• Title/Summary/Keyword: owner's identity

Search Result 18, Processing Time 0.021 seconds

Eligibility Verification based on Immutable Personal Information without Revealing the Owner's Identity (불변 개인정보에 기반하여 소유자 신원 드러나지 않도록 적격성 검증)

  • Jun-Cheol Park
    • Smart Media Journal
    • /
    • v.12 no.3
    • /
    • pp.38-48
    • /
    • 2023
  • When an individual needs to prove eligibility, it is sufficient to know whether or not s/he meets the eligibility, but any existing method inevitably exposes the identity of the owner or unnecessary additional information in the process of providing personal information. In this paper, among the immutable items of personal information such as gender, date of birth, and place of birth, we propose a method in which the owner provides only essential item(s) to the eligibility verifier with each iterm marked on one option among multiple choices. In this way, the eligibility verifier can access the combination of items stored in the blockchain with the consent of the information owner, and can safely store the access history by requesting recording in the blockchain again. In the proposed method, the user does not worry about his/her identity being revealed or his/her personal information being overly exposed, and the eligibility verifier can check only necessary items and search later records without separately storing the records.

Privacy Authorization for Internet Identity Management System (인터넷 Identity 관리 시스템을 위한 프라이버시 인가)

  • Roh Jong-Hyuk;Jin Seung-Hun;Lee Kyoon-Ha
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.10B
    • /
    • pp.648-659
    • /
    • 2005
  • One's identity on the Internet has been disclosed and abused without his consent. Personal information must be protected by appropriate security safeguard. An Individual should have the right to know whether his personal details have been collected and stored. This paper proposes various conceptual models for designing privacy enabling service architecture in the Internet identity management system. For the restriction of access to personal information, we introduce the owner's policy and the management policy The owner's policy should provide the user with enough information to manage easily and securely his data. To control precisely and effectively all personal information in the Identity provider, we propose the privacy management policy and the privacy authorization model.

A Study on Data Sharing Scheme using ECP-ABSC that Provides Data User Traceability in the Cloud

  • Hwang, Yong-Woon;Kim, Taehoon;Seo, Daehee;Lee, Im-Yeong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.12
    • /
    • pp.4042-4061
    • /
    • 2022
  • Recently, various security threats such as data leakage and data forgery have been possible in the communication and storage of data shared in the cloud environment. This paper conducted a study on the CP-ABSC scheme to solve these security threats. In the existing CP-ABSC scheme, if the data is obtained by the unsigncryption of the data user incorrectly, the identity of the data owner who uploaded the ciphertext cannot be known. Also, when verifying the leaked secret key, the identity information of the data user who leaked the secret key cannot be known. In terms of efficiency, the number of attributes can affect the ciphertext. In addition, a large amount of computation is required for the user to unsigncrypt the ciphertext. In this paper, we propose ECP-ABSC that provides data user traceability, and use it in a cloud environment to provide an efficient and secure data sharing scheme. The proposed ECP-ABSC scheme can trace and verify the identity of the data owner who uploaded the ciphertext incorrectly and the data user who leaked the secret key for the first time. In addition, the ciphertext of a constant size is output and the efficiency of the user's unsigncryption computation were improved.

A Study on Academic Costume Design -Focusing on the Design of Academic Costume Representing the University Identity of Seoul Women's University- (학위복 디자인 연구 -서울여자대학교의 UI를 구현한 학위복 개발을 중심으로-)

  • Chun, Hei-Jung;Na, Hyun-Shin;Lee, Kyung-Ah;Lee, So-Ryung;Kim, Hee-Kyun;An, Chang-Hyun;Park, Jin-Young
    • Journal of the Korean Society of Costume
    • /
    • v.58 no.8
    • /
    • pp.30-46
    • /
    • 2008
  • This study aims to develop an academic costume design representing the university identity of Seoul Women's University. As a formal dress and uniform symbolizing the dignity of study, academic costume arouses self-esteem of the owner and represents the symbolic order. UI(University Identity) is a system that embodies the identity of the university and create a certain image, and thus actively delivers the image pursued by the university. The study method to develop a new academic costume design of Seoul Women's University includes the theoretical background of UI and academic costume, investigation on the current rendition of academic costume, home and abroad, and a survey to collect the basic data for academic costume design development. Most of the respondents presented negative opinions on the existing academic costume and graduation cap, which do not show any clear distinction from those of other universities. They made a pressing demand for the development of an academic costume that well represents the image of the university by reflecting the university feature and symbol. As a result of the survey, it turned out that they preferred an academic costume with short length balloon sleeves to the exiting one, and that as for neck line and front hook, those of the existing one were preferred. This study developed and presented 9 different models of graduation gowns and 5 different caps based on the theoretical investigation and survey concerning academic costume. It is expected that the academic costume representing the university identity not only arouses self-esteem of the owner, but also enhances the university's position.

Secure and Efficient Privacy-Preserving Identity-Based Batch Public Auditing with Proxy Processing

  • Zhao, Jining;Xu, Chunxiang;Chen, Kefei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.2
    • /
    • pp.1043-1063
    • /
    • 2019
  • With delegating proxy to process data before outsourcing, data owners in restricted access could enjoy flexible and powerful cloud storage service for productivity, but still confront with data integrity breach. Identity-based data auditing as a critical technology, could address this security concern efficiently and eliminate complicated owners' public key certificates management issue. Recently, Yu et al. proposed an Identity-Based Public Auditing for Dynamic Outsourced Data with Proxy Processing (https://doi.org/10.3837/tiis.2017.10.019). It aims to offer identity-based, privacy-preserving and batch auditing for multiple owners' data on different clouds, while allowing proxy processing. In this article, we first demonstrate this scheme is insecure in the sense that malicious cloud could pass integrity auditing without original data. Additionally, clouds and owners are able to recover proxy's private key and thus impersonate it to forge tags for any data. Secondly, we propose an improved scheme with provable security in the random oracle model, to achieve desirable secure identity based privacy-preserving batch public auditing with proxy processing. Thirdly, based on theoretical analysis and performance simulation, our scheme shows better efficiency over existing identity-based auditing scheme with proxy processing on single owner and single cloud effort, which will benefit secure big data storage if extrapolating in real application.

Injunctive Effect of Provisional Seizure and Legal Superficies according to the Custom -Supreme Court Decision 2010Da52140 delivered on October 18, 2012- (가압류의 처분금지효와 관습상 법정지상권 -대법원 전원합의체 2012. 10. 18. 선고 2010다52140 판결-)

  • Chung, Ku-Tae
    • The Journal of the Korea Contents Association
    • /
    • v.13 no.5
    • /
    • pp.223-233
    • /
    • 2013
  • As the injunctive effect on the real estate gets announced in public once the seizure register gets exercised in terms of auction and the action of disposal by the real estate owner afterwards becomes nullified in the relationship with a seizure creditor or a successful bidder, the register performed by the cause of disposal action that cannot confront with the seizure or provisional seizure, becomes cancelled in virtue of a registration officer's office. Accordingly, in case of being a singular successor who relatively loses property in a relationship toward the successful bidder due to the injunctive effect of provisional seizure, the identity with building owner and land owner as the precondition of establishing legal superficies according to the custom must be decided based on the time of provisional seizure. The Supreme Court Decision 2010Da52140 delivered on October 18, 2012 has great significance from the fact that it has settled inconsistency in existing precedent cases with such purpose.

Identity Juggling in the North Korea-China trade: A Case Study of Korean Chinese(Chosonjok) in Dandong, China (북중무역에서 정체성 저글링: 중국 단둥 소재 조선족 무역상을 사례로)

  • Chung, Su-Yeul;Kim, Minho;Chi, Sang-Hyun;Lee, Sung-Cheol
    • Journal of the Economic Geographical Society of Korea
    • /
    • v.20 no.3
    • /
    • pp.355-368
    • /
    • 2017
  • Regarding to Dandong as the gateway city of the Sino-North Korea trade, cultural anthropology characterizes it with a hybridity of four groups with a different combination of ethnic and national identity: Korean Chinese(Chosonjok), South Koreans, North Koreans and Chinese-North Koreans. And, microeconomics views the enterprises in Dandong area have different sizes and types in the Sino-North Korea cross-border trade depending on their owner's ethnic and national identity. However, these researches focuses mainly on the differences between the groups, falling short in showing how the group members utilize their double identities to maintain and prosper their businesses, coping with various and changing situations. This study introduces the concept of 'identity juggling' and applies it to Chosonjok cross-border traders. The results from the in-depth interview and survey indicate they juggles their Korean ethnic identity and Chinese national identity selectively in terms of their bilinguality of the Korean and Chinese, mobility crossing China, South Korea, and North Korea, and prospects on the trade revitalization thanks to potential mitigation of tensions in Korea peninsula.

Construction Background, Architectural and Urban Characteristics of National Housing in Janghang (장항의 국민주택 건립 배경과 건축·도시적 특징)

  • Pak, Sungsine;Jeong, Jae-Uk
    • Journal of the Architectural Institute of Korea Planning & Design
    • /
    • v.35 no.12
    • /
    • pp.127-136
    • /
    • 2019
  • National Housing in Janghang was built intensively from the mid 1970s to the early 1980s, and has become a collective complex at Jangma-ro and Shinchangdong-ro. This Company House is a typical building for employee welfare, at the same time shows modern industrialization and urbanization. In general, it forms a housing complex and serves as industrial town. Reflecting the characteristics of Janghang, the housing complex is called National House based on the supply method and is also classified French Styled House in terms of housing style. Although Janghang was one of small local administrative units, it pursued urban style with mini-2-story. It has the typical characteristics as follows: division of the owner's living space and rental room, and independent layout of restrooms and washrooms. House is transformed to accommodate residents' lifestyles, so National Housing Complex of Janghang has undergone various changes such as the replacement of spatial structures and exterior materials for 40 years after construction. National Housing in Janghang is a symbol of local identity and an important spatial asset that shows the urban and architectural characteristics and changes.

The Mobile ID based Digital Signature Scheme Suitable for Mobile Contents Distribution (모바일 콘텐츠 유통에 적합한 ID 기반 디지털 서명 기법)

  • Yun, Sung-Hyun
    • Journal of the Korea Convergence Society
    • /
    • v.2 no.1
    • /
    • pp.1-6
    • /
    • 2011
  • The wide use of mobile devices such as smart phones makes the mobile commerce industry be growing-up rapidly. In mobile commerce security, how to secure a copyright of mobile contents and how to distribute it are of major concerns. The user can carry the smart phone regardless of the places. Thus the utilization of it is very high than that of personal computers. The USIM(Universal Subscriber Information Module) inserted in the smart phone binds the user with the device. This means that the smart phone can be used to represent the owner's identity. In this paper, we develop the mobile ID based digital signature scheme. We create the mobile ID by combining USIM with the user's random secret value. In addition, undeniable property of our signature scheme can make ID based applications such as mobile voting and mobile content distribution be possible with the smart phone.

Improvement of Contract Change Order System for the Fairness of Subcontracting in Public Construction Projects (공공건설공사의 하도급 거래 공정화를 위한 계약변경 제도개선 방향)

  • Cho, Youngjun
    • Korean Journal of Construction Engineering and Management
    • /
    • v.21 no.5
    • /
    • pp.3-10
    • /
    • 2020
  • Subcontracting of construction is essential to carry out public construction projects. Subcontractor of the construction work shall enter into a contract with the original contractor without directly entering into a contract with the owner. Subcontracts are therefore greatly affected by the original contract with the owner. To protect subcontractors, the Fair Trade Act is enacted and the construction company's standard subcontracting contract is in operation. However, subcontracts are not properly reflected in the Government contract system, which deals with the relationships between the owner and the original contractor. In particular, the subcontractor may complain of difficulties at the public construction site as such procedures are not properly reflected in the construction work standard subcontract, although various procedures shall be carried out depending on the amount when change order occurs in subcontracts. Thus, the direction of improvement of subcontracting systems was proposed in the case of change order at public construction project sites as follows: First, the rights of subcontractors should be strengthened. Second, in order to resolve the information non-identity, subcontractors should have access to information related to subcontracts. Third, the status of subcontractor shall be guaranteed by reflecting the characteristics of the subcontract when the original contract for public works is concluded. Fourth, the dispute settlement method should be prioritized over litigation in order to fair subcontracting.