• Title/Summary/Keyword: Usable-Security

Search Result 49, Processing Time 0.02 seconds

Performance Analysis of Perturbation-based Privacy Preserving Techniques: An Experimental Perspective

  • Ritu Ratra;Preeti Gulia;Nasib Singh Gill
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.10
    • /
    • pp.81-88
    • /
    • 2023
  • In the present scenario, enormous amounts of data are produced every second. These data also contain private information from sources including media platforms, the banking sector, finance, healthcare, and criminal histories. Data mining is a method for looking through and analyzing massive volumes of data to find usable information. Preserving personal data during data mining has become difficult, thus privacy-preserving data mining (PPDM) is used to do so. Data perturbation is one of the several tactics used by the PPDM data privacy protection mechanism. In Perturbation, datasets are perturbed in order to preserve personal information. Both data accuracy and data privacy are addressed by it. This paper will explore and compare several perturbation strategies that may be used to protect data privacy. For this experiment, two perturbation techniques based on random projection and principal component analysis were used. These techniques include Improved Random Projection Perturbation (IRPP) and Enhanced Principal Component Analysis based Technique (EPCAT). The Naive Bayes classification algorithm is used for data mining approaches. These methods are employed to assess the precision, run time, and accuracy of the experimental results. The best perturbation method in the Nave-Bayes classification is determined to be a random projection-based technique (IRPP) for both the cardiovascular and hypothyroid datasets.

Cloud of Things (CoTs): Security Threats and Attacks

  • Almtrafi, Sara Mutlaq;Alkhudadi, Bdour Abduallatif;Alsuwat, Hatim;Alsuwat, Emad
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.8
    • /
    • pp.229-237
    • /
    • 2021
  • Cloud of things (CoTs) is a newer idea which combines cloud computing (CC) with the Internet of Things (IoT). IoT capable of comprehensively producing data, and cloud computing can be presented pathways that allow for the progression towards specific destinations. Integrating these technologies leads to the formation of a separate element referred to as the Cloud of Things (CoTs). It helps implement ideas that make businesses more efficient. This technology is useful for monitoring a device or a machine and managing or connecting them. Since there are a substantial amount of machines that can run the IoT, there is now more data available from the IoT that would have to be stored on a local basis for a provisional period, and this is impossible. CoTs is used to help manage and analyze data to additionally create usable information by permitting and applying the development of advanced technology. However, combining these elements has a few drawbacks in terms of how secure the process is. This investigation aims to recent study literature from the past 3 years that talk about how secure the technology is in terms of protecting by authentication, reliability, availability, confidentiality, and access control. Additionally, this investigation includes a discussion regarding some kinds of potential attacks when using Cloud of Things. It will also cover what the various authors recommend and conclude with as well as how the situation can be approached to prevent an attack.

Zkimi : Integrated Security Analysis Tool for UNIX Systems (지킴이: 유닉스 시스템을 위한 통합 보안 점검 도구)

  • 채흥석;이남희;김형호;김내희;차성덕;백석철;임규건;박승민;정종윤
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.7 no.3
    • /
    • pp.23-40
    • /
    • 1997
  • There are a lot of security tools for the investigation and improvement of UNIX systems. However, most of them fail to provide a consistent and usable user interface. In addition, they concentrate on a specific aspect of a system, not the whole one. For the overall management, system administrators cannot help using several uncomfortable tools. This paper introduces an integrated security analysis tool, named "Zkimi", which provides a convenient user interface and investigates the various aspects of UNIX systems such as account security, system security, network security, and file system integrity. The Zkimi supports user-friendly WWW based interface, so administrators can examine the various aspects of system more easily. We tried the tool for a system of a moderate size, and were confirmed that the tool is very efficient for investigating various security aspects of a system. a system.

Congestion management Using Phase-Shifting Transformer in Power Systems (Phase-Shifting Transformer를 이용한 계통 혼잡처리 방안)

  • Kim, Kyu-Ho;Shin, Ho-Sung;Song, Kyung-Bin
    • Proceedings of the KIEE Conference
    • /
    • 2005.07a
    • /
    • pp.822-824
    • /
    • 2005
  • This paper presents a scheme to solve the congestion problem using phase-shifting transformer(PST) in power systems. Available transfer capability(ATC) is an important indicator of the usable amount of transmission capacity accessible by several parties for commercial trading in power transaction activities. This paper deals with an application of optimization technique for ATC calculation. Sequential quadratic programming(SQP) is used to maximize power flow of tie line subject to security constraints such as voltage magnitude and real power flow. The proposed method is applied to 10 machines 39 buses model systems to show its effectiveness.

  • PDF

Optimal Allocation of FACTS Devices Considering both Corrective and Prevenvite Mode (수정모드를 고려한 예방모드에서의 유연송전기기 최적투입계획 관한 연구)

  • Lim, Nam-Kyu;Song, Hwa-Chang;Lee, Byong-Jun
    • Proceedings of the KIEE Conference
    • /
    • 2000.11a
    • /
    • pp.23-25
    • /
    • 2000
  • In recent deregulation and competitive power market environment, electric utilities plan and operate their systems for economic benefit with secure system condition. Flexible AC transmission system(FACTS) technology opens up new opportunities of controlling power and enhancing the usable capacity of present transmission system. This paper presents a method for security constrained optimal allocation of FAETS considering contingencies for the purpose of enhanced system operation. The proposed scheme uses Benders decomposition to account of both corrective and preventive mode.

  • PDF

Comparison of Optimization Algorithms for Available Transfer Capability Assessment in Interconnected Systems (연계계통에서 가용송전용량 평가를 위한 최적화 알고리즘의 비교)

  • Kim, Kyu-Ho;Song, Kyung-Bin
    • The Transactions of the Korean Institute of Electrical Engineers A
    • /
    • v.55 no.12
    • /
    • pp.549-554
    • /
    • 2006
  • Available transfer capability(ATC) is an important indicator of the usable amount of transmission capacity accessible by several parties for commercial trading in power transaction activities. This paper deals with an application of optimization technique for available transfer capability(ATC) calculation and analyzes the results of ATC by considering several constraints. Especially several optimization techniques are used to solve the ATC problem with state-steady security constraints. The results are compared with that of repeat power flow(RPF), sequential quadratic programming(SQP) and linear programming(LP). The proposed method is applied to 10 machines 39 buses model systems to show its effectiveness.

ATC Determination and Analysis Considering Voltage Constraints (전압제약을 고려한 가용송전용량 결정 및 분석)

  • Kim, Kyu-Ho;Park, Jin-Wook;Kim, Jin-O;Shin, Dong-Joon
    • Proceedings of the KIEE Conference
    • /
    • 2004.11b
    • /
    • pp.169-171
    • /
    • 2004
  • Available transfer capability(ATC) is an important indicator of the usable amount of transmission capacity accessible by several parties for commercial trading in power transaction activities. This paper deals with an application of optimization technique for available transfer capability(ATC) calculation and analyzes the results of ATC by considering several constraints. Sequential quadratic programming(SQP) is used to calculate the ATC problem with state-steady security constraints. The proposed method is applied to 10 machines 39 buses model systems to show its effectiveness.

  • PDF

Application of Optimization Technique for Available Transfer Capability Caculation (가용송전용량 계산을 위한 최적화기법 응용)

  • Kim Kyu Ho;Shin Dong Joon;Kim Jin O;Kim Tae Kyun
    • Proceedings of the KIEE Conference
    • /
    • summer
    • /
    • pp.183-185
    • /
    • 2004
  • This paper deals with an application of optimization technique for available transfer capability(ATC) calculation. ATC is an important indicator of the usable amount of transmission capacity accessible by several parties for commercial trading. Sequential quadratic programming(SQP) is used to calculate the ATC problem with state-steady security constraints. The proposed method is applied to 10 machines 39 buses model systems. The results are discussed and compared to those obtained by continuation power flow(CPF).

  • PDF

Design and Performance Evaluation for GPS/GLONASS Antenna used for Container tracking (컨테이너 위치 추적에 활용되는 GPS/GLONASS 안테나 설계 및 성능 검증)

  • Lee, Eun-Kyu;Choi, Sung-Pill;Moon, Young-Sik;Kim, Jae-Joong;Choi, Hyung-Rim
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.7
    • /
    • pp.1544-1550
    • /
    • 2013
  • In recent years, Container Security Device(CSD) using GPS & GLONASS to improve logistics efficiency are being extensively researched. The purpose of this paper is to examine the performance development antenna usable cargo container security transport. Antenna developed by study were optimized to match logistics environment apply to GPS/GLONASS dual frequency for monitering system. The measure of antenna have confirmation about frequency characteristics each 1575.42MHz, 1602MHz and VSWR is 2:1 measured in return loss -9.54dB. Reliability of this antenna has been verified about GPS/GLONASS through test-operation between the south korea and Russia.

Perceived Risk and Purchase Obstruction Factors When Purchasing Clothing Online (인터넷 쇼핑몰에서 구매 경험과 소비자 특성이 의류 제품 구매 시 지각하는 위험과 구매 저해에 미치는 영향)

  • Kim, Ji-Yeon;Moon, Ji-Young;Park, Jung-Kwon;Choi, Eun-Chung;Lee, Ji-Yeon
    • The Research Journal of the Costume Culture
    • /
    • v.18 no.1
    • /
    • pp.118-132
    • /
    • 2010
  • The purpose of this study is to understand factors of risk perception and purchase obstruction by consumer characteristics and purchase experience of clothing in online. The collection of the research materials was progressed by online and offline. Out of 374 usable questionnaires used for examining this study, 278 questionnaires were collected from offline and 107 questionnaires were collected from online. Frequency analysis, factor analysis, reliability analysis, t-test, One-way ANOVA and multiple regression analysis using SPSS WIN 12.0 were conducted. Three factors of perceived risk were extracted: harmonic/image, quality/shopping process, payments. Based on these dimensions, ANOVA was conducted. The results indicated that the more purchasing experience people had, the less the extent of perceived risk they got, and quality/shopping process risk mostly among them. As the factors which obstruct purchasing decision, a security obstruction, a reliability obstruction, a convenient obstruction and an information insufficient obstruction are extracted. Also, the factors have got the result of same aspects as the perceived risk recognized by the Internet shopping experience. Meaningful differences between groups appear at security obstruction, reliability obstruction, and convenient obstruction. Perceived risk almost influenced on purchase obstruction when purchasing clothes in Internet shopping mall. When consumers perceiving harmony/image risk highly make decisions, they usually hesitate or abandon due to reliability obstruction, convenient obstruction. All the factors: including security obstruction, reliability obstruction, convenient obstruction and information insufficient obstruction made consumers perceiving quality/shopping process risk highly obstruct purchase decision.