• Title/Summary/Keyword: K-anonymity

Search Result 227, Processing Time 0.022 seconds

Improved RFID Authentication Protocol Providing Mutual Authentication (상호인증을 제공하는 개선된 RFID 인증 프로토콜)

  • Jeon, Seo-Kwan;Eun, Sun-Ki;Oh, Soo-Hyun
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.47 no.2
    • /
    • pp.113-120
    • /
    • 2010
  • RFID system is the contact-less recognition technology and use for distribution system, environment, transport, security and so on. However, it may create many security relevant problems such as privacy because constraints of RFID communication environment. So several methods of resolving these problems have been proposed. Recently, Shin and Park proposed an efficient RFID authentication protocol with protecting user's privacy using hash function and exclusive-OR.. But Ahn and Bu et al. poia problem that a attacker can to masquerade as malicious reader because their protocol can't providing mutual authentication.nted out weakness of Shin and Park's protocol and proposed more secure and efficient protocol. Unfortunately, Ahn and But's protocol has In this paper, We propose an improved RFID authentication protocol providing mutual authentication. The proposed protocol has advantages that providing mutual authentication between a tag and a reader, secure against replay attack and spoofing attack. Also, it guarantees anonymity of RFID tag and secure against location tracking attack by collusion of malicious readers.

An Investigation of Haptic Interaction in Online Negotiation between different native language people

  • Chen, Meng;Okada, Shogo;Nitta, Katsumi
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.17 no.1
    • /
    • pp.11-20
    • /
    • 2012
  • Due to the development of internet technology, the online business trade becomes an active area. Online negotiation supporting systems have been developing very actively in recent years to meet the growing needs. We have been studying on the effect that the haptic device brings about in interaction through online negotiation between two parties. In order to meet the online negotiation's requirements, the developed interface should be able to protect user's anonymity, convey user's emotion and make the scene alive.In this study, we adopt haptic interaction as a means of conveying emotion in an online negotiation between Japanese and Chinese people. In this study, our goal is to investigate the effectiveness of haptic interaction in communications between Chinese and Japanese users and analyze the characteristis in operation the haptic device. We conducted online negotiation experiments with and without haptic interaction . The comparison experiments results show that the haptic feedback can help to convey the emotion and the sense of presence. The Chinese subjects' feedback for the questionaire concerning the emotional communication and the sense of presence varies slightly compared to the Japanese subjects. We also found when using the haptic device, the force feedback can influence subject's feelings.There is little significant difference between the advanced and the medium subjects in negotiation dialogues and the haptic device's operation, the beginner subjects are slightly at a disadvantage.

An Improved ID-based Anonymous Authentication Scheme for Wireless Body Area Networks (WBAN 환경에서의 개선된 ID 기반 익명 인증 기법)

  • Jeong, Min-Soo;Suk, Jae Hyuk;Lee, Dong Hoon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.2
    • /
    • pp.322-332
    • /
    • 2017
  • Wireless Body Area Networks is an environment that provides an appropriate service remotely by collecting user's biometric information. With the growing importance of sensor, WBAN also attracts extensive attention. Since WBAN is representatively used in the medical field, it can be directly related to the patient's life. Hence security is very important in WBAN. Mutual authentication between the client and the application provider is essential. And efficiency is also important because a used device is limited to computation cost. In this reason, ID-based anonymous authentication scheme in WBAN has been intensively studied. We show that the recent research result of Wu et al. which is about the ID-based anonymous authentication scheme is vulnerable to impersonation attack. And we propose a new ID-based anonymous authentication scheme that is secure against the attacks discovered in the existing schemes. Compared to the existing schemes, the computation cost of our scheme is improved by 30.6% and 7.3%.

GNUnet improvenemt for anonymity supporing in large multimedia file (대형 멀티미디어 파일의 익명성 지원을 위한 수정 GNUnet)

  • Lee Myoung-Hoon;Park Byung-Yeon;Jo In-June
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2006.05a
    • /
    • pp.81-90
    • /
    • 2006
  • The GNUnet proposed a file encoding method by 1KB block size to support anonimity of files, decentralizes encoded block to peers through unstructed mode and original data decoding method a block searching or encoded blocks. but, the encoding and block decentralizing method with $600\sim700MB$ large multimedia file appered two problems. First problem, it need addition R block and I block, which make about 4% of storage resource. Second problem, unstructured model added network load by broadcasting decentralizing method. Third problem, The critical point of keyword search function. This paper suggest variable encoding block size and structured model by block decentralizing solution. Suggested encoding method reduced block request supplementary block generation from 4% to 1%, network load by proposal structured model sending answer through dedicated peer to decentralize block and we defined content-based keyword and identifier of sharing file.

  • PDF

A Study on Service-based Secure Anonymization for Data Utility Enhancement (데이터 유용성 향상을 위한 서비스 기반의 안전한 익명화 기법 연구)

  • Hwang, Chikwang;Choe, Jongwon;Hong, Choong Seon
    • Journal of KIISE
    • /
    • v.42 no.5
    • /
    • pp.681-689
    • /
    • 2015
  • Personal information includes information about a living human individual. It is the information identifiable through name, resident registration number, and image, etc. Personal information which is collected by institutions can be wrongfully used, because it contains confidential information of an information object. In order to prevent this, a method is used to remove personal identification elements before distributing and sharing the data. However, even when the identifier such as the name and the resident registration number is removed or changed, personal information can be exposed in the case of a linking attack. This paper proposes a new anonymization technique to enhance data utility. To achieve this, attributes that are utilized in service tend to anonymize at a low level. In addition, the anonymization technique of the proposal can provide two or more anonymized data tables from one original data table without concern about a linking attack. We also verify our proposal by using the cooperative game theory.

Service Management Scheme using Security Identification Information adopt to Big Data Environment (빅데이터 환경에 적합한 보안 인식 정보를 이용한 서비스 관리 기법)

  • Jeong, Yoon-Su;Han, Kun-Hee
    • Journal of Digital Convergence
    • /
    • v.11 no.12
    • /
    • pp.393-399
    • /
    • 2013
  • Recently, the quantity and type of data that is being processed in cloud environment are varied. A method for easy access in different network in a heterogeneous environment of big data stored in the device is required. This paper propose security management method for smoothly access to big data in other network environment conjunction with attribute information between big data and user. The proposed method has a high level of safety even if user-generated random bit signal is modulated. The proposed method is sufficient to deliver any number of bits the user to share information used to secure recognition. Also, the security awareness information bit sequence generated by a third party to avoid unnecessary exposure value by passing a hash chain of the user anonymity is to be guaranteed to receive.

Contents Error and Security Analysis of 'Security Analysis and Improvements of a Biometrics-based User Authentication Scheme Using Smart Cards' ('스마트카드를 이용한 생체인식기반 사용자 인증스킴의 분석 및 개선'의 내용 오류와 안전성 분석)

  • Park, Mi-Og;Oh, Gi-Oug
    • Journal of the Korea Society of Computer and Information
    • /
    • v.19 no.10
    • /
    • pp.99-106
    • /
    • 2014
  • In this paper, we analyze weaknesses of the biometrics-based user authentication scheme proposed by An. The result of analysis An's authentication scheme by the login success scenario proposed in this paper, if the attacker successes to get user's random number, he/she can pass user authentication phase of the legal server. Also the biometrics guessing scenario proposed in this paper shows the legal user's the biometric information is revealed in lost smart card. Since An's authentication scheme submit user ID and biometrics in plain text to the server, it is very vulnerable to inner attack and it is not provide the user anonymity to the server as well as the one to the third by user ID in plain text. Besides An's authentication scheme is contextual error too, due to this, it has weakness and so on that it did not check the validity of the smart card holder.

Evaluation of proficiency and improvement of accuracy on the analysis of brominated flame retardants (PBDEs) in ABS polymer (ABS수지 중 polybrominated diphenyl ether(PBDE)류 분석 숙련도 평가 및 정확도 향상)

  • Ryu, Jehoon;Kim, Dalho
    • Analytical Science and Technology
    • /
    • v.28 no.6
    • /
    • pp.446-452
    • /
    • 2015
  • In order to evaluate and improve the ability of Korean testing laboratories to measure Polybrominated diphenyl ethers in acrylonitrile-butadiene-styrene (ABS), a proficiency test was organised by Korea Research Institute of Standards and Science (KRISS) based on ISO/IEC 17043. The proficiency test material used was 10 g of a granular ABS fortified with a mixture of congeners of PBDE (BDE-154, 183, 206, 209). Homogeneity and stability were investigated to assess the adequacy of the test material. The certified value established by KRISS based on the national reference was used for assigned value of each PBDE. The test materials were distributed to the 16 participating laboratories. The participating laboratories were requested to analyse the samples employing the methods used in their routine analysis. Each laboratory was given it’s own code to secure the anonymity. Participants results were evaluated with z-scores according to ISO/IEC 17043. The standard deviation for proficiency assessment was set by standard deviation of the participants results except for outlier. The results, the laboratory's performance and improvement of accuracy were discussed.

The Experience of Life of the Physically Handicapped Adolescents (지체장애 청소년의 삶의 과정)

  • Kim, Shin-Jeong;Kang, Kyung-Ah
    • Research in Community and Public Health Nursing
    • /
    • v.13 no.4
    • /
    • pp.767-777
    • /
    • 2002
  • The purpose of this study was to construct a grounded theory as the basis for developing future nursing interventions by describing and analyzing the holistic lives of the physically handicapped adolescents. The subjects were 10 physically handicapped adolescents who were attending a rehabilitation school located in Kyunggi region and could understand and respond to the questions. The aim and purpose of the study were explained to the subjects, and only those who accepted to participate in the study were selected as the actual study subjects. The study data were collected from July to November 2000. The investigators provided detailed explanations to the subjects about keeping the anonymity of the subjects name and confidentiality of the information provided by the study subjects. The subjects received in-depth interviews by the investigators. Each interview took about 40 minutes to 1 hour and 30 minutes, and each subject received interviews with the range of one to 3 times. All interviews were recorded under the permission of the subjects. The investigators formed field notes after finishing each interview. In the process of data analysis, 'realizing the difficulty due to physical handicap' was found to be the causal condition, whereas' acceptance of physical handicap' was identified as the context. Then, we identified' awaring as the valuable being' as the core phenomenon, 'support from family and social group and spiritual help' as the intervening condition, 'effort for adaptation' as the strategy, and' finding the meaning of life' as the consequence. Through the theoretical model derived from this study, an important aspect the lives of physically handicapped adolescences was identified that' awaring as the valuable being' help them cope better and find the meaning of life in spite of suffering they experience.

  • PDF

Implementation of the Passenger Positioning Systems using Beacon (Beacon을 활용한 선박 탑승자 위치확인 시스템의 구현)

  • Jeong, Seon-Jae;Yim, Jae-Hong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.1
    • /
    • pp.153-160
    • /
    • 2016
  • In this paper, we propose a system that tracks the position of the passengers and sailors using a Bluetooth-based Beacon in the ship. The position of the tracking passengers, sometimes fatal emergencies of the rescue team, such as the sinking of the ship is utilized in order to efficiently and quickly rescue the passengers, and the collected data can be utilized additionally by grasping the flow of human traffic patterns. The system proposed in this paper, install MAC data acquisition called AP (Access Point) for each cabin, and in the installed AP retrieves Tag of the information provided to the passenger and collected. A Tag has only its own MAC Address to the privacy, no user information is not collected. All data communication by sending and receiving MAC Address was only to ensure anonymity.