• Title, Summary, Keyword: Privacy Protection

Search Result 706, Processing Time 0.039 seconds

A Study on Application of the UAV in Korea for Integrated Operation with Spatial Information (무인항공기(UAV)의 공간정보 통합운영을 위한 국내적용 방안)

  • Yun, Bu Yeol;Lee, Jae One
    • Journal of Korean Society for Geospatial Information System
    • /
    • v.22 no.2
    • /
    • pp.3-9
    • /
    • 2014
  • With broadcasting telecommunication, rapid change detection, and construction of spatial information, a long reconnaissance, resources detection in dangerous area and natural disasters, which are difficult for manned aerial vehicles to perform, international recognition in UAV merely being used for limited military purposes has been changed and its demand for both civil and military purpose have been increased. However, considering the current situation that availability of UAV varies and its working areas also broaden, the stability of UAV and the problems of privacy protection are more important in integrated operation of UAV. In particular, the application of UAV system is urgent for the area where rapid decision making due to expedite data construction such as disaster, calamity, and the acquisition of spatial information for small area are required. However, since technical stability for UAV system and institutional regulation in regard of spatial information are not examined, and UAV system has not been integrated with aerial photograph, the limitation of UAV system has been presented. Thus, this study is aimed at analyzing domestic and foreign research trend and institutional research trend in terms of integrated UAV operation, and proposing its implications and the availability of integrated UAV operation for future national spatial information data construction.

A Study on the Status of Market, Technology and Legal System of the UAV and its Useful Policies (무인항공기 시장·기술·법제도 실태분석 및 정책적 대응방안 연구)

  • Park, Cheol-Soon
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.30 no.2
    • /
    • pp.373-401
    • /
    • 2015
  • The UAV(Unmanned Aerial Vehicle, Drone) technology has been undergoing rapid progress, accompanied with a growth in the market. However, domestic industry standards and technology lag behind such progress happening on the international scene, and in particular in developed countries. Related regulations are also deemed lacking to address the issues that arise with such developments. Meanwhile, as the rise of UAV technology is a fairly recent phenomenon, the gap between Korea and developed countries is not too big. As this technology has high relevance to information and communication technologies, it also offers ample leeway for Korea to catch up in the field of UAV. As such, this paper seeks to provide a survey of the overall technology, market and regulations concerning UAV to identify possible measures on how to address any issues that may arise through proper policies. Due to the progress made in the field of UAV technology and increased penetration rate, striking a right balance between putting in place a proper regulatory system and establishing policies that foster growth in the field has risen as a very important issue. While the importance of establishing a legal system that helps prevent possible risks is indeed important, it must also be acknowledged that excessive regulation can also hinder technological progress. This, in turn would stagnate the market and dampen the entrepreneurial spirit in the society. In the case of new, practical technologies such as UAV, a prompt establishment of regulatory systems and policy measures in terms of policies is a requisite. In brief, in order to promote progress in the UAV industry and at the same time, for public safety and the protection of privacy, there should be an appropriate level on the easing and tightening of the regulation.

Robust DNA Watermarking based on Coding DNA Sequence (부호 영역 DNA 시퀀스 기반 강인한 DNA 워터마킹)

  • Lee, Suk-Hwan;Kwon, Seong-Geun;Kwon, Ki-Ryong
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.49 no.2
    • /
    • pp.123-133
    • /
    • 2012
  • This paper discuss about DNA watermarking using coding DNA sequence (CDS) for the authentication, the privacy protection, or the prevention of illegal copy and mutation of DNA sequence and propose a DNA watermarking scheme with the mutation robustness and the animo acid preservation. The proposed scheme selects a number of codons at the regular singularity in coding regions for the embedding target and embeds the watermark for watermarked codons and original codons to be transcribed to the same amino acids. DNA base sequence is the string of 4 characters, {A,G,C,T} ({A,G,C,U} in RNA). We design the codon coding table suitable to watermarking signal processing and transform the codon sequence to integer numerical sequence by this table and re-transform this sequence to floating numerical sequence of circular angle. A codon consists of a consecutive of three bases and 64 codons are transcribed to one from 20 amino acids. We substitute the angle of selected codon to one among the angle range with the same animo acid, which is determined by the watermark bit and the angle difference of adjacent codons. From in silico experiment by using HEXA and ANG sequences, we verified that the proposed scheme is more robust to silent and missense mutations than the conventional scheme and preserve the amino acids of the watermarked codons.

A Study on the protection of personal information using a Virtual IDs in an anonymous bulletin board (익명 게시판 환경에서 가상 아이디를 이용한 개인정보보호에 관한 연구)

  • Min, So-Yeon;Jang, Seung-Jae
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.13 no.9
    • /
    • pp.4214-4223
    • /
    • 2012
  • The argument related to the use of real and anonymous names on the Internet bulletin board has recently become a main issue. When using real names, it is possible to violate free discussion and privacy. Also, when using anonymous names, it is possible to have the reverse function of the Internet in regard to the use of malicious replies or the distribution of false ideas. Therefore, this paper has made it possible to prevent the spread of the user's personal information and execute the single log-in process by using the XML-token method which is one of the SSO technologies. Also, by issuing virtual IDs and forming the path when establishing tokens, the anonymous bulletin board which provides anonymity with a conditional tracing process has been suggested. After analyzing the performance of visitor numbers at authentication time, the anonymous bulletin board based on the group signature method showed the average response rate of 0.72 seconds, 0.18 seconds, which was suggested scheme. In the authentication time 4-5 times faster response speed, respectively. Also, since the suggested system does not have to provide a single authentication process or make the user provide his or her signature, the level of user's convenience seems to be much higher. Such a result shows that the system suggested on the anonymous bulletin board has a more appropriate level of user's convenience.

DNA Watermarking Method based on Random Codon Circular Code (랜덤 코돈 원형 부호 기반의 DNA 워터마킹)

  • Lee, Suk-Hwan;Kwon, Seong-Geun;Kwon, Ki-Ryong
    • Journal of Korea Multimedia Society
    • /
    • v.16 no.3
    • /
    • pp.318-329
    • /
    • 2013
  • This paper proposes a DNA watermarking method for the privacy protection and the prevention of illegal copy. The proposed method allocates codons to random circular angles by using random mapping table and selects triplet codons for embedding target with the help of the Lipschitz regularity value of local modulus maxima of codon circular angles. Then the watermark is embedded into circular angles of triplet codons without changing the codes of amino acids in a DNA. The length and location of target triplet codons depend on the random mapping table for 64 codons that includes start and stop codons. This table is used as the watermark key and can be applied on any codon sequence regardless of the length of sequence. If this table is unknown, it is very difficult to detect the length and location of them for extracting the watermark. We evaluated our method and DNA-crypt watermarking of Heider method on the condition of similar capacity. From evaluation results, we verified that our method has lower base changing rate than DNA-crypt and has lower bit error rate on point mutation and insertions/deletions than DNA-crypt. Furthermore, we verified that the entropy of random mapping table and the locaton of triplet codons is high, meaning that the watermark security has high level.

A Protection System of Medical Information using Multiple Authentication (다중 인증 기술을 이용한 의료정보 보호시스템)

  • Kim, Jin-Mook;Hong, Seong-Sik
    • Convergence Security Journal
    • /
    • v.14 no.7
    • /
    • pp.3-8
    • /
    • 2014
  • Recently, A utilization request of the U-Healthcare services are increasing rapidly. This is because the increase in smartphone users and ubiquitous computing technology was developed. Furthermore, the demand for access to and use of medical information systems is growing rapidly with a smartphone. This system have the advantage such as they can access from anywhere and anytime in the healthcare information system using their smartphone quickly and easily. But this system have various problems that are a privacy issue, the location disclosure issue, and the potential infringement of personal information. this problems are arise very explosive. Therefore, we propose a secure information security system that can solve the security problems in healthcare information systems for healthcare workers using smartphone. Our proposed system, doctors record, store, modify and manage patient medical information and this system would be safer than the existing healthcare information systems. The proposed system allows the doctor to perform further authentication by transmitting using SMS to GOTP message when they accessing medical information systems. So our proposed system can support to more secure system that can protect user individual information stealing and modify attack by two-factor authentication scheme. And this system can support confidentiality, integrity, location information blocking, personal information steal prevent using cryptography algorithm that is easy and fast.

A Remote User Authentication Scheme Preserving Anonymity and Traceability with Non-Tamper Resistant Smart Cards (정보추출 가능한 스마트카드 환경에서 익명성과 추적성을 제공하는 원격 사용자 인증 기법)

  • Kwon, Hyuck-Jin;Ryu, Eun-Kyung;Lee, Sung-Woon
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.6
    • /
    • pp.159-166
    • /
    • 2013
  • Recently, because the interest and needs in privacy protection are growing, smartcard-based remote user authentication schemes have been actively studied to provide the user anonymity. In 2008, Kim et al. first proposed an authentication scheme in order to ensure the user anonymity against both external attackers and the remote server and track malicious users with the help of a trusted trace sever. However, in 2010, Lee et al. showed that Kim et al.'s scheme cannot provide the user anonymity against remote server, which is because the server can trace users without any help of the trace server, and then proposed a improved scheme. On the other hand, in 2010, Horng et al. proposed an authentication scheme with non-tamper resistant smart cards, in which the non-tamper resistant smart card means that an attacker may find out secret information stored in the smart card through special data analysis techniques such as monitoring power consumption, to be secure against a variety of attacks and to provide the user anonymity against external attackers. In this paper, we will propose a remote user authentication scheme with non-tamper resistant smart cards not only to ensure the user anonymity against both external attackers and the remote server but also to track malicious users with only the help of a trusted trace sever.

Research Trends Analysis of Domestic Carrier Billing Services using Meta-Analysis (메타분석을 활용한 국내 통신과금 서비스 연구동향 분석)

  • Yoo, Soonduck;Kim, Jungihl
    • The Journal of The Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.2
    • /
    • pp.71-85
    • /
    • 2016
  • The purpose of this research is to study technical and policy improvements of carrier billing services, which are a developing and growing industry, by adopting a meta-analysis method. Implications were derived from studying 15 years-worth of academic research papers (from 2001 to 2015), by analyzing the trends over a total of 109 such research papers on carrier billing services. First, looking at the characteristics of the main studies of the papers from 2008 to 2009, it papers appeared that dealt with preventing fraudulent transactions and preserving consumer protection. Privacy, policy proposals and studies for new systems were researched from 2010-2012. Service, success factors, damage prevention systems research, law, and institutions were discussed in 2013-2015 mainly. Second, the research showed that the number of carrier billing service studies increased due to social issues(telecommunications billing services deregulation, the emergence smartphones, fraud). Third, in sectorial research results, technology was the focus area of 47 papers (43.1%), the service sector was the focus of 39 pieces (35.8%) and law and policy improvement accounted for 23 pieces (21.1%). The study of technology and service areas was the most active and according to changes in the environment, law and policy improvement were second to most active. This study will contribute to improving relevant institutions and research directions about study trends in carrier billing services.

A self-portrait of the information society: An Arguments on the SNS users' Responsibilities

  • Seo, Ran-Sug
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.8
    • /
    • pp.159-172
    • /
    • 2020
  • Social networking services (SNS) are developing significantly with the Internet and smartphones. It's a friendly social media, but if you think deeply about it, you'll find that it has a variety of faces. It is a communication tool between users, a medium for delivering information, an infrastructure for providing applications, and a community where people with common interests gather. In recent years, business tools, shopping and payment methods are also being swallowed. The influence of the spread of SNS on the real world is also expanding, and the work being dealt with from a sociological perspective is also increasing. Also, if you pay attention to the technical aspects of SNS, it is composed of various technical elements, such as infrastructure that handles large-scale access, user interface that supports comfortable use, and big data analysis to understand people's behavior more deeply. However, I usually use it as usual. However, if you look through SNS, you can see that the situation is surprisingly profound and multifaceted. This study began by looking at the history and current status of SNS and attempted to find its status through comparison with other media. From the point of view of relationship with society, it can be a risk and legal issue when using SNS, such as crimes using bad social media or social media. It is also necessary to comment on the activities on SNS or the guidelines established by the operators. Therefore, various legal issues on SNS will be discussed. Also, as an example of using SNS, I will introduce an example of using SNS in disaster response. From a more technical point of view, you will receive commentary on SNS's network-based technology and SNS's information use, and these articles will help you understand and use SNS safely and help you further utilize or develop SNS.

Study on Utilization Drones in Domestic Logistics Service in Korea (한국내 물류서비스에 드론 활용을 위한 연구)

  • Kang, Ki-Seog;Jeon, In-Oh
    • The Journal of Distribution Science
    • /
    • v.14 no.5
    • /
    • pp.51-57
    • /
    • 2016
  • Purpose - In the year of 2015 and 2016, one of the items that got attention in CES was a drone. It has been 100 years since a drone emerged, but most were used for military purposes. As its use became diverse as of 2010, it got attention of the general public. In Korea, it was in 2011 that a drone was known to the public through an aerial video shooting for television program. This study tried to come up with suggestions by comparing domestic with overseas cases, and tried to consider the related technologies and systems with applying the role of drones in logistics service. Research design, data, and methodology - The overseas cases were regarded as drone's logistical purpose. The Prime Air service by US Amazon is still not commercialized and under pre-testing due to Federal Aviation Regulations, although it started in 2013. In Germany, DHL succeeded in delivering service testing which is called Parcelcopter, but it is not commercialized yet. Other than these, there are more attempts to prepare logistics service in China with Taobao, in France with Geopost's test, and in Africa. In Korea, CJ Korea Express tested delivery with a self-developed drone Results - In order to study for utilizing drones for logistics as the prerequisites, some overseas and domestic cases, which are currently considered, were reviewed. Also, the technologies and institutional requirements to commercialize drones for logistical purpose were reviewed. The reasons for using drones in logistics is to ensure the price competitiveness by reducing cost. The empirical test also will be needed because drone pilot areas are designated by ministry of land, infrastructure and transport. Conclusions - In order to utilize drones in logistics and foster the industry, this study would like to suggest the followings. First of all, size of drones for logistics needs to be fixed and their operating system should be standardized. Centralized investment resources are needed through standardization to ensure the market occupancy. Secondly, it is necessary to get the converged businesses that do research, develop and commercialize drones with the investment of private sector. Example can be found in Korea aerospace Industries. We can respond to the rapid growth of the market with intensive investing by integrating the private sector investment. Thirdly, institutional arrangements are needed to be established quickly. In the case of high-technologies like drones, institutional support often does not follow the rapid development of the technology. The problems can be found in securing drones-only airspace, creating drone-specialized pilot's license, matters related to remote controller and complementary regulations for drones in Aviation Act. If these regulations are not prepared or complemented at the right timing, technologies cannot be commercialized even though the development is completed. Fourthly, there is a need to secure the transparency regarding possible privacy and personal information protection problem while operating drones. Finally, in order to foster this new industry, government should focus on supporting R&D more in the long term than short term outcomes.