• Title/Summary/Keyword: protection of personal information

Search Result 762, Processing Time 0.031 seconds

Comparative Analysis of TOA and TDOA method for position estimation of mobile station (이동국 위치 추정을 위한 TOA와 TDOA방법의 비교 분석)

  • 윤현성;이창호;변건식
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.4 no.3
    • /
    • pp.595-602
    • /
    • 2000
  • This paper is aimed at developing an location tracking system of mobile station based on currently available mobile communication network or mobile Phone and PCS(Personal Communication System). When the location tracking of mobile stations is in services, Emergency-119, all of crime investigation, effective urban traffic management and the safety protection of Alzheimer's patients can be available. In order to track the location of the mobile and base station, assumption in this paper is to use the statistic characteristics of LOS when modeling the standard noise in case that radio path is LNOS environment. The standard variation of the standard noise is $\pm150$. First, location is estimated by the positioning algorithms of TOA and TDOA and compared each other. Second, after canceling the standard noise by Kalman filter, location is estimated by the above two positioning algorithms. Finally, the location by the Kalman filter and two positioning algorithms is estimated by smoothing method. As a result, 2 dimensional average location error is imvoved by 51.2m in TOA and 34.8m in TDOA when Kalman filer and two positioning algorithms are used, compared with the two positioning algorithm used. And there is 3 more meter improvement after smoothing than Kalman filer and two positioning algorithms used.

  • PDF

Analysis of privacy issues and countermeasures in neural network learning (신경망 학습에서 프라이버시 이슈 및 대응방법 분석)

  • Hong, Eun-Ju;Lee, Su-Jin;Hong, Do-won;Seo, Chang-Ho
    • Journal of Digital Convergence
    • /
    • v.17 no.7
    • /
    • pp.285-292
    • /
    • 2019
  • With the popularization of PC, SNS and IoT, a lot of data is generated and the amount is increasing exponentially. Artificial neural network learning is a topic that attracts attention in many fields in recent years by using huge amounts of data. Artificial neural network learning has shown tremendous potential in speech recognition and image recognition, and is widely applied to a variety of complex areas such as medical diagnosis, artificial intelligence games, and face recognition. The results of artificial neural networks are accurate enough to surpass real human beings. Despite these many advantages, privacy problems still exist in artificial neural network learning. Learning data for artificial neural network learning includes various information including personal sensitive information, so that privacy can be exposed due to malicious attackers. There is a privacy risk that occurs when an attacker interferes with learning and degrades learning or attacks a model that has completed learning. In this paper, we analyze the attack method of the recently proposed neural network model and its privacy protection method.

Security Analysis on 'Privacy-Preserving Contact Tracing Specifications by Apple and Google' and Improvement with Verifiable Computations ('애플과 구글의 코로나 접촉 추적 사양'에 대한 보안성 평가 및 검증 가능한 연산을 이용한 개선)

  • Kim, Byeong Yeon;Kim, Huy Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.3
    • /
    • pp.291-307
    • /
    • 2021
  • There has been global efforts to prevent the further spread of the COVID-19 and get society back to normal. 'Contact tracing' is a crucial way to detect the infected person. However the contact tracing makes another concern about the privacy violation of the personal data of infected people, released by governments. Therefore Google and Apple are announcing a joint effort to enable the use of Bluetooth technology to help governments and health agencies reduce the spread of the virus, with user privacy and security central to the design. However, in order to provide the improved tracing application, it is necessary to identify potential security threats and investigate vulnerabilities for systematically. In this paper, we provide security analysis of Privacy-Preserving COVID-19 Contact Tracing App with STRIDE and LINDDUN threat models. Based on the analysis, we propose to adopt a verifiable computation scheme, Zero-knowledge Succinctness Non-interactive Arguments of Knowledges (zkSNARKs) and Public Key Infrastructure (PKI) to ensure both data integrity and privacy protection in a more practical way.

A Study on the Effect of Block Chain Application and Legal Issue in Logistics Industry (물류산업의 블록체인 적용효과와 법적 과제에 대한 연구)

  • Yang, Jae-Hoon
    • Journal of Convergence for Information Technology
    • /
    • v.8 no.1
    • /
    • pp.187-199
    • /
    • 2018
  • The purpose of this study is to find out the positive effects of the block chain when applied to the logistics industry and what legal problems should be solved to apply the block chain to the logistics industry. As a result of the study, it was found that the block chain can create the streamlining document work, increasing visibility, improving transaction reliability, activating Internet of things, and expanding smart contract. However, in order to apply the block chain to the logistics industry, have also confirmed that the scope of electronic transactions, international distribution of electronic bill of lading, and legal supplementation related to personal information protection are necessary. It is meaningful to confirm the applicability in the logistics industry, the positive effect and the legal problem, but it is necessary to study the problem from the practical point of view in the hereafter research.

Comparative Analysis of TOA and TDOA method for position estimation of mobile station (이동국 위치 추정을 위한 TOA와 TDOA방법의 비교 분석)

  • 윤현성;호인석;이장호;변건식
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2000.05a
    • /
    • pp.167-172
    • /
    • 2000
  • This paper is aimed at developing an location tracking for mobile station employing currently available mobile communication network of cellular phone and PCS(Personal Communication System). When the location tracking of mobile stations is in services, the services such as Emergency-119, crime investigation, effective urban traffic management or the safety protection of Alzheimer's patients, ran be available. This paper is to track the mobile station in communication network in NLOS environment. To achieve reduction of the standard noise, Kalman filter is used. In terms of the distance, positions are located by using TOA and TDOA methods in the environment that removes NLOS bias in the measured data. And then smoothing method is used. to achieve reduction of the position error values

  • PDF

A Study on the Energy Platform to Reduce Carbon Emissions (탄소배출 저감을 위한 에너지 플랫폼 연구)

  • Beom-seok Cha;Hyung-Jin Moon;Woojin Wi;Gab-Sang Ryu
    • Journal of Internet of Things and Convergence
    • /
    • v.10 no.2
    • /
    • pp.43-50
    • /
    • 2024
  • This manuscript proposes an artificial intelligence-based(AI) energy platform system that efficiently use existing energy than creating new energy than creating new energy sources. To this end, it collects public information data portal and statistics data portal and data emissions, including energy usage and greenhouse gas emissions, including energy consumption and greenhouse gas emissions.In addition, it provides strong security and personal information protection functions to overcome the limit of existing energy platform. Through the built energy platform, improving power supply and user convenience of users and users to contribute to global warming issues.In this paper, the contents to implement the contents of the system, and improvement direction from the future completion and improvement direction.

Security Technique using SSH Tunneling for CCTV Remote Access (SSH 터널링을 이용한 CCTV 원격접속 보안기법)

  • HWANG, GIJIN;PARK, JAEPYO;YANG, SEUNGMIN
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.11
    • /
    • pp.148-154
    • /
    • 2016
  • Video security has recently emerged as an important issue owing to CCTV video image spill accidents over the Internet. KISA recommends the use of encryption protocols for remote access through its guidelines for CCTV personal video information protection. But still, many products do not adhere to the guidelines, and those products are easily exposed to security threats, such as hacking. To solve these security vulnerabilities, this paper proposes a CCTV system that connects from remote locations, and is implemented by using secure shell (SSH) tunneling techniques. The system enhances security by transmitting encrypted data by using SSH. By using the tunneling technique, it also solves the problem of not being able to access a CCTV recorder located inside a firewall. For evaluation of the system, this paper compares various CCTV remote access schemes and security. Experimental results on the effectiveness of the system show it is possible to obtain remote access without a significant difference in transmission quality and time. Applying the method proposed in this paper, you can configure a system secure from the threats of hacking.

A Study on Improvement of Used-goods Market Platform Using Blockchain (블록체인을 이용한 중고거래 플랫폼 개선방안 연구)

  • Lee, Kyoung-Nam;Jeon, Gyeahyung
    • Journal of Digital Convergence
    • /
    • v.16 no.9
    • /
    • pp.133-145
    • /
    • 2018
  • This study was investigated the necessity and possibility of using block-chain technology in online used-goods trading platform. Current online used-goods trading platforms operate a safety trading system, but it is difficult to utilize due to relatively high commission rate. As a result, people mainly use the method of meeting and purchasing in person, which is a relatively costly method. This study discusses how to build a platform to solve or mitigate problems such as privacy, information distortion and omission, fraud, etc. In the platform proposed in this study, it is possible to solve the major fraud and personal information protection problems that may occur in the transaction proceeding by appropriately reflecting the types and characteristics of the block-chain technology. In future work, we will discuss legal framework and technology development plan to apply the proposed platform in this study.

Knowledge Creation Structure of Big Data Research Domain (빅데이터 연구영역의 지식창출 구조)

  • Namn, Su-Hyeon
    • Journal of Digital Convergence
    • /
    • v.13 no.9
    • /
    • pp.129-136
    • /
    • 2015
  • We investigate the underlying structure of big data research domain, which is diversified and complicated using bottom-up approach. For that purpose, we derive a set of articles by searching "big data" through the Korea Citation Index System provided by National Research Foundation of Korea. With some preprocessing on the author-provided keywords, we analyze bibliometric data such as author-provided keywords, publication year, author, and journal characteristics. From the analysis, we both identify major sub-domains of big data research area and discover the hidden issues which made big data complex. Major keywords identified include SOCIAL NETWORK ANALYSIS, HADOOP, MAPREDUCE, PERSONAL INFORMATION POLICY/PROTECTION/PRIVATE INFORMATION, CLOUD COMPUTING, VISUALIZATION, and DATA MINING. We finally suggest missing research themes to make big data a sustainable management innovation and convergence medium.

Design and implementation of Android obfuscation technique using layout file transformation (레이아웃 파일 변환을 이용한 안드로이드 난독화 기법의 설계 및 구현)

  • Park, Heewan
    • Journal of the Korea Convergence Society
    • /
    • v.11 no.11
    • /
    • pp.1-7
    • /
    • 2020
  • Android apps are mostly distributed as an apk files, and when the apk file is uncompressed, resource files such as xml files, images, and sounds related to app design can be extracted. If the resources of banking or finance-related apps are stolen and fake apps are distributed, personal information could be stolen or financial fraud may occur. Therefore, it is necessary to make it difficult to steal the design as well as the code when distributing the app. In this paper, we implemented a tool to convert the xml file into Java code and obfuscate using the Proguard, and evaluated the execution performance. If the layout obfuscation technique proposed in this paper is used, it is expected that the app operation performance can be improved and the illegal copying damage caused by the theft of the screen design can be prevented.