• Title/Summary/Keyword: 궤적 정보 보호

Search Result 11, Processing Time 0.02 seconds

k-oATY for considering Obstacles in Continuous Queries (연속적인 질의에서 장애물을 고려한 k-oATY)

  • Song, Doo-Hee
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2022.05a
    • /
    • pp.233-235
    • /
    • 2022
  • 서비스 제공자는 사용자의 위치를 기반으로 용이한 정보를 제공한다. 과거에는 사용자가 질의를 요청하는 순간(snapshot)에 대해 사용자의 위치를 보호하는 기법들이 주를 이루었다면 최근에는 연속적인 질의를 요청할 때 사용자의 위치를 보호하는 기법들이 연구되고 있다. 그러나 연속적인 질의처리는 시간별로 요청되는 질의의 묶음으로서 영역을 보호할 수 있으나 영역을 연결할 경우 사용자의 궤적이 노출되는 문제가 발생할 수 있다. 가장 최근 연속적인 질의에서 이동 궤적을 보호하는 k-ATY가 제안되었지만 사용자와 동일한 이동 속도와 일정한 방향을 기준으로 더미를 생성하기 때문에 장애물(다리, 건물 등)이 있을 경우 더미의 위치가 노출될 수 있다. 본 논문에서는 이러한 문제점을 개선하기 위하여 장애물을 고려한 k-oATY 기법을 제안하고 기존기법과 비교한다.

Grid-based Trajectory Cloaking Method for protecting Trajectory privacy in Location-based Services (위치기반서비스에서 개인의 궤적 정보를 보호하기 위한 그리드 기반 궤적 클로킹 기법)

  • Youn, Ji-hye;Song, Doo-hee;Cai, Tian-yuan;Park, Kwang-jin
    • Journal of Internet Computing and Services
    • /
    • v.18 no.5
    • /
    • pp.31-38
    • /
    • 2017
  • Recently with the rapid development of LBS (Location-based Services) technology, approaches of protecting user's location have gained tremendous attentions. For using LBS, users need to forward their real locations to LBS server. However, if the user sends his/her real location to LBS server, the server will have the all the information about user in LBS. Moreover, if the user opens it to LBS server for a long time, the trajectory of user may be released. In this paper, we propose GTC (Grid-based Trajectory Cloaking) method to address the privacy issue. Different from existing approaches, firstly the GTC method sets the predicting trajectory and divides the map into $2^n*2^n$ grid. After that we will generate cloaking regions according to user's desired privacy level. Finally the user sends them to LBS server randomly. The GTC method can make the cost of process less than sequential trajectory k-anonymity. Because of confusing the departure and destination, LBS server could not know the user's trajectory any more. Thus, we significantly improve the privacy level. evaluation results further verify the effectiveness and efficiency of our GTC method.

Enhanced Grid-Based Trajectory Cloaking Method for Efficiency Search and User Information Protection in Location-Based Services (위치기반 서비스에서 효율적 검색과 사용자 정보보호를 위한 향상된 그리드 기반 궤적 클로킹 기법)

  • Youn, Ji-Hye;Song, Doo-Hee;Cai, Tian-Yuan;Park, Kwang-Jin
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.7 no.8
    • /
    • pp.195-202
    • /
    • 2018
  • With the development of location-based applications such as smart phones and GPS navigation, active research is being conducted to protect location and trajectory privacy. To receive location-related services, users must disclose their exact location to the server. However, disclosure of users' location exposes not only their locations but also their trajectory to the server, which can lead to concerns of privacy violation. Furthermore, users request from the server not only location information but also multimedia information (photographs, reviews, etc. of the location), and this increases the processing cost of the server and the information to be received by the user. To solve these problems, this study proposes the EGTC (Enhanced Grid-based Trajectory Cloaking) technique. As with the existing GTC (Grid-based Trajectory Cloaking) technique, EGTC method divides the user trajectory into grids at the user privacy level (UPL) and creates a cloaking region in which a random query sequence is determined. In the next step, the necessary information is received as index by considering the sub-grid cell corresponding to the path through which the user wishes to move as c(x,y). The proposed method ensures the trajectory privacy as with the existing GTC method while reducing the amount of information the user must listen to. The excellence of the proposed method has been proven through experimental results.

Travel mode classification method based on travel track information

  • Kim, Hye-jin
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.12
    • /
    • pp.133-142
    • /
    • 2021
  • Travel pattern recognition is widely used in many aspects such as user trajectory query, user behavior prediction, interest recommendation based on user location, user privacy protection and municipal transportation planning. Because the current recognition accuracy cannot meet the application requirements, the study of travel pattern recognition is the focus of trajectory data research. With the popularization of GPS navigation technology and intelligent mobile devices, a large amount of user mobile data information can be obtained from it, and many meaningful researches can be carried out based on this information. In the current travel pattern research method, the feature extraction of trajectory is limited to the basic attributes of trajectory (speed, angle, acceleration, etc.). In this paper, permutation entropy was used as an eigenvalue of trajectory to participate in the research of trajectory classification, and also used as an attribute to measure the complexity of time series. Velocity permutation entropy and angle permutation entropy were used as characteristics of trajectory to participate in the classification of travel patterns, and the accuracy of attribute classification based on permutation entropy used in this paper reached 81.47%.

디파이의 금융권 제도화 패러다임 전환: 기술적 접근

  • Heesang Kim;Dohoon Kim
    • Review of KIISC
    • /
    • v.34 no.1
    • /
    • pp.21-25
    • /
    • 2024
  • 최근 몇 년 동안 탈중앙화 금융(DeFi)은 블록체인 기술의 혁신적인 사용을 통해 금융 부문의 지형을 재정의할 획기적인 세력으로 부상했다. 본 연구는 DeFi의 제도화를 향한 패러다임 전환에 대한 포괄적인 기술적 분석을 제시하며, DeFi가 전통적인 금융 시스템을 혼란에 빠뜨리고 글로벌 경제 프레임워크를 재구성할 수 있는 잠재력을 강조한다. 본 연구에서 스마트 계약, 분산형 자율 조직(DAO) 및 합의 알고리즘을 포함한 DeFi 핵심 기술의 복잡성을 조사하고 이러한 요소가 어떻게 집합적으로 보다 개방적이고 투명하며 포용적인 금융 생태계를 조성하는지 탐구한다. 주요 고려 사항에는 규제 장애물, 보안 문제, 확장성 문제, 혁신과 소비자 보호 간의 균형이 포함된다. 금융 포괄성, 특히 은행 서비스를 받지 못하는 인구와 은행 서비스를 받지 못하는 인구에게 금융 서비스에 대한 접근을 제공하는 역량 측면에서 DeFi의 혁신적인 잠재력에 대해 논의하여 일드 파밍, 유동성 채굴, 분산형 대출 등 새로운 금융 상품 및 서비스를 도입하는 데 있어 DeFi의 역할을 평가하여 소비자와 기존 금융 기관 모두에 미치는 영향을 강조한다. DeFi의 기술 기반과 기관 금융 프레임워크 내에서 급성장하는 역할에 대한 자세한 조사를 제공함으로써 본 논문은 금융의 미래 궤적과 글로벌 경제 시스템의 진화하는 역학에 대한 귀중한 통찰력을 제공하는 것을 목표로 한다.

On Routing for Enhancing Destination-Location Privacy in Wireless Sensor Networks (무선 센서 네트워크에서의 도착지 위치 기밀을 강화하는 라우팅)

  • Tscha, Yeong-Hwan
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.7
    • /
    • pp.1715-1722
    • /
    • 2010
  • In this paper we consider methods for selecting the next tracing node that take advantage of the history of traced positions during the packet-tracing. In the meantime, the proposed routing strategy that counters the tracing is to design the routing path is such a way that nodes on it are not close to the nodes whose location privacy is needed and zigzag or back-and-forth movements hardly take place. In simulations, the ratios of successful tracing were largely improved. It was shown that our routing scheme allows more data packets to be delivered to the destination while, enticing the tracer to move more long distances in the presence of multiple assets.

Loitering Behavior Detection Using Shadow Removal and Chromaticity Histogram Matching (그림자 제거와 색도 히스토그램 비교를 이용한 배회행위 검출)

  • Park, Eun-Soo;Lee, Hyung-Ho;Yun, Myoung-Kyu;Kim, Min-Gyu;Kwak, Jong-Hoon;Kim, Hak-Il
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.6
    • /
    • pp.171-181
    • /
    • 2011
  • Proposed in this paper is the intelligent video surveillance system to effectively detect multiple loitering objects even that disappear from the out of camera's field of view and later return to a target zone. After the background and foreground are segmented using Gaussian mixture model and shadows are removed, the objects returning to the target zone is recognized using the chromaticity histogram and the duration of loitering is preserved. For more accurate measurement of the loitering behavior, the camera calibration is also applied to map the image plane to the real-world ground. Hence, the loitering behavior can be detected by considering the time duration of the object's existence in the real-world space. The experiment was performed using loitering video and all of the loitering behaviors are accurately detected.

Evaluation of Freeway Mobile Work Zone Safety using Driving Simulations (주행 시뮬레이션을 활용한 고속도로 이동공사 안전성평가)

  • Park, Hyunjin;Oh, Cheol;Moon, Jaepil
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.16 no.6
    • /
    • pp.124-140
    • /
    • 2017
  • There exists a limitation to provide proper advance information for safe maneuvering through guidance and caution signs in freeway mobile work zones, unlike fixed work zones. Although a work-protection vehicle is currently deployed at the rear of the work vehicle, more active countermeasures to prevent crashes are required. The purpose of this study was to propose a method to evaluate the safety in mobile work zones and to present effective countermeasures. Driving simulation experiments were conducted to analyze characteristics of driver's behavior in mobile and fixed work zones. Safety distance index (SDI) based on the comparison of stopping distances of a work-protection vehicle and a following subject vehicle was used to evaluate traffic safety. More dangerous driving behavior was observed in the mobile work zone. Especially, it was identified that the lane-change of vehicles following the work- protection vehicle was late. Therefore, it is necessary to actively introduce methods to provide warning information so that the driver can recognize the work-protection vehicle in advance and carry out appropriate evasive maneuvers.

Safety Analysts of Slide-up Seat for the Elder and the Handicapped (노약자를 위한 슬라이드엎 시트의 안전도 분석)

  • 이수철;임구
    • Proceedings of the Korea Society of Information Technology Applications Conference
    • /
    • 2002.11a
    • /
    • pp.487-489
    • /
    • 2002
  • Recently, mobility and accessibility occurs for the elder and the handicapped in the aging problem. In this paper, we analyze the dynamics of slide-up seat, which helps to care the handicapped passenger in and out the automobile when we enjoy trip with the families including the elder and handicapped. We check the trajectories of slide-up seat inside and outside car to protect its corrosion and the stress at the joints of mechanical structure. Those can be helped to keep the safety and accuracy of the multiple dynamic systems for precision quality assurance in mass production.

  • PDF

Safety Analysis of Slide-up Seat for the Elder and the Handicapped (노약자를 위한 슬라이드엎 시트의 안전도 분석)

  • Lee, Soo-Cheol;Lim, Goo
    • Proceedings of the Korea Society for Industrial Systems Conference
    • /
    • 2002.11a
    • /
    • pp.487-489
    • /
    • 2002
  • Recently, mobility and accessibility occurs for the elder and the handicapped in the aging problem. In this paper, we analyze the dynamics of slide-up seat, which helps to care the handicapped passenger in and out the automobile when we enjoy trip with the families including the elder and handicapped. We check the trajectories of slide-up seat inside and outside car to protect its corrosion and the stress at the joints of mechanical structure. Those can be helped to keep the safety and accuracy of the multiple dynamic systems for precision quality assurance in mass production.

  • PDF