• Title/Summary/Keyword: 가명화

Search Result 26, Processing Time 0.025 seconds

A Study on Privacy Security in Maritime Information Gateway System (지능형 해상교통정보 연계시스템에서의 개인정보 보안에 관한 연구)

  • Yong-hak Song;Hyun Kim;Deuk-Jae Cho;Jong-Hwa Beak;Do-yeon Kim
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2023.05a
    • /
    • pp.202-203
    • /
    • 2023
  • The Ministry of Oceans and Fisheries is providing maritime safety services through the operation of the Korean e-Navigation service, and research is continuously needed to improve reliability and quality to secure the competitiveness of the system. In order to secure such competitiveness, we presented the basic design for the big-data maritime information gateway system for minimizes thereal-time operation impact of the Korean e-Navigation service, and a theoretical hardware structure diagram including pseudonymization procedures to implement the overall system and solve privacy security issues. However, the proposed structure diagram and design include only the overall concept, to link real-time maritime information, required detailed privacy security method to satisfy the Privacy Act of the Republic of Korea. To solve this problem, this study will identify factors to violate the Privacy Act within the real-time maritime information(privacy of shipowner, shipping company, captain, navigator, fisherman, etc.) linked by the big-data maritime information gateway system, and research the method to link the secured information to other institutions by encrypting identified the factors.

  • PDF

Study on the New Re-identification Process of Health Information Applying ISO TS 25237 (ISO TS 25237을 적용한 보건의료정보의 새로운 재식별 처리에 관한 연구)

  • Kim, Soon Seok
    • Convergence Security Journal
    • /
    • v.19 no.5
    • /
    • pp.25-36
    • /
    • 2019
  • With the development of information and communication technology, hospitals that electronically process and manage medical information of patients are increasing. However, if medical information is processed electronically, there is still room for infringing personal information of the patient or medical staff. Accordingly, in 2017, the International Organization for Standardization (ISO) published ISO TS 25237 Health Information - Pseudonymization[1]. In this paper, we examine the re - identification process based on ISO TS 25237, the procedure and the problems of our proposed method. In addition, we propose a new processing scheme that adds a re-identification procedure to our secure differential privacy method [2] by keeping a mapping table between de-identified data sets and original data as ciphertext. The proposed method has proved to satisfy the requirements of ISO TS 25237 trust service providers except for some policy matters.

Gasification characteristics of coal in an entrained-flow gasifier (분류층 가스화 장치를 이용한 석탄 가스화 특성 연구)

  • Ra, Ho Won;Seo, Myung Won;Yoon, Sang Jun;Yoon, Sung Min;Ka, Myung Hoon;Lee, Hae Ryung;Lee, Jae-Goo
    • 한국연소학회:학술대회논문집
    • /
    • 2014.11a
    • /
    • pp.265-266
    • /
    • 2014
  • Due to global economic growth, there is an increasing need for energy. Fossil fuels will continue to dominate the world energy supplies in the 21st century and coal will play a significant role. Since coal is one of the most important fossil fuels in the world, coal gasification technology appears to be an inevitable choice for power and chemicals production and has a leading place in Clean Coal Technology (CCT). The most eminent environmental advantage of coal gasification lies in its inherent reaction features that produce negligible sulfur and nitrogen oxides, as well as other pollutants in a reducing atmosphere. The gasifier was operated for a throughput of 1.0 ton & 10.0ton coal per day at pressures of 1~20Bar. Gasification was conducted in a temperature range of $1,100{\sim}1,450^{\circ}C$.

  • PDF

Early Prediction Model of Student Performance Based on Deep Neural Network Using Massive LMS Log Data (대용량 LMS 로그 데이터를 이용한 심층신경망 기반 대학생 학업성취 조기예측 모델)

  • Moon, Kibum;Kim, Jinwon;Lee, Jinsook
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.10
    • /
    • pp.1-10
    • /
    • 2021
  • Log data accumulated in the Learning Management System (LMS) provide high-quality information for the learning process of students. Until now, various studies have been conducted to predict students' academic achievement using LMS log data. However, previous studies were based on relatively small sample sizes of students and courses, limiting the possibility of generalization. This study developed and validated a deep neural network model for the early prediction of academic achievement of college students using massive LMS log data. To this end, we used 78,466,385 cases of LMS log data and 165,846 cases of grade data. The proposed model predicted the excellent-grade students with a high level of accuracy from the beginning of the semester. Meanwhile, the prediction accuracy for the moderate and underachieving groups was relatively low, but the accuracy improved as the time points of the prediction were delayed. This study is meaningful in that we developed an early prediction model based on a deep neural network with sufficient accuracy for practical utilization by only using LMS log data.

Suggestions for Applications of Anonymous Data under the Revised Data Privacy Acts (데이터 3법 시대의 익명화된 데이터 활용에 대한 제언)

  • Chun, Ji Young;Noh, Geontae
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.3
    • /
    • pp.503-512
    • /
    • 2020
  • The revisions to data privacy acts allows the disclosure of data after anonymizing personal information. Such anonymized data is expected to be useful in research and services, but there are high concerns about privacy breaches such as re-identifying of the individuals from the anonymized data. In this paper, we showed that identifying individuals from public data is not very difficult, and also raises questions about the reliability of the public data. We suggest that users understand the trade-offs between data disclosure and privacy protection so that they can use data securely under the revised data privacy acts.

Mix-based Decentralized Anonymous Transaction for Blockchain (블록체인을 위한 믹스 기반 분산화된 익명 거래)

  • Lee, Yun-ho
    • Journal of Internet Computing and Services
    • /
    • v.21 no.6
    • /
    • pp.51-56
    • /
    • 2020
  • Cryptocurrencies, including Bitcoin, has decentralization, distribution and P2P properties unlike traditional currencies relies on trusted central party such as banks. All transactions are stored transparently and distributively, hence all participants can check the details of those transactions. Due to the properties of cryptographic hash function, deletion or modification of the stored transations is computationally not possible. However, cryptocurrencies only provide pseudonymity, not anonymity, which is provided by traditional currencies. Therefore many researches were conducted to provide anonymity to cryptocurrencies such as mix-based methods. In this paper, I will propose more efficient hybrid mix-based method for anonymity than previous mix-based one.

Legal Issues on the Collection and Utilization of Infectious Disease Data in the Infectious Disease Crisis (감염병 위기 상황에서 감염병 데이터의 수집 및 활용에 관한 법적 쟁점 -미국 감염병 데이터 수집 및 활용 절차를 참조 사례로 하여-)

  • Kim, Jae Sun
    • The Korean Society of Law and Medicine
    • /
    • v.23 no.4
    • /
    • pp.29-74
    • /
    • 2022
  • As social disasters occur under the Disaster Management Act, which can damage the people's "life, body, and property" due to the rapid spread and spread of unexpected COVID-19 infectious diseases in 2020, information collected through inspection and reporting of infectious disease pathogens (Article 11), epidemiological investigation (Article 18), epidemiological investigation for vaccination (Article 29), artificial technology, and prevention policy Decision), (3) It was used as an important basis for decision-making in the context of an infectious disease crisis, such as promoting vaccination and understanding the current status of damage. In addition, medical policy decisions using infectious disease data contribute to quarantine policy decisions, information provision, drug development, and research technology development, and interest in the legal scope and limitations of using infectious disease data has increased worldwide. The use of infectious disease data can be classified for the purpose of spreading and blocking infectious diseases, prevention, management, and treatment of infectious diseases, and the use of information will be more widely made in the context of an infectious disease crisis. In particular, as the serious stage of the Disaster Management Act continues, the processing of personal identification information and sensitive information becomes an important issue. Information on "medical records, vaccination drugs, vaccination, underlying diseases, health rankings, long-term care recognition grades, pregnancy, etc." needs to be interpreted. In the case of "prevention, management, and treatment of infectious diseases", it is difficult to clearly define the concept of medical practicesThe types of actions are judged based on "legislative purposes, academic principles, expertise, and social norms," but the balance of legal interests should be based on the need for data use in quarantine policies and urgent judgment in public health crises. Specifically, the speed and degree of transmission of infectious diseases in a crisis, whether the purpose can be achieved without processing sensitive information, whether it unfairly violates the interests of third parties or information subjects, and the effectiveness of introducing quarantine policies through processing sensitive information can be used as major evaluation factors. On the other hand, the collection, provision, and use of infectious disease data for research purposes will be used through pseudonym processing under the Personal Information Protection Act, consent under the Bioethics Act and deliberation by the Institutional Bioethics Committee, and data provision deliberation committee. Therefore, the use of research purposes is recognized as long as procedural validity is secured as it is reviewed by the pseudonym processing and data review committee, the consent of the information subject, and the institutional bioethics review committee. However, the burden on research managers should be reduced by clarifying the pseudonymization or anonymization procedures, the introduction or consent procedures of the comprehensive consent system and the opt-out system should be clearly prepared, and the procedure for re-identifying or securing security that may arise from technological development should be clearly defined.

The Need for Homomorphic Encryption to Protection Privacy (프라이버시 보호를 위한 동형암호의 필요성)

  • Seo, Jin-Beom;Cho, Young-Bok
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.10a
    • /
    • pp.47-49
    • /
    • 2021
  • According to the revision of the Data 3 Act in 2020, personal information of medical data can be processed anonymously for statistical purposes, research, and public interest record keeping. However, unidentified data can be re-identified using genetic information, credit information, etc., and personal health information can be abused as sensitive information. In this paper, we derive the need for homomorphic encryption to protect the privacy of personal information separated by sensitive information.

  • PDF

The Details and Outlook of Three Data Acts Amendment in South Korea: With a Focus on the Changes of Domestic Financial and Data Industry (데이터 3법 개정안의 내용과 전망: 국내 금융 및 데이터 산업계의 변화를 중심으로)

  • Kim, Eun-Chan;Kim, Eun-Young;Lee, Hyo-Chan;Yoo, Byung-Joon
    • Informatization Policy
    • /
    • v.28 no.3
    • /
    • pp.49-72
    • /
    • 2021
  • This study analyzes the major content, significances, and future outlook of Three Data Acts amendment enacted in August 2020 in South Korea, with the focus on their impact on the financial and data industries. It seems that the revision of the Credit Information Act will enable the specification of a business which had previously only been regulated as the business of credit inquiry, and also enable the domestic data industry to activate the MyData industry, data trading and platforms, and specify data pseudonymization and trading procedures. For the rational and efficient implementation of the amendments to the Three Data Acts, the Personal Information Protection Committee must be as transparent and lawful in its activities as possible, and fairness must be guaranteed. Even in the utilization of personal information, the development or complementation of the related data processing technologies is essential, and clear data processing methods and areas must be regulated. Furthermore, the amendments must be supported with guarantees and the systematization of a fair competitive system in the data market, stricter regulations on penalties for illegal acts related to data, establishment and strengthening of the related security systems, and reinforcement of the system of cooperation for data transfer.

Detection of Heat Change in Urban Center Using Landsat Imagery (Landsat 영상을 이용한 도심의 열변화 탐지)

  • Kang, Joon-Mook;Ka, Myung-Seok;Lee, Sung-Soon;Park, Joon-Kyu
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.28 no.2
    • /
    • pp.197-206
    • /
    • 2010
  • Recently, developed countries have continuously been trying to recognize many issues about heat island in urban area and to make up countermeasures for them. This research is designed to extract change of land cover in the area under condition of land development with satellite images and to analyze its effect on the heat change in there. Heat change upon change of land cover in daejeon was analyzed with the four Landsat satellite images taken in April 1985, August 1994, May 2001, and May 2009. In order to measure the temperature on the surface in the city, the land surface temperature was produced with Landsat TM Band 6. Heat change is to detected with it. As a result, The urban area has been increased up to 23.59 percent. On the other hand, the forest area has been decreased up to 27.91%. Due to the urbanization, the temperature on the surface in urban center was higher than surrounding area. In that case, the temperature of urban center area was higher 2.4 to $5.7^{\circ}C$ compared with the forest area.