• 제목/요약/키워드: Sensitive data

검색결과 2,479건 처리시간 0.024초

영상분할을 위한 밀도추정 바탕의 Fuzzy C-means 알고리즘 (A Density Estimation based Fuzzy C-means Algorithm for Image Segmentation)

  • 고정원;최병인;이정훈
    • 한국지능시스템학회논문지
    • /
    • 제17권2호
    • /
    • pp.196-201
    • /
    • 2007
  • Fuzzy C-Means (FCM) 알고리즘은 probabilitic 멤버쉽을 사용하는 클러스터링 방법으로서 널리 쓰이고 있다. 하지만 이 방법은 노이즈에 대하여 민감한 성질을 가진다는 단점이 있다. 따라서 본 논문에서는 이러한 노이즈에 민감한 성질을 보완하기 위해서 데이터의 밀도추정을 이용하여 새로운 FCM 알고리즘을 제안한다. 본 논문에서 제안된 알고리즘은 FCM과 비슷한 성능의 클러스터링 수행이 가능하며, 노이즈가 포함된 데이터에서는 FCM보다 더 나은 성능을 보여준다.

WORM(Write Once Read Many) 지원 네트워크 대용량 저장 장치를 위한 파일 시스템 (A network-attached WORM(Write Once Read Many) storage system)

  • 김문경;김선태;노재춘;박성순
    • 대한전자공학회:학술대회논문집
    • /
    • 대한전자공학회 2008년도 하계종합학술대회
    • /
    • pp.1177-1178
    • /
    • 2008
  • This paper presents a network-attached WORM(Write Once Read Many) storage system whose purpose is to protect sensitive data that should not be accessed by accidental/intentional intrusion. In our storage system, the sensitive data would be marked and be stored into a specific WORM volume. Furthermore, with the associated WORM mark, the data whose WORM life cycle has been expired would automatically be moved to the general-purpose disk space, without interfering any other tasks, to save the WORM volume space. Our WORM storage system was integrated to the NAS product.

  • PDF

Resource Management Strategies in Fog Computing Environment -A Comprehensive Review

  • Alsadie, Deafallah
    • International Journal of Computer Science & Network Security
    • /
    • 제22권4호
    • /
    • pp.310-328
    • /
    • 2022
  • Internet of things (IoT) has emerged as the most popular technique that facilitates enhancing humans' quality of life. However, most time sensitive IoT applications require quick response time. So, processing these IoT applications in cloud servers may not be effective. Therefore, fog computing has emerged as a promising solution that addresses the problem of managing large data bandwidth requirements of devices and quick response time. This technology has resulted in processing a large amount of data near the data source compared to the cloud. However, efficient management of computing resources involving balancing workload, allocating resources, provisioning resources, and scheduling tasks is one primary consideration for effective computing-based solutions, specifically for time-sensitive applications. This paper provides a comprehensive review of the source management strategies considering resource limitations, heterogeneity, unpredicted traffic in the fog computing environment. It presents recent developments in the resource management field of the fog computing environment. It also presents significant management issues such as resource allocation, resource provisioning, resource scheduling, task offloading, etc. Related studies are compared indifferent mentions to provide promising directions of future research by fellow researchers in the field.

프라이버시 보호를 위한 동형암호의 필요성 (The Need for Homomorphic Encryption to Protection Privacy)

  • 서진범;조영복
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국정보통신학회 2021년도 추계학술대회
    • /
    • pp.47-49
    • /
    • 2021
  • 2020년 데이터 3법의 개정으로 의료데이터의 개인정보를 가명·익명 처리하여 통계작성, 연구, 공익적 기록 보존 등의 목적으로 사용가능 하도록 하고 있다. 그러나 비식별화 한 데이터를 유전정보, 신용정보 등을 이용하여 재식별이 가능하며, 재식별 정보를 통해 개인 건강정보는 민감정보로 프라이버시 침해에 악용될 여지가 있다. 본 논문에서는 민감정보로 분리되는 개인정보의 프라이버시 보호를 위한 동형암호의 필요성을 도출한다.

  • PDF

Digital Forensics Investigation Approaches in Mitigating Cybercrimes: A Review

  • Abdullahi Aminu, Kazaure;Aman Jantan;Mohd Najwadi Yusoff
    • Journal of Information Science Theory and Practice
    • /
    • 제11권4호
    • /
    • pp.14-39
    • /
    • 2023
  • Cybercrime is a significant threat to Internet users, involving crimes committed using computers or computer networks. The landscape of cyberspace presents a complex terrain, making the task of tracing the origins of sensitive data a formidable and often elusive endeavor. However, tracing the source of sensitive data in online cyberspace is critically challenging, and detecting cyber-criminals on the other hand remains a time-consuming process, especially in social networks. Cyber-criminals target individuals for financial gain or to cause harm to their assets, resulting in the loss or theft of millions of user data over the past few decades. Forensic professionals play a vital role in conducting successful investigations and acquiring legally acceptable evidence admissible in court proceedings using modern techniques. This study aims to provide an overview of forensic investigation methods for extracting digital evidence from computer systems and mobile devices to combat persistent cybercrime. It also discusses current cybercrime issues and mitigation procedures.

Software Defined Networking and Network Function Virtualization for improved data privacy using the emergent blockchain in banking systems

  • ALRUWAILI, Anfal;Hendaoui, Saloua
    • International Journal of Computer Science & Network Security
    • /
    • 제21권8호
    • /
    • pp.111-118
    • /
    • 2021
  • Banking systems are sensitive to data privacy since users' data, if not well protected, may be used to perform fake transactions. Blockchains, public and private, are frequently used in such systems thanks to their efficiency and high security. Public blockchains fail to fully protect users' data, despite their power in the accuracy of the transactions. The private blockchain is better used to protect the privacy of the sensitive data. They are not open and they apply authorization to login into the blockchain. However, they have a lower security compared to public blockchain. We propose in this paper a hybrid public-private architecture that profits from network virtualization. The main novelty of this proposal is the use of network virtualization that helps to reduce the complexity and efficiency of the computations. Simulations have been conducted to evaluate the performance of the proposed solution. Findings prove the efficiency of the scheme in reducing complexity and enhancing data privacy by guarantee high security. The contribution conducted by this proposal is that the results are verified by the centralized controller that ensures a correct validation of the resulted blockchains. In addition, computation complexity is to be reduced by profiting from the cooperation performed by the virtual agents.

버킷인덱스와 블룸필터를 이용한 범위형 의료정보 암호화기법 (A Mechanism of Medical Data Encryption Method Using Bucket Index and Bloom filter with the range property.)

  • 김창규;김정태;유천영;김지홍
    • 한국정보통신학회논문지
    • /
    • 제15권2호
    • /
    • pp.371-381
    • /
    • 2011
  • 최근 데이터베이스내의 개인정보의 유출이 사회적으로 이슈가 되고 있다. 개인의 민감한 정보를 보호하기 위한 최선의 방법은 데이터 암호화이다. 그러나 데이터를 암호화하면 질의어 처리가 어렵게 된다. 그러므로 데이터베이스를 보호하고 질의어 처리를 효율적으로 하기 위한 많은 방법들이 제안되고 있다. 본 논문에서는 기존의 연구에 대한 방법을 분석하고, 의료정보 데이터베이스내의 범위특성을 가진 데이터를 암호화하기 위한 방안으로서 버킷 방식과 블룸필터 방식을 이용한 복합적인 방법을 제안하였다. 버킷방식만을 적용한 경우에 비하여 본 논문에서 제안한 버킷방식과 블룸필터방식을 융합하여 적용한 경우에는 버킷의 개수를 늘일 수 있고, 이에 따른 사용자 데이터의 분포 노출을 방지할 수 있으며, 결과적으로 검색속도를 높일 수 있음을 알 수 있다.

Implementation of Qualitative Unrelated Question Model for Obtaining Sensitive Information at On-Line Survey

  • Park, Hee-Chang;Myung, Ho-Min
    • 한국데이터정보과학회:학술대회논문집
    • /
    • 한국데이터정보과학회 2002년도 춘계학술대회
    • /
    • pp.107-118
    • /
    • 2002
  • This paper is planned to use randomized response technique which is an indirect response technique on internet as a way of obtaining much more precise information, not revealing secrets of responsors, considering that respondents are generally reluctant to answer in a survey to get sensitive information targeting employees, customers, etc.

  • PDF

우선순위 기능을 가진 ATM스위치의 성능분석 (Performance evaluation of ATM switch with space priority control mechanism)

  • 장재신;신병철
    • 한국통신학회:학술대회논문집
    • /
    • 한국통신학회 1991년도 추계종합학술발표회논문집
    • /
    • pp.141-144
    • /
    • 1991
  • In this paper, we analyze the performance of ATM switch with output buffer which has a space priority control mechanism. As we assumed that the input traffic consists of loss tolerable voice and loss sensitive data, we modeled it with MMPP(Markov Modulated Poisson Process). We confirmed that the loss probability of loss sensitive traffic decreases when we use the space priority control mechanism.

내장된 메모리를 위한 향상된 March 테스트 알고리듬의 설계 및 구현 (Design and implementation of improved march test algorithm for embedded meories)

  • 박강민;장훈;양승민
    • 한국통신학회논문지
    • /
    • 제22권7호
    • /
    • pp.1394-1402
    • /
    • 1997
  • In this work, an efficient test algorithm and BIST architeture a for embedded memories are presented. The proposed test algorithm can fully detect stuck-at fault, transition fault, coupling fault. Moreover, the proposed test algorithm can detect nighborhood pattern sensitive fault which could not be detected in previous march test algoarithms. The proposed test algorithm perposed test algorithm performs testing for neghborhood pattern sensitive fault using backgroung data which has been used word-oriented memory testing.

  • PDF