• Title/Summary/Keyword: Private Information Exposure

Search Result 55, Processing Time 0.023 seconds

Modern Study on Internet of Medical Things (IOMT) Security

  • Aljumaie, Ghada Sultan;Alzeer, Ghada Hisham;Alghamdi, Reham Khaild;Alsuwat, Hatim;Alsuwat, Emad
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.8
    • /
    • pp.254-266
    • /
    • 2021
  • The Internet of Medical Things (IoMTs) are to be considered an investment and an improvement to respond effectively and efficiently to patient needs, as it reduces healthcare costs, provides the timely attendance of medical responses, and increases the quality of medical treatment. However, IoMT devices face exposure from several security threats that defer in function and thus can pose a significant risk to how private and safe a patient's data is. This document works as a comprehensive review of modern approaches to achieving security within the Internet of Things. Most of the papers cited here are used been carefully selected based on how recently it has been published. The paper highlights some common attacks on IoMTs. Also, highlighting the process by which secure authentication mechanisms can be achieved on IoMTs, we present several means to detect different attacks in IoMTs

A Study on the smartphone management standards(OMA DM) (스마트폰 관리 표준(OMA DM)에 관한 연구)

  • Bae, Jung-Min;Jung, Sung-Jae;Bae, Yu-Mi;Jang, Rea-Young;Soh, Woo-Young
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.05a
    • /
    • pp.253-255
    • /
    • 2013
  • It is being exposed to hazard about the person or company's information, according to mobile-telecommunication's development. Those situations are being threatened to private information exposure and in a bid to stop the outflow of new technologies from coporations or goverment. to resolve this issue, the administration of SMART phone's applications and the skill of handling for device applying the standard of DM defining protocol and Mechanism Study into the software management and Device supervision under controlling, OMA which is affiliated to Mobile Service Standard Organization.

  • PDF

A Case Study on the Disaster Management of the Private Sector in Japan (일본의 민간협력형 도서관재난관리 사례연구)

  • Youn You-Ra;Lee Eun-Ju
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.5
    • /
    • pp.951-956
    • /
    • 2023
  • In the current situation where systematic and active disaster management is becoming more important, domestic libraries do not have their own disaster management plans or support systems. In order to improve these problems, this study looked at overseas cases. Among them, we looked at Japan, where related cases and research are actively underway due to its exposure to various geopolitical disasters. In particular, we focused on cases of public-private cooperation established after the Great East Japan Earthquake. Association's Library Disaster Response Committee and saveMALK, a voluntary network of experts. The Library Disaster Response Committee played a central role in organizing donations and volunteer activities, and saveMALK played a role in collecting and sharing information by forming a collective intelligence among relevant experts. This analysis of the Japanese case has positive implications for building collaborative disaster management system.

Provably secure attribute based signcryption with delegated computation and efficient key updating

  • Hong, Hanshu;Xia, Yunhao;Sun, Zhixin;Liu, Ximeng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.5
    • /
    • pp.2646-2659
    • /
    • 2017
  • Equipped with the advantages of flexible access control and fine-grained authentication, attribute based signcryption is diffusely designed for security preservation in many scenarios. However, realizing efficient key evolution and reducing the calculation costs are two challenges which should be given full consideration in attribute based cryptosystem. In this paper, we present a key-policy attribute based signcryption scheme (KP-ABSC) with delegated computation and efficient key updating. In our scheme, an access structure is embedded into user's private key, while ciphertexts corresponds a target attribute set. Only the two are matched can a user decrypt and verify the ciphertexts. When the access privileges have to be altered or key exposure happens, the system will evolve into the next time slice to preserve the forward security. What's more, data receivers can delegate most of the de-signcryption task to data server, which can reduce the calculation on client's side. By performance analysis, our scheme is shown to be secure and more efficient, which makes it a promising method for data protection in data outsourcing systems.

Similarity measurement based on Min-Hash for Preserving Privacy

  • Cha, Hyun-Jong;Yang, Ho-Kyung;Song, You-Jin
    • International Journal of Advanced Culture Technology
    • /
    • v.10 no.2
    • /
    • pp.240-245
    • /
    • 2022
  • Because of the importance of the information, encryption algorithms are heavily used. Raw data is encrypted and secure, but problems arise when the key for decryption is exposed. In particular, large-scale Internet sites such as Facebook and Amazon suffer serious damage when user data is exposed. Recently, research into a new fourth-generation encryption technology that can protect user-related data without the use of a key required for encryption is attracting attention. Also, data clustering technology using encryption is attracting attention. In this paper, we try to reduce key exposure by using homomorphic encryption. In addition, we want to maintain privacy through similarity measurement. Additionally, holistic similarity measurements are time-consuming and expensive as the data size and scope increases. Therefore, Min-Hash has been studied to efficiently estimate the similarity between two signatures Methods of measuring similarity that have been studied in the past are time-consuming and expensive as the size and area of data increases. However, Min-Hash allowed us to efficiently infer the similarity between the two sets. Min-Hash is widely used for anti-plagiarism, graph and image analysis, and genetic analysis. Therefore, this paper reports privacy using homomorphic encryption and presents a model for efficient similarity measurement using Min-Hash.

Partial Key Exposure Attack on Unbalanced RSA with small CRT exponent (작은 CRT 지수를 사용한 RSA에서의 일부 키 노출 공격)

  • 이희정
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.5
    • /
    • pp.135-140
    • /
    • 2004
  • In Crypto 2002 May analyzed the relation between the size of two primes and private key in unbalanced RSA with small CRT exponent. Also in Crypto 2003 he showed that if $N^{1}$4/ amount of most significant bits(least significant bits) of $d_{p}$ is exposed in balanced RSA with CRT, N can be factored. To prove this he used Howgrave-Graham's Theorem. In this paper we show that if $N^{1}$4/ amount of $d_{p}$ , p is smaller than q, and bigger than $N^{0.382}$ to avoid May's attack, is exposed in unbalanced RSA with small CRT exponent, it is enough to expose $d_{p}$ . We use Coppersmith's theorem with unbalanced primes.

Working Environment and Experiences of Diseases in Semiconductor Industry (반도체 산업의 작업환경과 질병의 경험들)

  • Kong, Jeong-Ok
    • Journal of Korean Society of Occupational and Environmental Hygiene
    • /
    • v.22 no.1
    • /
    • pp.32-41
    • /
    • 2012
  • Objectives: Information of chemical in electronics industry has not been known enough, although workers' health hazards by chemicals in this industry have been regarded serious. The who always contribute to reveal and control the health hazards and risks in electronics industry have not been the industry but the occupational or environmental victims and grassroot organizations. The similar phenomena can be observed in Korea. Methods: The experiences of individual workers on the occuapational safety and health in semiconductor factory were heard separately and integrated with related literatures. Results:: The first part of this article is largely based on the memories and experiences of individual workers of semiconductor factories, mainly from S semiconductor. Common features of those experiences can be a good resource for detail understanding of the workplace, especially under the situation without any transparent disclosure of information by the governments or the companies. The second part of this article deals with several factors to be considered for control of exposure in workplace; characteristics of workplace and workforce, types of chemicals used, and the way of using the chemicals. Then the current social issues on work-relatedness of cancers of S semiconductor workers are presented briefly. Conclusions: As a conclusion, current OSH situations and issues in Korean electronics industry raise the need of changes in OSH culture. General adaptation of precautionary principle, internalization of costs, and extended responsibility of producers are needed urgently. The OSH professionals both in public and private sectors should support these agendas under their social obligation to protect workers' health.

An Efficient and Secure Handover Mechanism for MVPN Services (MVPN 서비스 제공을 위한 효율적이고 안전한 핸드오버 메커니즘)

  • Woo, Hyun-Je;Kim, Kyoung-Min;Lee, Mee-Jeong
    • Journal of KIISE:Information Networking
    • /
    • v.34 no.1
    • /
    • pp.62-72
    • /
    • 2007
  • Mobile Virtual Private Network (MVPN) provides VPN services without geographical restriction to mobile workers using mobile devices. Coexistence of Mobile IP (MIP) protocol for mobility and IPsec-based VPN technology are necessary in order to provide continuous VPN service to mobile users. However, Problems like registration failure or frequent IPsec tunnel re-negotiation occur when IPsec-based VPN Gateway (GW) and MIP are used together. In order to solve these problems, IETF proposes a mechanism which uses external home agent (x-HA) located external to the corporate VPN GW. In addition, based on the IETF proposal, a mechanism that assigns x-HA dynamically in the networks where MN is currently located was also proposed with the purpose to reduce handover latency as well as end-to-end delay. However, this mechanism has problems such as exposure of a session key for dynamic Mobility Security Association (MSA) or a long latency in case of the handover between different networks. In this paper, we propose a new MVPN protocol in order to minimize handover latency, enhance the security in key exchange, and to reduce data losses cause by handover. Through a course of simulation, the performance of proposed protocol is compared with the existing mechanism.

Design and Implementation of Authority Management for the Integrated Medical Information System in a Hospital Environment (병원환경의 통합의료정보시스템에 적합한 권한관리 설계 및 구현)

  • Cha, Hyo Soung;Chung, Seung Hyun;Ryu, Keun Ho;Hwang, Jeong Hee
    • Convergence Security Journal
    • /
    • v.14 no.5
    • /
    • pp.57-64
    • /
    • 2014
  • Beginning in 2000, domestic large hospital based integrated health information system has been developed from order communication system to electronic medical record system. However, today's advanced medical information system is integrated with unit of the system because user needs is complex and various. And, the problem is authority management of health information system in complex systems of large size hospital. It is also a serious problem of private information exposure because of user's authority management defect. In this paper, we analyze the problems of past hospital information system and propose an efficient and appropriate management authority in operating environment. It also introduces the instances applied into a large hospital EMR system, developing proper authority management to match the characteristics of the integrated medical information system. The proposed system is based on solutions of authority management system suitable for integrated health information system, as well as the next generation of EMR.

VANET Privacy Assurance Architecture Design (VANET 프라이버시 보장 아키텍처 설계)

  • Park, Su-min;Hong, Man-pyo;Shon, Tae-shik;Kwak, Jin
    • Journal of Internet Computing and Services
    • /
    • v.17 no.6
    • /
    • pp.81-91
    • /
    • 2016
  • VANET is one of the most developed technologies many people have considered a technology for the next generation. It basically utilizes the wireless technology and it can be used for measuring the speed of the vehicle, the location and even traffic control. With sharing those information, VANET can offer Cooperative ITS which can make a solution for a variety of traffic issues. In this way, safety for drivers, efficiency and mobility can be increased with VANET but data between vehicles or between vehicle and infrastructure are included with private information. Therefore alternatives are necessary to secure privacy. If there is no alternative for privacy, it can not only cause some problems about identification information but also it allows attackers to get location tracking and makes a target. Besides, people's lives or property can be dangerous because of sending wrong information or forgery. In addition to this, it is possible to be information stealing by attacker's impersonation or private information exposure through eavesdropping in communication environment. Therefore, in this paper we propose Privacy Assurance Architecture for VANET to ensure privacy from these threats.