• Title/Summary/Keyword: 개인정보침해

Search Result 609, Processing Time 0.026 seconds

Analysis of Al-Saggaf et al's Three-factor User Authentication Scheme for TMIS

  • Park, Mi-Og
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.9
    • /
    • pp.89-96
    • /
    • 2021
  • In this paper, we analyzed that the user authentication scheme for TMIS(Telecare Medicine Information System) proposed by Al-Saggaf et al. In 2019, Al-Saggaf et al. proposed authentication scheme using biometric information, Al-Saggaf et al. claimed that their authentication scheme provides high security against various attacks along with very low computational cost. However in this paper after analyzing Al-Saggaf et al's authentication scheme, the Al-Saggaf et al's one are missing random number s from the DB to calculate the identity of the user from the server, and there is a design error in the authentication scheme due to the lack of delivery method. Al-Saggaf et al also claimed that their authentication scheme were safe against a variety of attacks, but were vulnerable to password guessing attack using login request messages and smart cards, session key exposure and insider attack. An attacker could also use a password to decrypt the stored user's biometric information by encrypting the DB with a password. Exposure of biometric information is a very serious breach of the user's privacy, which could allow an attacker to succeed in the user impersonation. Furthermore, Al-Saggaf et al's authentication schemes are vulnerable to identity guessing attack, which, unlike what they claimed, do not provide significant user anonymity in TMIS.

K-Anonymity using Hierarchical Structure in Indoor Space (실내공간에서 계층 구조를 이용한 K-익명화)

  • Kim, Joon-Seok;Li, Ki-Joune
    • Spatial Information Research
    • /
    • v.20 no.4
    • /
    • pp.93-101
    • /
    • 2012
  • Due to complexity of indoor space, the demand of Location Based Services (LBS) in indoor space is increasing as well as outdoor. However, it includes privacy problems of exposing personal location. Location K-anonymity technology is a method to solve the privacy problems with cloaking their locations by Anonymized Spatial Region(ASR). It guarantees K users within a region containing the location of a given user. However previous researches have dealt the problems based on Euclidean distance in outdoor space, and cannot be applied in indoor space where there are constraints of movement such as walls. For this reason, we propose in this paper a K-anonymity for cloaking indoor location in consideration of structures and representation of indoor space. The basic concept of our approach is to introduce a hierarchical structure as ASR for including K-1 users for cloaking their locations. We also proposed a cost model by K and attributes of hierarchical structure to analyze the performance of the method.

Random Digit Dialing Telephone Survey and Major Findings (RDD 전화조사와 주요결과)

  • Kang, H.C.;Han, S.T.;Kim, J.Y.;Jung, Y.C.;Huh, M.H.
    • Survey Research
    • /
    • v.9 no.1
    • /
    • pp.1-22
    • /
    • 2008
  • Telephone directories ille still being used as the sampling frame in almost all fixed-line telephone surveys in Korea, causing potentially serious coverage error. RDD (random digit dialing) sampling is an obvious alternative to solve the problem. The aim of this paper is twofold: 1) proposal of RDD methodology suitable to the telephone system of Korea and 2) the identification of socio-demographic and socio-psychological differences between listed-number and unlisted-number respondents. Major findings of RDD telephone survey conducted experimental]y are as follows. 1) Population coverage by telephone directories is 60% or less. 2) Unlisted-number households have statistically larger income compared to listed-number households. 3) Unlisted-number households have smaller family size compared to listed-number households. 4) Unlisted-number respondents are more sensitive about confidentiality, leaks, 5) Unlisted-number respondents are more liberal compared to unlisted-number respondents. These facts suggest that directory-based telephone surveys tend to be biased in socio-economic aspects.

  • PDF

A Study about problem and a correspondence strategy along a beauty culture-Ubiquitous implementation (미용 부분의 유비쿼터스 구현에 따른 문제점과 대응전략에 관한 연구)

  • Lim Jin-Sook;Kang Jang-Mook
    • Journal of Digital Contents Society
    • /
    • v.5 no.3
    • /
    • pp.163-170
    • /
    • 2004
  • Ubiquitous is an agriculture revolution, the Industrial Revolution, the fourth revolution to equal an information revolution are Ubiquitous. Historic agriculture was revolutionary, but the Industrial Revolution was a revolution of the physics space that was a base of a mankind civilization, and the informatization revolution that Cyber Space saw a prime while world wide web service was expended was a revolution of cyber space. Be charmed with this, and, as for the Ubiquitous revolution, it is achieved a physics space and an intelligent union of cyber space in the space where an off-line space was integrated with compunction on-line. It is combined with a life space naturally, and Ubiquitous technology. Also, I presented the plan that derivation tried a problem about Ubiquitous, and can solve an each problem. Specially, infringement about personal privacy very has a lot of possession to occur in the world that radio communication between all appliances is possible. It is Ubiquitous by becoming the data which is useful to thorough preparation about the Ubiquitous world to come with presenting policy a little technical solution plan about this to the future Republic of Korea. many company has been cracked by crackers information security and everyday new computer virus come out.

  • PDF

Method to Reduce the Time when Identifying RFID Tag by using Computational Grid (계산 그리드를 이용한 대량의 RFID 태그 판별 시간 단축 방법)

  • Shin, Myeong-Sook;Lee, Joon
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.5 no.5
    • /
    • pp.547-554
    • /
    • 2010
  • RFID is core technology to lead ubiquitous computing, and attract the notice of the world. It also improves social transparency, creates employment, and invigorates the allied industries. However, The technical characteristic with RFID has some problems with security and privacy. The commercialization of RFID is delayed due to these problems. This paper introduces the technical method to find solutions about an invasion of privacy to be due to introduce RFID system. First, this method applies Hash-Chain proposed by M. Ohkubo and some other researchers. The more tags increase, the more it demands lots of computation time. We divide SPs equally to solve these problems. And then, We'll suggest solutions to shorten the identification time of tag by implementing SPs with multi nodes of Grid environment at the same time. This makes it possible to keep the privacy protection of RFID tag, and process RFID tag in real time at the same time.

A Study on Violence and Countermeasures on Cyberspace Corruption (부패범죄의 현황과 대책연구:사이버폭력을 중심으로)

  • Kim, Taek
    • The Journal of the Convergence on Culture Technology
    • /
    • v.5 no.1
    • /
    • pp.51-58
    • /
    • 2019
  • This study focused on violent act, such as verbal offensive and other acts of violence such as cyber bullying, personal information infringement. Online bullying is seriously taking place online, as juvenile violence is seriously debated due to recent school violence. In particular, it is necessary to seek countermeasures by considering the nature of cyber violence in cyberspace, particularly when stalking victims in cyberspace have died from stalking. The study examines the problem of defamation and defamation of character and tries to identify problems. Measures were taken to enact cyber defamation laws. To this end, the Commission analyzed cases of defamation and defamation of character and considered legal precedents. The study intends to study cyber defamation and defamation of character. First, I want to differentiate between cyber libel and defamation of character. Second, I intend to raise the need for cyber defamation of cybercrime and consider the offence of contempt for the criminal justice system. Third, seek ways to protect against cyber defamation and defamation of character.

A Study on Vulnerability Factors of The Smart Home Service ('스마트홈 서비스'의 보안취약요인에 관한 연구)

  • Jeon, Jeong Hoon
    • Convergence Security Journal
    • /
    • v.20 no.4
    • /
    • pp.169-176
    • /
    • 2020
  • Recently, the era in which various services using smart devices are used is sometimes referred to as the so-called "smart era". Among these, Smart Home Service' have not only brought about significant changes in the residential environment and culture, but are evolving very rapidly. and The 'Smart Home Service' provides more convenient services to users through communication between various electronic products in general homes, and has a bright future in the future. In particular,'Smart Home Service' provides various services combined based on IoT(Internet of Things) technology and wired/wireless communication in connection between various devices. However, such a "smart home service" inherits the security vulnerabilities of the underlying technologies such as the Internet of Things and wired and wireless communication technologies, and accidents that lead to the leakage of personal information and invasion of privacy continue to occur. So, it is necessary to prepare a countermeasure and prevention against the weak factors of the underlying technologies. Therefore, this paper is expected to be used as basic data for future application technology development and countermeasure technology by examining various security vulnerability factors of 'Smart Home Service'.

Cloud security authentication platform design to prevent user authority theft and abnormal operation during remote control of smart home Internet of Things (IoT) devices (스마트 홈 사물인터넷 기기(IoT)의 원격제어 시 사용자 권한 탈취 및 이상조작 방지를 위한 클라우드 보안인증 플랫폼 설계)

  • Yoo Young Hwan
    • Convergence Security Journal
    • /
    • v.22 no.4
    • /
    • pp.99-107
    • /
    • 2022
  • The use of smart home appliances and Internet of Things (IoT) devices is growing, enabling new interactions and automation in the home. This technology relies heavily on mobile services which leaves it vulnerable to the increasing threat of hacking, identity theft, information leakage, serious infringement of personal privacy, abnormal access, and erroneous operation. Confirming or proving such security breaches have occurred is also currently insufficient. Furthermore, due to the restricted nature of IoT devices, such as their specifications and operating environments, it is difficult to provide the same level of internet security as personal computers. Therefore, to increase the security on smart home IoT devices, attention is needed on (1) preventing hacking and user authority theft; (2) disabling abnormal manipulation; and (3) strengthening audit records for device operation. In response to this, we present a plan to build a cloud security authentication platform which features security authentication management functionality between mobile terminals and IoT devices.

Analysis on the Operation Status of National Education Information System (교육행정정보시스템의 운영실태분석)

  • Lee Dae-Sik;Jeong Ju-Young
    • Journal of Internet Computing and Services
    • /
    • v.7 no.4
    • /
    • pp.115-122
    • /
    • 2006
  • The purpose of this paper is to suggest the improving plans about the system as searching an effective managing devices for NEIS with analysis of managing condition. For the plans, questionnaire was performed in the five sections to primary and secondary school teachers. Those were recognition about C/S, Introduction and conductive processing of NEIS, Satisfaction of specific task on school affairs and educational matters, its function, efficiency and security as well as technical problem. Those were recognition about C/S, Introduction and conductive processing of NEIS, Satisfaction of specific task on school affairs and educational matters, its function, efficiency and security as well as technical problem. The results are following: First. in spite of satisfaction with function of C/S, it have been some problems such as frequent patch and down of server. Secondly, although the introduction of NEIS was done in hurry without gathering teachers' opinions and sufficient research of system, it has been expected to settle down normally with correction and security. Thirdly, positive reaction was generally showed in research on satisfaction of specific task for school affairs and educational matters. Fourthly, most of teachers have known the functions of NEIS and recognized its convenience. Although they has not thought it reduced their work, they have realized it's convenient for dealing with statistics. Lastly, they think of NEIS as the essential system for the age of information, in spite of problems such as reveal of personal data and security. Therefore, we should keep eyes to problem of an invasion of human right. In addition, study deep into NEIS should be conducted with consistent security for the system. In order to it. technical and legal system should be carried out side by side.

  • PDF

An Empirical Analysis on the Operating System Update Decision Factors according to Age and Gender (연령과 성별에 따른 운영체제 업데이트 실시여부 실증분석)

  • Kim, Sunok;Lee, Mina
    • Journal of the Korean Data Analysis Society
    • /
    • v.20 no.6
    • /
    • pp.3117-3126
    • /
    • 2018
  • The operating system update is a basic step to maintain a safe internet use environment. This study analyzed whether the implementation of the operating system update was related to gender and age group during the violation accident prevention act in relation to information protection on the internet, and tried to verify the validity of these factors by analyzing the influence of gender and age group. In this study, logistic regression analysis was conducted based on the information security survey data surveyed by the Korea Internet & Security Agency in 2016. As a result, gender and age were surveyed as factors related to the implementation of operating system updates. As a result of analyzing the impact on the implementation of operating system updates by gender, it is estimated that the odds are 0.419 times higher for women than for men. According to the analysis of the operating system update by age group based on the 50s, which is a vulnerable group of information, the result is that the odds are 13.266 times higher in the 20s than the 50s.