• Title/Summary/Keyword: privacy protection

Search Result 901, Processing Time 0.024 seconds

Design of Dynamic Location Privacy Protection Scheme Based an CS-RBAC (CS-RBAC 기반의 동적 Location Privacy 보호 구조 설계)

  • Song You-Jin;Han Seoung-Hyun;Lee Dong-Hyeok
    • The KIPS Transactions:PartC
    • /
    • v.13C no.4 s.107
    • /
    • pp.415-426
    • /
    • 2006
  • The essential characteristic of ubiquitous is context-awareness, and that means ubiquitous computing can automatically process the data that change according to space and time, without users' intervention. However, in circumstance of context awareness, since location information is able to be collected without users' clear approval, users cannot control their location information completely. These problems can cause privacy issue when users access their location information. Therefore, it is important to construct the location information system, which decides to release the information considering privacy under the condition such as location, users' situation, and people who demand information. Therefore, in order to intercept an outflow information and provide securely location-based information, this paper suggests a new system based CS-RBAC with the existing LBS, which responds sensitively as customer's situation. Moreover, it accommodates a merit of PCP reflecting user's preference constructively. Also, through privacy weight, it makes information not only decide to providing information, but endow 'grade'. By this method, users' data can be protected safely with foundation of 'Role' in context-aware circumstance.

An Individual Privacy Protection Design for Smart Tourism Service based on Location (위치 기반 스마트 관광 서비스를 위한 개인 프라이버시 보호 설계)

  • Cho, Cook-Chin;Jeong, Eun-Hee
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.9 no.5
    • /
    • pp.439-444
    • /
    • 2016
  • This paper proposes the technique to protect the privacy of those who uses Smart Tourism Service based on location. The proposed privacy protection technique (1) generates a shared private key, OTK(One Time Key) without information exchanging Users with a Tourism Server and provides Users and a Tourism Server with message confidentiality by encrypting data with the key, (2) concatenates users' ID, login time(timestamp), and randomly-generated nonce, generates OTK by hashing with a hash function, encrypts users' location information and query by using the operation of OTK and XOR and provides Users and a Tourism Server with message confidentiality by sending the encrypted result. (3) protects a message replay attack by adding OTK and timestamp. Therefore, this paper not only provides data confidentiality and users' privacy protection but also guarantees the safety of location information and behavior pattern data.

Grid-based Cloaking Area Creation Scheme supporting Continuous Location-Based Services (연속적인 위치기반 서비스를 지원하는 그리드 기반 Cloaking 영역 설정 기법)

  • Lee, Ah-Reum;Kim, Hyeong-Il;Chang, Jae-Woo
    • Journal of Korea Spatial Information System Society
    • /
    • v.11 no.3
    • /
    • pp.19-30
    • /
    • 2009
  • Recent development in wireless communication technology and mobile equipment like PDA, cellular phone and GPS makes location-based services (LBSs) popular. However, because, in the LBSs, users continuously request a query to LBS servers by using their exact locations, privacy information could be in danger. Therefore, a mechanism for users' privacy protection is required for the safe and comfortable use of LBSs by mobile users. For this, this paper propose a grid-based cloaking area creation scheme supporting continuous LBSs. The proposed scheme creates a cloaking area rapidly by using grid-based cell expansion to efficiently support the continuous LBSs. In addition, to generate a cloaking area which makes the exposure probability of a mobile user to a minimum, we compute a privacy protection degree by granting weights to mobile users. Finally, we show from a performance analysis that our cloaking scheme outperforms the existing cloaking schemes, in terms of service time, privacy protection degree.

  • PDF

Private information protection method and countermeasures in Big-data environment: Survey (빅데이터 환경에서 개인민감정보 보호 방안 및 대응책: 서베이)

  • Hong, Sunghyuck
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.10
    • /
    • pp.55-59
    • /
    • 2018
  • Big-data, a revolutionary technology in the era of the 4th Industrial Revolution, provides services in various fields such as health, public sector, distribution, marketing, manufacturing, etc. It is very useful technology for marketing analysis and future design through accurate and quick data analysis. It is very likely to develop further. However, the biggest problem when using Big-data is privacy and privacy. When various data are analyzed using Big-data, the tendency of each user can be analyzed, and this information may be sensitive information of an individual and may invade privacy of an individual. Therefore, in this paper, we investigate the necessary measures for Personal private information infringement that may occur when using Personal private information in Big-data environment, and propose necessary Personal private information protection technologies to contribute to protection of Personal private information and privacy.

Road Network Distance based User Privacy Protection Scheme in Location-based Services (위치 기반 서비스에서 도로 네트워크의 거리 정보를 이용한 사용자 정보 은닉 기법)

  • Kim, Hyeong Il;Shin, Young Sung;Chang, Jae Woo
    • Spatial Information Research
    • /
    • v.20 no.5
    • /
    • pp.57-66
    • /
    • 2012
  • Recent development in wireless communication technology like GPS as well as mobile equipments like PDA and cellular phone makes location-based services (LBSs) popular. However, because users request a query to LBS servers by using their exact locations while moving on the road network, users' privacy may not be protected in the LBSs. Therefore, a mechanism for users' privacy protection is required for the safe and comfortable use of LBSs by mobile users. For this, we, in this paper, propose a road network distance based cloaking scheme supporting user privacy protection in location-based services. The proposed scheme creates a cloaking area by considering road network distance, in order to support the efficient and safe LBSs on the road network. Finally, we show from our performance analysis that our cloaking scheme outperforms the existing cloaking scheme in terms of cloaking area and service time.

Efficient Secret Sharing Data Management Scheme for Privacy Protection in Smart Grid Environment (스마트 그리드 환경에서 개인정보 보호를 위한 효율적인 비밀분산 데이터 관리 방안)

  • Lee, Sung-Yong;Yeo, Sang-Soo
    • Journal of Digital Convergence
    • /
    • v.11 no.12
    • /
    • pp.311-318
    • /
    • 2013
  • It is very important to design security policy and technical framework on sensitive private data in order to protect user privacy in smart grid environment. This paper introduces secret data sharing schemes proposed for privacy protection in smart grid, and presents technical problems of them. The proposed scheme in this paper, reduces the number of rounds in sharing process and also in restoration process, and can select how many databases would be used, so eventually it shows enhancements in terms of efficiency and security.

Personal Information Recognition and Practice of Music Therapists through IPA Tool (IPA를 활용한 음악치료사의 내담자 개인정보보호의 인식도와 실천도 분석)

  • Lee, Gyu-Hee;Yoon, Young-Mi;Cho, Mi-Ran;Kim, Ha-Young;Ryu, Hwang-Gun
    • The Korean Journal of Health Service Management
    • /
    • v.14 no.1
    • /
    • pp.103-110
    • /
    • 2020
  • Objectives: In this paper, we propose the ethical education direction by analyzing the personal information recognition and practice of music therapists. Methods: For the analyses, we selected 60 music therapists who answered a questionnaire from members of K Music Therapy Association, and analyzed task recognition and practice ask performance using IPA method. Results: In the IPA table, the areas of high recognition and practice (1) are the areas of personal information protection information management. In the IPA table, the areas of low awareness and high practice (2) are areas of privacy communication for those who have completed ethics education. In the IPA table, the areas of low awareness and low practice (3) are areas of privacy communication when ethics education is not completed. In the IPA table, areas of high awareness and low levels of practice (4) are areas of privacy protection. Conclusions: Continuing education should be provided to improve the curriculum on the protection of personal information for music therapists, thereby raising the awareness and practice of privacy.

Privacy Information Protection Model in e-Healthcare Environment (e-Healthcare 환경 내 개인정보 보호 모델)

  • Kim, Kyong-Jin;Hong, Seng-Phil
    • Journal of Internet Computing and Services
    • /
    • v.10 no.2
    • /
    • pp.29-40
    • /
    • 2009
  • The development of information technology such as the internet has brought about rapidly changes the old medical technology, e-Healthcare has been to raise social issue. The e-Healthcare which new turning point of paradigm in the medical information develops the medical policy in Korea and the technology, the prospective of reverse engineering in internet environment is incurring problems such as distribution of critical information and invasion and infringement of privacy, etc. In this research, we suggest the Role Based Access Control System, HPIP-e-Healthcare Privacy Information Protection, for solving above problem. The HPIP is composed 4 mechanisms such as Consolidate User Identity, Hospital Authorization, Medical Record Access Control, Patient Diagnosis and we are also prototyping the HPIP for feasible approach in the real computing environment.

  • PDF

An Exploratory Study on Consumer Privacy Paradox Experience: Grounded Theory Approach (소비자 프라이버시 역설 경험에 대한 탐색적 연구: 근거이론적 접근)

  • Kim, Hyo Jung;Rha, Jong Youn
    • Human Ecology Research
    • /
    • v.55 no.2
    • /
    • pp.205-219
    • /
    • 2017
  • This study redefines 'consumer privacy attitude and behavior discrepancy' that occurs in the transaction environment that exists between consumer and provider as 'consumer privacy paradox.' In this study, qualitative research was conducted based on grounded theory. This study explored how consumers react to a privacy paradox as well as looked into how to adapt to the negative and positive results that can be generated by the privacy paradox. 'Consumer privacy paradox' is the same as the existing privacy paradox in that consumers can utilize the resources of personal information to consume and benefit from the market environment. However, it differs from previous studies in that it examines the privacy paradox in terms of consumer influence and consumer experience. The results of the study are as follows. First, a paradigm model of the consumer privacy paradox was derived. Second, consumers used three types of strategies to rationalize themselves or maintain indifference or relief to cope with the consumer privacy paradox. Third, the possibility of damage and the responsibility for privacy protection were the mediators of the consumer privacy paradox. Fourth, the 'result' generated by the consumer privacy paradox showed four types of: non-response, satisfaction, commitment to change, and negative emotional experience. Fifth, there is a difference in strategies to respond to the consumer privacy paradox according to consumer types.

A Study on the infringement of privacy of unmanned aircraft : Focusing on the analysis of legislation and US policy (무인항공기의 사생활 침해에 대한 법적 대응 : 미국 정책.입법안 분석을 중심으로)

  • Kim, Sun-Ihee
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.29 no.2
    • /
    • pp.135-161
    • /
    • 2014
  • An unmanned aerial vehicle (UAV), commonly known as a drone and also referred to as an unpiloted aerial vehicle and a remotely piloted aircraft (RPA) by the International Civil Aviation Organization (ICAO), is an aircraft without a human pilot aboard. ICAO classify unmanned aircraft into two types under Circular 328 AN/190. Unmanned aircraft, which is the core of the development of the aviation industry. However, there are also elements of the legal dispute. Unmanned aircraft are manufactured in small size, it is possible to shoot a record peripheral routes stored in high-performance cameras and sensors without the consent of the citizens, there is a risk of invasion of privacy. In addition, the occurrence of the people of invasion of privacy is expected to use of civilian unmanned aircraft. If the exposure of private life that people did not want for unmanned aircraft has occurred, may occur liability to the operator of unmanned aircraft, this is a factor to be taken into account for the development of unmanned aircraft industry. In the United States, which is currently led by the unmanned aircraft industry, policy related to unmanned aircraft, invasion of privacy is under development, is preparing an efficient measures making. Unmanned aircraft special law has not been enforced. So there is a need for legal measures based on infringement of privacy by the unmanned aircraft. US was presented Privacy Protection Act of unmanned aircraft (draft). However Korea has many laws have been enacted, to enact a new law, but will be able to harm the legal stability, there is a need for the enactment of laws for public safety of life. Although in force Personal Information Protection Law, unmanned aerospace, when the invasion of privacy occurs, it is difficult to apply the Personal Information Protection Law. So, it was presented a privacy protection bill with infringement of privacy of unmanned aircraft in the reference US legislation and the Personal Information Protection Act.