• 제목/요약/키워드: Usable Security

검색결과 49건 처리시간 0.024초

Performance Analysis of Perturbation-based Privacy Preserving Techniques: An Experimental Perspective

  • Ritu Ratra;Preeti Gulia;Nasib Singh Gill
    • International Journal of Computer Science & Network Security
    • /
    • 제23권10호
    • /
    • pp.81-88
    • /
    • 2023
  • In the present scenario, enormous amounts of data are produced every second. These data also contain private information from sources including media platforms, the banking sector, finance, healthcare, and criminal histories. Data mining is a method for looking through and analyzing massive volumes of data to find usable information. Preserving personal data during data mining has become difficult, thus privacy-preserving data mining (PPDM) is used to do so. Data perturbation is one of the several tactics used by the PPDM data privacy protection mechanism. In Perturbation, datasets are perturbed in order to preserve personal information. Both data accuracy and data privacy are addressed by it. This paper will explore and compare several perturbation strategies that may be used to protect data privacy. For this experiment, two perturbation techniques based on random projection and principal component analysis were used. These techniques include Improved Random Projection Perturbation (IRPP) and Enhanced Principal Component Analysis based Technique (EPCAT). The Naive Bayes classification algorithm is used for data mining approaches. These methods are employed to assess the precision, run time, and accuracy of the experimental results. The best perturbation method in the Nave-Bayes classification is determined to be a random projection-based technique (IRPP) for both the cardiovascular and hypothyroid datasets.

Cloud of Things (CoTs): Security Threats and Attacks

  • Almtrafi, Sara Mutlaq;Alkhudadi, Bdour Abduallatif;Alsuwat, Hatim;Alsuwat, Emad
    • International Journal of Computer Science & Network Security
    • /
    • 제21권8호
    • /
    • pp.229-237
    • /
    • 2021
  • Cloud of things (CoTs) is a newer idea which combines cloud computing (CC) with the Internet of Things (IoT). IoT capable of comprehensively producing data, and cloud computing can be presented pathways that allow for the progression towards specific destinations. Integrating these technologies leads to the formation of a separate element referred to as the Cloud of Things (CoTs). It helps implement ideas that make businesses more efficient. This technology is useful for monitoring a device or a machine and managing or connecting them. Since there are a substantial amount of machines that can run the IoT, there is now more data available from the IoT that would have to be stored on a local basis for a provisional period, and this is impossible. CoTs is used to help manage and analyze data to additionally create usable information by permitting and applying the development of advanced technology. However, combining these elements has a few drawbacks in terms of how secure the process is. This investigation aims to recent study literature from the past 3 years that talk about how secure the technology is in terms of protecting by authentication, reliability, availability, confidentiality, and access control. Additionally, this investigation includes a discussion regarding some kinds of potential attacks when using Cloud of Things. It will also cover what the various authors recommend and conclude with as well as how the situation can be approached to prevent an attack.

지킴이: 유닉스 시스템을 위한 통합 보안 점검 도구 (Zkimi : Integrated Security Analysis Tool for UNIX Systems)

  • 채흥석;이남희;김형호;김내희;차성덕;백석철;임규건;박승민;정종윤
    • 정보보호학회논문지
    • /
    • 제7권3호
    • /
    • pp.23-40
    • /
    • 1997
  • 지금까지 유닉스 시스템의 보안을 점검하거나 향상시키기 위하여 다양한 보안 도구들이 공개 소프트웨어(public domain)로 개발되어 사용되었다. 그러나, 대부분의 보안 도구들은 편리하고 일관성 있는 사용자 인터페이스를 제공하지 않으며, 또한 시스템의 특정 부분에 대 한 점검 기능만을 제공한다. 따라서, 시스템의 전반적인 보안을 관리해야 하는 시스템 관리자는 사용하기 불편한 여러 개의 도구들을 함께 사용해야 한다. 게다가, 이러한 도구들은 영어권에서 개발되었기 때문에, 국내의 현실이 잘 반영되지 않는 면이 있다. 본 논문에서는 사용하기 편리하면서 시스템의 전반적인 보안 점검 기능을 제공하는 통합 보안 점검 도구로서 "지킴이"를 구현하였다. 지킴이는 시스템의 전반적인 보안 점검을 위한 계정 보안, 시스템 보안, 네트웍 보안, 화일 변경 검사 기능과, 관리자의 정기적인 시스템 관리를 효율적으로 지원하기 위한 주기적인 보안 점검 기능을 제공한다. 지킴이의 각 기능은 기존의 공개된 대표적인 보안 도구를 바탕으로 하였으며, 기존 도구들의 단순한 조합이 아니라, 시스템 전체의 보안을 위해 필수적인 기능을 제공하도록 구성하였다. 그리고, WWW를 바탕으로 하는 사용자 인터페이스를 제공하기 때문에, 사용자는 기존의 WWW 브라우저를 이용하여 시스템의 전반적인 보안 상태를 점검할 수 있다. 또한, 지킴이를 실제 운용 중인 유닉스 시스템의 보안 상태를 점검하기 위하여 적용하였으며, 이를 통해서 지킴이의 효용성을 확인하였다.용성을 확인하였다.

Phase-Shifting Transformer를 이용한 계통 혼잡처리 방안 (Congestion management Using Phase-Shifting Transformer in Power Systems)

  • 김규호;신호성;송경빈
    • 대한전기학회:학술대회논문집
    • /
    • 대한전기학회 2005년도 제36회 하계학술대회 논문집 A
    • /
    • pp.822-824
    • /
    • 2005
  • This paper presents a scheme to solve the congestion problem using phase-shifting transformer(PST) in power systems. Available transfer capability(ATC) is an important indicator of the usable amount of transmission capacity accessible by several parties for commercial trading in power transaction activities. This paper deals with an application of optimization technique for ATC calculation. Sequential quadratic programming(SQP) is used to maximize power flow of tie line subject to security constraints such as voltage magnitude and real power flow. The proposed method is applied to 10 machines 39 buses model systems to show its effectiveness.

  • PDF

수정모드를 고려한 예방모드에서의 유연송전기기 최적투입계획 관한 연구 (Optimal Allocation of FACTS Devices Considering both Corrective and Prevenvite Mode)

  • 임남규;송화창;이병준
    • 대한전기학회:학술대회논문집
    • /
    • 대한전기학회 2000년도 추계학술대회 논문집 학회본부 A
    • /
    • pp.23-25
    • /
    • 2000
  • In recent deregulation and competitive power market environment, electric utilities plan and operate their systems for economic benefit with secure system condition. Flexible AC transmission system(FACTS) technology opens up new opportunities of controlling power and enhancing the usable capacity of present transmission system. This paper presents a method for security constrained optimal allocation of FAETS considering contingencies for the purpose of enhanced system operation. The proposed scheme uses Benders decomposition to account of both corrective and preventive mode.

  • PDF

연계계통에서 가용송전용량 평가를 위한 최적화 알고리즘의 비교 (Comparison of Optimization Algorithms for Available Transfer Capability Assessment in Interconnected Systems)

  • 김규호;송경빈
    • 대한전기학회논문지:전력기술부문A
    • /
    • 제55권12호
    • /
    • pp.549-554
    • /
    • 2006
  • Available transfer capability(ATC) is an important indicator of the usable amount of transmission capacity accessible by several parties for commercial trading in power transaction activities. This paper deals with an application of optimization technique for available transfer capability(ATC) calculation and analyzes the results of ATC by considering several constraints. Especially several optimization techniques are used to solve the ATC problem with state-steady security constraints. The results are compared with that of repeat power flow(RPF), sequential quadratic programming(SQP) and linear programming(LP). The proposed method is applied to 10 machines 39 buses model systems to show its effectiveness.

전압제약을 고려한 가용송전용량 결정 및 분석 (ATC Determination and Analysis Considering Voltage Constraints)

  • 김규호;박진욱;김진오;신동준
    • 대한전기학회:학술대회논문집
    • /
    • 대한전기학회 2004년도 추계학술대회 논문집 전력기술부문
    • /
    • pp.169-171
    • /
    • 2004
  • Available transfer capability(ATC) is an important indicator of the usable amount of transmission capacity accessible by several parties for commercial trading in power transaction activities. This paper deals with an application of optimization technique for available transfer capability(ATC) calculation and analyzes the results of ATC by considering several constraints. Sequential quadratic programming(SQP) is used to calculate the ATC problem with state-steady security constraints. The proposed method is applied to 10 machines 39 buses model systems to show its effectiveness.

  • PDF

가용송전용량 계산을 위한 최적화기법 응용 (Application of Optimization Technique for Available Transfer Capability Caculation)

  • 김규호;신동준;김진오;김태균
    • 대한전기학회:학술대회논문집
    • /
    • 대한전기학회 2004년도 하계학술대회 논문집 A
    • /
    • pp.183-185
    • /
    • 2004
  • This paper deals with an application of optimization technique for available transfer capability(ATC) calculation. ATC is an important indicator of the usable amount of transmission capacity accessible by several parties for commercial trading. Sequential quadratic programming(SQP) is used to calculate the ATC problem with state-steady security constraints. The proposed method is applied to 10 machines 39 buses model systems. The results are discussed and compared to those obtained by continuation power flow(CPF).

  • PDF

컨테이너 위치 추적에 활용되는 GPS/GLONASS 안테나 설계 및 성능 검증 (Design and Performance Evaluation for GPS/GLONASS Antenna used for Container tracking)

  • 이은규;최성필;문영식;김재중;최형림
    • 한국정보통신학회논문지
    • /
    • 제17권7호
    • /
    • pp.1544-1550
    • /
    • 2013
  • 최근에는 미국에서 개발 및 관리하는 위성항법시스템과(GPS)와 러시아에서 운용하는 위성항법시스템(GLONASS)을 함께 수신하여 컨테이너 보안 장치에 활용함으로서 물류 효율성을 향상시키기 위한 방안이 연구되고 있다. 본 논문에서는 컨테이너화물 안전수송에 사용되는 컨테이너 위치 수신 안테나를 설계 및 제작하여 그 성능을 검증하였다. 제작된 안테나는 물류시스템에 운영할 수 있도록 물류 환경에 맞춰 광대역 원편파 특성과 GPS/GLONASS 듀얼 주파수 지원 가능하도록 성능을 최적화 하였다. 정재파비(VSWR) 2:1에서 대역폭은 26.1MHz이며 GPS(1575.42MHz)와 GLONASS(1602MHz)의 반사손실은 -9.54dB로 나왔다. 개발 완료한 안테나는 실제 한국간 러시아 물류 환경에 적용함으로써 GPS/GLONASS 신호가 국가 간 이동에도 정상적으로 수신됨을 시범 운영 테스트를 통해 성능 검증을 확인 하였다.

인터넷 쇼핑몰에서 구매 경험과 소비자 특성이 의류 제품 구매 시 지각하는 위험과 구매 저해에 미치는 영향 (Perceived Risk and Purchase Obstruction Factors When Purchasing Clothing Online)

  • 김지연;문지영;박정권;최은정;이지연
    • 복식문화연구
    • /
    • 제18권1호
    • /
    • pp.118-132
    • /
    • 2010
  • The purpose of this study is to understand factors of risk perception and purchase obstruction by consumer characteristics and purchase experience of clothing in online. The collection of the research materials was progressed by online and offline. Out of 374 usable questionnaires used for examining this study, 278 questionnaires were collected from offline and 107 questionnaires were collected from online. Frequency analysis, factor analysis, reliability analysis, t-test, One-way ANOVA and multiple regression analysis using SPSS WIN 12.0 were conducted. Three factors of perceived risk were extracted: harmonic/image, quality/shopping process, payments. Based on these dimensions, ANOVA was conducted. The results indicated that the more purchasing experience people had, the less the extent of perceived risk they got, and quality/shopping process risk mostly among them. As the factors which obstruct purchasing decision, a security obstruction, a reliability obstruction, a convenient obstruction and an information insufficient obstruction are extracted. Also, the factors have got the result of same aspects as the perceived risk recognized by the Internet shopping experience. Meaningful differences between groups appear at security obstruction, reliability obstruction, and convenient obstruction. Perceived risk almost influenced on purchase obstruction when purchasing clothes in Internet shopping mall. When consumers perceiving harmony/image risk highly make decisions, they usually hesitate or abandon due to reliability obstruction, convenient obstruction. All the factors: including security obstruction, reliability obstruction, convenient obstruction and information insufficient obstruction made consumers perceiving quality/shopping process risk highly obstruct purchase decision.