• Title/Summary/Keyword: privacy and security

Search Result 1,482, Processing Time 0.026 seconds

Implementation of Secure System for Blockchain-based Smart Meter Aggregation (블록체인 기반 스마트 미터 집계 보안 시스템 구축)

  • Kim, Yong-Gil;Moon, Kyung-Il
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.20 no.2
    • /
    • pp.1-11
    • /
    • 2020
  • As an important basic building block of the smart grid environment, smart meter provides real-time electricity consumption information to the utility. However, ensuring information security and privacy in the smart meter data aggregation process is a non-trivial task. Even though the secure data aggregation for the smart meter has been a lot of attention from both academic and industry researchers in recent years, most of these studies are not secure against internal attackers or cannot provide data integrity. Besides, their computation costs are not satisfactory because the bilinear pairing operation or the hash-to-point operation is performed at the smart meter system. Recently, blockchains or distributed ledgers are an emerging technology that has drawn considerable interest from energy supply firms, startups, technology developers, financial institutions, national governments and the academic community. In particular, blockchains are identified as having the potential to bring significant benefits and innovation for the electricity consumption network. This study suggests a distributed, privacy-preserving, and simple secure smart meter data aggregation system, backed up by Blockchain technology. Smart meter data are aggregated and verified by a hierarchical Merkle tree, in which the consensus protocol is supported by the practical Byzantine fault tolerance algorithm.

A Study on Consumers' regulatory focus as a determinant of perceived value of online shopping mall VMD (온라인 쇼핑몰VMD에 대한 지각된 가치의 영향요인으로 소비자 조절초점 역할에 관한 연구)

  • Suh, Yonghan
    • Management & Information Systems Review
    • /
    • v.33 no.5
    • /
    • pp.213-232
    • /
    • 2014
  • Sensitivity to online store stimuli (VMD attributes) and response (online store loyalty) may depend upon consumers' regulatory focus (emotional state). In other words, consumers' sensitivity to online store atmosphere and consequent store loyalty can be influenced by the match between their regulatory focus (promotion focused vs. prevention focused) and the type of the online store VMD benefits Study 1 results indicate consumers have a different evaluation about online store atmosphere depending on their regulatory focus. Promotion-focused consumers were significantly more sensitive to visual appeal and entertainment attributes of online store atmospherics than prevention-focused consumers. Conversely, prevention-focused consumers were significantly more sensitive to security and privacy attributes of online store, than promotion-focused consumers. Study 2 results indicate for promotion-focused shoppers, hedonic value toward online store atmosphere was associated with greater online store loyalty. In contrast, prevention-focused shoppers were influenced more by the utilitarian attributes on online store loyalty than promotion-focused shoppers. The current findings indicate that shoppers with promotion-focused are more easily persuaded by visual and entertainment-oriented online store cues. Conversely, shoppers with prevention-focus are more easily persuaded by safety and privacy-oriented online store cues.

  • PDF

A New Method of Registering the XML-based Clinical Document Architecture Supporting Pseudonymization in Clinical Document Registry Framework (익명화 방법을 적용한 임상진료문서 등록 기법 연구)

  • Kim, Il-Kwang;Lee, Jae-Young;Kim, Il-Kon;Kwak, Yun-Sik
    • Journal of KIISE:Software and Applications
    • /
    • v.34 no.10
    • /
    • pp.918-928
    • /
    • 2007
  • The goal of this paper is to propose a new way to register CDA documents in CDR (Clinical Document Repository) that is proposed by the author earlier. One of the methods is to use a manifest archiving for seamless references and visualization of CDA related files. Another method is to enhance the CDA security level for supporting pseudonymization of CDA. The former is a useful method to support the bundled registration of CDA related files as a set. And it also can provide a seamless presentation view to end-users, once downloaded, without each HTTP connection. The latter is a new method of CDA registration which can supports a do-identification of a patient. Usually, CDA header can be used for containing patient identification information, and CDA body can be used for diagnosis or treatment data. So, if we detach each other, we can get good advantages for privacy protection. Because even if someone succeeded to get separated CDA body, he/she never knows whose clinical data that is. The other way, even if someone succeeded to get separated CDA header; he/she doesn't know what kind of treatment has been done. This is the way to achieve protecting privacy by disconnecting association of relative information and reducing possibility of leaking private information. In order to achieve this goal, the method we propose is to separate CDA into two parts and to store them in different repositories.

Dynamic Predicate: An Efficient Access Control Mechanism for Hippocratic XML Databases (동적 프레디킷 : 허포크라테스 XML 데이타베이스를 위한 효율적인 액세스 통제 방법)

  • Lee Jae-Gil;Han Wook-Shin;Whang Kyu-Young
    • Journal of KIISE:Databases
    • /
    • v.32 no.5
    • /
    • pp.473-486
    • /
    • 2005
  • The Hippocratic database model recently proposed by Agrawal et at. incorporates privacy protection capabilities into relational databases. The authors have subsequenty proposed the Hippocratic XML daかabase model[4], an extension of the Hippocratic database model for XML databases. In this paper, we propose a new concept that we cail the dynamic predicate(DP) for effective access control in the Hippocratic XML database model. A DP is a novel concept that represents a dynamically constructed rendition that tan be adapted for determining the accessibility of elements during query execution. DPs allow us to effectively integrate authorization checking into the query plan so that unauthorized elements are excluded in the process of query execution. Using synthetic and real data, we have performed extensive experiments comparing query processing time with those of existing access control mechanisms. The results show that the proposed access control mechanism improves the wall clock time by up to 219 times over the top-down access control strategy and by up to 499 times over the bottom-up access control strategy. The major contribution of our, paper is enabling effective integration of access control mechanisms with the query plan using the DP under the Hippocratic XML database model.

Enhanced Secure Sensor Association and Key Management in Wireless Body Area Networks

  • Shen, Jian;Tan, Haowen;Moh, Sangman;Chung, Ilyong;Liu, Qi;Sun, Xingming
    • Journal of Communications and Networks
    • /
    • v.17 no.5
    • /
    • pp.453-462
    • /
    • 2015
  • Body area networks (BANs) have emerged as an enabling technique for e-healthcare systems, which can be used to continuously and remotely monitor patients' health. In BANs, the data of a patient's vital body functions and movements can be collected by small wearable or implantable sensors and sent using shortrange wireless communication techniques. Due to the shared wireless medium between the sensors in BANs, it may be possible to have malicious attacks on e-healthcare systems. The security and privacy issues of BANs are becoming more and more important. To provide secure and correct association of a group of sensors with a patient and satisfy the requirements of data confidentiality and integrity in BANs, we propose a novel enhanced secure sensor association and key management protocol based on elliptic curve cryptography and hash chains. The authentication procedure and group key generation are very simple and efficient. Therefore, our protocol can be easily implemented in the power and resource constrained sensor nodes in BANs. From a comparison of results, furthermore, we can conclude that the proposed protocol dramatically reduces the computation and communication cost for the authentication and key derivation compared with previous protocols. We believe that our protocol is attractive in the application of BANs.

A New Rekeying Scheme for 802.11 Wireless Packets Transmission (802.11 무선패킷 전송을 위한 새로운 Rekeying 스킴)

  • Phang, Seong-Yee;They, Yu-Shu;Yang, Chi-Shian;Lee, Hoon-Jae;Lim, Hyo-Taek
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.10a
    • /
    • pp.274-277
    • /
    • 2008
  • Rekeying is the process of changing the encryption key of an ongoing communication. The main objective is to limit the amount of data encrypted with the same key. The IEEE 802.11 standard defines the Wired Equivalent Privacy, or WEP, encapsulation of 802.11 data frames. MAC at sender encrypts the payload (frame body and CRC) of each 802.11 frame before transmission using RC4 stream cipher. MAC at receiver decrypts and passes data to higher level protocol. WEP uses symmetric key stream cipher (RC4) where same key will be used for data encryption and decryption at the sender and the receiver. WEP is not promising with the advancement of the wireless technology existing today. We propose to use the existing information to define the security attributes. This will eliminate the steps that regenerated keys have to be sent to each other over certain period. The rekeying scheme is according to the number of bytes transmitted. Therefore, even the attacker has recorded the packets, it will be insufficient information and time for the attacker to launch the attacks as the key is not deterministic. We develop a packet simulation software for packet transmission and simulate our propose scheme. From the simulation, our propose scheme will overcome the weak WEP key attack and provide an alternative solution to wireless packet transmission. Besides that, our solution appears to be a software approach where only driver updates are needed for the wireless client and server.

  • PDF

Perceived Usefulness and Risks and Behavioral Intentions of Mobile Fashion Apps -Focus Group Interviews with Chinese Students Studying in Korea- (모바일 패션 앱의 지각된 유용성과 위험 및 행동의도 -중국인 유학생 초점집단 면접 조사-)

  • Hong, Heesook;Sun, Yu;Lee, Seung-Eun
    • Journal of the Korean Society of Clothing and Textiles
    • /
    • v.44 no.2
    • /
    • pp.255-272
    • /
    • 2020
  • This exploratory study investigated Chinese consumers' perceived usefulness and risks of fashion apps and identified reasons for continuance and discontinuance intentions. This study conducted focus group interviews with a convenience sample of 13 Chinese students majoring in fashion in Korea. Based on interviewee responses, this study identified five attributes leading the perceived usefulness of mobile fashion apps (ubiquity and convenience, multi-media information, personalization, interactivity between consumers, and immediateness) and sub elements related to the five attributes. Five types of perceived risk (privacy risk, security risk, product risk, loss of future opportunity, and time risk) were identified in relation to Chinese consumers' use of fashion apps. The important role of live streaming services was uniquely identified by Chinese fashion app users. Usefulness of location-based information provided by mobile fashion apps were differently perceived according to respondents' use purpose, and augmented reality services provided by the apps were related to entertainment rather than usefulness. This study provides meaningful insights into Chinese consumers' perceptions of fashion apps and important app attributes that influence their continuance and discontinuance intentions. The findings from this study lend preliminary implications for future researchers and fashion businesses interested in the Chinese app market.

A Study on Issues and Tasks of Humanity and Social Science in a Fourth Industrial Revolution Era (제4차 산업혁명시대 인문사회학적 쟁점과 과제에 관한 연구)

  • Kim, Jin-Young;Heo, Wan-Gyu
    • Journal of Digital Convergence
    • /
    • v.16 no.11
    • /
    • pp.137-147
    • /
    • 2018
  • To prepare for and implement policies for the Fourth Industrial Revolution, which is characterized by convergence, super-connectivity, and AI, this study summarized the effects and characteristics of individual technologies on our society and discussed the issues with humanity and social science perspectives. As a result, in terms of AI technology, the issues of job losses, project-type works, basic income and robot taxes, accountability of AI, and algorithm inequality were dealt with. Security, cyber hacking and privacy infringement issues were highlighted in big-data technology. In the part of block-chain and bioengineering, the society of decentralization, the concentration, digital divide, and ethical issues were discussed. On-demand economic aspects highlighted the problems of civil ethics and human commercialization. Lastly, the development of VR is discussed including side effects such as cyber-syndrom, avoidance of reality, and so on.

Attitudes and Acceptability of Smart Wear Technology: Qualitative Analysis from the Perspective of Caregivers

  • Park, Soonjee;Harden, Amy J.;Nam, Jinhee;Saiki, Diana;Hall, Scott S.;Kandiah, Jay
    • International Journal of Human Ecology
    • /
    • v.13 no.2
    • /
    • pp.87-100
    • /
    • 2012
  • Smart wear integrates computing technology into fabric or a garment for additional functionality. This research explored the attitudes and opinions of the use of smart wear from the viewpoint of caregivers. Thirty two individuals including care providers of children and adult family members with health problems participated in focus group interviews. Participants reported being interested in smart wear because of the potential to detect the location (GPS) of a dependent (e.g., child, elderly) and to monitor vital signs. Participants indicated perceived advantages of smart wear such as identifying geographical location and effectiveness. Perceived concerns mentioned were privacy/security issues and accuracy of data. Participants taking care of dependents without a specific disease were hesitant to adopt and pay for smart wear. However, caregivers of elderly individuals expressed positive adoption intentions and willingness to reasonably pay for smart wear. They indicated expectations that potential insurance would provide coverage for cost savings. Caregivers expressed the need of specific requirements for future adoption such as customizability, and comfort/safety. Specific to smart wear clothing, most respondents preferred it be an undershirt or a jacket with a sensor located in the shoulder area. The findings from this study can be used in product development, promotion and marketing of smart wear.

An Assessment System for Evaluating Big Data Capability Based on a Reference Model (빅데이터 역량 평가를 위한 참조모델 및 수준진단시스템 개발)

  • Cheon, Min-Kyeong;Baek, Dong-Hyun
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.39 no.2
    • /
    • pp.54-63
    • /
    • 2016
  • As technology has developed and cost for data processing has reduced, big data market has grown bigger. Developed countries such as the United States have constantly invested in big data industry and achieved some remarkable results like improving advertisement effects and getting patents for customer service. Every company aims to achieve long-term survival and profit maximization, but it needs to establish a good strategy, considering current industrial conditions so that it can accomplish its goal in big data industry. However, since domestic big data industry is at its initial stage, local companies lack systematic method to establish competitive strategy. Therefore, this research aims to help local companies diagnose their big data capabilities through a reference model and big data capability assessment system. Big data reference model consists of five maturity levels such as Ad hoc, Repeatable, Defined, Managed and Optimizing and five key dimensions such as Organization, Resources, Infrastructure, People, and Analytics. Big data assessment system is planned based on the reference model's key factors. In the Organization area, there are 4 key diagnosis factors, big data leadership, big data strategy, analytical culture and data governance. In Resource area, there are 3 factors, data management, data integrity and data security/privacy. In Infrastructure area, there are 2 factors, big data platform and data management technology. In People area, there are 3 factors, training, big data skills and business-IT alignment. In Analytics area, there are 2 factors, data analysis and data visualization. These reference model and assessment system would be a useful guideline for local companies.