• Title/Summary/Keyword: Anonymous

Search Result 435, Processing Time 0.024 seconds

Performance Improvement for Increased Communication Speed in Anonymous Network using GeoIP (GeoIP를 이용한 익명 네트워크에서 통신 속도 향상을 위한 성능 개선)

  • Park, Kwang-Cheol;Lim, Young-Hwan;Lim, Jong-In;Park, Won-Hyung
    • The Journal of Society for e-Business Studies
    • /
    • v.16 no.4
    • /
    • pp.75-85
    • /
    • 2011
  • Although progress in information technology has made our life prosperous. But it accompanied a number of adverse effects in various aspects. Especially, internet according to the increasing requirements for privacy and security, IP concealment network technologies to ensure the anonymity are constantly being developed. IP concealment network technologies is aiding the user to bypass the blocked sites can be used to access for information gathering, and they could be used for a malicious hacker to hide his attacks. However, due to complex routing path, local communication bandwidth sangyiham, and internode encryption there are also disadvantages that communication speed is significantly less. In this paper, the research for improving the performance of anonymous networks is to proceed by the communication speed measurement that using GeoIP the particular country with high-bandwidth is Specified or path length is limited.

Predictors of Successful Control for Selfishness, Dishonesty, Resentment and Fear (SDRF) among Korean Alcoholics Anonymous Members (익명의 알콜중독자(AA) 모임 참여군의 심리적 통제에 대한 예측인자 - 이기심, 부정직, 분노 및 두려움(SDRF) 통제를 중심으로 -)

  • Shin, Ein-Soon;Chung, Yoon-Chul;Kim, Han-Joong
    • Journal of Preventive Medicine and Public Health
    • /
    • v.34 no.1
    • /
    • pp.73-79
    • /
    • 2001
  • Objectives : To examine predictors of successful control for selfishness, dishonesty, resentment, and fear(SDRF) among Korean Alcoholics Anonymous(AA) members. Methods : This study was a cross-sectional study. The study group included members from 18 different AA groups which were enrolled in the Korean AA Association in 1998. 207 Out of 300 self administered questionnaires were completed by AA members (response rate 69.0%). Alcoholics who attended AA meetings were divided into two groups according to their self reported level of success in SDRF control; one with very successful experience after AA participation and the other with little or no success. In this study, the general characteristics, AA activities, relapse experience, and degree of effort exerted for SDRF control were compared between two groups. In order to study predictors of successful SDRF control after joining AA, 4 logistic regression analyses were performed for each of the 4 SDRF indices. Results : The proportion of those reporting a 'very successful' experience was 19.9% for selfishness, 20.7% for dishonesty, 25.5% for resentment, and 24.7% for fear. After control for the effect of general characteristics, the practice of the 12th step(taking alcoholics to an AA meeting after conveying messages) was found to be a significant predictor for the successful control of both selfishness(OR=6.04) and the dishonesty(OR=7.77). And individuals making every effort for SDRF control showed more successful control of selfishness(OR=4.10), dishonesty(OR=4.01, and fear(OR=34.89). Conclusions : Bivariate and multivariate analyses demonstrated that especially practicing the 12th step and making every effort themselves, may help alcoholics to control SDRF successfully after joining AA.

  • PDF

An Anonymous Authentication Scheme for Health Information Push Service Based on Indoor Location in Hospital (병원 실내 위치기반 의료정보 푸쉬 서비스를 위한 익명 인증 스킴)

  • Ahn, Hae-Soon;Yoon, Eun-Jun;Nam, In-Gil
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.5C
    • /
    • pp.410-419
    • /
    • 2012
  • This paper proposes a secure and efficient anonymous authentication scheme for health information push service based on indoor location in hospital. The proposed scheme has the following benefits: (1)It is just based on a secure one-way hash function for avoiding complex computations for both health care operations users and health care centers. (2)It does not require sensitive verification table which may cause health care centers to become an attractive target for numerous attacks(e.g., insertion attacks and stolen-verifier attacks), (3)It provides higher security level (e.g., secure mutual authentication and key establishment, confidential communication, user's privacy, simple key management, and session key independence). As result, the proposed scheme is very suitable for various location-based medical information service environments using lightweight-device(e.g., smartphone) because of very low computation overload on the part of both health care operations users and health care centers.

Peer to Peer Anonymous Protocol Based Random Walk (랜덤 워크 기반의 P2P 익명 프로토콜)

  • Cho, Jun-Ha;Rhee, Hyun-Sook;Park, Hyun-A;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.6
    • /
    • pp.65-76
    • /
    • 2007
  • The P2P file sharing system sends the results to users by searching the files in the shared folders. In the process of it, the problem is that the transferred information includes the pathname and file information and it can be revealed who searches which files. In related to this problem, anonymous file sharing P2P protocol has been an active research area where a number of works have been produced. However, the previous studies still have a few of weakness. Therefore, We propose two anonymous P2P file sharing protocols based on the decentralized and unstructured Random Walk. The first scheme uses the dynamic onion routing where the requester can receive the wanted file without knowing other peers' IDs. The second scheme uses the IP multicast method which lowers the computational overhead. Both of them are more suited for the dynamic P2P system.

Anonymous Electronic Promissory Note System Based on Blockchain (블록체인 기반 익명 전자 어음 시스템)

  • HyunJoo Woo;Hyoseung Kim;Dong Hoon Lee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.6
    • /
    • pp.947-960
    • /
    • 2023
  • In Korea, traditional paper promissory notes are currently undergoing a transformation, being gradually replaced by electronic notes. This transformation is being steered under the Korea Financial Telecommunications Institute, a trusted authority. However, existing electronic systems have security vulnerabilities, including the risk of hacking and internal errors within the institute. To this end, we have defined a novel anonymous electronic promissory note system based on blockchain. We have constructed a concrete protocol and conducted security analysis of our protocol. Note that, in our protocol, every note information is committed so that the note remains undisclosed until the point of payment. Once the note information becomes public on the blockchain, it enables the detection of illicit activities, such as money laundering and tax evasion. Furthermore, our protocol incorporates a feature of split endorsement, which is a crucial functionality permitted by the Korean electronic note system. Consequently, our proposed protocol is suitable for practical applications in financial transactions.

A Study on the Crime Investigation of Anonymity-Driven Blockchain Forensics (익명 네트워크 기반 블록체인 범죄 수사방안 연구)

  • Han, Chae-Rim;Kim, Hak-Kyong
    • Convergence Security Journal
    • /
    • v.23 no.5
    • /
    • pp.45-55
    • /
    • 2023
  • With the widespread use of digital devices, anonymous communication technologies such as the dark web and deep web are becoming increasingly popular for criminal activity. Because these technologies leave little local data on the device, they are difficult to track using conventional crime investigation techniques. The United States and the United Kingdom have enacted laws and developed systems to address this issue, but South Korea has not yet taken any significant steps. This paper proposes a new blockchain-based crime investigation method that uses physical memory data analysis to track the behavior of anonymous network users. The proposed method minimizes infringement of basic rights by only collecting physical memory data from the device of the suspected user and storing the tracking information on a blockchain, which is tamper-proof and transparent. The paper evaluates the effectiveness of the proposed method using a simulation environment and finds that it can track the behavior of dark website users with a residual rate of 77.2%.

A Study of Factors Affecting Group Polarization in Online Communication : Based on Anonymity (온라인 커뮤니케이션에서 집단극화 현상에 영향을 미치는 요인에 관한 연구: 익명성 관점에서)

  • Suh, Eung-Kyo
    • Journal of Distribution Science
    • /
    • v.13 no.2
    • /
    • pp.75-83
    • /
    • 2015
  • Purpose - This study aims to identify the effects of communication cues, anonymity, and social presence on group polarization in computer-mediated communication (CMC) settings. Extant literature has introduced some theoretical backgrounds of social presence and SIDE (Social Identity model of Deindividuation Effects) to explain the effects of communication cues and anonymity. The concept of social presence emphasized the mediating role on communication cues and anonymity. However, most literature did not measure social presence and compare group polarization of all condition groups. This does not sufficiently explain the result of group polarization. Research design, data, and methodology - We believe that the direct impact of anonymity on group polarization can provide a more admissible and clearer explanation for the results. In addition, this study categorizes anonymity into two levels, as anonymity of group and anonymity of self. To justify the anonymity view, a laboratory experiment was conducted. The experiment was conducted in communication cues settings (visual cue; without visual cue) and anonymity settings (identified; anonymous). Each of the four settings has 10 groups consisting of five subjects each (total 200 subjects). The subjects are undergraduates from a large university, majoring in business. All experimental procedures and calculations of choice shift and preference change follow the literature. Results - First, the removal of visual cues does not produce a significant impact on group polarization, which cannot be explained by the social presence view. Second, the anonymous condition does not significantly affect group polarization, which also cannot be explained by the social presence view. However, the anonymous condition directly affects group polarization. Specifically, anonymity of self has a stronger effect on group polarization than anonymity of group. The result explains about the leading factor affecting group polarization. This study examines another view of how computer-mediated communication may be associated with group polarization. The process and outcome data from the experiment reveal that group polarization is not affected by level of social presence, but by level of anonymity. Group discussions conducted with visual cue CMC setting and identified CMC setting result in weaker group polarization. Conversely, group discussions conducted without visual cue CMC setting and anonymous CMC setting lead to stronger group polarization. The results of the study have the following implications. First, they provide clues for business organizations to design the most appropriate media conditions and preemptive social conditions to implement when making group decisions through CMC, to maximize achievements, generate amicable agreements, or actively share information. Second, this study can be useful in analyzing different adverse effects generated through Internet use. Conclusions - This research can help explain discussions and decision-making actions on Internet forums, which have recently increased, as well as providing a foundational basis in newly establishing policies for the forums. Finally, it should be noted that many other factors such as group size, topics, and group history may affect group polarization. These should be examined in future studies.

Empirical Analysis of Political Communication Mode at Cyberspace (사이버 공간에서의 정치 커뮤니케이션 양식 분석 연구 : 제16대 공선 후보자 사이버 게시판 분석을 중심으로)

  • Hwang, Geun
    • Korean journal of communication and information
    • /
    • v.16
    • /
    • pp.207-254
    • /
    • 2001
  • This study is focused on forecasting the future of tole-democracy. Many Scholars expect that internet provides technological space needing realizing the tole-democracy or deliberate democracy. Especially in Korea, this expectation is higher than other nations because of political corruption and inefficiency. Therefore internet is intended to considering as new technologies reforming political process. In 16th the general election period, many candidates established home page and used as election campaign tool. And a little of home pages is payed attention to among voters. In spite of using internet as political medium, many political communication researchers have a doubt that internet will realize ideal direct democracy. It's reason is that internet is open and anonymous space. At anonymous space, communication participators is tended to be irresponsible and non-serious. Therefore it is hard that cyber-politics will be ideal type of democracy. In this context, this paper analyzed how pauicipators communicate with others at cyber bulletin board establishing candidate's home pages. Main research questions is how do discussions at cyberspace fulfill the conditions of deliberate democracy. Therefore, concrete questions include; who are participators at candidate's cyber bulletin board; which pattern do they communicate; what is the theme of communication; which effects do the anonymous character of cyberspace influence. To that purpose, this study conducted content analysis on 4,210 written matters at 82 cyber bulletin boards of candidate's home page establishing during 16th the general election period. It can be found that cyberspace in Korea still is not deliberate democracy space and not will be. Firstly, discussion patterns at cyber bulletin board is "candidate with supporters communication space. To be exact, it is said that candidate's home page is "the space of self-convincing among supporters." Secondly, the main themes of discussion are simple emotional expressions; "I support you!" "fighting" "Be vigor" etc. By contrast, real political contents'-central or local political matters - is relatively few. In the mode of expression, real political messages are more positive, logical than simple expressions, candidates private matters. Especially this characteristic will make cyberspace as "mutual slander space" consolidating anonymous characteristic of cyberspace. finally, Cyberspace in Korea still is not real "public sphere" realizing deliberate process. Therefore to be real public sphere, it is needed to participant's ethical maturity and political citizenship. In conclusion, it is difficult that cyberspace will reconstruct the Athene's Agora. On the contrary, Cyberagora will like to be irrespectable area fulfilling the sweeping. Making the deliberate space, technological possibility and ethical condition will have to be balanced together.

  • PDF

The Study on Effect of Alcoholics Anonymous for Anxiety and Depression (익명의 알코올 중독자 모임의 불안, 우울에 대한 효과 연구)

  • Kim, Hoi-Young;Son, Hyun-Soo;Kang, Ji-Hong;Shim, So-Ra;Park, Bo-Ra;Kim, Ji-Hwon;Kim, Tae-Heon
    • Journal of Oriental Neuropsychiatry
    • /
    • v.20 no.2
    • /
    • pp.71-84
    • /
    • 2009
  • Objectives : This study was performed to assess the benefits of Alcoholics anonymous program for anxiety and depression of alcoholics. And we investigate Sasang constitution in Alcoholics Anonymous(A.A.) members to study relation between alcoholic and constitution. Methods : 21 members of A.A. groups in korea who agreed to the purpose of this study were selected. We evaluated anxiety by BAl, depression by BDI-II and sasang constitution by QSCCII+. Results : The research result is as follows. 1. Eighteens of 21 A.A. members are men and the rest are women. First alcohol drinking age(mean) is 15. Getting alcohol drunk age(mean) is 20.9. 2. The duration of alcohol drinking before A.A. participation(mean) is 20.2 years. The duration of giving up drinking after A.A. participation(mean) is 26.5 months. 3. A.A. program significantly reduced anxiety of A.A. members from 10.43${\pm}$1.37(mean${\pm}$S.E.)(light anxiety) to 6.86${\pm}$1.24(normal). 4. A.A. program significantly reduced depression of A.A. members from 4.14${\pm}$1.14(mean${\pm}$S.E)(normal) to 2.33${\pm}$0.75(normal) in the statistics, but it does not have the meaning clinically. 5. Sasang constitution classification result was Taeum group 10 people(47.6%), Soyang group 9 people(42.9%), Soeum group 2peopleC9.5%), Taeyang group 0 people(0%), Taeum group and Soyang group were relatively more than Soeum group. Conclusions : Participation in the A.A. program reduce anxiety and depression of A.A. members. This research provide data on positive effect of A.A. program and may prove that the self-help program(A.A.) can help to maintain long term sobriety and improve the quality of life of its members.

  • PDF

Provisioning Anonymous Communication in Ad Hoc Networks (Ad Hoc 네트워크상에서 익명성을 보장하는 방법에 관한 연구)

  • Kang, Seung-Seok
    • Journal of the Korea Society for Simulation
    • /
    • v.15 no.1
    • /
    • pp.77-85
    • /
    • 2006
  • The cost of downloading content from the Internet may be costly for mobile device users using its 3G connection, because the 3G connection cost to download data from the Internet is a function of the amount of data downloaded. This paper introduces an approach in which mobile devices, called peers, form an ad hoc network and share their downloaded content with others. As an example, spectators may want to collect/share information about players and game records in a stadium. In an art gallery, visitors may want to retrieve some background information about the displayed work from the nearby ad hoc network. In an outdoor class, a teacher may download today's topic files from the Internet, and all students may share the content with minimal or no cost paid. This is possible if mobile device has both a 3G interface and a wireless LAN interface. If the peers want to improve privacy md discourage traffic analysis when sharing content, this paper describes a low-delay anonymous connection between the sending peer and the receiving peer using two additional peers. Simulation results show that the transmission time overhead of the anonymous connection may increase 50% or less as the number of peers increase or the peers are scattered over the larger area.

  • PDF