• Title/Summary/Keyword: cloaked region

Search Result 3, Processing Time 0.015 seconds

Seismic Surface Wave Cloaking by Acoustic Wave Refraction (음향파 굴절을 이용한 지진파의 표면파 가림)

  • Lee, Dong-Woo;Kang, Young-Hoon;Kim, Sang-Hoon
    • Journal of the Earthquake Engineering Society of Korea
    • /
    • v.19 no.6
    • /
    • pp.257-263
    • /
    • 2015
  • Recently two seismic cloaking methods of earthquake engineering have been suggested. One is the seismic wave deflection method that makes the seismic wave bend away and the other is the shadow zone method that makes an area that seismic waves cannot pass through. It is called as seismic cloaking. The fundamental principles of the seismic cloaking by variable refractive index were explained. A two-dimensional cylindrical model which was composed of 40 layers of different density and modulus was tested by numerical simulation. The center region of the model to be protected is called 'cloaked area' and the outer region of it to deflect the incoming wave is called 'cloaking area' or 'cloak area.' As the incoming surface wave is approaching to the cloaking area, the refractive index is decreasing and, therefore, the velocity and impedance are increasing. Then, the wave bends away the cloaked area instead of passing it. Three cases are tested depending on the comparison between the seismic wavelength and the diameter of the cloaked region. The advantage and disadvantage of the method were compared with conventional earthquake engineering method. Some practical requirements for realization in fields were discussed.

Efficient Dummy Generation for Protecting Location Privacy (개인의 위치를 보호하기 위한 효율적인 더미 생성)

  • Cai, Tian-Yuan;Song, Doo-Hee;Youn, Ji-Hye;Lee, Won-Gyu;Kim, Yong-Kab;Park, Kwang-Jin
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.9 no.6
    • /
    • pp.526-533
    • /
    • 2016
  • The researches protecting user's location in location-based services(LBS) have received much attention. Especially k-anonymity is the most popular privacy preservation method. k-anonymization means that it selects k-1 other dummies or clients to make the cloaking region. This reduced the probability of the query issuer's location being exposed to untrusted parties to 1/k. But query's location may expose to adversary when k-1 dummies are concentrated in query's location or there is dummy in where query can not exist. Therefore, we proposed the dummy system model and algorithm taking the real environment into account to protect user's location privacy. And we proved the efficiency of our method in terms of experiment result.

Efficient dummy generation for protecting location privacy in location based services (위치기반 서비스에서 위치 프라이버시를 보호하기 위한 효율적인 더미 생성)

  • Cai, Tian-yuan;Youn, Ji-hye;Song, Doo-hee;Park, Kwang-jin
    • Journal of Internet Computing and Services
    • /
    • v.18 no.5
    • /
    • pp.23-30
    • /
    • 2017
  • For enjoying the convenience provided by location based services, the user needs to submit his or her location and query to the LBS server. So there is a probability that the untrusted LBS server may expose the user's id and location etc. To protect user's privacy so many approaches have been proposed in the literature. Recently, the approaches about using dummy are getting popular. However, there are a number of things to consider if we want to generate a dummy. For example, when generating a dummy, we have to take the obstacle and the distance between dummies into account so that we can improve the privacy level. Thus, in this paper we proposed an efficient dummy generation algorithm to achieve k-anonymity and protect user's privacy in LBS. Evaluation results show that the algorithm can significantly improve the privacy level when it was compared with others.