• Title/Summary/Keyword: leakage of personal information

Search Result 329, Processing Time 0.025 seconds

Federated Learning Based on Ethereum Network (이더리움 네트워크 기반의 연합학습)

  • Seung-Yeon Hwang;Jeong-Joon Kim
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.24 no.2
    • /
    • pp.191-196
    • /
    • 2024
  • Recently, research on intelligent IoT technology has been actively conducted by various companies and research institutes to analyze various data collected from IoT devices and provide it through actual application services. However, security issues such as personal information leakage may arise in the process of transmitting and receiving data to use data collected from IoT devices for research and development. In addition, as data collected from multiple IoT devices increases, data management difficulties exist, and data movement is costly and time consuming. Therefore, in this paper, we intend to develop an Ethereum network-based federated learning system with guaranteed reliability to improve security issues and inefficiencies in a federated learning environment composed of various devices.

Derivation of Security Requirements of Smart TV Based on STRIDE Threat Modeling (STRIDE 위협 모델링에 기반한 스마트 TV 보안 요구사항 도출)

  • Oh, In-Kyung;Seo, Jae-Wan;Lee, Min-Kyu;Lee, Tae-Hoon;Han, Yu-Na;Park, Ui-Seong;Ji, Han-Byeol;Lee, Jong-Ho;Cho, Kyu-Hyung;Kim, Kyounggon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.2
    • /
    • pp.213-230
    • /
    • 2020
  • As smart TVs have recently emerged as the center of the IoT ecosystem, their importance is increasing. If a vulnerability occurs within a smart TV, there is a possibility that it will cause financial damage, not just in terms of privacy invasion and personal information leakage due to sniffing and theft. Therefore, in this paper, to enhance the completeness of smart TV vulnerability analysis, STRIDE threat classification are used to systematically identify threats. In addition, through the manufacture of the Attack Tree and the actual vulnerability analysis, the effectiveness of the checklist was verified and security requirements were derived for the safe smart TV use environment.

Cloud Computing Virtualization: It's Security Issues and Vulnerability (클라우드 컴퓨팅 가상화 기술: 보안이슈 및 취약점)

  • Kang, Dea-Hoon;Kim, Sang-Gu;Kim, HyunHo;Lee, HoonJae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.05a
    • /
    • pp.234-237
    • /
    • 2014
  • The increasing of Cloud Computing technology among several companies has been a key strategy for IT services to provide desirable IT solutions to consumers of cloud services. More attention is concentrated to these core technologies that enable cloud services and more particularly to the virtualization aspect. The accessibility to a larger number of users is possible because of the usage of the data-intensive, data management and data integrity. Unfortunately, those useful services are vulnerable to kind of attacks by hackers, thus the security of personal information is in critical situation. To solve this to leakage vulnerability, and with the proliferation of cloud services, the cloud service providers adopt a security system with firewall, antivirus software and a large number of virtualized servers and Host. In this paper, a variety of virtualization technologies, threats and vulnerabilities are described with a complement of different security solutions as countermeasures.

  • PDF

Intelligent Video Surveillance Incubating Security Mechanism in Open Cloud Environments (개방형 클라우드 환경의 지능형 영상감시 인큐베이팅 보안 메커니즘 구조)

  • Kim, Jinsu;Park, Namje
    • The Journal of Korean Institute of Information Technology
    • /
    • v.17 no.5
    • /
    • pp.105-116
    • /
    • 2019
  • Most of the public and private buildings in Korea are installing CCTV for crime prevention and follow-up action, insider security, facility safety, and fire prevention, and the number of installations is increasing each year. In the questionnaire conducted on the increasing CCTV, many reactions were positive in terms of the prevention of crime that could occur due to the installation, rather than negative views such as privacy violation caused by CCTV shooting. However, CCTV poses a lot of privacy risks, and when the image data is collected using the cloud, the personal information of the subject can be leaked. InseCam relayed the CCTV surveillance video of each country in real time, including the front camera of the notebook computer, which caused a big issue. In this paper, we introduce a system to prevent leakage of private information and enhance the security of the cloud system by processing the privacy technique on image information about a subject photographed through CCTV.

Fusion of Blockchain-IoT network to improve supply chain traceability using Ethermint Smart chain: A Review

  • George, Geethu Mary;Jayashree, LS
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.11
    • /
    • pp.3694-3722
    • /
    • 2022
  • In today's globalized world, there is no transparency in exchanging data and information between producers and consumers. However, these tasks experience many challenges, such as administrative barriers, confidential data leakage, and extensive time delays. To overcome these challenges, we propose a decentralized, secured, and verified smart chain framework using Ethereum Smart Contract which employs Inter Planetary File Systems (IPFS) and MongoDB as storage systems to automate the process and exchange information into blocks using the Tendermint algorithm. The proposed work promotes complete traceability of the product, ensures data integrity and transparency in addition to providing security to their personal information using the Lelantos mode of shipping. The Tendermint algorithm helps to speed up the process of validating and authenticating the transaction quickly. More so in this time of pandemic, it is easier to meet the needs of customers through the Ethermint Smart Chain, which increases customer satisfaction, thus boosting their confidence. Moreover, Smart contracts help to exploit more international transaction services and provide an instant block time finality of around 5 sec using Ethermint. The paper concludes with a description of product storage and distribution adopting the Ethermint technique. The proposed system was executed based on the Ethereum-Tendermint Smart chain. Experiments were conducted on variable block sizes and the number of transactions. The experimental results indicate that the proposed system seems to perform better than existing blockchain-based systems. Two configuration files were used, the first one was to describe the storage part, including its topology. The second one was a modified file to include the test rounds that Caliper should execute, including the running time and the workload content. Our findings indicate this is a promising technology for food supply chain storage and distribution.

A Conceptual Study on the Development of Intelligent Detection Model for the anonymous Communication bypassing the Cyber Defense System (사이버 방어체계를 우회하는 익명통신의 지능형 탐지모델개발을 위한 개념연구)

  • Jung, Ui Seob;Kim, Jae Hyun;Jeong, Chan Ki
    • Convergence Security Journal
    • /
    • v.19 no.4
    • /
    • pp.77-85
    • /
    • 2019
  • As the Internet continues to evolve, cyber attacks are becoming more precise and covert. Anonymous communication, which is used to protect personal privacy, is also being used for cyber attacks. Not only it hides the attacker's IP address but also encrypts traffic, which allows users to bypass the information protection system that most organizations and institutions are using to defend cyber attacks. For this reason, anonymous communication can be used as a means of attacking malicious code or for downloading additional malware. Therefore, this study aims to suggest a method to detect and block encrypted anonymous communication as quickly as possible through artificial intelligence. Furthermore, it will be applied to the defense to detect malicious communication and contribute to preventing the leakage of important data and cyber attacks.

A Traceback-Based Authentication Model for Active Phishing Site Detection for Service Users (서비스 사용자의 능동적 피싱 사이트 탐지를 위한 트레이스 백 기반 인증 모델)

  • Baek Yong Jin;Kim Hyun Ju
    • Convergence Security Journal
    • /
    • v.23 no.1
    • /
    • pp.19-25
    • /
    • 2023
  • The current network environment provides a real-time interactive service from an initial one-way information prov ision service. Depending on the form of web-based information sharing, it is possible to provide various knowledge a nd services between users. However, in this web-based real-time information sharing environment, cases of damage by illegal attackers who exploit network vulnerabilities are increasing rapidly. In particular, for attackers who attempt a phishing attack, a link to the corresponding web page is induced after actively generating a forged web page to a user who needs a specific web page service. In this paper, we analyze whether users directly and actively forge a sp ecific site rather than a passive server-based detection method. For this purpose, it is possible to prevent leakage of important personal information of general users by detecting a disguised webpage of an attacker who induces illegal webpage access using traceback information

Consideration on the Revision Direction of National Cyber Security Management Legislation (국가 사이버안전 관리 법제의 개정방향에 관한 소고)

  • Oh, Tae-Kon;Seoung, Gwan-Sil
    • Journal of the Korea Society of Computer and Information
    • /
    • v.19 no.3
    • /
    • pp.163-170
    • /
    • 2014
  • Cyberspace is closely related with one another, transcending the spacetime throughout the world, and is already located in the most important area of our lives. However, if the organizational cyber terror happens like the national paralysis crisis of major information network such as the previous 1.25 the Internet crisis, the possibility of cyber crisis highly damaging our whole society such as the leakage of the national secrecy and advanced technology is increasing. But we haven't set up the institutional procedure systematically performing the national cyber security management affairs yet. So, in case of cyber crisis, this is highly likely to damage the aspects of national and personal level. On this point, this study looks into the examples of legislation related to our cyber security, and suggests the implication on the revision direction of national cyber security management regulations through relative examination about the examples of legislation in major countries.

Vehicle black box system with LINK blockchain (LINK 블록체인을 적용한 차량용 블랙박스 시스템)

  • An, Kyuhwang;Won, Taeyeon;Park, Sangmin;Jang, Kyoungbae;Seo, Hwajeong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.8
    • /
    • pp.1018-1023
    • /
    • 2019
  • Since 2010, vehicle black boxes have become popular with many people, if there is no record of the vehicle accident scene, or if the offender deliberately deletes the image data, the victim succeeds. The biggest advantage of blockchain is that it is impossible to modify and delete data by data distribution storage. The biggest disadvantage is that sensitive data is also distributed. In this paper, we propose a blockchain method for the black box by using the advantage of shared block data and we intend to solve the problem of personal information leakage which is a disadvantage of blockchain by storing sensitive information stored in a blockchain in a private server by LINK blockchain with a private server. We also attached code(Github) and demonstration video(Youtube) linking LINK blockchain with the private server in this paper.

A Study on the Abnormal Behavior Detection Model through Data Transfer Data Analysis (자료 전송 데이터 분석을 통한 이상 행위 탐지 모델의 관한 연구)

  • Son, In Jae;Kim, Huy Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.4
    • /
    • pp.647-656
    • /
    • 2020
  • Recently, there has been an increasing number of cases in which important data (personal information, technology, etc.) of national and public institutions are leaked to the outside world. Surveys show that the largest cause of such leakage accidents is "insiders." Insiders of organization with the most authority can cause more damage than technology leaks caused by external attacks due to the organization. This is due to the characteristics of insiders who have relatively easy access to the organization's major assets. This study aims to present an optimized property selection model for detecting such abnormalities through supervised learning algorithms among machine learning techniques using actual data such as CrossNet data transfer system transmission log, e-mail transmission log, and personnel information, which safely transmits data between separate areas (security area and non-security area) of the business network and the Internet network.