• Title/Summary/Keyword: User's Privacy

Search Result 394, Processing Time 0.029 seconds

ID 연계 기반의 인터넷 ID Management System: e-IDMS (Internet ID Management System based on ID Federation: e-IDMS)

  • 조영섭;진승헌;문필주;정교일
    • 대한전자공학회논문지TC
    • /
    • 제43권7호
    • /
    • pp.104-114
    • /
    • 2006
  • 인터넷 서비스를 이용하기 위해서 사용자는 일반적으로 가입절차를 수행하고 서비스를 위한 id(identifier)를 등록하게 된다. 그러나 인터넷의 활용이 증가함에 따라, 사용자는 많은 id를 가지게 되었으며 이것은 사용자가 인터넷 서비스를 이용할 때마다, 매번 인증을 받아야 한다는 문제를 발생시키고 있다 또한 여러 사이트에 산재되어 관리되지 않은 id들은 사용자 개인정보의 침해 가능성을 높이고 있다. 본 논문에서는 이와 같은 문제를 해결하기 위해 ETRI에서 개발한 ID(IDentity) 연계 기반의 인터넷 ID 관리 시스템인 e-IDMS에 대하여 기술한다. e-IDMS는 ID 연계를 기반으로 복합 인증, 인터넷 SSG, ID 정보 관리, ID 정보 공유, 개인정보 보호 및 대화형 질의 기능을 제공한다. e-IDMS는 공공기관 통합 ID 관리 시스템 구축에 활용되고 있다.

서비스거부공격에 안전한 OTP 스마트카드 인증 프로토콜 (Secure OTP Smart Card Authentication Protocol for Denial of Service)

  • 신광철
    • 한국컴퓨터정보학회논문지
    • /
    • 제12권6호
    • /
    • pp.201-206
    • /
    • 2007
  • 정보통신기술의 발전은 인터넷뱅킹과 e-business의 활성화를 가져왔고 그 매체로써의 스마트카드는 전자서명 인증관리센터의 사용자인증용으로 전자화폐, 교통카드, 출입카드 등으로 널리 보급되어 보편화되고 있다. 정보통신 공중망을 이용하는 분야에서는 스마트카드에 대한 보안과 카드 소지자의 프라이버시 보호가 매우 중요하다. 스마트카드 보안의 핵심은 사용자 인증으로 스마트카드에 대한 안전한 사용이다. 프라이버시 보호를 위한 익명성 보장과 가용성을 위한 서비스거부공격에 대한 대책이 필요하다. 본 논문에서는 Hwang-Li's, Sun's, L-H-Y scheme을 분석한 다음 일회용 해시함수를 사용하여 세션마다 안전하게 패스워드 확인자를 변경하고 익명성과 서비스거부공격에 안전한 보다 효율적인 새로운 스마트카드 인증 프로토콜을 제안한다.

  • PDF

A Delegation Model based on Agent in Distributed Systems

  • Kim, Kyu-Il;Lee, Joo-Chang;Choi, Won-Gil;Lee, Eun-Ju;Kim, Ung-Mo
    • Journal of Information Processing Systems
    • /
    • 제3권2호
    • /
    • pp.82-88
    • /
    • 2007
  • Web services are the new building block of today's Internet, and provides interoperability among heterogeneous distributed systems. Recently in web services environment, security has become one of the most critical issues. The hackers attack one of fragile point and can misuse legitimate user privilege because all of the connected devices provide services for the user control and monitoring in real time. Also, the users of web services must temporarily delegate some or all of their rights to agents in order to perform actions on their behalf. This fact risks the exposure of user privacy information. In this paper, we propose secure delegation model based on SAML that provides confidentiality and integrity about the user information in distributed systems. In order to support privacy protection, service confidentiality, and assertion integrity, encryption and a digital signature mechanism is deployed. We build web service management server based on XACML, in order to manage services and policies of web service providers.

Information Privacy Concern in Context-Aware Personalized Services: Results of a Delphi Study

  • Lee, Yon-Nim;Kwon, Oh-Byung
    • Asia pacific journal of information systems
    • /
    • 제20권2호
    • /
    • pp.63-86
    • /
    • 2010
  • Personalized services directly and indirectly acquire personal data, in part, to provide customers with higher-value services that are specifically context-relevant (such as place and time). Information technologies continue to mature and develop, providing greatly improved performance. Sensory networks and intelligent software can now obtain context data, and that is the cornerstone for providing personalized, context-specific services. Yet, the danger of overflowing personal information is increasing because the data retrieved by the sensors usually contains privacy information. Various technical characteristics of context-aware applications have more troubling implications for information privacy. In parallel with increasing use of context for service personalization, information privacy concerns have also increased such as an unrestricted availability of context information. Those privacy concerns are consistently regarded as a critical issue facing context-aware personalized service success. The entire field of information privacy is growing as an important area of research, with many new definitions and terminologies, because of a need for a better understanding of information privacy concepts. Especially, it requires that the factors of information privacy should be revised according to the characteristics of new technologies. However, previous information privacy factors of context-aware applications have at least two shortcomings. First, there has been little overview of the technology characteristics of context-aware computing. Existing studies have only focused on a small subset of the technical characteristics of context-aware computing. Therefore, there has not been a mutually exclusive set of factors that uniquely and completely describe information privacy on context-aware applications. Second, user survey has been widely used to identify factors of information privacy in most studies despite the limitation of users' knowledge and experiences about context-aware computing technology. To date, since context-aware services have not been widely deployed on a commercial scale yet, only very few people have prior experiences with context-aware personalized services. It is difficult to build users' knowledge about context-aware technology even by increasing their understanding in various ways: scenarios, pictures, flash animation, etc. Nevertheless, conducting a survey, assuming that the participants have sufficient experience or understanding about the technologies shown in the survey, may not be absolutely valid. Moreover, some surveys are based solely on simplifying and hence unrealistic assumptions (e.g., they only consider location information as a context data). A better understanding of information privacy concern in context-aware personalized services is highly needed. Hence, the purpose of this paper is to identify a generic set of factors for elemental information privacy concern in context-aware personalized services and to develop a rank-order list of information privacy concern factors. We consider overall technology characteristics to establish a mutually exclusive set of factors. A Delphi survey, a rigorous data collection method, was deployed to obtain a reliable opinion from the experts and to produce a rank-order list. It, therefore, lends itself well to obtaining a set of universal factors of information privacy concern and its priority. An international panel of researchers and practitioners who have the expertise in privacy and context-aware system fields were involved in our research. Delphi rounds formatting will faithfully follow the procedure for the Delphi study proposed by Okoli and Pawlowski. This will involve three general rounds: (1) brainstorming for important factors; (2) narrowing down the original list to the most important ones; and (3) ranking the list of important factors. For this round only, experts were treated as individuals, not panels. Adapted from Okoli and Pawlowski, we outlined the process of administrating the study. We performed three rounds. In the first and second rounds of the Delphi questionnaire, we gathered a set of exclusive factors for information privacy concern in context-aware personalized services. The respondents were asked to provide at least five main factors for the most appropriate understanding of the information privacy concern in the first round. To do so, some of the main factors found in the literature were presented to the participants. The second round of the questionnaire discussed the main factor provided in the first round, fleshed out with relevant sub-factors. Respondents were then requested to evaluate each sub factor's suitability against the corresponding main factors to determine the final sub-factors from the candidate factors. The sub-factors were found from the literature survey. Final factors selected by over 50% of experts. In the third round, a list of factors with corresponding questions was provided, and the respondents were requested to assess the importance of each main factor and its corresponding sub factors. Finally, we calculated the mean rank of each item to make a final result. While analyzing the data, we focused on group consensus rather than individual insistence. To do so, a concordance analysis, which measures the consistency of the experts' responses over successive rounds of the Delphi, was adopted during the survey process. As a result, experts reported that context data collection and high identifiable level of identical data are the most important factor in the main factors and sub factors, respectively. Additional important sub-factors included diverse types of context data collected, tracking and recording functionalities, and embedded and disappeared sensor devices. The average score of each factor is very useful for future context-aware personalized service development in the view of the information privacy. The final factors have the following differences comparing to those proposed in other studies. First, the concern factors differ from existing studies, which are based on privacy issues that may occur during the lifecycle of acquired user information. However, our study helped to clarify these sometimes vague issues by determining which privacy concern issues are viable based on specific technical characteristics in context-aware personalized services. Since a context-aware service differs in its technical characteristics compared to other services, we selected specific characteristics that had a higher potential to increase user's privacy concerns. Secondly, this study considered privacy issues in terms of service delivery and display that were almost overlooked in existing studies by introducing IPOS as the factor division. Lastly, in each factor, it correlated the level of importance with professionals' opinions as to what extent users have privacy concerns. The reason that it did not select the traditional method questionnaire at that time is that context-aware personalized service considered the absolute lack in understanding and experience of users with new technology. For understanding users' privacy concerns, professionals in the Delphi questionnaire process selected context data collection, tracking and recording, and sensory network as the most important factors among technological characteristics of context-aware personalized services. In the creation of a context-aware personalized services, this study demonstrates the importance and relevance of determining an optimal methodology, and which technologies and in what sequence are needed, to acquire what types of users' context information. Most studies focus on which services and systems should be provided and developed by utilizing context information on the supposition, along with the development of context-aware technology. However, the results in this study show that, in terms of users' privacy, it is necessary to pay greater attention to the activities that acquire context information. To inspect the results in the evaluation of sub factor, additional studies would be necessary for approaches on reducing users' privacy concerns toward technological characteristics such as highly identifiable level of identical data, diverse types of context data collected, tracking and recording functionality, embedded and disappearing sensor devices. The factor ranked the next highest level of importance after input is a context-aware service delivery that is related to output. The results show that delivery and display showing services to users in a context-aware personalized services toward the anywhere-anytime-any device concept have been regarded as even more important than in previous computing environment. Considering the concern factors to develop context aware personalized services will help to increase service success rate and hopefully user acceptance for those services. Our future work will be to adopt these factors for qualifying context aware service development projects such as u-city development projects in terms of service quality and hence user acceptance.

A Privacy-preserving Data Aggregation Scheme with Efficient Batch Verification in Smart Grid

  • Zhang, Yueyu;Chen, Jie;Zhou, Hua;Dang, Lanjun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제15권2호
    • /
    • pp.617-636
    • /
    • 2021
  • This paper presents a privacy-preserving data aggregation scheme deals with the multidimensional data. It is essential that the multidimensional data is rarely mentioned in all researches on smart grid. We use the Paillier Cryptosystem and blinding factor technique to encrypt the multidimensional data as a whole and take advantage of the homomorphic property of the Paillier Cryptosystem to achieve data aggregation. Signature and efficient batch verification have also been applied into our scheme for data integrity and quick verification. And the efficient batch verification only requires 2 pairing operations. Our scheme also supports fault tolerance which means that even some smart meters don't work, our scheme can still work well. In addition, we give two extensions of our scheme. One is that our scheme can be used to compute a fixed user's time-of-use electricity bill. The other is that our scheme is able to effectively and quickly deal with the dynamic user situation. In security analysis, we prove the detailed unforgeability and security of batch verification, and briefly introduce other security features. Performance analysis shows that our scheme has lower computational complexity and communication overhead than existing schemes.

위치 기반 서비스에서 도로 네트워크의 거리 정보를 이용한 사용자 정보 은닉 기법 (Road Network Distance based User Privacy Protection Scheme in Location-based Services)

  • 김형일;신영성;장재우
    • Spatial Information Research
    • /
    • 제20권5호
    • /
    • pp.57-66
    • /
    • 2012
  • 최근 PDA, 휴대폰과 같은 모바일 기기 및 GPS와 같은 무선 통신 기술의 발달로 인하여 위치 기반 서비스의 이용이 확산되었다. 하지만 이러한 서비스는 사용자가 도로 네트워크에서 이동하면서 자신의 위치정보를 통해 LBS 서버에 질의를 요청하기 때문에, 심각한 개인 정보 누출의 위협이 될 수 있다. 따라서 모바일 사용자의 안전하고 편리한 위치기반 서비스 사용을 위한 개인 정보 보호 기법이 필요하다. 이를 위해 본 논문에서는 위치 기반 서비스에서 사용자 정보 보호를 지원하는 도로 네트워크 거리 기반 클로킹 기법을 제안한다. 제안하는 기법은 도로 네트워크에서 효율적이고 안전한 위치기반 서비스를 지원하기 위하여, 도로 네트워크의 거리를 고려하여 클로킹 영역을 설정한다. 아울러, 성능평가를 통해서 제안하는 기법이 클로킹 영역 및 서비스 시간 측면에서 기존 연구보다 우수함을 보인다.

Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems

  • Kang, Jin-Suk;Choi, Yong-Sik;Sung, Mee-Young;Shin, Seung-Ho;Jeong, Tai-Keong T.
    • Journal of information and communication convergence engineering
    • /
    • 제5권3호
    • /
    • pp.254-258
    • /
    • 2007
  • Recently, ubiquitous computing in being actively researched and one of the main technology in ubiquitous computing environments is recognized as RFID system. The RFID system has much benefits but simultaneously has some problems such as user's privacy violation. In this paper, in order to improve the survivability of its nodes, it should build available simulation surrounding sensor nodes. Also, In the proposed cryptosystems we use a new hash function for user authentication and a stream cipher based on LFSR(Linear Feedback Shift Register) for message encryption and decryption. Moreover, each algorithm is programmed with C language and simulated on IBM-PC system and we analyze the randomness properties of the proposed algorithms by using statistical tests.

An Approach Towards Secure Matchmaking Using Mobile Social Network

  • Abbas, Fizza;Hussain, Rasheed;Son, Junggab;Oh, Heekuck
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2013년도 추계학술발표대회
    • /
    • pp.698-701
    • /
    • 2013
  • Mobile social networking applications are getting increasingly popular among today's mobile applications. Mobile users find their old or new friends anywhere or anytime through mobile social network (MSN) services. MSN uses matchmaking mechanisms to discover mutual interests among different people. To discover friends in MSN, a user must share his/her private information which can be a risk for his/her personal privacy as this information can be learned by a malicious or semi honest user. In this paper we give a brief survey on MSN that includes MSN categories, components, architecture and applications. In the rest of the paper we discuss the matchmaking protocols. Finally we give some suggestions to improve the previous protocols.

Secure Authentication Scheme with Anonymity for Wireless Environments

  • Xiu, Anna;Li, Kun;Kim, Hyoung-Joong
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2011년도 춘계학술발표대회
    • /
    • pp.1033-1036
    • /
    • 2011
  • With the development of wireless networks and the use of mobile devices, mobile user's privacy issue is becoming more and more important. Privacy includes ID anonymity and unlinkability. Unlinkability requires that any two temporary IDs which have been used before should not be associated with each other. In other words, these temporary IDs should be generated in such a way that no direct relationship among them should be derived. The existing schemes only focus on ID anonymity of mobile users. In this paper, we proposed a scheme not only holding all the merits of previous works, but also achieving unlinkability which is guaranteed by using one-time-use temporary ID. And the mobile user can also updates its one-time-use temporary ID with the help of the visited foreign agent.

웹 2.0 환경에서 사용되는 디지털 컨텐츠의 사용자 프라이버시 보호를 위한 RCBAC 모델 (RCBAC(Relationship-Content based Access Control) Model for User Privacy Protection of Digital Contents in Web 2.0 Environment)

  • 조은애;문창주;박대하;김정동;강동수;백두권
    • 디지털콘텐츠학회 논문지
    • /
    • 제9권4호
    • /
    • pp.697-705
    • /
    • 2008
  • 최근 웹 기술은 통합화, 가상화, 사회화의 세 가지 원동력에 의해 발전해왔다. 그러나 웹 기술은 소셜 네트워킹 능력의 증가를 제공하는 반면에 개인의 디지털 컨텐츠에 대한 프라이버시의 노출을 더욱 복잡하고 해결하기 어려운 문제로 심화시키고 있다. 대표적으로 세부적인 관계의 정의나 관리가 불가능하여 컨텐츠의 수집, 요약으로부터 개인의 정보 및 관심사가 추론될 수 있고, 정보 소유자만의 소셜 네트워크 구축이 어려운 문제점이 있다. 따라서 본 논문에서는 웹 2.0 환경에서 사용자만의 디지털 컨텐츠를 보호하기 위해 기존의 접근 통제 방법에 관계(Relationship)와 컨텐트 시맨틱(Content Semantic)의 개념을 적용한 RCBAC(Relationship-Content based Access Control) 모델을 제안한다. 이 방법은 개인적인 성향 등의 프라이버시가 노출되지 않고 세부적인 관계의 정의나 관리가 가능하도록 하여 정보 소유자가 자신의 소셜 네트워크를 구축할 수 있고, 이것을 웹 컨텐츠로 적용 및 확장할 수 있다.

  • PDF