• Title/Summary/Keyword: K-anonymity

Search Result 227, Processing Time 0.025 seconds

Coordination of Anti-Spoofing Mechanisms in Partial Deployments

  • An, Hyok;Lee, Heejo;Perrig, Adrian
    • Journal of Communications and Networks
    • /
    • v.18 no.6
    • /
    • pp.948-961
    • /
    • 2016
  • Internet protocol (IP) spoofing is a serious problem on the Internet. It is an attractive technique for adversaries who wish to amplify their network attacks and retain anonymity. Many approaches have been proposed to prevent IP spoofing attacks; however, they do not address a significant deployment issue, i.e., filtering inefficiency caused by a lack of deployment incentives for adopters. To defeat attacks effectively, one mechanism must be widely deployed on the network; however, the majority of the anti-spoofing mechanisms are unsuitable to solve the deployment issue by themselves. Each mechanism can work separately; however, their defensive power is considerably weak when insufficiently deployed. If we coordinate partially deployed mechanisms such that they work together, they demonstrate considerably superior performance by creating a synergy effect that overcomes their limited deployment. Therefore, we propose a universal anti-spoofing (UAS) mechanism that incorporates existing mechanisms to thwart IP spoofing attacks. In the proposed mechanism, intermediate routers utilize any existing anti-spoofing mechanism that can ascertain if a packet is spoofed and records this decision in the packet header. The edge routers of a victim network can estimate the forgery of a packet based on this information sent by the upstream routers. The results of experiments conducted with real Internet topologies indicate that UAS reduces false alarms up to 84.5% compared to the case where each mechanism operates individually.

Robust Conditional Privacy-Preserving Authentication based on Pseudonym Root with Cuckoo Filter in Vehicular Ad Hoc Networks

  • Alazzawi, Murtadha A.;Lu, Hongwei;Yassin, Ali A.;Chen, Kai
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.12
    • /
    • pp.6121-6144
    • /
    • 2019
  • Numerous privacy-preserving authentication schemes have been proposed but vehicular ad hoc networks (VANETs) still suffer from security and privacy issues as well as computation and communication overheads. In this paper, we proposed a robust conditional privacy-preserving authentication scheme based on pseudonym root with cuckoo filter to meet security and privacy requirements and reduce computation and communication overheads. In our proposed scheme, we used a new idea to generate pseudonyms for vehicles where each on-board unit (OBU) saves one pseudonym, named as "pseudonym root," and generates all pseudonyms from the same pseudonym. Therefore, OBU does not need to enlarge its storage. In addition, the scheme does not use bilinear pairing operation that causes computation overhead and has no certification revocation list that leads to computation and communication overheads. The proposed scheme has lightweight mutual authentication among all parties and just for once. Moreover, it provides strong anonymity to preserve privacy and resists ordinary attacks. We analyzed our proposed scheme and showed that it meets security and privacy requirements of VANETs and is more efficient than traditional schemes. The communication and computation overheads were also discussed to show the cost-effectiveness of the proposed scheme.

Quantum cryptography-used Key Distribution Model Design of U-healthcare environment (양자 암호를 이용한 유헬스케어 환경의 키 분배 모델 설계)

  • Jeong, Yoon-Su;Han, Kun-Hee
    • Journal of Digital Convergence
    • /
    • v.11 no.11
    • /
    • pp.389-395
    • /
    • 2013
  • As fusing IT and medical technique, the number of patients who adhere medical equipment inside of them is increasing. However there is a problem of for the third person to tap or modulate the patient's biometric data viciously. This paper suggests quantum encryption-based key distribution model to share key for the third person not to tap or modulate the patient's biometric data between patient and hospital staff. The proposed model uses one-time pad key that shares key sending random bits not direct sending message of quantum data. Also, it guarantees patient's anonymity because the biometric data of injected-device in the body doesn't be exposed unnecessarily.

All rants and no substance?: A new framework for studying the rationality of cyberspace

  • Soon, Carol;How, Tan Tarn
    • Journal of Contemporary Eastern Asia
    • /
    • v.16 no.2
    • /
    • pp.20-43
    • /
    • 2017
  • While the Internet has been used to galvanise people for the collective good, many have voiced concerns over the noise and vitriol present online and polarisation. In Singapore where the government regulates traditional mainstream media such as print and broadcast, the online space has been described as a "Wild Wild West" rife with rumours, untruths and misinformation. Such developments do not only exert a potential negative effect on the deliberative nature of public discourse but also skew bias towards the online space, affecting the ability of online users to communicate with authority and power. This study seeks to examine the rationality of the cyberspace through using a new "rationality" framework to analyse political discourse online. Comprising objectivity, emotionality and partisanship, the rationality framework was applied to a content analysis of 197 blogs with political content in 2014. The analysis indicated that the online political space was not the Wild Wild West that it was touted to be with significant levels of objectivity and non-partisanship. There was a stark absence of emotional discourse, and relationships were observed between bloggers' anonymity and rationality. Cognisant of academia's and policymakers' interest on the quality and effects of online discourse, the proposed analytical framework and the study findings hold implications for both developed and developing countries.

Measures of Abnormal User Activities in Online Comments Based on Cosine Similarity (코사인 유사도 기반의 인터넷 댓글 상 이상 행위 분석 방법)

  • Kim, Minjae;Lee, Sangjin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.2
    • /
    • pp.335-343
    • /
    • 2014
  • It is more important to ensure the credibility of internet media which influence the public opinion. However, there are vague suspicions in public from the examples of manipulation of online reviews with anonymity. In this study, we explore the possibility of manipulating public opinion in online web sites. We investigate the characteristics of comments posted by users on web sites and compare each comments by using the cosine similarity function. Our result shows followings. First, we found a correlation between the similarities of comments and the article ranks in the web sites. Second, it is possible to identify abnormal user activities indicating excessive multiple posting, double posting and astroturf activities.

eBay: Smart Entry Strategy into the Korean Market Through M&A and its Post-Merger Integration

  • Park, Young-Eun;Allui, Alawiya
    • Journal of Distribution Science
    • /
    • v.17 no.1
    • /
    • pp.47-56
    • /
    • 2019
  • Purpose - This case study illustrates the story of eBay Korea, which owns two most leading Korean open market companies, AUCTION and Gmarket. The main concerns are to take over the Korean top domestic companies one by one, then, emerge these two giants through its well-developed post-merger Integration by eBay, an American multinational corporation. Research design, data, and methodology - This case explores various secondary resources such as periodicals, annual reviews, magazine, news articles, commentaries, even some interview materials related to 'eBay Korea' and industry source on condition of anonymity based on the critical reviewing of existing studies on these topics as well. Results - The findings of this study show the merger and acquisition of two market leaders in Korea is the only successful case in Asian Markets. The eBay's choice of entry mode is appropriate considering the timing, synergy and efficiency by sharing their resources. Conclusions - This study examines the successful entry and settlement process of foreign, multinational company through mergers and acquisitions in the Korean market. This would be a valuable in the studies of International Business and Global entry or distribution strategy in the e-commerce and open market dealing with M&A and its post-merger integration.

An Analysis on the Application of Functional Mask for Protection in Fashion Mask (보호용 기능성 마스크를 응용한 패션 마스크 분석)

  • Choi, Jung-Hwa
    • Fashion & Textile Research Journal
    • /
    • v.15 no.6
    • /
    • pp.851-861
    • /
    • 2013
  • This study analyzed the fashionable characteristics of functional fashion mask types. This study reviewed the literature on masks and analyzed fashion photos found in fashion books, fashion collections and on internet fashion sites. The results were categorized into four characteristics. Integration of structure and function showed mask designs that connected to the hood and portable items. It represented the reflection of nomadic life, liberation, obscurity and the consciousness of discomfort. Signs of playfulness showed mask hybrids and animal images, the mask hybrids and humanoid images, the printing of animal characters, body parts and unusual material hybrids. It represented the liberation from a fixed identity, the loss of seriousness, the reduction of tension and the pursuit of pleasure and freedom. The duplicity of aggression and protection showed a futuristic or aggressive helmet facemask, an enclosed mask of intensive color, and the morphological hybrid of a disgusting or aggressive motif. It represented the end of human weakness, the desire of new self-expression and the longing of superhuman power. Fanciful decoration showed masks with glittery decoration, sunglasses with luxury decoration material, a medical facemask made of lace material and fanciful printing. It showed one facet of extreme consumption, the creation of new personality and value, the pursuit of high quality and a mutual coexistence of status and anonymity.

A Study on the Idea of the Technology in Jong Soung Kimm's Architecture (김종성 건축에서의 기술 개념에 관한 연구)

  • Jung, In-Ha
    • Journal of architectural history
    • /
    • v.10 no.2 s.26
    • /
    • pp.85-99
    • /
    • 2001
  • Jong Soung Kim is a rare architect in Korea who has consistently done research on the idea of the architectural technology for a long time. Therefore in order to understand Kimm's architecture, it is essential to examine his idea on the technology, which reveals the complicated relationship between divers architectural discourses. It is concerned with tectonics which was the most important theoretical movements in German architecture from the nineteenth century, the Mies van der Rohe's idea of the technology which provided the most powerful basis of modern architecture, Miesians' technological discourses which was at the height of prosperity in seventies in America, and High-tech architecture in eighties. Kimm's idea on the technology is defined as follow; 1) Kimm believe that although architecture begins in construction and materiality, it must culminate in artistic form. It's legacy of German tectonics. 2) He accepts Mies' three ideas on the technology. 'Architecture is the spatially apprehended will of the epoch.' 'Technology reveals the true nature of the will of the epoch.' 'We can attain a new beauty with the help of a new technology' 3) He takes a double attitude toward the idea on the technology of Mies followers. He accepts their architectural achievement according to technological progress, but criticize their technology-oriented attitude, deprived of spiritual enrichment. 4) Kimm's idea on the technology is distinguished from that of High-tech architect. The principal criteria exist in their different attitude toward the anonymity and the ethics of technology.

  • PDF

A Study on the Current Status of Nursing Personnel in Cheju Island (제주도 지역 간호인력 현황 분석)

  • Ham, Eun-Ock
    • Journal of Korean Academy of Rural Health Nursing
    • /
    • v.5 no.1
    • /
    • pp.25-32
    • /
    • 2010
  • Purpose: The purpose of this study was to provide a fundamental data for improving nurses' working environment and securing quality of nursing care. Method: It was consisted of analyzing education system and employment status of nursing personnel, and focus group interviews in Cheju Island. Results: Total graduates were 4,139 by 2006 from two nursing schools in Cheju. Difficulties in working conditions from focal group interviews were classified into four categories; Lack of anonymity of nurses, the burden from performing nontraditional nursing roles due to shortage of physicians, irregularity of working schedule and too many night shifts for taking care of female colleague's condition related with pregnancy, and poor support for implementing and developing professional nursing. Conclusion: A survey revealing working condition of nursing personnel of all health care institutions in Cheju Island will provide the comparison between Cheju Island and other areas. It needs to cultivate the public opinion about the importance of quality of nursing care proceeded by the broad support for improving nurses' working environment. It is essential to support continuing education to bring professional nurses and establishing the system to utilize them to overcome the shortage of physicians in Cheju Island.

Privacy Protection Method for Sensitive Weighted Edges in Social Networks

  • Gong, Weihua;Jin, Rong;Li, Yanjun;Yang, Lianghuai;Mei, Jianping
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.2
    • /
    • pp.540-557
    • /
    • 2021
  • Privacy vulnerability of social networks is one of the major concerns for social science research and business analysis. Most existing studies which mainly focus on un-weighted network graph, have designed various privacy models similar to k-anonymity to prevent data disclosure of vertex attributes or relationships, but they may be suffered from serious problems of huge information loss and significant modification of key properties of the network structure. Furthermore, there still lacks further considerations of privacy protection for important sensitive edges in weighted social networks. To address this problem, this paper proposes a privacy preserving method to protect sensitive weighted edges. Firstly, the sensitive edges are differentiated from weighted edges according to the edge betweenness centrality, which evaluates the importance of entities in social network. Then, the perturbation operations are used to preserve the privacy of weighted social network by adding some pseudo-edges or modifying specific edge weights, so that the bottleneck problem of information flow can be well resolved in key area of the social network. Experimental results show that the proposed method can not only effectively preserve the sensitive edges with lower computation cost, but also maintain the stability of the network structures. Further, the capability of defending against malicious attacks to important sensitive edges has been greatly improved.