• Title, Summary, Keyword: Privacy Protection

Search Result 706, Processing Time 0.049 seconds

A Survey of System Architectures, Privacy Preservation, and Main Research Challenges on Location-Based Services

  • Tefera, Mulugeta K.;Yang, Xiaolong;Sun, Qifu Tyler
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.6
    • /
    • pp.3199-3218
    • /
    • 2019
  • Location-based services (LBSs) have become popular in recent years due to the ever-increasing usage of smart mobile devices and mobile applications through networks. Although LBS application provides great benefits to mobile users, it also raises a sever privacy concern of users due to the untrusted service providers. In the lack of privacy enhancing mechanisms, most applications of the LBS may discourage the user's acceptance of location services in general, and endanger the user's privacy in particular. Therefore, it is a great interest to discuss on the recent privacy-preserving mechanisms in LBSs. Many existing location-privacy protection-mechanisms (LPPMs) make great efforts to increase the attacker's uncertainty on the user's actual whereabouts by generating a multiple of fake-locations together with user's actual positions. In this survey, we present a study and analysis of existing LPPMs and the state-of-art privacy measures in service quality aware LBS applications. We first study the general architecture of privacy qualification system for LBSs by surveying the existing framework and outlining its main feature components. We then give an overview of the basic privacy requirements to be considered in the design and evaluation of LPPMs. Furthermore, we discuss the classification and countermeasure solutions of existing LPPMs for mitigating the current LBS privacy protection challenges. These classifications include anonymization, obfuscation, and an encryption-based technique, as well as the combination of them is called a hybrid mechanism. Finally, we discuss several open issues and research challenges based on the latest progresses for on-going LBS and location privacy research.

Compliance and Implications for Public Officials in Charge of Personal Information Protection by Policy Trends (개인정보보호 정책 동향에 따른 공공기관 담당자를 위한 업무 수행 준수사항 및 시사점)

  • Ju, Gwang-il;Choi, Seon-Hui;Park, Hark-Soo
    • The Journal of the Korea Contents Association
    • /
    • v.17 no.4
    • /
    • pp.461-467
    • /
    • 2017
  • Privacy laws are widely enforced throughout the general public and private sector, and the Ministry of Government Administration and Home Affairs is stepping up its annual level of protection and management levels annually. However, in actual field, it has limits to follow the laws that are amended to comply with the privacy laws of the public sector. Therefore, this study should examine the trends of privacy protection and examine items that require adherence to privacy practices in public institutions. In addition, it is hoped to draw implications for the problems arising from the task itself, as well as providing implications for the issues that are closely related to the public in the privacy of the privacy policies.

A Study on Protecting Patients' Privacy of Obstetric and Gynecologic Nurses (산부인과 간호사의 환자 프라이버시 보호행동에 관한 연구)

  • Kim, Miok
    • Korean Journal of Women Health Nursing
    • /
    • v.18 no.4
    • /
    • pp.268-278
    • /
    • 2012
  • Purpose: This study aims to determine obstetric and gynecologic (OBGY) nurses' perception and performance propecting patients' privacy, and to contribute to develop educational program and improve the quality of nursing care. Methods: 206 OBGY nurses in 6 hospitals using an electronic medical record or an order communicating system were chosen by convenience sampling and agreed to participate in the study. The questionnaire, explored 4 domains of privacy: direct nursing, linked business, patient information management, communication with relatives. Results: Perception and performance of protecting patient privacy averaged 4.29 (of 5) and 3.55 (of 5), respectively. Most nurses (94.2%) recognized the importance of protecting patient privacy, 80.1% received patient privacy education. There was a distinct difference between the perception and performance of protecting patient privacy of nurses. Performance of protecting patient privacy had a positive correlation with perception. Conclusion: Proper performance of protecting privacy protection requires improving perception of each nurse on the patient privacy, and various efforts should be made to minimize the affect from external factors such as hospital environment. It is needed to educate nurses for patient privacy. It is also needed for medical organizations to improve their policies and facilities to ease the performance for privacy protection.

A Study on Consumer Personal Information in Information Society (정보사회에서의 소비자 개인정보보호에 관한 연구)

  • 남수정;김기옥
    • Journal of the Korean Home Economics Association
    • /
    • v.37 no.10
    • /
    • pp.55-66
    • /
    • 1999
  • The purpose of this study is to propose consumer policy related to the protection of personal information on the basis of regulations and laws in the developed countries. From this study, implications for the protection consumer privacy are discussed as follows. First, Consumer education is needed to enhance consumers'knowledge on their privacy right and this should be done not only by private consumer organization but also by businesses. Second, Businesses should realize ethical responsibilities of consumers'privacy right when they use personal information by databasemarketing. Finally, Government should establish a privacy law concerning both public and private sectors.

  • PDF

A Study on the Investigation of the Awareness for the Privacy of the Users at the School Libraries (학교도서관 이용자의 프라이버시에 대한 인식조사연구)

  • Sim, Jae-yun;Noh, Younghee
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.26 no.4
    • /
    • pp.31-63
    • /
    • 2015
  • This research was based on the investigation of the awarenesses of librarians of issues regarding the privacy of the users of school libraries. It sought to determine if, by raising the issue of the importance of the need for the protection of the personal information of the users of the school libraries, and the implications of not paying attention to the rules in effect, the awareness regarding the privacy of the users of school libraries would be improved. For this, previous research related to the privacy of the students, the legal basis for the protection of the privacy of the domestic and foreign students, and the types of the infringements upon the protection of their personal information were investigated. A survey was conducted to measure the awareness of issues related to the privacy of the users of the library. The research showed the results as follows: First, the awarenesses regarding the privacy of the users of the school libraries appeared low, and low recognition was also found regarding the awareness of the cases of the infringements upon the privacy of the users of the school libraries; regarding the awareness in relation to the protection of privacy; regarding the seriousness of the privacy problems of the users; and regarding the factors that can encroach upon the privacy of the users. Second, regarding the seriousness felt when the library records of the users of the school libraries are leaked to the outside, 41.6% of the respondents responded by saying "It is serious", and 18.4% responded by saying "It is not serious". Third, as a result of investigating the awareness regarding whether the consent of the person concerned is needed in case a third party requests access to reading the records in the library, 68.5% of the respondent responded "It is needed", and only 10.4% responded "It is not needed". Last, in the investigation into whether the respondents had the experience of being educated as to the rules related to the privacy of the users at a school or an external organization, over 80% of the respondents answered that they did not receive it.

Integrated Privacy Protection Model based on RBAC (RBAC에 기초한 통합형 프라이버시 보호 모델)

  • Cho, Hyug-Hyun;Park, Hee-Man;Lee, Young-Lok;Noh, Bong-Nam;Lee, Hyung-Hyo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.4
    • /
    • pp.135-144
    • /
    • 2010
  • Privacy protection can only be achieved by enforcing privacy policies within an enterprise's on and offline data processing systems. There are P-RBAC model and purpose based model and obligations model among privacy policy models. But only these models each can not dynamically deal with the rapidly changing business environment. Even though users are in the same role, on occasion, secure system has to opt for a figure among them who is smart, capable and supremely confident and to give him/her a special mission during a given period and to strengthen privacy protection by permitting to present fluently access control conditions. For this, we propose Integrated Privacy Protection Model based on RBAC. Our model includes purpose model and P-RBAC and obligation model. And lastly, we define high level policy language model based XML to be independent of platforms and applications.

A Content Analysis of Web sites from a Perspective of Children's Online Privacy Protection (아동 대상 인터넷 사이트의 개인정보보호 실태와 개선 방향)

  • Kim, So-Ra;Rhee, Kee-Choon
    • Journal of the Korean Home Economics Association
    • /
    • v.45 no.8
    • /
    • pp.127-142
    • /
    • 2007
  • The objective of this study was to discuss child privacy issues at Web sites targeting children, Specifically, the study examined l)types of information required for join the membership, 2)whether privacy policies at Web sites for children abide by privacy guideline, and 3)specific examples of recommendable privacy policy and problematic privacy policy from Web sites, Total of 305 Web sites targeting children were used for content analysis, Selected Web sites included recommended sites by Korea Council of Children's Organizations and food business Web sites, The results showed that more than 70% of Web sites required private information when children join the membership. Most of these Web sites provided mailing service for children. Generally, Web sites showed problems in parents' approval procedures. Also, privacy policies at Web sites frequently omitted purpose specification principle and the security safeguard principle. Regulating online service provides and marketers targeting children would be necessary for protecting child privacy. Further, education program targeting parents and children could help them make right choices to protect children's online privacy.

Analysis of Personal Information Protection Circumstances based on Collecting and Storing Data in Privacy Policies (개인정보처리방침의 데이터를 활용한 개인정보보호 현황 분석)

  • Lee, Jae-Geun;Kang, Sang-Ug;Youm, Heung-Youl
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.4
    • /
    • pp.767-779
    • /
    • 2013
  • A field of privacy protection lacks statistical information about the current status, compared to other fields. On top of that, since it has not been classified as a concrete separate field, the related survey is only conducted as a part of such concrete areas. Furthermore, this trend of being regarded as a part of fields such as informatization, information protection and law will continue in the near future. In this paper, a novel and practical way for collecting and storing a big amout of data from 110,000 privacy policies by data controller is proposed and the real analysis results is also shown. The proposed method can save time and cost compared with the traditional survey-based method while maintaining or even advancing the accuracy of results and speediness of process. The collected big personal data can be used to set up various kinds of statistical models and they will play an important role as a breakthrough of observing the present status of privacy information protection policy. The big data concept is incorporated into the privacy protection and we can observe the method and some results throughout the paper.

Development of Personal Information Protection Model using a Mobile Agent

  • Bae, Seong-Hee;Kim, Jae-Joon
    • Journal of Information Processing Systems
    • /
    • v.6 no.2
    • /
    • pp.185-196
    • /
    • 2010
  • This paper proposes a personal information protection model that allows a user to regulate his or her own personal information and privacy protection policies to receive services provided by a service provider without having to reveal personal information in a way that the user is opposed to. When the user needs to receive a service that requires personal information, the user will only reveal personal information that they find acceptable and for uses that they agree with. Users receive desired services from the service provider only when there is agreement between the user's and the service provider's security policies. Moreover, the proposed model utilizes a mobile agent that is transmitted from the user's personal space, providing the user with complete control over their privacy protection. In addition, the mobile agent is itself a self-destructing program that eliminates the possibility of personal information being leaked. The mobile agent described in this paper allows users to truly control access to their personal information.

A Framework for measuring query privacy in Location-based Service

  • Zhang, Xuejun;Gui, Xiaolin;Tian, Feng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.5
    • /
    • pp.1717-1732
    • /
    • 2015
  • The widespread use of location-based services (LBSs), which allows untrusted service provider to collect large number of user request records, leads to serious privacy concerns. In response to these issues, a number of LBS privacy protection mechanisms (LPPMs) have been recently proposed. However, the evaluation of these LPPMs usually disregards the background knowledge that the adversary may possess about users' contextual information, which runs the risk of wrongly evaluating users' query privacy. In this paper, we address these issues by proposing a generic formal quantification framework,which comprehensively contemplate the various elements that influence the query privacy of users and explicitly states the knowledge that an adversary might have in the context of query privacy. Moreover, a way to model the adversary's attack on query privacy is proposed, which allows us to show the insufficiency of the existing query privacy metrics, e.g., k-anonymity. Thus we propose two new metrics: entropy anonymity and mutual information anonymity. Lastly, we run a set of experiments on datasets generated by network based generator of moving objects proposed by Thomas Brinkhoff. The results show the effectiveness and efficient of our framework to measure the LPPM.