DOI QR코드

DOI QR Code

Research on the Access Control Methodology for Dualised Hierarchical Personal Information Life-Cycle

이원화된 계층적 개인정보 Life-Cycle 접근제어 방법론에 관한 연구

  • 서우석 (주식회사 이지서티 개인정보보호센터) ;
  • 김계순 (한국SMC공압(주)) ;
  • 전문석 (숭실대학교 컴퓨터학과)
  • Received : 2013.07.20
  • Accepted : 2013.08.23
  • Published : 2013.08.30

Abstract

Currently in 2013, a law that was drawn as a result of social agreement for personal information protection was enacted, and through several amendments, definite policy of written law and guideline were presented for definitive information protection in various fields of social business including IT field. Based on a series of social issues about the importance of personal information, a new access paradigm to personal information appeared. And from macroscopic access method called information protection, the necessity of technical access method came to the fore. Of course, it seems somewhat irrational to restrict all data in the form of personal information to a certain category of information until now. But in the deluge of information based on IT field, it is true that the part of checking the flow of personal information and selecting as security target has been standardized. But still there are cases in which it is difficult to routinely apply the five standardized flows of personal information Life-Cycle-collect, process, provide, store, and destroy-to information that all companies and organizations have. Therefore, the researcher proposes the standardized methodology by proposing the access control methodology for dualised hierarchical personal information Life-Cycle. The results of this research aim to provide practical data which makes optimal access control to personal information Life-Cycle possible.

2013년 현재 개인정보보호를 위한 사회적 합의결과로 도출되어진 관련법이 제정되고 수차례의 개정을 통해 IT분야를 비롯한 다양한 사회적 업무분야에 최종적인 정보보호를 위한 명확한 성문법적인 정책과 지침 등의 방향이 제시되어 졌다. 이러한 일련의 개인정보 중요성에 대한 사회적 이슈를 기반으로 새로운 개인정보 접근 패러다임이 나타났고 정보보호라는 거시적인 접근 방법에서 전문적인 접근방법의 필요성이 대두되어졌다. 물론 현재까지 모든 개인정보 형태의 자료들을 특정한 정보의 범주에 모두 제한하고 경계를 두는 것은 다소 무리수 있어 보이나 IT분야를 기반으로 하는 정보의 홍수 속에서 개인정보의 흐름을 확인하고 보안대상으로 선정하는 부분은 표준화되어 진 것은 사실이다. 다만 아직까지도 개인정보 Life-Cycle의 5가지 표준화된 흐름인 수집, 처리, 제공, 보관, 파기 등을 모든 기업과 기관이 보유한 정보들에 일상적으로 적용하기 어려운 경우도 발생하고 있다. 따라서 이원화된 계층적 개인정보 Life-Cycle 접근제어 방법론을 제안함으로써 표준화 방법론을 제안한다. 본 연구결과는 개인정보 Life-Cycle에 최적의 접근제어 가능한 현실적인 자료를 제공하고자 한다.

Keywords

References

  1. K. S. Lee, H. B. A, S. Y. Lee, "A Study on a Prevention Method for Personal Information Exposure", The Journal of information and security, Vol. 12, No. 1, pp. 71-77, 2012.
  2. M. S. Kim, "The Study of Check-list based on Privacy Law in Korea for Private Company", The Journal of computing science and engineering (Proceedings of the 2010 Fall Conference), Vol. 37, No. 2B, pp. 37-42, 2010.
  3. D. j. Lee, "The Moderating Role of Site Usage Experience in Internet Users' Decision on Personal Information Disclosure", Information Policy, Vol. 19, No. 2, pp. 21-38, 2012.
  4. The Republic of Korea Ministry of Security and Public Administration . Korea Internet & Security Agency, Privacy counseling casebook", pp. 10-11, 2012.
  5. S. C. Jin, I. K. K, "A Study on the Psychological anxiety on Private information leakage to likelihood of internet users", The Journal of the Korea Institute of Electronic Communication Sciences, Vol. 6, No. 5, pp. 731-738, 2011.
  6. C. I. Hwan, "A study on the Development of Personnel Security Management for Protection against Insider threat", The Journal of the Korea Institute of Electronic Communication Sciences, Vol. 3, No. 4, pp. 210-220, 2008.
  7. E. J. Jun, H. B. Kim, H. Y. Youm, "Trends of laws and programs for personal information protection of Japan and China", The Journal of the Korea Institute of Information Security and Cryptology, Vol. 22, No. 5, pp. 90-105, 2012.
  8. D. K. Jeong, "Comparative study of the privacy information protection policy - Privacy information basic laws and dedicated organizations -", The Journal of the Korea Institute of Information Security and Cryptology, Vol. 22, No. 4, pp. 923-939, 2012.
  9. S. J. Lim, G. J. Kim, T. G. Kang, "Important Information Protection using Client Virtualization", The Journal of The Korea Institute of Electronic Communication Sciences, Vol. 6, No. 1, pp. 111-117, 2011.