• Title/Summary/Keyword: Private Information Protection

Search Result 257, Processing Time 0.031 seconds

A Design of MILENAGE Algorithm-based Mutual Authentication Protocol for The Protection of Initial Identifier in LTE (LTE 환경에서 초기 식별자를 보호하기 위한 MILENAGE 알고리즘 기반의 상호인증)

  • Yoo, Jae-hoe;Kim, Hyung-uk;Jung, Yong-hoon
    • Journal of Venture Innovation
    • /
    • v.2 no.1
    • /
    • pp.13-21
    • /
    • 2019
  • In LTE environment, which is 4th generation mobile communication systems, there is concern about private information exposure by transmitting initial identifier in plain text. This paper suggest mutual authentication protocol, which uses one-time password utilizing challenge-response and AES-based Milenage key generation algorithm, as solution for safe initial identification communication, preventing unique identification information leaking. Milenage key generation algorithm has been used in LTE Security protocol for generating Cipher key, Integrity key, Message Authentication Code. Performance analysis evaluates the suitability of LTE Security protocol and LTE network by comparing LTE Security protocol with proposed protocol about algorithm operation count and Latency.Thus, this paper figures out initial identification communication's weak points of currently used LTE security protocol and complements in accordance with traditional protocol. So, it can be applied for traditional LTE communication on account of providing additional confidentiality to initial identifier.

A Data Protection Scheme based on Hilbert Curve for Data Aggregation in Wireless Sensor Network (센서 네트워크에서 데이터 집계를 위한 힐버트 커브 기반 데이터 보호 기법)

  • Yoon, Min;Kim, Yong-Ki;Chang, Jae-Woo
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.16 no.11
    • /
    • pp.1071-1075
    • /
    • 2010
  • Because a sensor node in wireless sensor networks(WSNs) has limited resources, such as battery capacity and memory, data aggregation techniques have been studied to manage the limited resources efficiently. Because sensor network uses wireless communication, a data can be disclosed by attacker. Thus, the study on data protection schemes for data aggregation is essential in WSNs. But the existing data aggregation methods require both a large number of computation and communication, in case of network construction and data aggregation processing. To solve the problem, we propose a data protection scheme based on Hilbert-curve for data aggregation. Our scheme can minimizes communications among neighboring sensor nodes by using tree-based routing. Moreover, it can protect the data from attacker by doing encryption through a Hilbert-curve technique based on a private seed, Finally, we show that our scheme outperforms the existing methods in terms of message transmission and average sensor node lifetime.

A Study on Risk and Safety measures of the Improved Explosive Device (사제폭발물의 위험성 및 안전대책에 관한 연구)

  • Han, Jae-Hoon;Choi, Min-Ki;Choi, Don-Mook
    • Journal of the Korea Safety Management & Science
    • /
    • v.16 no.4
    • /
    • pp.193-202
    • /
    • 2014
  • Crimes with explosives is one of the mass-destructive crimes that involves the most victims. It is heavily punished under the Korean laws. Mid-eastern area is one of the leading places that are home to improvised explosive device attacks, in the form of religious or political terrorism because of its convenience of use, production and disguise. Improvised bombs are permeating into domestic crimes in Korea as their tools. Use of explosive substances are strictly restricted in this country, but it is not impossible to find its information online and to create private explosives with a bit of interest. And they are being traded in the grey market. For this reason, this thesis offers the method of an efficient safety control of explosive substances, which can be used as raw materials for improvised explosive devices, in order to protect citizens' lives and properties and to promote national security down the road.

Information Security Policy in Ubiquitous-Ecological City (u-Eco City에서의 정보보호 정책)

  • Jang, Hee-Seon
    • Convergence Security Journal
    • /
    • v.12 no.1
    • /
    • pp.43-48
    • /
    • 2012
  • In this paper, the requirements for information security are presented in the ubiquitous ecological(u-Eco) city. The various definition of ubiquitous city is analyzed first, the concept of the u-Eco City, services and major projects are then presented. The framework of the integrated operating center for u-Eco city is proposed, the privacy, data security and network facility protection in the center are analyzed. Unlike to previously proposed security algorithms, the light-weight encoding algorithms(such as block/stream encoding, pseudo-random generator, hash function, and public key encoding) in the u-Eco city center are required to communicate the information in the ubiquitous sensor network. Furthermore, the principal policies guaranteeing the secrecy and authentication for the private information are also presented.

Methods for Change of Tag States and Assignment of Master Leaders to Protect RFID Privacy (태그상태 변경과 마스터리더 지정을 통한 RFID 프라이버시 보호 방안)

  • Kim, Eun-Jin;Roh, Byeong-Hee
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.12B
    • /
    • pp.743-749
    • /
    • 2007
  • The problem of privacy is considered one of the main concerns to deploy RFID applications. In this paper, we propose methods to change a tag state and assign a master leader for the protection of privacy. By changing a tag state, we can limit the range for the information retrieval of the tag to all leaders or a specific leader (mater leader). Whenever the owner of a tag changes, with the master leader assignment method for the tag, we can make only the master leader get the information for the tag. With the proposed methods, it is expected that the privacy problems can be solved by preventing the private information of tags that persons have from being exposed by illegal leaders.

A Study of Patient's Privacy Protection in U-Healthcare (유헬스케어에서 환자의 프라이버시 보호 방안 연구)

  • Jeong, Yoon-Su;Lee, Sang-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.4
    • /
    • pp.913-921
    • /
    • 2012
  • On the strength of the rapid development and propagation of U-healthcare service, the service technologies are full of important changes. However, U-healthcare service has security problem that patient's biometric information can be easily exposed to the third party without service users' consent. This paper proposes a distributed model according authority and access level of hospital officials in order to safely access patients' private information in u-Healthcare Environment. Proposed model can both limit the access to patients' biometric information and keep safe system from DoS attack using time stamp. Also, it can prevent patients' data spill and privacy intrusion because the main server simultaneously controls hospital officials and the access by the access range of officials from each hospital.

The Impact of CPO Characteristics on Organizational Privacy Performance (개인정보보호책임자의 특성이 개인정보보호 성과에 미치는 영향)

  • Wee, Jiyoung;Jang, Jaeyoung;Kim, Beomsoo
    • Asia pacific journal of information systems
    • /
    • v.24 no.1
    • /
    • pp.93-112
    • /
    • 2014
  • As personal data breach reared up as a problem domestically and globally, organizations appointing chief privacy officers (CPOs) are increasing. Related Korean laws, 'Personal Data Protection Act' and 'the Act on Promotion of Information and Communication Network Utilization and Information Protection, etc.' require personal data processing organizations to appoint CPOs. Research on the characteristics and role of CPO is called for because of the importance of CPO being emphasized. There are many researches on top management's role and their impact on organizational performance using the Upper Echelon theory. This study investigates what influence the characteristics of CPO gives on the organizational privacy performance. CPO's definition varies depending on industry, organization size, required responsibility and power. This study defines CPO as 'a person who takes responsibility for all the duties on handling the organization's privacy,' This research assumes that CPO characteristics such as role, personality and background knowledge have an influence on the organizational privacy performance. This study applies the part relevant to the upper echelon's characteristics and performance of the executives (CEOs, CIOs etc.) for CPO. First, following Mintzberg and other managerial role classification, information, strategic, and diplomacy roles are defined as the role of CPO. Second, the "Big Five" taxonomy on individual's personality was suggested in 1990. Among these five personalities, extraversion and conscientiousness are drawn as the personality characteristics of CPO. Third, advance study suggests complex knowledge of technology, law and business is necessary for CPO. Technical, legal, and business background knowledge are drawn as the background knowledge of CPO. To test this model empirically, 120 samples of data collected from CPOs of domestic organizations are used. Factor analysis is carried out and convergent validity and discriminant validity were verified using SPSS and Smart PLS, and the causal relationships between the CPO's role, personality, background knowledge and the organizational privacy performance are analyzed as well. The result of the analysis shows that CPO's diplomacy role and strategic role have significant impacts on organizational privacy performance. This reveals that CPO's active communication with other organizations is needed. Differentiated privacy policy or strategy of organizations is also important. Legal background knowledge and technical background knowledge were also found to be significant determinants to organizational privacy performance. In addition, CPOs conscientiousness has a positive impact on organizational privacy performance. The practical implication of this study is as follows: First, the research can be a yardstick for judgment when companies select CPOs and vest authority in them. Second, not only companies but also CPOs can judge what ability they should concentrate on for development of their career relevant to their job through results of this research. Cultural social value, citizen's consensus on the right to privacy, expected CPO's role will change in process of time. In future study, long-term time-series analysis based research can reveal these changes and can also offer practical implications for government and private organization's policy making on information privacy.

Presidential Archives Management in Crisis - An Archival Approach to the Solutions - (위기에 처한 대통령기록물관리, 문제의 인식과 해결을 위한 접근 방식)

  • Lee, Sang-Min
    • The Korean Journal of Archival Studies
    • /
    • no.18
    • /
    • pp.281-315
    • /
    • 2008
  • This paper reviews recent records issues surrounding former president Roh Moo-Hyun's private possession of the copies of the presidential records in Korea. While the former president transferred his records to the National Archives of Korea, he copied his electronic presidential records and kept them in his house after the term. His retention of the "records copies" arouse critical records issues and criminal charges. In this paper, I examined the definition of presidential records and legal status of records copies, authenticity of electronic copies of public records in public and private records systems, nature and scope of presidential privilege of access to his records, and most importantly, political neutrality of national archives. I examined these issues comparing with foreign experience, especially that of the United States which has the Presidential Records Act like Korea. All issues are examined in the professional spirit of archives principles and archives ethics. Legal status of the electronic copies of presidential records is not firmly established and the criminal charge seems groundless. However, it is against public archives principles and ethics that private former president privately possesses and manages private information and national security information held in the electronic copies of the presidential records. Presidential Records Act of Korea provides an effective tool to protect the presidential records for 15 years and it should be respected. It is time to consolidate the public records management institutions in Korea, not to disintegrate them.

A study on the implementation of Digital Cinema platform and its security system (디지털 시네마 플랫폼 구축과 보안에 관한 연구)

  • Kim Jong-An;Kim Jin-Han;Kim Jong-Heum
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2006.08a
    • /
    • pp.82-86
    • /
    • 2006
  • Film has been used widely since Auguste and Louis Lumiere hold the first private screening in 1895. Star Wars Episode II: Attack of the Clones directed by George Lucas released on May 16, was the first motion picture both to be shot completely on a high definition digital 24-frame system and to be projected by digital projectors. Its success showed us that the digital cinema era is imminent. Digital Cinema will enable the studios and movie distributors to low the expenses of making and delivering film prints and dissemination of it can put the entire digital cinema ecosystem in great jeopardy. Therefore DRM and other security policies are used for digital cinema content protection. In this paper it will be discussed how the digital cinema platform can package (encooe & encrypt), transport, and project the digital cinema contents safely.

  • PDF

Street Planning of Urban Detached Housing Area for Revitalization of the Community (커뮤니티 활성화를 위한 도시 단독주택지 가로공간 계획)

  • 김묘정;하재명
    • Proceeding of Spring/Autumn Annual Conference of KHA
    • /
    • 2002.11a
    • /
    • pp.197-201
    • /
    • 2002
  • The purpose of this study is to provide the information of street planning for revitalization oft the community in urban detached housing area. This study was accomplished by observations and actual survey, and suggested several street planning methods; exclusion of the passing through car and control of the resident's car by one-way passage, protection of the parking area to inside individual lot by the ‘Break down Fence’ campaign in Daegu, and provide the common space for social contact and community According to this program, the public street space cant be changed into the semi-private space and the semi-public space as common territory.

  • PDF