• 제목/요약/키워드: Privacy preserving

검색결과 248건 처리시간 0.029초

Deriving ratings from a private P2P collaborative scheme

  • Okkalioglu, Murat;Kaleli, Cihan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제13권9호
    • /
    • pp.4463-4483
    • /
    • 2019
  • Privacy-preserving collaborative filtering schemes take privacy concerns into its primary consideration without neglecting the prediction accuracy. Different schemes are proposed that are built upon different data partitioning scenarios such as a central server, two-, multi-party or peer-to-peer network. These data partitioning scenarios have been investigated in terms of claimed privacy promises, recently. However, to the best of our knowledge, any peer-to-peer privacy-preserving scheme lacks such study that scrutinizes privacy promises. In this paper, we apply three different attack techniques by utilizing auxiliary information to derive private ratings of peers and conduct experiments by varying privacy protection parameters to evaluate to what extent peers' data can be reconstructed.

프라이버시를 제공하는 저작권 보호 프로토콜 (Copyright Protection Protocol providing Privacy)

  • 유혜정
    • 디지털산업정보학회논문지
    • /
    • 제4권2호
    • /
    • pp.57-66
    • /
    • 2008
  • There have been proposed various copyright protection protocols in network-based digital multimedia distribution framework. However, most of conventional copyright protection protocols are focused on the stability of copyright information embedding/extracting and the access control to data suitable for user's authority but overlooked the privacy of copyright owner and user in authentication process of copyright and access information. In this paper, we propose a solution that builds a privacy-preserving proof of copyright ownership of digital contents in conjunction with keyword search scheme. The appeal of our proposal is three-fold: (1) content providers maintain stable copyright ownership in the distribution of digital contents; (2) the proof process of digital contents ownership is very secure in the view of preserving privacy; (3) the proposed protocol is the copyright protection protocol added by indexing process but is balanced privacy and efficiency concerns for its practical use.

Privacy-Preserving Traffic Volume Estimation by Leveraging Local Differential Privacy

  • Oh, Yang-Taek;Kim, Jong Wook
    • 한국컴퓨터정보학회논문지
    • /
    • 제26권12호
    • /
    • pp.19-27
    • /
    • 2021
  • 본 논문에서는 지역 차분 프라이버시(Local Differential Privacy, LDP) 기법을 이용하여 프라이버시를 보호하면서 수집한 차량 위치 데이터와 딥러닝 기법을 이용하여 교통량을 예측하기 위한 기법을 제시한다. 제시한 기법은 데이터를 수집하는 과정과 수집한 데이터를 이용하여 교통량을 예측하는 과정으로 구성된다. 첫 번째 단계에서는 데이터 수집 과정 중에 발생할 수 있는 프라이버시 침해 문제를 해결하기 위해 LDP 기법을 적용하여 차량의 위치 데이터를 수집한다. LDP 기법은 데이터 수집 시 원본 데이터에 노이즈를 추가해 사용자의 민감한 데이터가 외부에 노출되는 것을 방지한다. 이를 통해 운전자의 프라이버시를 보존하면서 차량의 위치 데이터를 수집할 수 있다. 두 번째 단계에서는 첫 번째 단계에서 수집한 데이터에 딥러닝 기법을 적용하여, 교통량을 예측한다. 또한, 본 논문에서 제안한 기법의 우수성을 입증하기 위해, 실데이터를 이용한 성능 평가를 진행한다. 성능 평가 결과는 본 논문에서 제안한 기법이 사용자의 프라이버시를 보호하면서 수집된 데이터를 이용하여 효과적으로 교통량을 예측할 수 있음을 입증한다.

Secure and Privacy Preserving Protocol for Traffic Violation Reporting in Vehicular Cloud Environment

  • Nkenyereye, Lewis;Rhee, Kyung-Hyune
    • 한국멀티미디어학회논문지
    • /
    • 제19권7호
    • /
    • pp.1159-1165
    • /
    • 2016
  • Traffic violations such as moving while the traffic lights are red have come from a simple omission to a premeditated act. The traffic control center cannot timely monitor all the cameras installed on the roads to trace and pursue those traffic violators. Modern vehicles are equipped and controlled by several sensors in order to support monitoring and reporting those kind of behaviors which some time end up in severe causalities. However, such applications within the vehicle environment need to provide security guaranties. In this paper, we address the limitation of previous work and present a secure and privacy preserving protocol for traffic violation reporting system in vehicular cloud environment which enables the vehicles to report the traffic violators, thus the roadside clouds collect those information which can be used as evidence to pursue the traffic violators. Particularly, we provide the unlinkability security property within the proposed protocol which also offers lightweight computational overhead compared to previous protocol. We consider the concept of conditional privacy preserving authentication without pairing operations to provide security and privacy for the reporting vehicles.

동형 암호를 이용한 스마트그리드에서의 효율적 프라이버시 보존 전력량 집계 방법 (Efficient Privacy-Preserving Metering Aggregation in Smart Grids Using Homomorphic Encryption)

  • 구동영
    • 정보보호학회논문지
    • /
    • 제29권3호
    • /
    • pp.685-692
    • /
    • 2019
  • 스마트그리드는 기존의 단방향 전력 전송에서 나아가 양방향 정보 교환이 이루어지는 시스템으로 전력의 이동 및 소요량에 대한 실시간 파악이 가능하다. 전력 생산자는 전력 소모량 집계 결과로부터 향후 전력 생산량 예측이 용이하며, 사용자 또한 다수 전력원으로부터의 단위 사용 비용을 고려한 선택적 전력 사용 및 전력 절약 계획 수립이 용이해져 자원의 효율적 생산 및 사용을 가능하게 한다. 반면 자원의 사용 및 이동에 대한 실시간 정보 수집은 개인의 프라이버시를 침해할 수 있는 위험성을 내포하고 있다. 이러한 스마트그리드에서의 전력량 집계 과정에서 프라이버시 침해를 방지하기 위하여, 본 논문에서는 동형 암호화 기법을 활용함으로써 단순 합계를 포함한 복합 연산을 허용하는 유연하면서도 효율적인 전력량 집계 및 분석 기법을 제시한다.

연관규칙 마이닝에서 랜덤화를 이용한 프라이버시 보호 기법에 관한 연구 (On the Privacy Preserving Mining Association Rules by using Randomization)

  • 강주성;조성훈;이옥연;홍도원
    • 정보처리학회논문지C
    • /
    • 제14C권5호
    • /
    • pp.439-452
    • /
    • 2007
  • 본 논문에서는 랜덤화 기법을 이용한 프라이버시 보존형 데이터 마이닝(PPDM) 기술에 대하여 논한다. 계산 효율성 때문에 실용화 되지 못하고 있는 안전한 다자간 계산(SMC) 기반 PPDM은 현재의 컴퓨팅 환경에서는 실용성 없는 다분히 이론적인 것이다. 그래서 우리는 실용적인 PPDM 기술에 집중하여 가장 널리 사용되고 있는 랜덤화 기법에 대한 연구 결과를 소개한다. 특히, 랜덤화를 이용한 실용적인 PPDM 분야에서 가장 중요한 프라이버시 측도 개념을 심도 있게 분석하였으며, 연관규칙 마이닝에서의 프라이버시 보호 기술에 초점을 맞춘다. Evfimievski 등이 제안한 select-a-size 범주에 속하는 새로운 랜덤화 작용소인 binomial-selector 개념을 제안하고, 적절한 파라미터를 찾기 위한 시뮬레이션 결과를 제시한다. 기존의 cut-and-paste 랜덤화 작용소는 아이템 집합이 큰 경우에는 매우 비효율적이며 복원된 지지도의 분산이 크다는 단점을 지니고 있다. 여기에서 제안하는 binomial-selector 랜덤화 작용소는 cut-and-paste 작용소가 갖는 단점들을 보완한다.

CONSTANT-ROUND PRIVACY PRESERVING MULTISET UNION

  • Hong, Jeongdae;Kim, Jung Woo;Kim, Jihye;Park, Kunsoo;Cheon, Jung Hee
    • 대한수학회보
    • /
    • 제50권6호
    • /
    • pp.1799-1816
    • /
    • 2013
  • Privacy preserving multiset union (PPMU) protocol allows a set of parties, each with a multiset, to collaboratively compute a multiset union secretly, meaning that any information other than union is not revealed. We propose efficient PPMU protocols, using multiplicative homomorphic cryptosystem. The novelty of our protocol is to directly encrypt a polynomial by representing it by an element of an extension field. The resulting protocols consist of constant rounds and improve communication cost. We also prove the security of our protocol against malicious adversaries, in the random oracle model.

A Survey on Security Issues of M2M Communications in Cyber-Physical Systems

  • Chen, Dong;Chang, Guiran
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제6권1호
    • /
    • pp.24-45
    • /
    • 2012
  • In this paper, we present a survey of security and privacy preserving issues in M2M communications in Cyber-Physical Systems. First, we discuss the security challenges in M2M communications in wireless networks of Cyber-Physical Systems and outline the constraints, attack issues, and a set of challenges that need to be addressed for building secure Cyber-Physical Systems. Then, a secure architecture suitable for Cyber-Physical Systems is proposed to cope with these security issues. Eventually, the corresponding countermeasures to the security issues are discussed from four aspects: access control, intrusion detection, authentication and privacy preserving, respectively. Along the way we highlight the advantages and disadvantages of various existing security schemes and further compare and evaluate these schemes from each of these four aspects. We also point out the open research issues in each subarea and conclude with possible future research directions on security in Cyber-Physical Systems. It is believed that once these challenges are surmounted, applications with intrinsic security considerations will become immediately realizable.

A Privacy Preserving Vertical Handover Authentication Scheme for WiMAX-WiFi Networks

  • Fu, Anmin;Zhang, Gongxuan;Yu, Yan;Zhu, Zhenchao
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제8권9호
    • /
    • pp.3250-3265
    • /
    • 2014
  • Integrated WiMAX and WiFi networks is of great potential for the future due to the wider coverage of WiMAX and the high data transport capacity of WiFi. However, seamless and secure handover (HO) is one of the most challenging issues in this field. In this paper, we present a novel vertical HO authentication scheme with privacy preserving for WiMAX-WiFi heterogeneous networks. Our scheme uses ticket-based and pseudonym-based cryptographic methods to secure HO process and to achieve high efficiency. The formal verification by the AVISPA tool shows that the proposed scheme is secure against various malicious attacks and the simulation result indicates that it outperforms the existing schemes in terms of communication and computation cost.

A Solution to Privacy Preservation in Publishing Human Trajectories

  • Li, Xianming;Sun, Guangzhong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제14권8호
    • /
    • pp.3328-3349
    • /
    • 2020
  • With rapid development of ubiquitous computing and location-based services (LBSs), human trajectory data and associated activities are increasingly easily recorded. Inappropriately publishing trajectory data may leak users' privacy. Therefore, we study publishing trajectory data while preserving privacy, denoted privacy-preserving activity trajectories publishing (PPATP). We propose S-PPATP to solve this problem. S-PPATP comprises three steps: modeling, algorithm design and algorithm adjustment. During modeling, two user models describe users' behaviors: one based on a Markov chain and the other based on the hidden Markov model. We assume a potential adversary who intends to infer users' privacy, defined as a set of sensitive information. An adversary model is then proposed to define the adversary's background knowledge and inference method. Additionally, privacy requirements and a data quality metric are defined for assessment. During algorithm design, we propose two publishing algorithms corresponding to the user models and prove that both algorithms satisfy the privacy requirement. Then, we perform a comparative analysis on utility, efficiency and speedup techniques. Finally, we evaluate our algorithms through experiments on several datasets. The experiment results verify that our proposed algorithms preserve users' privay. We also test utility and discuss the privacy-utility tradeoff that real-world data publishers may face.