DOI QR코드

DOI QR Code

Private information protection method and countermeasures in Big-data environment: Survey

빅데이터 환경에서 개인민감정보 보호 방안 및 대응책: 서베이

  • Received : 2018.08.10
  • Accepted : 2018.10.20
  • Published : 2018.10.28

Abstract

Big-data, a revolutionary technology in the era of the 4th Industrial Revolution, provides services in various fields such as health, public sector, distribution, marketing, manufacturing, etc. It is very useful technology for marketing analysis and future design through accurate and quick data analysis. It is very likely to develop further. However, the biggest problem when using Big-data is privacy and privacy. When various data are analyzed using Big-data, the tendency of each user can be analyzed, and this information may be sensitive information of an individual and may invade privacy of an individual. Therefore, in this paper, we investigate the necessary measures for Personal private information infringement that may occur when using Personal private information in Big-data environment, and propose necessary Personal private information protection technologies to contribute to protection of Personal private information and privacy.

4차 산업혁명 시대에 혁심기술인 빅데이터는 보건, 금융, 유통, 공공부문, 제조업, 마케팅 등 다양한 분야에서 서비스를 제공하고 있으며, 정확하고 신속한 데이터 분석을 통하여 마케팅 분석과 미래 설계에 매우 유용한 기술이며, 앞으로 더 발전할 가능성이 매우 높다. 하지만, 빅데이터 활용 시 가장 큰 문제점이 개인정보 보호와 프라이버시 문제이다. 빅데이터를 이용하여 분석을 통해 기존에 알지 못했던 개인의 취향 및 행동을 분석될 수도 있고, 이러한 정보들은 개인의 민감한 정보이자 개인의 프라이버시 침해가 될 수 있다. 따라서 본 논문에서는 빅데이터 환경에서 개인정보를 활용할 때 발생 가능한 개인정보 침해에 대한 필요 사항들을 분석하여, 그에 따른 필요한 개인정보보호 기술을 제안하여 개인정보 보호와 사생활 보호에 기여하고자 한다.

Keywords

References

  1. W. Fan & A. Bifet. (2013). Mining Big-data. ACM SIGKDD Explorations Newsletter, 14(2), 1. https://doi.org/10.1145/2481244.2481246
  2. N. Khan, I. Yaqoob, I. Hashem, Z. Inayat, A. W. Mahmoud, M. Alam, M. Shiraz & A. Gani. (2014). Big-data: Survey, Technologies, Opportunities, and Challenges. The Scientific World Journal, 1-18.
  3. S. Hong. (2017). Secure and light IoT protocol (SLIP) for anti-hacking. Journal of Computer Virology and Hacking Techniques, 13(4), 241-247. doi:10.1007/s11416-017-0295-5.
  4. P. Tallon. (2013). Corporate Governance of Big-data: Perspectives on Value, Risk, and Cost. Computer, 46(6), 32-38. https://doi.org/10.1109/MC.2013.155
  5. H. Varian. (2014). Beyond Big-data. Bus Econ, 49(1), 27-31. https://doi.org/10.1057/be.2014.1
  6. S. Hong. (2017). Research on IoT International Strategic Standard Model. Journal of the Korea Convergence Society, 8(2), 21-26. doi:10.15207/jkcs.2017.8.2.021
  7. S. Hong. (2014). Analysis of DDoS Attack and Countermeasure: Survey. The Journal of Digital Policy and Management, 12(1), 423-429. doi:10.14400/jdpm.2014.12.1.423
  8. S. Hong. (2013). Disconnection of Wireless LAN Attack and Countermeasure. The Journal of Digital Policy and Management, 11(12), 453-458. doi:10.14400/jdpm.2013.11.12.453
  9. S. Hong, S. Lim & J. Song. (2011). Unified Modeling Language based Analysis of Security Attacks in Wireless Sensor Networks: A Survey. KSII Transactions on Internet and Information Systems, 805-821. doi:10.3837/tiis.2011.04.010
  10. S. Hong. (2015). Two-channel user authentication by using USB on Cloud. Journal of Computer Virology and Hacking Techniques, 12(3), 137-143. doi:10.1007/s11416-015-0254-y
  11. R. Smolan & J. Erwitt. (2012). The human face of Big-data. Sausalito, Calif: Against All Odds Productions.
  12. S. U. Cha. (2014). Big-data Protection of the environment and privacy. IT and Law Studies, 8, 193-259.
  13. H. M. Choi. (2014). [Encouragement Prize] A study on the inconsistency problem of the Big-data era and current privacy laws and their solutions. IT and Legal Research, 8, 357-382.
  14. S. W. Heo. (2014). Big-data Legal Issues in Korea. Journal of Law & Economic Ragulation, 7(2), 7-21.
  15. K. J. Park. (2012). Big-data Eco System. Industrial Engineering Magazine, 19(3), 41-47.