• 제목/요약/키워드: Privacy-Aware

검색결과 76건 처리시간 0.028초

도서관 이용자 프라이버시에 대한 사서인식 조사연구 (A Study on Librarians' Perception of Library User Privacy)

  • 노영희
    • 한국문헌정보학회지
    • /
    • 제47권3호
    • /
    • pp.73-96
    • /
    • 2013
  • 본 연구에서는 사서들을 대상으로 도서관 이용자 프라이버시에 대한 인식을 조사하고자 하였다. 이를 위해 도서관 이용자 프라이버시에 대한 설문응답자의 의견, 도서관 기록이 이용자의 프라이버시를 침해하는 정도, 도서관 이용자 프라이버시 보호를 위한 사서 및 도서관의 노력, 그리고 도서관 이용자 프라이버시 교육의 필요성 등 크게 네 개의 부분으로 나누어 조사하였다. 연구결과, 사서들은 프라이버시 침해에 대한 문제는 심각하게 인식하고 있으나 도서관 이용자 프라이버시에 대한 인식은 그다지 높지 못한 것으로 나타났다. 특히 도서관의 어떤 기록과 어떤 업무가 이용자 프라이버시 침해 가능성이 있는지에 대한 인식은 매우 낮게 나타났다. 또한 도서관 이용자 프라이버시를 보호하기 위해 어떤 노력을 어느 정도 해야 하는지에 대한 인식도 매우 낮게 나타났다. 반면에 도서관 이용자 프라이버시 관련 교육 프로그램의 필요성은 매우 높게 인지하고 있으며, 교육 프로그램에 참여할 의사도 비교적 높음을 알 수 있었다.

A Survey of System Architectures, Privacy Preservation, and Main Research Challenges on Location-Based Services

  • Tefera, Mulugeta K.;Yang, Xiaolong;Sun, Qifu Tyler
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제13권6호
    • /
    • pp.3199-3218
    • /
    • 2019
  • Location-based services (LBSs) have become popular in recent years due to the ever-increasing usage of smart mobile devices and mobile applications through networks. Although LBS application provides great benefits to mobile users, it also raises a sever privacy concern of users due to the untrusted service providers. In the lack of privacy enhancing mechanisms, most applications of the LBS may discourage the user's acceptance of location services in general, and endanger the user's privacy in particular. Therefore, it is a great interest to discuss on the recent privacy-preserving mechanisms in LBSs. Many existing location-privacy protection-mechanisms (LPPMs) make great efforts to increase the attacker's uncertainty on the user's actual whereabouts by generating a multiple of fake-locations together with user's actual positions. In this survey, we present a study and analysis of existing LPPMs and the state-of-art privacy measures in service quality aware LBS applications. We first study the general architecture of privacy qualification system for LBSs by surveying the existing framework and outlining its main feature components. We then give an overview of the basic privacy requirements to be considered in the design and evaluation of LPPMs. Furthermore, we discuss the classification and countermeasure solutions of existing LPPMs for mitigating the current LBS privacy protection challenges. These classifications include anonymization, obfuscation, and an encryption-based technique, as well as the combination of them is called a hybrid mechanism. Finally, we discuss several open issues and research challenges based on the latest progresses for on-going LBS and location privacy research.

A Privacy-Preserving Health Data Aggregation Scheme

  • Liu, Yining;Liu, Gao;Cheng, Chi;Xia, Zhe;Shen, Jian
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제10권8호
    • /
    • pp.3852-3864
    • /
    • 2016
  • Patients' health data is very sensitive and the access to individual's health data should be strictly restricted. However, many data consumers may need to use the aggregated health data. For example, the insurance companies needs to use this data to setup the premium level for health insurances. Therefore, privacy-preserving data aggregation solutions for health data have both theoretical importance and application potentials. In this paper, we propose a privacy-preserving health data aggregation scheme using differential privacy. In our scheme, patients' health data are aggregated by the local healthcare center before it is used by data comsumers, and this prevents individual's data from being leaked. Moreover, compared with the existing schemes in the literature, our work enjoys two additional benefits: 1) it not only resists many well known attacks in the open wireless networks, but also achieves the resilience against the human-factor-aware differential aggregation attack; 2) no trusted third party is employed in our proposed scheme, hence it achieves the robustness property and it does not suffer the single point failure problem.

응급처치 교육과정을 배우는 학생들의 개인의료정보 보호에 대한 인식도 조사 - 응급구조과와 간호과 학생을 중심으로 - (The Perception Survey for Personal Health Information Protection of First Aid Training Courses Students - Focused of EMT students and Nursing students -)

  • 배성주;최영진
    • 한국임상보건과학회지
    • /
    • 제2권1호
    • /
    • pp.25-34
    • /
    • 2014
  • Purpose. The checked of perception for the protection of personal medical information of EMT student and Nursing student. Methods. Nursing students and EMT students 200 questionnaires were collected and Frequency analysis, Chi-square test, one-way ANOVA was performed for using the Windows SPSS(ver. 12.0). Results. Most of the subjects were aware of the protection law of personal information and Infringement of the privacy of personal information will be exposed. also, Education is needed privacy(EMT students $3.84{\pm}0.96$, Nursing students $3.73{\pm}0.99$). EMT($3.99{\pm}1.00$) and Nursing($4.07{\pm}0.94$)students due to exposure to both the patient's personal information privacy was violated would get recognized. Exposure to the computerization of information privacy will be exploited in other agencies(EMT students $3.78{\pm}0.88$, Nursing students $3.95{\pm}0.94$) was called. Conclusions. For the protection of personal health information, education needs to be expanded.

Context-Aware 환경에서의 위치정보 프라이버시 연구동향

  • 이동혁;송유진
    • 정보보호학회지
    • /
    • 제15권5호
    • /
    • pp.100-112
    • /
    • 2005
  • 유비쿼터스의 주요한 특성은 상황 인식(Context-Aware)이며 이것은 사용자의 시공간에 따라 변하는 데이터를 사용자가 직접 입력하지 않고 상황에 맞게 자동적으로 처리해 주는 것을 뜻한다. 그러나 이러한 유비쿼터스의 특성은 데이터의 보안이 취약할 경우 기존 컴퓨팅 환경보다 더 큰 문제를 가져올 수 있다. 한편, 미 벨 연구소에 의해 개발된 PCP(Privacy Conscious Personalization)는 모바일 및 유비쿼터스 환경에서 사용자의 프라이버시 문제에 Context-Aware의 특성을 반영해 준다. PCP는 위치 정보에 대한 요구를 받으면 Houdini로 명명된 Rule Engine을 작동시키며 현재의 상황 및 사용자의 설정을 고려하여 정보를 공개할지 여부를 결정한다. 또한, 네덜란드의 University of Twente는 P3P를 확장하는 P3P Extension과 상황-의존 Preference를 표현하는 XML 기반 언어를 개발하고 이를 바탕으로 WASP 플랫폼을 위한 아키텍쳐를 개발하였다. WASP Framework는 웹서비스 기반의 프라이버시 보호 아키텍쳐이며 사용자의 위치, 시간, 상태, 신원 등 다양한 Context 정보를 제공할 수 있다. 본고에서는 Location Context의 관점에서 Context Aware Computing 환경의 하나로 LBS 위치정보의 프라이버시 구조에 대한 두가지 사례 연구를 수행한다.

Applying Metricized Knowledge Abstraction Hierarchy for Securely Personalized Context-Aware Cooperative Query

  • Kwon Oh-Byung;Shin Myung-Geun;Kim In-Jun
    • 한국지능정보시스템학회:학술대회논문집
    • /
    • 한국지능정보시스템학회 2006년도 춘계학술대회
    • /
    • pp.354-360
    • /
    • 2006
  • The purpose of this paper is to propose a securely personalized context-aware cooperative query that supports a multi-level data abstraction hierarchy and conceptual distance metric among data values, while considering privacy concerns around user context awareness. The conceptual distance expresses a semantic similarity among data values with a quantitative measure, and thus the conceptual distance enables query results to be ranked. To show the feasibility of the methodology proposed in this paper we have implemented a prototype system in the area of site search in a large-scale shopping mall.

  • PDF

Ubiquitous 환경에서의 Context-Aware Service를 위한 User Model 설계 (The Design of User Model for Context-Aware Service in Ubiquitous Environment)

  • 박종원;이긍해
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2004년도 춘계학술발표대회
    • /
    • pp.845-848
    • /
    • 2004
  • Ubiquitous Computing 환경은 컴퓨터 중심의 환경이 아닌 사용자가 편리성과 효율성이 극대화된 서비스들을 제공 받을 수 있는 사용자 중심의 환경이다. 이러한 환경에서 사용자들은 자신의 정보가 언제 어디서 사용되고 있고 어떠한 목적으로 유출되고 있는지 알기 어렵다. 따라서 사용자를 식별하고 개인의 특성에 따라 관련된 서비스를 제공하는데 있어 사용자의 필요정보를 적절하게 보호할 수 있는 메커니즘이 필요하다. 본 논문에서는 Ubiquitous환경에서 특정목적에 국한된 서비스 제공이 아닌 다양한 목적에 따라 서비스가 제공될 수 있도록 사용자의 목적과 상황에 맞는 User Model을 제안하고자 한다. 또한 사용자의 상황에 맞는 Context Content를 구별하여 Privacy등급을 결정하고 사용자마다 독립적이고 안전한 Context-Aware Service를 제공하는 User Model은 사용자마다 정해진 정적 Context와 상황에 따라 변화하는 동적 Context를 모두 고려하여 높은 신뢰성과 안전성을 지닌 방법을 제공한다. 그리고 제안된 User Model의 정의와 시나리오를 설명한다.

  • PDF

A wireless sensor network approach to enable location awareness in ubiquitous healthcare applications

  • Singh, Vinay Kumar;Lim, Hyo-Taek;Chung, Wan-Young
    • 센서학회지
    • /
    • 제16권4호
    • /
    • pp.277-285
    • /
    • 2007
  • In this paper, we outline the research issues that we are pursuing towards building of location aware environments for mainly ubiquitous healthcare applications. Such location aware application can provide what is happening in this space. To locate an object, such as patient or elderly person, the active ceiling-mounted reference beacons were placed throughout the building. Reference beacons periodically publish location information on RF and ultrasonic signals to allow application running on mobile or static nodes to study and determine their physical location. Once object-carried passive listener receives the information, it subsequently determines it's location from reference beacons. The cost of the system was reduced while the accuracy in our experiments was fairly good and fine grained between 7 and 12 cm for location awareness in indoor environments by using only the sensor nodes and wireless sensor network technology. Passive architecture used here provides the security of the user privacy while at the server the privacy was secured by providing the authentication using Geopriv approach. This information from sensor nodes is further forwarded to base station where further computation is performed to determine the current position of object.

Design and Implementation of Context-aware Application on Smartphone Using Speech Recognizer

  • Kim, Kyuseok
    • 한국정보기술학회 영문논문지
    • /
    • 제10권2호
    • /
    • pp.49-59
    • /
    • 2020
  • As technologies have been developing, our lives are getting easier. Today we are surrounded by the new technologies such as AI and IoT. Moreover, the word, "smart" is a very broad one because we are trying to change our daily environment into smart one by using those technologies. For example, the traditional workplaces have changed into smart offices. Since the 3rd industrial revolution, we have used the touch interface to operate the machines. In the 4th industrial revolution, however, we are trying adding the speech recognition module to the machines to operate them by giving voice commands. Today many of the things are communicated with human by voice commands. Many of them are called AI things and they do tasks which users request and do tasks more than what users request. In the 4th industrial revolution, we use smartphones all the time every day from the morning to the night. For this reason, the privacy using phone is not guaranteed sometimes. For example, the caller's voice can be heard through the phone speaker when accepting a call. So, it is needed to protect privacy on smartphone and it should work automatically according to the user context. In this aspect, this paper proposes a method to adjust the voice volume for call to protect privacy on smartphone according to the user context.

Cooperation-Aware VANET Clouds: Providing Secure Cloud Services to Vehicular Ad Hoc Networks

  • Hussain, Rasheed;Oh, Heekuck
    • Journal of Information Processing Systems
    • /
    • 제10권1호
    • /
    • pp.103-118
    • /
    • 2014
  • Over the last couple of years, traditional VANET (Vehicular Ad Hoc NETwork) evolved into VANET-based clouds. From the VANET standpoint, applications became richer by virtue of the boom in automotive telematics and infotainment technologies. Nevertheless, the research community and industries are concerned about the under-utilization of rich computation, communication, and storage resources in middle and high-end vehicles. This phenomenon became the driving force for the birth of VANET-based clouds. In this paper, we envision a novel application layer of VANET-based clouds based on the cooperation of the moving cars on the road, called CaaS (Cooperation as a Service). CaaS is divided into TIaaS (Traffic Information as a Service), WaaS (Warning as a Service), and IfaaS (Infotainment as a Service). Note, however, that this work focuses only on TIaaS and WaaS. TIaaS provides vehicular nodes, more precisely subscribers, with the fine-grained traffic information constructed by CDM (Cloud Decision Module) as a result of the cooperation of the vehicles on the roads in the form of mobility vectors. On the other hand, WaaS provides subscribers with potential warning messages in case of hazard situations on the road. Communication between the cloud infrastructure and the vehicles is done through GTs (Gateway Terminals), whereas GTs are physically realized through RSUs (Road-Side Units) and vehicles with 4G Internet access. These GTs forward the coarse-grained cooperation from vehicles to cloud and fine-grained traffic information and warnings from cloud to vehicles (subscribers) in a secure, privacy-aware fashion. In our proposed scheme, privacy is conditionally preserved wherein the location and the identity of the cooperators are preserved by leveraging the modified location-based encryption and, in case of any dispute, the node is subject to revocation. To the best of our knowledge, our proposed scheme is the first effort to offshore the extended traffic view construction function and warning messages dissemination function to the cloud.