• Title/Summary/Keyword: Sensitive data

Search Result 2,488, Processing Time 0.029 seconds

A Study on the Performances of the Voice/Data Integrated Multiple Access Protocols for Cellular Packet Radio Networks (셀룰러 패켓 라디오망용 음성/데이타 집적 다중 엑세스 프로토콜의 성능 분석에 관한 연구)

  • 강군화;조동호
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.18 no.9
    • /
    • pp.1304-1314
    • /
    • 1993
  • During the last several years, the demand of mobile communication is increasing rapidly due to the convenience of usage. Therefore, the evoluation scenario toward the new cellular network is needed. In this paper, the future prospect of cellular network is considered, and movable-boundary TDMA/BTMA protocol is proposed as a new voice/data integrated multiple access protocol for the future cellular packet radio networks. Then, the performance of movable-bounary TDMA/BTMA protocol is analyzed and compared with that of PRMA protocol by computer simulation. In the proposed movable-boundary TDMA/BTMA protocol, the voice traffic sensitive to delay time is served by TDMA protocol and the data traffic sensitive to loss is served by BTMA protocol. Also, the boundary of voice and data can be moved adaptively by usign SYN character, control byte, voice call counter, ect. Therefore. it could be seen that the performance of movable-boundary TDMA/BTMA protocol is better than that of PRMA protocol with respect to delay and throughput.

  • PDF

A Video Encryption Based Approach for Privacy Protection of Video Surveillance Service (개인정보보호를 위한 영상 암호화 아키텍처 연구)

  • Kim, Jeongseok;Lee, Jaeho
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.9 no.12
    • /
    • pp.307-314
    • /
    • 2020
  • The video surveillance service is being widely deployed around our lives and the service stores sensitive data such as video streams in the cloud over the Internet or the centralized data store in an on-premise environment. The main concerning of these services is that the user should trust the service provider how secure the video or data is stored and handled without any concrete evidence. In this paper, we proposed the approach to protecting video by PKI (public key infrastructure) with a blockchain network. The video is encrypted by a symmetric key, then the key is shared through a blockchain network with taking advantage of the PKI mechanism. Therefore, the user can ensure the sensitive data is always kept secure and traceable in its lifecycle.

A Study on the Secure Key Escrow System (안전한 키 위탁 시스템에 관한 연구)

  • 채승철
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.9 no.2
    • /
    • pp.83-92
    • /
    • 1999
  • Cryptography techniques can prevent eavesdroppers from maliciously intercepting or modifying sensitive information. however misuses of encryption may cause other problems First if the encryption key is lost or damaged even an authorized access to the original data will be denied. Second criminals can prevent authorized law enforcement officers from examining the necessary information by using the strong encrypted data can provide solutions for the situations. In this paper we propose a new key escrow system based on the ElGamal cryptosystem. Our system provide time-bound eavesdropping under court authorized permission protect from trustee's cheating and prevent user's shadow public key generation.

The genomic landscape associated with resistance to aromatase inhibitors in breast cancer

  • Kirithika Sadasivam;Jeevitha Priya Manoharan;Hema Palanisamy;Subramanian Vidyalakshmi
    • Genomics & Informatics
    • /
    • v.21 no.2
    • /
    • pp.20.1-20.10
    • /
    • 2023
  • Aromatase inhibitors (AI) are drugs that are widely used in treating estrogen receptor (ER)-positive breast cancer patients. Drug resistance is a major obstacle to aromatase inhibition therapy. There are diverse reasons behind acquired AI resistance. This study aims at identifying the plausible cause of acquired AI resistance in patients administered with non-steroidal AIs (anastrozole and letrozole). We used genomic, transcriptomic, epigenetic, and mutation data of breast invasive carcinoma from The Cancer Genomic Atlas database. The data was then separated into sensitive and resistant sets based on patients' responsiveness to the non-steroidal AIs. A sensitive set of 150 patients and a resistant set of 172 patients were included for the study. These data were collectively analyzed to probe into the factors that might be responsible for AI resistance. We identified 17 differentially regulated genes (DEGs) among the two groups. Then, methylation, mutation, miRNA, copy number variation, and pathway analyses were performed for these DEGs. The top mutated genes (FGFR3, CDKN2A, RNF208, MAPK4, MAPK15, HSD3B1, CRYBB2, CDC20B, TP53TG5, and MAPK8IP3) were predicted. We also identified a key miRNA - hsa-mir-1264 regulating the expression of CDC20B. Pathway analysis revealed HSD3B1 to be involved in estrogen biosynthesis. This study reveals the involvement of key genes that might be associated with the development of AI resistance in ER-positive breast cancers and hence may act as a potential prognostic and diagnostic biomarker for these patients.

Light-weight Preservation of Access Pattern Privacy in Un-trusted Storage

  • Yang, Ka;Zhang, Jinsheng;Zhang, Wensheng;Qiao, Daji
    • IEIE Transactions on Smart Processing and Computing
    • /
    • v.2 no.5
    • /
    • pp.282-296
    • /
    • 2013
  • With the emergence of cloud computing, more and more sensitive user data are outsourced to remote storage servers. The privacy of users' access pattern to the data should be protected to prevent un-trusted storage servers from inferring users' private information or launching stealthy attacks. Meanwhile, the privacy protection schemes should be efficient as cloud users often use thin client devices to access the data. In this paper, we propose a lightweight scheme to protect the privacy of data access pattern. Comparing with existing state-of-the-art solutions, our scheme incurs less communication and computational overhead, requires significantly less storage space at the user side, while consuming similar storage space at the server. Rigorous proofs and extensive evaluations have been conducted to show that the proposed scheme can hide the data access pattern effectively in the long run after a reasonable number of accesses have been made.

  • PDF

The Development of Short-term Load Forecasting System Using Ordinary Database (범용 Database를 이용한 단기전력수요예측 시스템 개발)

  • Kim Byoung Su;Ha Seong Kwan;Song Kyung Bin;Park Jeong Do
    • Proceedings of the KIEE Conference
    • /
    • summer
    • /
    • pp.683-685
    • /
    • 2004
  • This paper introduces a basic design for the short-term load forecasting system using a commercial data base. The proposed system uses a hybrid load forecasting method using fuzzy linear regression for forecasting of weekends and Monday and general exponential smoothing for forecasting of weekdays. The temperature sensitive is used to improve the accuracy of the load forecasting during the summer season. MS-SQL Sever has been used a commercial data base for the proposed system and the database is operated by ADO(ActiveX Data Objects) and RDO(Remote Data Object). Database has been constructed by altering the historical load data for the past 38 years. The weather iDormation is included in the database. The developed short-term load forecasting system is developed as a user friendly system based on GUI(Graphical User interface) using MFC(Microsoft Foundation Class). Test results show that the developed system efficiently performs short-term load forecasting.

  • PDF

Analysis of Degradation Data Using Robust Experimental Design (강건 실험계획법을 이용한 열화자료의 분석)

  • 서순근;하천수
    • Journal of Korean Society for Quality Management
    • /
    • v.32 no.1
    • /
    • pp.113-129
    • /
    • 2004
  • The reliability of the product can be improved by making the product less sensitive to noises. Especially, it Is important to make products robust against various noise factors encountered in production and field environments. In this paper, the phenomenon of degradation assumes a simple random coefficient degradation model to present analysis procedures of degradation data for robust experimental design. To alleviate weak points of previous studies, such as Taguchi's, Wasserman's, and pseudo failure time methods, novel techniques for analysis of degradation data using the cross array that regards amount of degradation as a dynamic characteristic for time are proposed. Analysis approach for degradation data using robust experimental design are classified by assumptions on parametric or nonparametric degradation rate(or slope). Also, a simulation study demonstrates the superiority of proposed methods over some previous works.

Quick Detection of Variance Change Point for I.I.D. Data

  • Park, Kyoung-Hwa;Kim, Tae-Yoon;Song, Gyu-Moon;Choi, Jung-Jae
    • Journal of the Korean Data and Information Science Society
    • /
    • v.16 no.2
    • /
    • pp.173-183
    • /
    • 2005
  • This paper studies quick detection of variance change point for iid data. For development of sensitive and adaptive variance change point detector, moving variance ratio is employed as a variance ratio estimator. It is shown that selection of tuning parameters of detector, (i.e., information and lag tuning parameters) is critical for detector to achieve desirable sensitivity and adaptiveness. Interestingly our simulation result reveals limitations of the commonly used change ratio against the previous day. Our results will provide useful insight when the detector is applied to time series data.

  • PDF

Admission Control for Voice and Stream-Type Data Services in DS-CDMA Cellular System (직접 대역확산 부호분할 시스템에서 음성 및 흐름형 데이터 서비스를 위한 호 수락제어 기법)

  • Chang Jin-weon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.9A
    • /
    • pp.737-748
    • /
    • 2005
  • Two flexible admission control schemes for integrated voice and stream-type data services are proposed in DS-CDMA systems. Most Previous studies on admission control have focused on integration of short, bursty Packet-type data services and conventional voice services. However, stream-type data services with a relatively long service holding time are expected to be a considerable portion of data traffic in future generation cellular systems. Scheme I is a basic scheme that accommodates both voice and data services with full bandwidth. However, voice services are given priority over data services using the duration difference between the holding times for these services. Scheme ll uses a different method to efficiently give priority to voice services over stream-type data services. An additional interference margin for voice services is provided by suppressing interference from stream-type data services according to voice access requests and a varying interference status. Performance of the two schemes is evaluated by developing Markovian models. Numerical results show that the voice capacity is highly sensitive to the service holding time of data services while the performance measures of data services are not highly sensitive. Scheme H is a significant improvement over Scheme I for accommodating voice and stream-type data services

An Efficient Top-k Query Processing Algorithm over Encrypted Outsourced-Data in the Cloud (아웃소싱 암호화 데이터에 대한 효율적인 Top-k 질의 처리 알고리즘)

  • Kim, Jong Wook;Suh, Young-Kyoon
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.4 no.12
    • /
    • pp.543-548
    • /
    • 2015
  • Recently top-k query processing has been extremely important along with the explosion of data produced by a variety of applications. Top-k queries return the best k results ordered by a user-provided monotone scoring function. As cloud computing service has been getting more popular than ever, a hot attention has been paid to cloud-based data outsourcing in which clients' data are stored and managed by the cloud. The cloud-based data outsourcing, though, exposes a critical secuity concern of sensitive data, resulting in the misuse of unauthorized users. Hence it is essential to encrypt sensitive data before outsourcing the data to the cloud. However, there has been little attention to efficient top-k processing on the encrypted cloud data. In this paper we propose a novel top-k processing algorithm that can efficiently process a large amount of encrypted data in the cloud. The main idea of the algorithm is to prune unpromising intermediate results at the early phase without decrypting the encrypted data by leveraging an order-preserving encrypted technique. Experiment results show that the proposed top-k processing algorithm significantly reduces the overhead of client systems from 10X to 10000X.