• Title/Summary/Keyword: Privacy risk

Search Result 274, Processing Time 0.033 seconds

Strengthening security structure of open Blockchain platform to enhance privacy protection of DApp users (DApp 사용자의 프라이버시 보호 강화를 위한 공개형 블록체인 플랫폼 보안구조 강화방안)

  • Hwang, Seonjin;Ko, DongHyun;Bahk, Taeu;Choi, Yoon-ho
    • Journal of Internet Computing and Services
    • /
    • v.21 no.3
    • /
    • pp.1-9
    • /
    • 2020
  • Along with the growth of Blockchain, DApp (Distributed Application) is getting attention. As interest in DApp grows, market size continues to grow and many developers participate in development. Many developers are using API(Application Programming Interface) services to mediate Blockchain nodes, such as Infura, for DApp development. However, when using such a service, there is a serious risk that the API service operator can violate the user's privacy by 1 to 1 matching the account address of the Transaction executed by the DApp user with the IP address of the DApp user. It can have an adverse effect on the reliability of public Blockchains that need to provide users with a secure DApp service environment. The proposed Blockchain platform is expected to provide user privacy protection from API services and provide a reliable DApp use environment that existing Blockchain platforms did not provide. It is also expected to help to activate DApp and increase the number of DApp users, which has not been activated due to the risk of an existing privacy breach.

Legislative Reform of Smart Grid Privacy Act (스마트그리드 개인정보보호법제 개선)

  • Lee, Donghyeok;Park, Namje
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.2
    • /
    • pp.415-423
    • /
    • 2016
  • Smart grid systems can be real-time information exchange between suppliers and consumers, and provides a lot of convenience. However, the risk to the user's personal information exposure is ever-present. Depending on the characteristic of the smart grid environment, there is a threat of the disclosure of personal information based on the personal information life-cycle, and can also be exposed a variety of information based on energy consumption pattern analysis. In this paper, we analyze the existing privacy act in the smart grid and propose improvements for the existing directive.

Bed Side Monitoring System using Occupancy Sensor and Doppler Radar (Occupancy 센서와 도플러 Radar를 이용한 침상 모니터링 시스템)

  • Kang, Byung Wuk;Yoo, Sun Kook
    • Journal of Korea Multimedia Society
    • /
    • v.21 no.3
    • /
    • pp.382-390
    • /
    • 2018
  • A major accident occurring on the bed is falls that occur during at times when the care of nurses or protectors is inadequate, which is fatal to patients or the elderly. In particular, Enuresis or sleepiness caused by sleep apnea increases the risk of falls. Therefore, it is very important to detect falls and sleep apnea of patients without infringing privacy in the bed to patient's safety and accident prevention. In this paper, we reviewed the technologies developed for bed monitoring and implemented a non-intrusive monitoring system. The Occupancy Sensor allows the temperature of the bed and surrounding area to be extracted to enable track of the patient's motion. The Doppler Radar detects the patient's movements at normal times and the respiration state when patients have no movement during sleeping. It is specially designed for real-time monitoring of falling and respiration during sleeping through contactless multi-sensing while solving patient's privacy problems.

Factors Affecting the Behavioral Intention and Behavior of Using E-Wallets of Youth in Vietnam

  • PHAN, Trong Nhan;HO, Truc Vi;LE-HOANG, Phuong Viet
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.7 no.10
    • /
    • pp.295-302
    • /
    • 2020
  • The study examines an empirical case that explores the key constructs of the Unified Theory of Acceptance and Use of Technology (UTAUT) (Venkatesh, Morris, Davis & Davis, 2003) and the relationship between security and privacy of the Theory of Perceived Risk (TPR) (Bauer, 1960). This study employs survey data of 200 young Internet users aged 18 to 25. The study was conducted through two steps: preliminary research by qualitative research method to form the official research scale then formal research by quantitative research method using CFA and SEM to test the research model. The research results show that performance expectancy and social influence significantly predict behavioral intention to use e-wallets in payment. In contrast, the factors, namely, security and privacy, and effort expectancy, are statistically insignificant on behavioral intention. Nevertheless, the facilitating conditions factor still affects the behavior of using e-wallets. The study proposes a model to generalize the online payment environment through the integration of UTAUT and TPR models that are important for online payment management and researchers in the technology environment. The findings of this study suggest that social influence significantly affects the intention of young people to use e-wallets instead of security and privacy.

Analyses of Light-weight Protocol for Tag Security in RFID System (RFID 시스템에서의 태그 보안을 위한 경량화 프로토콜의 분석)

  • Kim, Jung-Tae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.11
    • /
    • pp.2399-2403
    • /
    • 2011
  • Radio Frequency Identification(RFID) has been considered as an key infrastructure for the ubiquitous society. However, due to the inherent drawbacks, RFID causes var- ious security threats like privacy problems, tag cloning, etc. This paper analyses the security risk analysis process from the perspective of the RFID tag life cycle, identify the tag usage process, identify the associated vulnerability and threat to the confidentiality, integrity and availability of the information assets and its implications for privacy, and the mitigate the risks.

A Study on the FinTech : The consideration of the Security (핀테크의 보안 고려사항에 대한 연구)

  • Lee, Yujin;Chang, Beomhwan;Lee, Youngsook
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.12 no.3
    • /
    • pp.111-123
    • /
    • 2016
  • Recently, mobile devices have been widely used. Therefore, the service users want that are not constrained by time and space. Among them, electronic payment services, mobile finance service is enjoying a tremendous popularity. The FinTech is the result of the fusion of finance and ICT(Information & Communication Technology). Security experts is pointed the FinTech security risk. New technology and Innovative FinTech services are even available, Insecure FinTech services is insignificant. In this paper we were surveyed market and product trends of FinTech and analyzed the threats about FinTech. Also, we analyzed the security considerations for FinTech using a questionnaire. As a result, users considers secure payment process and privacy. Therefore, we proposed security considerations for each vulnerability. So, we must be resolved of security technology and policy issues. If establishing a secure payment process and the unclear legal issue is resolved, FinTech service will provide a secure financial services to the user.

Secure E-Voting System with Secure Storage Media

  • Allayear, Shaikh Muhammad;Park, Sung-Soon
    • Annual Conference of KIPS
    • /
    • 2005.05a
    • /
    • pp.1075-1078
    • /
    • 2005
  • The Global IT revolution is growing rapidly. Government and business have to be ready to meet the increased demand for effective and secure online services. With the E-Government practicing, day-by-day the public demand is also increasing simultaneously. Now this present moment, one of important research part is secure E-Voting for E-Government service, but for this important factor or Government Issue, it needs information privacy for secure information transaction of citizen’s opinions and secure authentication. This paper has analyzed several approaches E-voting protocols, those are implemented with many digital signature mechanism and maintained many types of cryptographic rules, which are main factor for information privacy. In this paper we have discussed them with a view to voter anonymity and protection from manipulations. The paper then developed an algorithm designed to guarantee anonymity of the voter and to avoid the risk of manipulation of votes. In this paper the proposed algorithm is based upon the strict separation of voter’s registration and submission of votes, which means that certain information has to be stored on a secure storage media.

  • PDF

Analyses of Privacy and Vulnerability with Light-weight RFID System (저용량 RFID 시스템에서의 보안 및 취약성 분석)

  • Ahn, Byung-Jun;Park, Young-Bum;Nam, Jun-Woo;Kim, Jung-Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.10a
    • /
    • pp.773-775
    • /
    • 2011
  • We analysed privacy, attack model and vulnerability with light-weight RFID System. A specific system's vulnerability depends on its implementation and the applied countermeasures. We can build an RFID system with a satisfactory security level even in a high-risk application area. To do so, however, we must pay attention to the implementation of proportional security measures.

  • PDF

Enhancing Privacy Protection in Steppy Applications through Pseudonymization

  • Nugroho, Heri Arum;Prihatmanto, Ary Setijadi;Rhee, Kyung Hyune
    • Annual Conference of KIPS
    • /
    • 2015.10a
    • /
    • pp.763-766
    • /
    • 2015
  • Smart Healthcare System as an Open Platform (Shesop) is an integrated healthcare system and have several features, one of them is Steppy Application. Steppy does count your step and display on Shesop website. In this system security issues are not properly addressed, while Personal Health Record (PHR) patient stored in the cloud platform could be at risk. In fact, the huge electronic information available online, people needs reliable and effective technique for privacy preserving. In order to improve the security of data which are displayed on the Shesop website, so that anyone who access could not tamper without permission. Recently Xu et al. showed a pseudonym scheme using smart card as a solution in e-health systems which uses discrete logarithm problem with cyclic group. In this paper, we adopt their scheme and use it application into smartphone using Near Field Communication (NFC) to construct security in Steppy apps.

Analysis on the Possibility of Electronic Surveillance Society in the Intelligence Information age

  • Chung, Choong-Sik
    • Journal of Platform Technology
    • /
    • v.6 no.4
    • /
    • pp.11-17
    • /
    • 2018
  • In the smart intelligence information society, there is a possibility that the social dysfunction such as the personal information protection issue and the risk to the electronic surveillance society may be highlighted. In this paper, we refer to various categories and classify electronic surveillance into audio surveillance, visual surveillance, location surveillance, biometric information surveillance, and data surveillance. In order to respond to new electronic surveillance in the intelligent information society, it requires a change of perception that is different from that of the past. This starts with the importance of digital privacy and results in the right to self-determination of personal information. Therefore, in order to preemptively respond to the dysfunctions that may arise in the intelligent information society, it is necessary to further raise the awareness of the civil society to protect information human rights.