• Title/Summary/Keyword: Data Sovereignty

Search Result 30, Processing Time 0.021 seconds

Trends in Personal Data Storage Technologies for the Data Economy (데이터 경제를 위한 개인 데이터 저장 기술 동향)

  • Jung, H.Y.;Lee, S.Y.
    • Electronics and Telecommunications Trends
    • /
    • v.37 no.5
    • /
    • pp.54-61
    • /
    • 2022
  • Data are an essential resource for artificial intelligence-based services. It is considered a vital resource in the 4th industrial revolution era based on artificial intelligence. However, it is well-known that only a few giant platforms that provide most of the current online services tend to monopolize personal data. Therefore, some governments have started enforcing personal data protection and mobility regulations to address this problem. Additionally, there are some notable activities from a technical perspective, and Web 3.0 is one of these. Web 3.0 focuses on distributed architecture to protect people's data sovereignty. An important technical challenge of Web 3.0 is how to facilitate the personal data storage technology to provide valuable data for new data-based services while providing data for producers' sovereignty. This study reviews some currently proposed personal data storage technologies. Furthermore, we discuss the domestic countermeasures from MyData perspective, which is a typical project for data-based businesses in Korea.

Secure De-identification and Data Sovereignty Management of Decentralized SSI using Restructured ZKP (재구성된 영지식 증명을 활용한 탈중앙형 자기 주권 신원의 안전한 비식별화 및 데이터 주권 관리)

  • Cho, Kang-Woo;Jeon, Mi-Hyeon;Shin, Sang Uk
    • Journal of Digital Convergence
    • /
    • v.19 no.8
    • /
    • pp.205-217
    • /
    • 2021
  • Decentralized SSI(Self Sovereign Identity) has become an alternative to a new digital identity solution, but an efficient de-identification technique has not been proposed due to the unique algorithmic characteristics of data transactions. In this study, to ensure the decentralized operation of SSI, we propose a de-identification technique that does not remove identifiers by restructuring the verification results of ZKP (Zero Knowledge Proof) into a form that can be provided to the outside by the verifier. In addition, it is possible to provide restructured de-identification data without the consent of data subject by proposing the concept of differential sovereignty management for each entity participating in verification. As a result, the proposed model satisfies the domestic personal information protection law in a decnetralized SSI, in addition provides secure and efficient de-identification processing and sovereignty management.

A Study on the Establishment of the Fresh Water Plant Industry for the Response of the Nagoya Protocol (나고야의정서 대응을 위한 담수식물 산업화 방향 설정 연구)

  • Ryu, Yoon-Jin;Cho, Dong-Gil;Kim, Sang-Cheol;Shin, Su-Young;Cho, Soo-Hyun
    • Journal of the Korean Society of Environmental Restoration Technology
    • /
    • v.20 no.6
    • /
    • pp.161-180
    • /
    • 2017
  • As the competition for securing cross-border biological sovereignty becomes intensified due to the adoption of the Nagoya Protocol, this study analyzed patent trends only for freshwater plants in order to secure national biological sovereignty. As a result, freshwater plants include a total of 68 genera and 128 species, and a total of 60 genera and 3,256 patents were surveyed. Among them, iris was the most industrialized, 14.71% followed by angelica(8.48%) and Mentha(6.94%). However, unconfirmed eight genera (Aneilema, Artemisia Cabomba, Nymphoides, Pistia stratiotes L., Pseudoraphis Griff., Ruppia) are not patented freshwater plants and it is expected that patent entry is high and barrier is low in the future. Based on patent results, Cooperative Patent Classification analysis was carried out and as a result, a total of 15 industry sectors were derived. And biopharmaceutical(30.24%) was found to be the most industrialized industry sector followed by agricultural chemistry (28.89%), biochemical industry (16.25%). In the biomedical industry, angelica(17.74%) was the most used and Iris (9.55%), Sium(20.56%) and angelica (20.48%) were found to be the most used in agricultural chemistry, biochemical industry and bio food industry, respectively. The analysis of detailed industry fields for 15 industry sectors showed that medicines of unknown structure containing substances from plants (37.77%), raw materials (46.57%) such as insect repellants, attracting agents and preparation of peptides(16.82%) with more than 21 amino acids were most frequently used in biopharmaceutical, agricultural chemistry and biochemical industry, respectively. This study is of significance as a basic data to know which freshwater plants are used in which field in order to secure biological sovereignty and patent analysis is considered necessary to continuously secure the biological sovereignty for freshwater plants.

A Study on Strengthening Personal Information Sovereignty through Analysis of Domestic Service Cases and Research Projects of Self-Sovereign Identity Technology (자기주권신원기술의 국내 서비스 사례 및 연구 과제 분석을 통한 개인정보 주권 강화 방안연구)

  • Lee, Jeong-Hyeon;Kim, Ji-Won;Kim, Chul-Soo;Yang, Jin-hong
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.13 no.6
    • /
    • pp.575-589
    • /
    • 2020
  • Along with the exponential growth of data businesses, the importance of data containing personal information of use have also increaseing. Particularly, in Korea, as the Data 3 Act was implemented, companies can use personal information more actively through regulatory improvement and stipulation in case of using data containing personal information. In this situation as per the service use, self-sovereign identity technology has emerged that can minimize the provision of personal information in relation to real name authentication and provision of personal information. Recently, services and studies using blockchain have been actively conducted in case of using the self-sovereign identity function for clarity and verification of records according to the use of personal information. In this thesis, by analyzing the characteristics of domestic self-sovereign identity service and the current status and contents of research related to blockchain-based self-sovereign identity technology and we suggest a research direction based on self-sovereign identity technology to reinforce the sovereignty of personal information in the era of the 3rd Data Act do.

Big Data Conceptualization and Policy Design on Data Sovereignty (빅데이터의 개념적 논의와 데이터 주권에 대한 정책설계)

  • Moon, Hyejung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2013.05a
    • /
    • pp.911-914
    • /
    • 2013
  • 빅데이터가 이전의 대용량정보와 비교하여 어떠한 개념적인 의미를 지니는지 정책설계과정에 따라 이론적으로 논의하고, 이 시대 이슈가 되는 데이터 주권에 대하여 저작권과 CCL을 사례로 ICT정책의 설계방안을 제시한다. 사례분석의 결과 빅데이터 시대 데이터 주권에 대한 정책은 법, 시장, 기술, 규범 측면에서 균형 있게 설계되어야 하며 기술구조를 기초로 사회문제에 대한 규제구조를 설계하고 정책을 집행해야 한다.

An Exploration and Consideration for New Consumer Sovereignty Era in the 21th Century -Focused on the Consumers' Information Gap- (21세기 신소비자주권시대를 위한 탐색과 고찰: 소비자정보격차의 실태)

  • Yoo, Hyun-Jung
    • Korean Journal of Human Ecology
    • /
    • v.17 no.2
    • /
    • pp.279-292
    • /
    • 2008
  • The concept of "new consumer sovereignty" is playing a significant role in having the initiative of production and consumption of technology and culture trend. Today the 'new consumers' positively use digital and information technology in purchasing. To understand these consumers' new purchase tendency, the study examined the actual conditions 1) of consumers' use of digital and information technology, 2) of digital devide between consumers, and 3) the consumer's attitude to changes of their lifestyle which digital convergence could result in. The subjects were thousand male and female adults. The data were collected from a survey conducted by Embrain, a research firm in Seoul, in the period of June 1st, 2007 ${\sim}$ June 10th, 2007. The results show: 1. Most subjects have computers, their Internet use is their general life, and they have lots of exposure opportunities to digital information. They positively and actively use information technology. 2. Between male and female subjects, and between old and young generation there is a significant digital gap. But the gap between regional areas is statistically not significant. 3. The subject's attitude to digital convergence society shows both positive expectation and negative concerns. Concludingly, to embody a desirable digital convergence society, it is necessary to be searched the ways which can decrease the digital gap and policy to share benefit that information technology can give to consumers.

A Study on the right to data portability for data sovereignty triggered by the GDPR enforcement (GDPR시행에 따른 데이터 주권강화를 위한 개인정보 이동권에 관한 연구)

  • Jeon, Ju-Hyun;Rhee, Kyung-Hyune
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2018.10a
    • /
    • pp.300-303
    • /
    • 2018
  • 유럽연합(EU)의 GPDR(개인정보보호일반규정)시행에 따라 개인정보를 활용하는 사업자 입장에서는 개인정보 보호도 중요하지만 활용측면에 더 많은 관심을 보이고 있다. 개인정보 보호와 활용에 따른 균형점을 찾는 제도적 정착을 위해 개인정보 이동권에 대한 요구가 생겼다. 국내 개인정보 관련 법률에는 아직 근거가 없으며 개인정보처리자의 독립적 데이터 보유에 따른 책임 강화와 정보주체가 자신의 데이터를 관리하는 권리를 가지고 데이터 활용을 할 수 있는 개인정보 자기결정권이 더 요구된다. 이에 따라 본 논문에서는 GDPR의 개인정보 이동권에 대한 현황 및 준수사항을 알아보고 각 나라별 개인정보 이동(data portability)에 따른 개인정보 활용방안과 고려사항을 제시하고자 한다. 개인정보이동에 한 형태로 국내 마이데이터 시범 사업이 정착하기 위한 법칙, 기술적 대응사항을 제시하고자 한다.

Implementation of Search Engine to Minimize Traffic Using Blockchain-Based Web Usage History Management System

  • Yu, Sunghyun;Yeom, Cheolmin;Won, Yoojae
    • Journal of Information Processing Systems
    • /
    • v.17 no.5
    • /
    • pp.989-1003
    • /
    • 2021
  • With the recent increase in the types of services provided by Internet companies, collection of various types of data has become a necessity. Data collectors corresponding to web services profit by collecting users' data indiscriminately and providing it to the associated services. However, the data provider remains unaware of the manner in which the data are collected and used. Furthermore, the data collector of a web service consumes web resources by generating a large amount of web traffic. This traffic can damage servers by causing service outages. In this study, we propose a website search engine that employs a system that controls user information using blockchains and builds its database based on the recorded information. The system is divided into three parts: a collection section that uses proxy, a management section that uses blockchains, and a search engine that uses a built-in database. This structure allows data sovereigns to manage their data more transparently. Search engines that use blockchains do not use internet bots, and instead use the data generated by user behavior. This avoids generation of traffic from internet bots and can, thereby, contribute to creating a better web ecosystem.

An Analysis of Decision Making Factor by Delphi and DEMATEL Model for Decision Support Information System development -Wartime Operational Control Transition approach- (의사결정 지원 정보시스템 개발을 위한 Delphi-DEMATEL모델에 의한 의사결정 요인분석 -전작권 전환 사례를 중심으로-)

  • Park, Sangjung;Koh, Chan
    • Journal of Digital Convergence
    • /
    • v.10 no.11
    • /
    • pp.47-58
    • /
    • 2012
  • This study selects political and military decision factors of Participatory Government's Wartime Operational Control(OPCON) Transition and analyzes, both quantitatively and qualitatively, the effects and relations between those factors. Previous research utilizing the Analytic Hierarchy Process(AHP) selected their decision factors based on academic data and field experience, requiring more objective analysis of the factors. For this study, we conducted a survey among security subject matter experts(SME) both online and offline. The results show that OPCON transition's decision factors were to 'recover military sovereignty', 'set the conditions for peaceful reunification' and 'improve ROK image through enhancing national power' which differs little from the previous AHP method studies. It also showed that 'recover military sovereignty' and 'set the conditions for peaceful reunification' had no relationship to each other and that the key factor that decided the OPCON Transition was actually 'recover military sovereignty' which represents the interest of the liberal party in ROK. This study finds its meaning by analyzing the decision factors of Participartory Government's OPCON Transition thorugh Delphi and DEMATEL method.

A Study on Efficient Data De-Identification Method for Blockchain DID

  • Min, Youn-A
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.13 no.2
    • /
    • pp.60-66
    • /
    • 2021
  • Blockchain is a technology that enables trust-based consensus and verification based on a decentralized network. Distributed ID (DID) is based on a decentralized structure, and users have the right to manage their own ID. Recently, interest in self-sovereign identity authentication is increasing. In this paper, as a method for transparent and safe sovereignty management of data, among data pseudonymization techniques for blockchain use, various methods for data encryption processing are examined. The public key technique (homomorphic encryption) has high flexibility and security because different algorithms are applied to the entire sentence for encryption and decryption. As a result, the computational efficiency decreases. The hash function method (MD5) can maintain flexibility and is higher than the security-related two-way encryption method, but there is a threat of collision. Zero-knowledge proof is based on public key encryption based on a mutual proof method, and complex formulas are applied to processes such as personal identification, key distribution, and digital signature. It requires consensus and verification process, so the operation efficiency is lowered to the level of O (logeN) ~ O(N2). In this paper, data encryption processing for blockchain DID, based on zero-knowledge proof, was proposed and a one-way encryption method considering data use range and frequency of use was proposed. Based on the content presented in the thesis, it is possible to process corrected zero-knowledge proof and to process data efficiently.