• Title/Summary/Keyword: location protection

Search Result 457, Processing Time 0.028 seconds

A Study of Privacy Protection of Location Information in Internet GIS Environment (인터넷 GIS 환경에서 위치정보 보호에 관한 연구)

  • 오충원
    • Spatial Information Research
    • /
    • v.11 no.2
    • /
    • pp.131-142
    • /
    • 2003
  • The Location Based Services comprised GIS and Telecommunication allow users to receive various services based on their geographic location. It is need to legislation to encourage the provision and use of location information by providing privacy protection to users. But the contents of the legislation proposed by Korean government have problems conflicted between protection of a person's location information and invigoration of location-based services. The purpose of this study is to search complementary measures for privacy protection of location information from a viewpoint of effective management strategy for geographic information.

  • PDF

Design and Implementation of a Protection System for the Mentally Handicapped Using a GPS Receiver and Mobile Communications (이동통신과 GPS 수신기를 이용한 지적장애인 보호 시스템의 설계 및 구현)

  • Seol, Tae-Min;Yoon, Sang-Ho;Kang, Chang-Soon
    • Journal of Information Technology Services
    • /
    • v.9 no.4
    • /
    • pp.207-217
    • /
    • 2010
  • This paper is concerned with a protection system for the mentally handicapped, which is utilizing a GPS receiver and mobile communications. The protection system consists of a location notification equipment, a location identification and management server, and a cell phone of guardian. The location notification equipment is made up of a GPS receiver, a CDMA communication module and a microprocessor. The equipment transfers the location of the mentally impaired to the location identification and management server when the handicapped gets out of a certain bound of the designated facility. The server marks the handicapped's location on the map in the server and also notifies the guardian's cell phone of the locations. With applying the proposed protection system to social welfare organizations related to the mentally handicapped, it is expected to efficiently contribute to the promotion of the handicapped's welfare.

Enhancing Location Privacy through P2P Network and Caching in Anonymizer

  • Liu, Peiqian;Xie, Shangchen;Shen, Zihao;Wang, Hui
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.5
    • /
    • pp.1653-1670
    • /
    • 2022
  • The fear that location privacy may be compromised greatly hinders the development of location-based service. Accordingly, some schemes based on the distributed architecture in peer-to-peer network for location privacy protection are proposed. Most of them assume that mobile terminals are mutually trusted, but this does not conform to realistic scenes, and they cannot make requirements for the level of location privacy protection. Therefore, this paper proposes a scheme for location attribute-based security authentication and private sharing data group, so that they trust each other in peer-to-peer network and the trusted but curious mobile terminal cannot access the initiator's query request. A new identifier is designed to allow mobile terminals to customize the protection strength. In addition, the caching mechanism is introduced considering the cache capacity, and a cache replacement policy based on deep reinforcement learning is proposed to reduce communications with location-based service server for achieving location privacy protection. Experiments show the effectiveness and efficiency of the proposed scheme.

인터넷 GIS 환경에서 위치정보 보호에 관한 연구

  • 오충원
    • Proceedings of the Korean Association of Geographic Inforamtion Studies Conference
    • /
    • 2003.11a
    • /
    • pp.65-69
    • /
    • 2003
  • The Location Based Services comprised GIS and Telecommunication allow users to receive various services based on their geographic location. It is need to legislation to encourage the provision and use of location information by providing privacy protection to users. But the contents of the legislation proposed by Korean government have problems conflicted between protection of a person's location information and invigoration of location-based services. The purpose of this study is to search complementary measures for privacy protection of location information from From a viewpoint of effective management strategy for geographic information.

  • PDF

Implementation and Evaluation of the Wibro-based Location Identification System for Air Base Protection Force (Wibro 기반 비행기지 방어전력 위치식별체계 구축 및 실험)

  • Pyo, Sang-Ho;Koo, Jung;Ko, Young-Bae;Kim, Ki-Hyung
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.15 no.3
    • /
    • pp.306-314
    • /
    • 2012
  • This paper proposes a new system to maximize efficiency of Air Base Protection Operations through the development of location identification software. The Wibro-based location identification system for Air Base Protection Force offers Blue Ground Force digitalized character message which is not exposed to enemy. Also, it is possible to automatically provide the location of Blue Ground Force to Air Base Ground Operations Center. The test result proves that this system is very helpful when Air Base Protection Force executes Air Base Protection Operations.

Numerical analysis results of the cathodic protection for the underground steel pipe by anode installation method

  • Jeong, Jin-A;Choo, Yeon-Gil;Jin, Chung-Kuk;Park, Kyeong-Wan
    • Journal of Advanced Marine Engineering and Technology
    • /
    • v.38 no.10
    • /
    • pp.1212-1216
    • /
    • 2014
  • This study aims to find out the best anode location for buried pipelines. Numerical simulation program known as CATPRO (Elsyca, Belgium) were used for confirming the best location of anodes and the effects of impressed current cathodic protection system. Applied conditions for numerical simulation were similar to on-site environmental conditions for optimal application of cathodic protection system. Used criterion of cathodic protection was NACE SP 0169, which describes that minimum requirement for cathodic protection is -850mV vs. CSE. Various layouts for anodes' installation were applied, which were distance between anodes, anode installation location, and applied current. The areas where cathodic protection potential was lower than -850mV vs. CSE was limited up to 50m from anode installation locations. It was founded numerical analysis obtain cost-effective and efficient cathodic protection methods before design and application the impressed cathodic protection system to on-site environment.

The Application for the Protection System of Location-based Information on a Smart-phone Environment (스마트폰 환경에서 개인위치정보 보호시스템 응용방안)

  • Kim, In-Jai;Choi, Jae-Won;Kim, Woon-Yoeng
    • The Journal of Society for e-Business Studies
    • /
    • v.17 no.3
    • /
    • pp.129-147
    • /
    • 2012
  • In this paper, we research on the personal information protection system in smart-phone based on mobile environment. This paper proposes the enhanced personal location privacy mechanism in location-based service environment of a smart phone operating system(iOS, Android) for the relevant regulations on location-based protection and utilization. Also, the result verified that possibility on a self-control mechanism of the personal information protection system's subject in the window platform throughout the experiment. Therefore, this study have drew a method that user positively can cope with a protection of personal location information by having a user's self-control method in the system under development or done by illegal location-based service providers and illegal application developer.

A Trajectory Substitution Privacy Protection Scheme in location-based services

  • Song, Cheng;Zhang, Yadong;Gu, Xinan;Wang, Lei;Liu, Zhizhong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.9
    • /
    • pp.4771-4787
    • /
    • 2019
  • Aimed at the disclosure risk of mobile terminal user's location privacy in location-based services, a location-privacy protection scheme based on similar trajectory substitution is proposed. On the basis of the anonymized identities of users and candidates who request LBS, this scheme adopts trajectory similarity function to select the candidate whose trajectory is the most similar to user's at certain time intervals, then the selected candidate substitutes user to send LBS request, so as to protect user's privacy like identity, query and trajectory. Security analyses prove that this scheme is able to guarantee such security features as anonymity, non-forgeability, resistance to continuous query tracing attack and wiretapping attack. And the results of simulation experiment demonstrate that this scheme remarkably improve the optimal candidate' trajectory similarity and selection efficiency.

Environmental Radiation Protection in Medical Institutions

  • Han, Eun-Ok;Dong, Kyung-Rae
    • Journal of Radiation Protection and Research
    • /
    • v.35 no.3
    • /
    • pp.91-95
    • /
    • 2010
  • The study aimed to measure the levels of radiation protection for radiologists in medical institutions in three environmental categories (physical, administrative and social) and to establish a data base which can be used to increase awareness of environmental radiation protection in medical institutions within Korea. The study surveyed 10% of radiologists working in radiology departments in medical institutions which are supervised by the National Dose Registry overseen by the Korean Food and Drug Administration(KFDA). This study found that the level of environmental radiation protection was higher in the capital area and in larger hospitals. On the other hand, the study shows environmental radiation protection was lower in the Youngnam area and in clinics. Results from the questionnaires indicate the level of environmental radiation protection was higher when radiologists were given an individual dosimeter but lowest when the radiation protection apron quality test was conducted. Environmental radiation protection is an important factor for radiologists to conduct activities in a safe and protected environment. However, this study shows there are differences in the level of environmental radiation protection in medical institutions and location within Korea. In particular, the level of environmental radiation protection was lower in clinics, appropriate intervention strategies befitting these conditions are needed based on medical institution classification and location in order to improve the level of environmental protection.

TCA: A Trusted Collaborative Anonymity Construction Scheme for Location Privacy Protection in VANETs

  • Zhang, Wenbo;Chen, Lin;Su, Hengtao;Wang, Yin;Feng, Jingyu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.10
    • /
    • pp.3438-3457
    • /
    • 2022
  • As location-based services (LBS) are widely used in vehicular ad-hoc networks (VANETs), location privacy has become an utmost concern. Spatial cloaking is a popular location privacy protection approach, which uses a cloaking area containing k-1 collaborative vehicles (CVs) to replace the real location of the requested vehicle (RV). However, all CVs are assumed as honest in k-anonymity, and thus giving opportunities for dishonest CVs to submit false location information during the cloaking area construction. Attackers could exploit dishonest CVs' false location information to speculate the real location of RV. To suppress this threat, an edge-assisted Trusted Collaborative Anonymity construction scheme called TCA is proposed with trust mechanism. From the design idea of trusted observations within variable radius r, the trust value is not only utilized to select honest CVs to construct a cloaking area by restricting r's search range but also used to verify false location information from dishonest CVs. In order to obtain the variable radius r of searching CVs, a multiple linear regression model is established based on the privacy level and service quality of RV. By using the above approaches, the trust relationship among vehicles can be predicted, and the most suitable CVs can be selected according to RV's preference, so as to construct the trusted cloaking area. Moreover, to deal with the massive trust value calculation brought by large quantities of LBS requests, edge computing is employed during the trust evaluation. The performance analysis indicates that the malicious response of TCA is only 22% of the collaborative anonymity construction scheme without trust mechanism, and the location privacy leakage is about 32% of the traditional Enhanced Location Privacy Preserving (ELPP) scheme.