• Title/Summary/Keyword: privacy friendly system

Search Result 12, Processing Time 0.032 seconds

A Method to Elicit Privacy Requirements and Build Privacy Assurance Cases for Privacy Friendly System (프라이버시 친화 시스템 개발을 위한 프라이버시 요구사항 도출 및 보증 사례 작성)

  • Cho, Ju Hye;Lee, Seok-Won
    • Journal of KIISE
    • /
    • v.44 no.9
    • /
    • pp.918-931
    • /
    • 2017
  • Recently, the spread of smartphones and various wearable devices has led to increases in the accumulation and usage of personal information. As a result, privacy protection has become an issue. Even though there have been studies and efforts to improve legal and technological security measures for protecting privacy, personal information leakage accidents still occur. Rather than privacy requirements, analysts mostly focus on the implementation of security technology within software development. Previous studies of security requirements strongly focused on supplementing the basic principles and laws for privacy protection and securing privacy requirements without understanding the relationship between privacy and security. As a result, personal information infringement occurs continuously despite the development of security technologies and the revision of the Personal Information Protection Act. Therefore, we need a method for eliciting privacy requirements based on related privacy protection laws that are applicable to software development. We also should clearly specify the relationship between privacy and security. This study aims to elicit privacy requirements and create privacy assurances cases for Privacy Friendly System development.

A Cloud-Based User-Friendly DRM System

  • Lee, Suk Ja;Wang, Jing;Rhee, Kyung-Hyune
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2013.05a
    • /
    • pp.636-639
    • /
    • 2013
  • With the development and rapid growth of cloud computing, lots of application services based on cloud computing have been developed. In addition, cloud-based DRM systems have been developed to support those services' copyright and privacy protection. In this paper, we propose a new cloud-based user-friendly DRM system, which allows users to execute the same contents bought at most n times at any devices with license enforcement, which checks the validation of licenses before every execution, having no smart card, which has to carry a smart card reader that seems troublesome to a user, and providing the copyright and privacy protection.

A RFID Privacy protection system using H/W friendly security algorithm Environment (하드웨어 친화적인 암호 알고리즘을 사용한 RFID 프라이버시 보호 시스템)

  • Kim, Jin-mook;Ryou, Hwang-Bin
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.2
    • /
    • pp.280-284
    • /
    • 2005
  • In ubiquitous computing environment, An RFID system will be the important way that recognizing an object instead of Bar-code system. But a privacy infringement problem is predicted between a tag and leader to be serious. There is many difficulty that just uses an existing research method because it has an Hardware restriction. Therefore we will suggest that A RFID Privacy Protect system using Hareware friendly security algorithm. we will use RC5 and CBC_MAC because the tag has hardware restriction .To implement, We will simulate and test on One chip microprcessor environment. In the result of the experiment, We will know that a suggested system solves privacy problem on RFID system that it was using CBC-MAC and RC5 security algorithm.

  • PDF

Context categorization of physiological signal for protecting user's privacy (사생활 보호를 위한 생체 신호기반 컨택스트 분석 및 구분기법)

  • Choi, Ah-Young;Rashid, Umar;Woo, Woon-Tack
    • 한국HCI학회:학술대회논문집
    • /
    • 2006.02a
    • /
    • pp.960-965
    • /
    • 2006
  • Privacy and security are latent problems in pervasive healthcare system. For the sake of protecting health monitoring information, it is necessary to classify and categorize the various contexts in terms of obfuscation. In this paper, we propose the physiological context categorization and specification methodology by exploiting data fusion network for automatic context alignment. In addition, we introduce the methodologies for making various level of physiological context on the context aware application model, which is wear-UCAM. This physiological context has several layers of context according to the level of abstraction such as user-friendly level or parametric level. This mechanism facilitates a user to restrict access to his/her monitoring results based on the level of details in context.

  • PDF

Applying PKI for Internet Voting System

  • Kim, Jinho;Kim, Kwangjo;Lee, Byoungcheon
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2001.11a
    • /
    • pp.318-321
    • /
    • 2001
  • We have designed an Internet voting system applicable for worldwide voting which is based on Ohkubo et. al,'s scheme[9] combined with Public Key Infrastructure (PKI). To the best of our knowledge, this is the first trial to serve secure Internet voting system to the world. In our system, voter's privacy is guaranteed by using blind signature and mix-net, and robustness is provided through the threshold encryption scheme. By employing Java technology, we propose a way of typical implementation for internet voting system. Furthermore, PKI permits worldwide key distribution and achieve “one certificate/one vote” policy. Therefore, anyone can participate in the voting if he gets a certificate from Certificate Authority (CA). By the joint work between Korean and Japanese teams, the implementation aims to select MVPs in 2002 FIFA World Cup Korea-Japan$\^$TM/ in easy and friendly manner for any Internet user to participate and enjoy Internet voting.

  • PDF

Improving Personal Data Protection in IoT Environments (사물인터넷(IoT) 환경에서 개인정보보호 강화를 위한 제도 개선 방안)

  • Lee, Ae Ri;Son, Soomin;Kim, Hyun Jin;Kim, Beomsoo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.4
    • /
    • pp.995-1012
    • /
    • 2016
  • In Internet of Things (IoT) environments, devices or sensors everywhere can automatically collect data without the individual awareness, further combine and share data using ubiquitous network, and thus the development of IoT raises new challenges in respect of personal data protection and privacy. This study aims to identify main issues related to data protection in the IoT and propose adequate measures. We analyzed the types of personal data controllers and processors in IoT and figured out the issues regarding the processing of personal data and the rights to privacy of data subject. Accordingly, we suggested the institutional ways (e.g., establishment of user-friendly notice and flexible consent system, re-identification risk monitoring system, data protection in cross-border transfer, and user education) to improve the situation of personal data protection in IoT and finally proposed the improvement tasks to carry out first based on the degree of urgency and importance.

A Study on Effective Countermeasures against E-mail Propagation of Intelligent Malware (지능형 악성코드의 이메일 전파에 대한 효과적인 대응 방안에 관한 연구)

  • Lee, Eun-Sub;Kim, Young-Kon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.20 no.3
    • /
    • pp.189-194
    • /
    • 2020
  • Most cyber breaches are caused by APT attacks using malware. Hackers use the email system as a medium to penetrate the target. It uses e-mail as a method to access internally, destroys databases using long-term collected vulnerabilities, and illegally acquires personal information through system operation and ransomware. As such, the e-mail system is the most friendly and convenient, but at the same time operates in a blind spot of security. As a result, personal information leakage accidents can cause great damage to the company and society as a whole. This study intends to suggest an effective methodology to securely manage the APT attack by strengthening the security configuration of the e-mail system operating in the enterprise.

User-friendly Application for operability with HL7 in mobile agent of Ubiquitous Health Environment

  • Lee, JeongHoon;Kwock, DongYeup;Moon, KangNam;sahama, Tony;Kim, Jung-Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.10a
    • /
    • pp.866-870
    • /
    • 2009
  • Mobile Health (M-Health) system is a recent term for medical and public health practice supported by mobile devices, such as mobile phones, PDAs, and other wireless devices. Mobile Health system has been successfully establishing at few general hospital in Korea. However, to use diverse devices manufactured by various company cause inoperability, and lack of security disappoints customers often. Although the outstanding health environment, most of hospitals are unavailable to share electronic patient records due to lack of standard protocol to handle the interoperability each other. Health Level 7 (HL7) is the best solution for the problem. In this paper, we will analyse a current M-Health service in terms of security and mobile device, and suggest iPhone for the best device against hospital environment. Also, for keep confidentiality of health information and patient privacy, enhanced security mechanism is introduced. As a consequence, interoperable standard, and most appropriate device for supporting staffs and M-Health performance, and enhanced securirty mechanism will be integrated in order to propose improved M-health model.

  • PDF

Identifying Social Relationships using Text Analysis for Social Chatbots (소셜챗봇 구축에 필요한 관계성 추론을 위한 텍스트마이닝 방법)

  • Kim, Jeonghun;Kwon, Ohbyung
    • Journal of Intelligence and Information Systems
    • /
    • v.24 no.4
    • /
    • pp.85-110
    • /
    • 2018
  • A chatbot is an interactive assistant that utilizes many communication modes: voice, images, video, or text. It is an artificial intelligence-based application that responds to users' needs or solves problems during user-friendly conversation. However, the current version of the chatbot is focused on understanding and performing tasks requested by the user; its ability to generate personalized conversation suitable for relationship-building is limited. Recognizing the need to build a relationship and making suitable conversation is more important for social chatbots who require social skills similar to those of problem-solving chatbots like the intelligent personal assistant. The purpose of this study is to propose a text analysis method that evaluates relationships between chatbots and users based on content input by the user and adapted to the communication situation, enabling the chatbot to conduct suitable conversations. To evaluate the performance of this method, we examined learning and verified the results using actual SNS conversation records. The results of the analysis will aid in implementation of the social chatbot, as this method yields excellent results even when the private profile information of the user is excluded for privacy reasons.

Evaluation of Outdoor Community Facility in Rental Apartment For Community Space Activation (커뮤니티공간 활성화를 위한 임대아파트의 외부 커뮤니티시설 계획 특성에 관한 연구)

  • Hwang, Yeon Sook;Lee, Song Hyun;Eo, Sung-sin
    • KIEAE Journal
    • /
    • v.9 no.5
    • /
    • pp.69-76
    • /
    • 2009
  • The purpose of this study is to provide basic data needed for planning and designing apartment community facilities in order to vitalize rental apartments. Outdoors community facilities of six rental apartments in Seoul were examined. The results are as follows. Firstly, the conditions of planning characteristics showed that the convenience is ranked as the highest priority of planning, compared to safety, friendliness and finally comfortableness. Community facilities are connected with the apartments and sidewalk providing convenient access for all apartment residents, there was little regard given to the features of comfortableness. Secondly, comfortableness of community facilities were shown to the lowest, compared to any characteristics. It is not easy to control noise and privacy in facility, and there are lack of near community facilities, for washing hands, drinking water and shielding from snow or rain, respectively. Thirdly, green facilities were shown to the highest applied friendliness more than other facilities. They were well outfitted with water space and gardening spaces, and robustly applied environment friendly materials and colors. Fourthly, resting facilities were shown to the lowest applied safety more than other facilities. Structure and material of facility are favorable but there is an absence of nonskid material and night-lightening system.