• Title/Summary/Keyword: privacy model

Search Result 592, Processing Time 0.025 seconds

QoS Guaranteed Secure Network Service Realization using Global User Management Framework (GUMF);Service Security Model for Privacy

  • Choi, Byeong-Cheol;Kim, Kwang-Sik;Seo, Dong-Il
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2005.06a
    • /
    • pp.1586-1589
    • /
    • 2005
  • GUMF (Global User Management Framework) that is proposed in this research can be applied to next generation network such as BcN (Broadband convergence Network), it is QoS guaranteed security framework for user that can solve present Internet's security vulnerability. GUMF offers anonymity for user of service and use the user's real-name or ID for management of service and it is technology that can realize secure QoS. GUMF needs management framework, UMS (User Management System), VNC (Virtual Network Controller) etc. UMS consists of root UMS in country dimension and Local UMS in each site dimension. VNC is network security equipment including VPN, QoS and security functions etc., and it achieves the QoSS (Quality of Security Service) and CLS(Communication Level Switching) functions. GUMF can offer safety in bandwidth consumption attacks such as worm propagation and DoS/DDoS, IP spoofing attack, and current most attack such as abusing of private information because it can offer the different QoS guaranteed network according to user's grades. User's grades are divided by 4 levels from Level 0 to Level 3, and user's security service level is decided according to level of the private information. Level 3 users that offer bio-information can receive secure network service that privacy is guaranteed. Therefore, GUMF that is proposed in this research can offer profit model to ISP and NSP, and can be utilized by strategy for secure u-Korea realization.

  • PDF

Gender Differences in Determinants of Customer Satisfaction in Beauty and Cosmetic E-commerce

  • NGUYEN, Thuan Thi Nhu
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.7 no.10
    • /
    • pp.811-822
    • /
    • 2020
  • This study investigates the gender differences in determinants of customers' satisfaction when purchasing online beauty and cosmetics products in Vietnamese market. To do so, we construct a data set via online survey of 419 Vietnamese customers including both males and females, and examine such sample using t-tests and multiple regressions. Our regression model is constructed based on our five-construct model including online shopping experience, customer service, external incentives, security and privacy, and personal characteristics. The t-tests results reveal that the mean difference of customer satisfaction (negative coefficient) between the two groups of customers (females and males) is statistically significant. This suggests that the purchasing satisfaction of male customers is significantly higher than that of their female counterparts. Similarly, we also find that male customers are more satisfied with their online shopping experience, customer service and external incentives offered by the online sellers than female peers. Furthermore, regression results for full sample show that, on average, the online shopping experience, customer service and external incentives are significantly and positively related to customer satisfaction. Yet, such positive effect of customer service on customer satisfaction is more likely for males while females' satisfaction is more positively influenced by security and privacy.

A Study on the model of CCTV Image Information Integration portal (CCTV 영상자료 통합포털 구축 모델에 관한 연구)

  • Kang, Poo-Reum;Kim, Kui-Nam J.
    • Convergence Security Journal
    • /
    • v.12 no.2
    • /
    • pp.43-51
    • /
    • 2012
  • CCTV would be the effective way in the prevention of abuse, as well as recorded image information evidence of the crime as a significant legal effect. But recorded image information As evidence by utilizing the Complaint/complaint handling, and administrative business processes that are currently operating offline procedural complexity and unnecessary time appear costly, privacy remains an issue to be solved, etc. Runoff. In this paper, incidence rate of offline business processing phase to solve the problems proposed to build unified portal for CCTV image information and the existing studies on the effectiveness of electronic civil service system, previous studies by analyzing e-government in accordance with laws and privacy laws, CCTV image information portal deployment model is applied to data integration occurs are trying to solve the problem effectively.

IP-CCTV Risk Decision Model Using AHP (Cloud Computing Based) (AHP를 활용한 IP-CCTV 위험 결정 모델 (클라우드 컴퓨팅 기반으로))

  • Jung, Sung-hoo;Lee, Kyung-ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.1
    • /
    • pp.229-239
    • /
    • 2018
  • This paper analyzes the problems of existing CCTV and discusses cyber security problems of IP-CCTV in cloud computing environment. In order to reduce the risk of simply removing the risk associated with the provision of cloud services, the risk analysis and counter-measures need to be carried out effectively. Therefore, the STRIDE model as the Threat Risk Modeling is used to analyze the risk factors, and Analytic Hierarchy Process(AHP) is used to measure risk priorities based on the analyzed threats.

Black Consumer Detection in E-Commerce Using Filter Method and Classification Algorithms (Filter Method와 Classification 알고리즘을 이용한 전자상거래 블랙컨슈머 탐지에 대한 연구)

  • Lee, Taekyu;Lee, Kyung Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.6
    • /
    • pp.1499-1508
    • /
    • 2018
  • Although fast-growing e-commerce markets gave a lot of companies opportunities to expand their customer bases, it is also the case that there are growing number of cases in which the so-called 'black consumers' cause much damage on many companies. In this study, we will implement and optimize a machine learning model that detects black consumers using customer data from e-commerce store. Using filter method for feature selection and 4 different algorithms for classification, we could get the best-performing machine learning model that detects black consumer with F-measure 0.667 and could also yield improvements in performance which are 11.44% in F-measure, 10.51% in AURC, and 22.87% in TPR.

A Comparative Study on Direct Bank Services between South Korea and China: Putting Emphasis on Service Convenience and Social Influence (인터넷전문은행 서비스의 한중 비교연구: 서비스의 편리성과 사회적 영향 요인을 중심으로)

  • Joo, Jaehun;Yu, Jiatong
    • The Journal of Information Systems
    • /
    • v.28 no.1
    • /
    • pp.17-39
    • /
    • 2019
  • Purpose The purpose of the present study is to analyze the factors influencing the intention to use direct bank continuously from the perspective of service rather than technology. Hygiene factors including economic benefits, privacy, and unverified risks, and convenience of service as a motivator were considered as user's satisfaction. A research model integrating the relationships among user's satisfaction, its determinants, social influence, and continuous intention to use direct banks was proposed. Design/methodology/approach Structural equation modelling for validating the research model was employed. 253 valid data were collected from users of direct bank service in South Korea and China, and used to test six hypotheses. Findings User's satisfaction and social influence were determinants of continuous use intention of direct bank. Convenience of service as a motivator has a significant influence on service satisfaction, while economic benefits, privacy, and unverified risks as hygiene factors have no significant influence on the continuous intention. Managers of direct banks need to implement service differentiation strategies to gain customers' loyalty. Also they seek to find the determinants of social influence. The present study confirmed that there is a big difference between Korea and China in terms of factors affecting the continuous intention to use direct bank.

An ID-based Broadcast Encryption Scheme for Cloud-network Integration in Smart Grid

  • Niu, Shufen;Fang, Lizhi;Song, Mi;Yu, Fei;Han, Song
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.9
    • /
    • pp.3365-3383
    • /
    • 2021
  • The rapid growth of data has successfully promoted the development of modern information and communication technologies, which are used to process data generated by public urban departments and citizens in modern cities. In specific application areas where the ciphertext of messages generated by different users' needs to be transmitted, the concept of broadcast encryption is important. It can not only improve the transmission efficiency but also reduce the cost. However, the existing schemes cannot entirely ensure the privacy of receivers and dynamically adjust the user authorization. To mitigate these deficiencies, we propose an efficient, secure identity-based broadcast encryption scheme that achieves direct revocation and receiver anonymity, along with the analysis of smart grid solutions. Moreover, we constructed a security model to ensure wireless data transmission under cloud computing and internet of things integrated devices. The achieved results reveal that the proposed scheme is semantically secure in the random oracle model. The performance of the proposed scheme is evaluated through theoretical analysis and numerical experiments.

A Study On User-centric Identity Information Management Model In Internet Environment (인터넷 환경에서의 사용자 중심 ID정보 관리 모델에 관한 연구)

  • Rhy, Hae-Gyu;Shin, Hyeon-Shik
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.3
    • /
    • pp.37-50
    • /
    • 2009
  • With the increase of number of internet services due to development of internet, it becomes a critical issue to appropriately manage the personal information about user's identity, that is ID information that service providers collect in terms of user's convenience improvement and privacy protection. But the existing ID information management models are service provider-centric or they insufficiently provide ID information management functions, so that they have not been satisfying user's requirement. In this paper, by establishing user-centric concept in we information management, we propose the new user-centric ID information management model in which user can make use of the internet service more conveniently and eventually enhance user's privacy.

A Study of Patient's Privacy Protection in U-Healthcare (유헬스케어에서 환자의 프라이버시 보호 방안 연구)

  • Jeong, Yoon-Su;Lee, Sang-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.4
    • /
    • pp.913-921
    • /
    • 2012
  • On the strength of the rapid development and propagation of U-healthcare service, the service technologies are full of important changes. However, U-healthcare service has security problem that patient's biometric information can be easily exposed to the third party without service users' consent. This paper proposes a distributed model according authority and access level of hospital officials in order to safely access patients' private information in u-Healthcare Environment. Proposed model can both limit the access to patients' biometric information and keep safe system from DoS attack using time stamp. Also, it can prevent patients' data spill and privacy intrusion because the main server simultaneously controls hospital officials and the access by the access range of officials from each hospital.

TPMP: A Privacy-Preserving Technique for DNN Prediction Using ARM TrustZone (TPMP : ARM TrustZone을 활용한 DNN 추론 과정의 기밀성 보장 기술)

  • Song, Suhyeon;Park, Seonghwan;Kwon, Donghyun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.3
    • /
    • pp.487-499
    • /
    • 2022
  • Machine learning such as deep learning have been widely used in recent years. Recently deep learning is performed in a trusted execution environment such as ARM TrustZone to improve security in edge devices and embedded devices with low computing resource. To mitigate this problem, we propose TPMP that efficiently uses the limited memory of TEE through DNN model partitioning. TPMP achieves high confidentiality of DNN by performing DNN models that could not be run with existing memory scheduling methods in TEE through optimized memory scheduling. TPMP required a similar amount of computational resources to previous methodologies.