• Title/Summary/Keyword: K-anonymity

Search Result 227, Processing Time 0.029 seconds

The Effect of Real-Time Individual Process Performance Feedback on Computer-based Group Idea Generation

  • Jung, J.H.
    • The Journal of Information Systems
    • /
    • v.23 no.2
    • /
    • pp.91-107
    • /
    • 2014
  • In computer-mediated idea generation where contributions can be anonymous, the ability to accurately monitor performances is limited, inducing social loafing. Prior research has suggested that social loafing is likely an important factor in reducing task performance. Researchers have theorized that loafing could be minimized if clear performance feedback is provided. Our prior study evidences a substantial performance gain by the provision of real time performance information about who is contributing and who is not. However, our prior study incorporated the quantity feedback only to create a larger pool of ideas based on the long-standing assumption (i.e., quantity breeds quality), not considering the quality feedback. As a result, taking advantage of anonymity in the form of pseudonymity, individuals in almost all groups exhibited a tendency of self-presentation by capitalizing on ideas of which quality was low and even frivolous (i.e., junk comments) toward the later stages of the session. Thus, we have learned that the quantity performance feedback alone does not have enough restrictiveness to consistently control the performance behavior throughout the session. Since a process chart allows participants to monitor process variation by comparing new performance data to past performance data, we incorporated real-time visual process performance feedback to reveal performance histories by connecting the sequence of idea quality scores in a time-series format. Using this environment, a laboratory experiment was conducted with five-member groups that examined the influence of both identifiability (i.e., anonymity versus pseudonymity) and process performance feedback (i.e., yes or no) in a $2{\times}2$ factorial design. The result showed that groups in the process performance feedback treatment outperformed groups in the no feedback treatment. Additionally, process performance feedback and identifiability interacted such that groups in the process performance feedback/pseudonymity treatment had the highest performance. The implications of these findings for future research, as well as the implications for the design of group idea generation procedures are discussed.

A Study of Privacy Protection for Users of Electronic Money Using Blockchain Technology (블록체인 기법을 사용하는 전자화폐 사용자의 프라이버시 보호에 대한 연구)

  • Kang, Yong-Hyeog
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.10a
    • /
    • pp.571-572
    • /
    • 2017
  • The blockchain technology that implements electronic money uses decentralized computing and all transactions in a blockchain are open to everyone. This technique seems to guarantee anonymity by performing the transaction on the address instead of the user, but by using direction acyclic graph based on the transaction graph, the privacy problem is caused by tracking the addresses. In this paper, we analyze various techniques for centralized processing which makes it difficult to find the relevance on the graph in order to protect the privacy in the block chain technology. We also analyze the techniques of anonymizing in a distributed way to enhance privacy. Using the zero knowledge proof scheme guarantees full distributed anonymity but requires more computation and storage space, and various techniques to make this efficient are proposed. In this paper, we propose a privacy protection scheme of blockchain technology to integrate existing privacy protection techniques into a blockchain technology and perform it more efficiently with a centralized or decentralized technique.

  • PDF

The Development of Community Website Using an Automatic Delete Posts (게시글 자동삭제를 이용한 커뮤니티 웹사이트 개발)

  • Jeong, Kil-Hyeon;Yoo, Ji-Hyun;Choi, Dong-Jun;Kim, Yeon-Un;Seo, Eun-Bok;Moon, Chan-Ho
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2016.07a
    • /
    • pp.233-234
    • /
    • 2016
  • 본 프로젝트는 편안하고 안전하게 세상과 소통하고 관심사를 공유할 수 있는 커뮤니티 사이트이다. 게시글에 수명을 설정하여 자동으로 글이 삭제되는 기능을 통해 사용자의 보안성을 향상시키며, 기본적으로 닉네임을 사용하여 안전한 익명성을 보장한다. 즉, 자동으로 게시글이 삭제되는 커뮤니티 웹 사이트로 사용자들의 일상, 관심사, 정보 공유 등을 게시글을 통해 공유하고 소통할 수 있고, 커뮤니티 활동에 따라 마일리지를 누적하여 게시글의 기본 수명을 연장 할 수도 있다.

  • PDF

An Efficient Anonymous Authentication and Vehicle Tracing Protocol for Secure Vehicular Communications

  • Park, Young-Shin;Jung, Chae-Duk;Park, Young-Ho;Rhee, Kyung-Hyune
    • Journal of Korea Multimedia Society
    • /
    • v.13 no.6
    • /
    • pp.865-874
    • /
    • 2010
  • Recently, Hao et al. proposed a privacy preservation protocol based on group signature scheme for secure vehicular communications to overcome a well-recognized problems of secure VANETs based on PKI. However, although efficient group signature schemes have been proposed in cryptographic literatures, group signature itself is still a rather much time consuming operation. In this paper, we propose a more efficient privacy preservation protocol than that of Hao et al. In order to design a more efficient anonymous authentication protocol, we consider a key-insulated signature scheme as our cryptographic building block. We demonstrate experimental results to confirm that the proposed protocol is more efficient than the previous scheme.

A Secure End-to-End Protocol assuring Anonymity for Mobile Users (이동 사용자의 익명성을 보장하는 안전한 종단간 프로토콜)

  • Kim, Sun-Hyoung;Lee, Byung-Rae;Kang, Sang-Seung;Kim, Tai-Yun
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2001.10b
    • /
    • pp.1233-1236
    • /
    • 2001
  • 무선 통신 시스템에서 이동 사용자들의 안전성 문제에 대한 논쟁은 끊임없이 이루어지고 있으며 무선 네트워크 환경에서 더 안전한 통신을 위한 연구들이 계속 진행되고 있다. 무선 네트워크 환경에서는 전달하고자 하는 메시지들이 공중파를 매체로 하여 전송되기 때문에 유선 네트워크 시스템에서보다 안전성의 문제가 더욱 철저히 고려되어야 한다. 본 논문에서는 무선 이동 네트워크 환경에서 인증서를 기반으로 한 안전한 통신 프로토콜을 제안하고자 한다. 특히 이동 사용자들이 각기 다른 도메인으로부터 서비스를 받고 있는 환경에서 종단간에 위치한 이동 사용자들이 다근 사용자와 외부 도메인으로부터 익명성을 보장받으며 서로를 인증하고 안전하게 통신을 위한 비밀키를 공유찬 수 있는 프로토콜을 제안한다.

  • PDF

Secure Payment System using Mobile Phone assuring User Anonymity (사용자 익명성을 보장하는 안전한 휴대폰 지불시스템)

  • Lim, Soo-Chul;Lee, Byung-Rae;Kang, Sang-Seung;Kim, Tai-Yun
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2001.10b
    • /
    • pp.1245-1248
    • /
    • 2001
  • 소액전자지불시스템 중에서 휴대폰을 이용한 지불이 늘어나고 있는 추세인데, 이는 휴대폰의 보편성과 이동통신업체를 통한 통합적인 요금체계 즉 후불제 방식이라는 장점을 가지고 있기 때문이다. 하지만, 휴대폰을 이용한 지불은 지불 결제시 구매자의 이동통신번호와 주민등록번호를 입력하여 구매자의 신원을 확인하므로 구매자의 정보가 누출될 위험이 있다. 따라서, 본 논문에서는 휴대폰을 이용한 소액지불 결제시 판매자에게 구매자의 신분을 은닉성을 제공하는 안전한 핸드폰 지불시스템을 제안한다.

  • PDF

Symmetric Key-Based Remote User Authentication Scheme With Forward Secrecy (순방향 안전성을 제공하는 대칭키 기반의 원격 사용자 인증 방식)

  • Lee, SungYup;Park, KiSung;Park, YoHan;Park, YoungHo
    • Journal of Korea Multimedia Society
    • /
    • v.19 no.3
    • /
    • pp.585-594
    • /
    • 2016
  • Recently because of development of remote network technology, users are able to access the network freely without constraints of time and space. As users are getting more frequent to access the remote server in a computing environment, they are increasingly being exposed to various risk factors such as forward secrecy and server impersonation attack. Therefore, researches for remote user authentication scheme have been studying actively. This paper overcomes the weaknesses of many authentication schemes proposed recently. This paper suggests an improved authentication scheme that protects user's anonymity with preserving variable more safe and also provides forward secrecy.

The Study of Anonymity and Untraceability in Mobile Computing Environments (이동 컴퓨팅 환경에서의 익명성 보장과 불추적성에 관한 연구)

  • Choi, Sun-Young;Park, Sang-Yun;Han, Mun-Suk;Eom, Young-Ik
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2000.04a
    • /
    • pp.396-399
    • /
    • 2000
  • 이동 네트워크 상에서의 인터넷 서비스가 활성화됨에 따라 이동 호스트에 대한 인증 및 비밀성이 요구되었고, 이동 호스트의 이동성에 따른 익명성 및 불추적성이 중요한 고려사항이 되었다. 본 논문에서는 이동 호스트가 도메인간을 이동하면서 노출될 수 있는 이동 호스트의 identity의 보호를 위한 익명성 보장 및 불추적성을 지원하는 안전한 인증 프로토콜을 제시한다.

  • PDF

Revealing the linkability of Popescue ID-based Group Signature Scheme

  • Park, Hyungki;Fangguo Zhang;Kim, Kwangjo
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2002.11a
    • /
    • pp.81-83
    • /
    • 2002
  • Group signature schemes allow a group member to sign a document on behalf of the group anonymously. In addition, in case of anonymity misuse, a group authority can recover the issuer of a signature. In this paper, we analyze the security of a group signature scheme proposed by Popescu which is a modification of the Tseng-Jan group signature scheme. We show that the scheme can't provide an important requirement of the group signature, unlikability. Thus, other members are allowed to identify whether two signatures have been issued by the same group member or not.

  • PDF

The Influence of Internet Use on Interpersonal Interaction among Chinese Urban Residents: The Mediating Effect of Social Identification

  • Chen, Hong;Qin, Jing;Li, Jing;Zheng, Guangjia
    • Asian Journal for Public Opinion Research
    • /
    • v.3 no.2
    • /
    • pp.84-105
    • /
    • 2016
  • The instability of social norms on the Internet causes the diversity of social identification. Meanwhile, the anonymity of online social identity and the chaos of the role-playing among the interacting participants cause an ambiguity of identity recognition, which intensifies anxiety about interpersonal interaction. Methods that promote face-to-face interpersonal interaction through the reconstruction of the identification to the social system and intergroup trust is worth further research. Based on a telephone survey of urban residents in thirty-six cities in China (N=1080), the study focuses on the influence of Internet use on interpersonal interaction of urban residents and the mediation effect of social identification. The results show that Internet use has a negative effect on the interpersonal interactions of urban residents, and social identification plays a mediating effect between Internet use and interpersonal interaction. Implications of the results are discussed.