification is performed to assess the proposed protocol's security strength. When comparing the performance of current protocols, the suggested protocol outperforms the others.